diff --git a/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json b/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json index 97cf84f07f5..9019ff0d94d 100644 --- a/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json +++ b/CVE-2023/CVE-2023-205xx/CVE-2023-20578.json @@ -2,8 +2,8 @@ "id": "CVE-2023-20578", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:19.510", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-02T17:35:44.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + }, { "source": "psirt@amd.com", "type": "Secondary", @@ -39,10 +59,2967 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "52229468-9A95-4B2A-B242-88A49198BB69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "75CC4E62-C004-4DB5-B045-8CA6F6375310" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "B72D0513-A081-4871-B4C4-8E3D4F1C7F20" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "4E2074A2-64F9-4504-BB6C-E5ABD0B9127F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "EF399472-A184-479C-85B1-53EF5839A1DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "E8525DD1-74DE-40A8-80DF-5CF8C6F0C6EC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "B814AA68-5BD4-496B-AAC1-5C38808EDAAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "2D8AAF48-ED77-48A0-B79E-BFFAF0EF6242" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "D4336899-8E52-4ED2-BDE0-332AC882BFDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "010984BE-83AF-43E4-A223-99F3A8109E78" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "871188D9-6824-4E32-966D-498289249197" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "AEBA6BC7-7200-487F-BAB7-1418DC4D31A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "869AB16C-9789-4224-B5FD-A0B8F592E3D3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "0AB7BEB3-7963-46F0-893F-1AC572ECA3F7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "D5834EEE-2556-4E2B-BCD7-FC00ADF202D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "4B2721D3-FB40-4226-A19D-25E08723CA00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "4080FDB7-2CCD-40A5-8911-7F6FA914711C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "368E596E-DC61-45B8-AD56-7F6F407C1696" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "151FF36E-D9B4-4AAE-BD92-29F9B80A323C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "A21871F5-1554-4114-A48E-4CB4EE49719F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "9D3E4278-4687-4ABB-B3DF-034CD3219DEA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "AC4882DB-052E-42B5-B7C4-8069208A2B6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "30D3F0ED-EF34-4019-A236-F82466C80D1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "0B445C34-694D-479F-AE24-C33C12EFE7AD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "5EE3CDA1-FCB5-4EEC-B432-B157B4821EA3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "EED4A04F-989A-4C2B-9D8A-BD55F35F25CF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "C366C81F-0BA0-4BB0-85CD-683B909070A6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "ADD566C1-9D5D-4290-A59C-5EC4858B7EEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "8DBED30F-F061-4D68-8DCA-36A0799B6B8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "14DE8C60-FFCA-4C1A-8E56-CA7D587FA6BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "640BBEA7-6FF0-48BE-9293-91B3938A944D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "FFC537E2-7ED8-4D06-982A-D82A8077A847" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "FFC90C96-F53B-4231-86D5-487E386D8753" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "12860839-6A4E-42CC-8E6D-498718E285CB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "E7F4DF58-DED1-4B73-8A79-8B726BDCF038" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "genoapi_1.0.0.2", + "matchCriteriaId": "8B7A0640-A14D-401A-97AC-BA053CD6EFD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "2BB5D70A-1627-4878-8F12-FB439C2BB2F0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "80BEF1BA-4533-40CA-8DC6-FCB6D9A291C4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "948D4C27-EBB2-4578-BE09-2F237B9B8D59" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "7C1AD7A8-7E0F-4EDD-B93F-D4800D54D776" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", + "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "32FA4160-368C-46AC-A7DD-623CB8CF1F01" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "36F046AD-A8BC-4BE1-812F-99E096779C77" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "910DFF12-DF71-444C-89A0-10CFE6A1BAA4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "milanpi_1.0.0.5", + "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "B9E27FD9-3F54-48A2-AA2E-EE797D264757" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "F683539A-0D2B-4FE8-823C-01439E74CF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "E51DCE34-419F-4645-899F-A02B352BDCA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "40F03482-025B-4323-831B-B0F985083CD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "D6FC45BE-C55D-4FB4-A10E-89A80477251C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "D9E7E49B-F739-4B9F-94AA-64041A3E38F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "E4613AA4-BE67-46B5-875C-A5D5CDEADB62" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "956D2603-DB21-4349-BA0A-3DDD3AD8177A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "A0D7C415-6952-4DCC-9EAE-50BD5DD8A226" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "A30368D7-2E1D-41D5-9E72-FB2D156C1AAF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "42707648-1703-4FA0-8D64-2149DA2C7C49" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "938BE7DE-6094-4E7B-BC42-88EC0E037C8A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "C4E7658B-5AE0-451A-8EAA-0713FA20C2C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "C812730D-D41C-4606-81E3-AB0A0389354D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "6D6DC9C5-2804-4320-8FA4-76A8F4665C73" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "EA520E42-E231-456B-AC4A-CBF7B42D1F4D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "877949F7-C06F-4804-97BB-4147F348F7A0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", + "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "D7C790F3-E6D1-4E00-9E48-C4FA4DB2A6B6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "8964660C-AB5C-4932-942E-B2C6F223B097" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "1FBA9BBB-0FF7-4D15-8AD3-BF591D136B5F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "09606942-FF1B-46A1-890D-65BDA7624704" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "7C40C74D-A6F9-4428-89E4-2201DD9E9919" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "99144DDA-F3EA-45E2-B470-ACD1652194F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "555BC41D-3E8E-49FE-BDF3-0D496B8A9147" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "romepi_1.0.0.g", + "matchCriteriaId": "D30A454D-0B71-4651-AFEB-E915BCB8AC9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "724E131E-E678-4AD7-B521-5E68882AF4BD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", + "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "07526B36-A301-49B4-A1B4-86D182D3BFD4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "C28F9044-4D6D-421D-8F8E-9A35DE6DA79E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "149DCFDB-8062-4376-A7F7-645A8D40AC84" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "DFACA3C3-7481-45DF-9870-7761CB858B2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "F606E5D6-0113-4908-900D-E94F87E6481A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "EDCBAB98-1683-47C3-8DDB-BF39F6286B34" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "5A0DC6B5-3851-40B2-B959-524A6116A6DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "70A4946C-DF6C-4CD8-9842-E5027FFAA078" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "1855549F-70B0-4670-BF61-C0DD02525C45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "C459B1FE-D8ED-4483-8780-9134C3246B5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "E90EDBC7-C8C6-4DF1-BF23-C883611DD4FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", + "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "99C92284-DD9E-4B5D-81D7-67990905C2EE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "1661DEF6-006B-4C14-953A-5322141B4CF0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", + "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "naplespi_1.0.0.k", + "matchCriteriaId": "5871DB40-AF57-4031-990E-E99902CAF8FC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", - "source": "psirt@amd.com" + "source": "psirt@amd.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3426.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3426.json index 1081238b302..d71ba34efec 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3426.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3426.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3426", "sourceIdentifier": "security@liferay.com", "published": "2023-08-02T10:15:09.887", - "lastModified": "2023-08-05T03:45:57.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-02T16:15:08.500", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-425" } ] } diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39059.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39059.json index d08a694ad3f..326cb2ff771 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39059.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39059.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39059", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-28T22:15:08.983", - "lastModified": "2023-08-30T00:30:06.513", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-02T16:35:25.547", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-395xx/CVE-2023-39508.json b/CVE-2023/CVE-2023-395xx/CVE-2023-39508.json index fe9d2eddc13..77dcd7a0384 100644 --- a/CVE-2023/CVE-2023-395xx/CVE-2023-39508.json +++ b/CVE-2023/CVE-2023-395xx/CVE-2023-39508.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39508", "sourceIdentifier": "security@apache.org", "published": "2023-08-05T07:15:43.607", - "lastModified": "2023-08-09T17:52:57.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-02T17:35:14.147", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45640.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45640.json index ef5c73b788c..e86af57861a 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45640.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45640.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45640", "sourceIdentifier": "audit@patchstack.com", "published": "2023-10-25T18:17:33.567", - "lastModified": "2023-11-01T16:19:20.753", + "lastModified": "2024-10-02T17:44:06.180", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:technowich:wp_ulike_-_most_advanced_wordpress_marketing_toolkit:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "4.6.8", - "matchCriteriaId": "9581A6A3-6F20-469C-BAB4-34352C5C6B39" + "matchCriteriaId": "5F73BFF4-FB94-4C8E-892E-7576F05ADA5B" } ] } diff --git a/CVE-2023/CVE-2023-511xx/CVE-2023-51157.json b/CVE-2023/CVE-2023-511xx/CVE-2023-51157.json index 0491cd15fe4..d3b89929b45 100644 --- a/CVE-2023/CVE-2023-511xx/CVE-2023-51157.json +++ b/CVE-2023/CVE-2023-511xx/CVE-2023-51157.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51157", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T19:15:04.453", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:58:20.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zkteco:wdms:5.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "24D5B083-72D5-4C4B-8902-FDED10E702F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://infosecwriteups.com/xss-store-in-zkteco-welcome-to-wdms-3d5c8e1113f0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20365.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20365.json new file mode 100644 index 00000000000..84cbd8e8195 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20365.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20365", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:14.863", + "lastModified": "2024-10-02T17:15:14.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to perform command injection attacks on an affected system and elevate privileges to root.\r\n\r\nThis vulnerability is due to insufficient input validation. An attacker with administrative privileges could exploit this vulnerability by sending crafted commands through the Redfish API on an affected device. A successful exploit could allow the attacker to elevate privileges to root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cimc-redfish-cominj-sbkv5ZZ", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20385.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20385.json new file mode 100644 index 00000000000..ca9da736ec3 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20385.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20385", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:15.110", + "lastModified": "2024-10-02T17:15:15.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SSL/TLS implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an unauthenticated, remote attacker to intercept sensitive information from an affected device. \r\n\r\nThis vulnerability exists because the Cisco NDO Validate Peer Certificate site management feature validates the certificates for Cisco Application Policy Infrastructure Controller (APIC), Cisco Cloud Network Controller (CNC), and Cisco Nexus Dashboard only when a new site is added or an existing one is reregistered. An attacker could exploit this vulnerability by using machine-in-the-middle techniques to intercept the traffic between the affected device and Cisco NDO and then using a crafted certificate to impersonate the affected device. A successful exploit could allow the attacker to learn sensitive information during communications between these devices." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndo-tlsvld-FdUF3cpw", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20393.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20393.json new file mode 100644 index 00000000000..3aa7f8cb7a3 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20393.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20393", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:15.337", + "lastModified": "2024-10-02T17:15:15.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to elevate privileges on an affected device.\r\n\r\nThis vulnerability exists because the web-based management interface discloses sensitive information. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow an attacker to elevate privileges from guest to admin." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20432.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20432.json new file mode 100644 index 00000000000..b81d4cd0361 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20432.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20432", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:15.550", + "lastModified": "2024-10-02T17:15:15.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the REST API and web UI of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, low-privileged, remote attacker to perform a command injection attack against an affected device.\r\n \r\nThis vulnerability is due to improper user authorization and insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted commands to an affected REST API endpoint or through the web UI. A successful exploit could allow the attacker to execute arbitrary commands on the CLI of a Cisco NDFC-managed device with network-admin privileges.\r\n \r\nNote: This vulnerability does not affect Cisco NDFC when it is configured for storage area network (SAN) controller deployment." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cmdinj-UvYZrKfr", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20438.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20438.json new file mode 100644 index 00000000000..919f78e4e9a --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20438.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20438", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:15.753", + "lastModified": "2024-10-02T17:15:15.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the REST API endpoints of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to read or write files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited network-admin functions such as reading device configuration information, uploading files, and modifying uploaded files.\r\nNote: This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20441.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20441.json new file mode 100644 index 00000000000..cd7c155c662 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20441.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20441", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:15.967", + "lastModified": "2024-10-02T17:15:15.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to download config only or full backup files and learn sensitive configuration information. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20442.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20442.json new file mode 100644 index 00000000000..5ebb997b0a6 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20442.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20442", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:16.177", + "lastModified": "2024-10-02T17:15:16.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the REST API endpoints of Cisco Nexus Dashboard could allow an authenticated, low-privileged, remote attacker to perform limited Administrator actions on an affected device.\r\n\r\nThis vulnerability is due to insufficient authorization controls on some REST API endpoints. An attacker could exploit this vulnerability by sending crafted API requests to an affected endpoint. A successful exploit could allow the attacker to perform limited Administrator functions such as viewing portions of the web UI, generating config only or full backup files, and deleting tech support files. This vulnerability only affects a subset of REST API endpoints and does not affect the web-based management interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20444.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20444.json new file mode 100644 index 00000000000..f85e3dac150 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20444", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:16.390", + "lastModified": "2024-10-02T17:15:16.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC), formerly Cisco Data Center Network Manager (DCNM), could allow an authenticated, remote attacker with network-admin privileges to perform a command injection attack against an affected device.\r\n \r\nThis vulnerability is due to insufficient validation of command arguments. An attacker could exploit this vulnerability by submitting crafted command arguments to a specific REST API endpoint. A successful exploit could allow the attacker to overwrite sensitive files or crash a specific container, which would restart on its own, causing a low-impact denial of service (DoS) condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-raci-T46k3jnN", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20448.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20448.json new file mode 100644 index 00000000000..725c4138632 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20448.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20448", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:16.597", + "lastModified": "2024-10-02T17:15:16.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Cisco Nexus Dashboard Fabric Controller (NDFC) software, formerly Cisco Data Center Network Manager (DCNM), could allow an attacker with access to a backup file to view sensitive information.\r\n\r\nThis vulnerability is due to the improper storage of sensitive information within config only and full backup files. An attacker could exploit this vulnerability by parsing the contents of a backup file that is generated from an affected device. A successful exploit could allow the attacker to access sensitive information, including NDFC-connected device credentials, the NDFC site manager private key, and the scheduled backup file encryption key." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-313" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-cidv-XvyX2wLj", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20449.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20449.json new file mode 100644 index 00000000000..7237ba801e9 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20449.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20449", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:16.820", + "lastModified": "2024-10-02T17:15:16.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an authenticated, remote attacker with low privileges to execute arbitrary code on an affected device.\r\n\r\nThis vulnerability is due to improper path validation. An attacker could exploit this vulnerability by using the Secure Copy Protocol (SCP) to upload malicious code to an affected device using path traversal techniques. A successful exploit could allow the attacker to execute arbitrary code in a specific container with the privileges of root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-ptrce-BUSHLbp", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json new file mode 100644 index 00000000000..0f5c1925ada --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20470.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-20470", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:17.027", + "lastModified": "2024-10-02T17:15:17.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV340, RV340W, RV345, and RV345P Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to execute arbitrary code on an affected device. In order to exploit this vulnerability, the attacker must have valid admin credentials.\r\n\r\nThis vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by sending crafted HTTP input to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-146" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv34x-privesc-rce-qE33TCms", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json new file mode 100644 index 00000000000..15f95f09297 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20477.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20477", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:17.130", + "lastModified": "2024-10-02T17:15:17.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to upload or delete files on an affected device.\r\n\r\nThis vulnerability exists because of missing authorization controls on the affected REST API endpoint. An attacker could exploit this vulnerability by sending crafted API requests to the affected endpoint. A successful exploit could allow the attacker to upload files into a specific container or delete files from a specific folder within that container. This vulnerability only affects a specific REST API endpoint and does not affect the web-based management interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-uaapi-Jh4V6zpN", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20490.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20490.json new file mode 100644 index 00000000000..6181f1be93d --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20490.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20490", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:17.350", + "lastModified": "2024-10-02T17:15:17.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in a logging function of Cisco Nexus Dashboard Fabric Controller (NDFC) and Cisco Nexus Dashboard Orchestrator (NDO) could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because HTTP proxy credentials could be recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view HTTP proxy server admin credentials in clear text that are configured on Nexus Dashboard to reach an external network.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20491.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20491.json new file mode 100644 index 00000000000..11c38304eed --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20491.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20491", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:17.563", + "lastModified": "2024-10-02T17:15:17.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in a logging function of Cisco Nexus Dashboard Insights could allow an attacker with access to a tech support file to view sensitive information.\r\n\r\nThis vulnerability exists because remote controller credentials are recorded in an internal log that is stored in the tech support file. An attacker could exploit this vulnerability by accessing a tech support file that is generated from an affected system. A successful exploit could allow the attacker to view remote controller admin credentials in clear text.\r\nNote: Best practice is to store debug logs and tech support files safely and to share them only with trusted parties because they may contain sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndhs-idv-Bk8VqEDc", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json new file mode 100644 index 00000000000..67c1c21ee79 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20492.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20492", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:17.763", + "lastModified": "2024-10-02T17:15:17.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the restricted shell of Cisco Expressway Series could allow an authenticated, local attacker to perform command injection attacks on the underlying operating system and elevate privileges to root. To exploit this vulnerability, the attacker must have Administrator-level credentials with read-write privileges on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by submitting a series of crafted CLI commands. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of the affected device.\r\nNote: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expw-escalation-3bkz77bD", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json new file mode 100644 index 00000000000..50dfcc8bfa3 --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20515.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20515", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:17.973", + "lastModified": "2024-10-02T17:15:17.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to obtain sensitive information from an affected device.\r\n\r\nThis vulnerability is due to a lack of proper data protection mechanisms for certain configuration settings. An attacker with Read-Only Administrator privileges could exploit this vulnerability by browsing to a page that contains sensitive data. A successful exploit could allow the attacker to view device credentials that are normally not visible to Read-Only Administrators." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-311" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-info-disc-ZYF2nEEX", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20516.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20516.json new file mode 100644 index 00000000000..ee8be54e21a --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20516.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20516", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:18.200", + "lastModified": "2024-10-02T17:15:18.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20517.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20517.json new file mode 100644 index 00000000000..410fd7aef8b --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20517.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20517", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:18.417", + "lastModified": "2024-10-02T17:15:18.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20518.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20518.json new file mode 100644 index 00000000000..8860b0846f3 --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20518.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20518", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:18.637", + "lastModified": "2024-10-02T17:15:18.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20519.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20519.json new file mode 100644 index 00000000000..798996ade19 --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20519.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20519", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:18.837", + "lastModified": "2024-10-02T17:15:18.837", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20520.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20520.json new file mode 100644 index 00000000000..9b4f762f4ab --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20520.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20520", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:19.050", + "lastModified": "2024-10-02T17:15:19.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20521.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20521.json new file mode 100644 index 00000000000..52cd84c4a58 --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20521.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20521", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:19.280", + "lastModified": "2024-10-02T17:15:19.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to execute arbitrary code as the root user. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the root user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20522.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20522.json new file mode 100644 index 00000000000..748a4f3676e --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20522.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20522", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:19.490", + "lastModified": "2024-10-02T17:15:19.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20523.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20523.json new file mode 100644 index 00000000000..973b66f3e66 --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20523.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20523", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:19.707", + "lastModified": "2024-10-02T17:15:19.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20524.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20524.json new file mode 100644 index 00000000000..833334f3754 --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20524.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20524", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-10-02T17:15:19.930", + "lastModified": "2024-10-02T17:15:19.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV042, RV042G, RV320, and RV325 Routers could allow an authenticated, Administrator-level, remote attacker to cause an unexpected reload of an affected device, resulting in a denial of service (DoS) condition. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.\r\n \r\nThis vulnerability is due to improper validation of user input that is in incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of the affected device. A successful exploit could allow the attacker to cause an unexpected reload of the device, resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-rv04x_rv32x_vulns-yJ2OSDhV", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json index e691f880b9b..dc81316023b 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25143.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25143", "sourceIdentifier": "security@liferay.com", "published": "2024-02-07T15:15:08.907", - "lastModified": "2024-02-07T17:04:54.407", + "lastModified": "2024-10-02T16:15:09.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-770" } ] } diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25144.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25144.json index a134d126c2e..105e4535c9e 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25144.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25144.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25144", "sourceIdentifier": "security@liferay.com", "published": "2024-02-08T04:15:07.763", - "lastModified": "2024-02-15T04:36:24.350", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-02T16:15:09.950", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-834" + "value": "CWE-835" } ] } diff --git a/CVE-2024/CVE-2024-251xx/CVE-2024-25148.json b/CVE-2024/CVE-2024-251xx/CVE-2024-25148.json index a9db405a5c0..016d81c5656 100644 --- a/CVE-2024/CVE-2024-251xx/CVE-2024-25148.json +++ b/CVE-2024/CVE-2024-251xx/CVE-2024-25148.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25148", "sourceIdentifier": "security@liferay.com", "published": "2024-02-08T04:15:08.240", - "lastModified": "2024-02-15T04:37:31.957", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-02T16:15:10.087", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-201" } ] } diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json index 5c7e4f41c82..ddd2af2187f 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26265.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26265", "sourceIdentifier": "security@liferay.com", "published": "2024-02-20T13:15:08.673", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-10-02T16:15:10.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-770" } ] } diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json new file mode 100644 index 00000000000..065c4800496 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-33209", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-02T16:15:10.300", + "lastModified": "2024-10-02T16:15:10.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FlatPress v1.3 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript code into the \"Add New Entry\" section, which allows them to execute arbitrary code in the context of a victim's web browser." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/paragbagul111/CVE-2024-33209", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33210.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33210.json new file mode 100644 index 00000000000..659dad82f89 --- /dev/null +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33210.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33210", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-02T16:15:10.383", + "lastModified": "2024-10-02T16:35:30.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability has been identified in Flatpress 1.3. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by other users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/paragbagul111/CVE-2024-33210", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41290.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41290.json new file mode 100644 index 00000000000..0bc5084f69a --- /dev/null +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41290.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41290", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-02T17:15:20.217", + "lastModified": "2024-10-02T17:15:20.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FlatPress CMS v1.3.1 1.3 was discovered to use insecure methods to store authentication data via the cookie's component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/paragbagul111/CVE-2024-41290", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44097.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44097.json index 585e5b6e06d..8e6cf54bcf5 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44097.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44097.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44097", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-02T14:15:05.670", - "lastModified": "2024-10-02T14:15:05.670", + "lastModified": "2024-10-02T17:35:15.257", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "According to the researcher: \"The TLS connections are encrypted against tampering or eavesdropping. However, the application does not validate the server certificate properly while initializing the TLS connection. This allows for a network attacker to intercept the connection and read the data. The attacker could the either send the client a malicious response, or forward the (possibly modified) data to the real server.\"" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "dsap-vuln-management@google.com", diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json index 6f70591130b..c2dd9e04c51 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46080.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46080", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T21:15:06.767", - "lastModified": "2024-10-01T21:15:06.767", + "lastModified": "2024-10-02T16:35:31.633", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Scriptcase v9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_zip function." + }, + { + "lang": "es", + "value": "Scriptcase v9.10.023 y anteriores son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de la funci\u00f3n nm_zip." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/", diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json index 738fb7b5560..f612e8cba39 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46082.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46082", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T21:15:06.857", - "lastModified": "2024-10-01T21:15:06.857", + "lastModified": "2024-10-02T16:35:32.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Scriptcase v.9.10.023 and before is vulnerable to Cross Site Scripting (XSS) in nm_cor.php via the form and field parameters." + }, + { + "lang": "es", + "value": "Scriptcase v.9.10.023 y anteriores son vulnerables a Cross Site Scripting (XSS) en nm_cor.php a trav\u00e9s de los par\u00e1metros de formulario y campo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.hawktesters.com/zero-day-alert-scriptcase-vulnerabilities-rce/", diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json index 4fde7198da9..a6374679552 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46084.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46084", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T21:15:06.950", - "lastModified": "2024-10-01T21:15:06.950", + "lastModified": "2024-10-02T16:35:33.230", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Scriptcase 9.10.023 and before is vulnerable to Remote Code Execution (RCE) via the nm_unzip function." + }, + { + "lang": "es", + "value": "Scriptcase 9.10.023 y anteriores son vulnerables a la ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s de la funci\u00f3n nm_unzip." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://scriptcase.com", diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46488.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46488.json index 2815f6c166b..c9ed5bfc75d 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46488.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46488.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46488", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T18:15:05.143", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:21:36.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:asg017:sqlite-vec:0.1.1:-:*:*:*:*:*:*", + "matchCriteriaId": "15891C1C-178A-4DA1-AA12-80E555327942" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/VulnSphere/LLMVulnSphere/blob/main/VectorDB/sqlite-vec/OOBR_2.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46489.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46489.json index 3c3156b3ebd..a9585434560 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46489.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46489.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46489", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T18:15:05.227", - "lastModified": "2024-09-26T16:35:24.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:24:32.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ferrislucas:promptr:6.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "B4444BC2-DC3A-4DBA-A023-6220D94D03FB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/VulnSphere/LLMVulnSphere/blob/main/Prompt/promptr/RCE_FC_6.0.7.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46626.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46626.json new file mode 100644 index 00000000000..ab4055e1876 --- /dev/null +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46626.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-46626", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-02T17:15:20.320", + "lastModified": "2024-10-02T17:35:15.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OS4ED openSIS-Classic v9.1 was discovered to contain a SQL injection vulnerability via a crafted payload." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/d0ub1edd/CVE-Reference/blob/main/CVE-2024-46626.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47197.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47197.json index c9fb0fab842..f4b0053f407 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47197.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47197.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47197", "sourceIdentifier": "security@apache.org", "published": "2024-09-26T08:15:06.587", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:25:36.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,44 @@ "value": "Exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado, vulnerabilidad de almacenamiento inseguro de informaci\u00f3n confidencial en el complemento Maven Archetype. Este problema afecta al complemento Maven Archetype: desde la versi\u00f3n 3.2.1 hasta la 3.3.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 3.3.0, que soluciona el problema. Las pruebas de integraci\u00f3n de Archetype crean un archivo llamado ./target/classes/archetype-it/archetype-settings.xml. Este archivo contiene todo el contenido del archivo ~/.m2/settings.xml de los usuarios, que a menudo contiene informaci\u00f3n que no desean publicar. Esperamos que en muchas m\u00e1quinas de desarrolladores, esto tambi\u00e9n contenga credenciales. Cuando el usuario ejecuta mvn verificar nuevamente (sin un mvn clean), este archivo se convierte en parte del artefacto final. Si un desarrollador publicara esto en Maven Central o cualquier otro repositorio remoto (ya sea como una versi\u00f3n o una instant\u00e1nea), sus credenciales se publicar\u00edan sin que ellos lo supieran." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -32,10 +65,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:maven_archetype:3.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A159A60A-09F5-49B5-A159-E530CACDA1B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/ftg81np183wnyk0kg4ks95dvgxdrof96", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47305.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47305.json index 02adfd4e811..ea376c99051 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47305.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47305.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47305", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-25T18:15:05.617", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:35:40.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dineshkarki:use_any_font:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.3.09", + "matchCriteriaId": "069F1F5A-EE12-476C-A65E-CA57760269E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/use-any-font/wordpress-use-any-font-plugin-6-3-08-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47330.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47330.json index cdd16b6b3ac..8c59651d389 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47330.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47330.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47330", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-26T03:15:02.670", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:26:49.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,14 +71,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:supsystic:slider:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.7", + "matchCriteriaId": "21F2152C-561F-4210-9FC1-42D1150AEAB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:supsystic:social_share_buttons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.2.9", + "matchCriteriaId": "963DF36C-363D-4EA8-A988-466FC0213E69" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/slider-by-supsystic/wordpress-slider-by-supsystic-plugin-1-8-6-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/social-share-buttons-by-supsystic/wordpress-social-share-buttons-by-supsystic-plugin-2-2-9-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47611.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47611.json index f1509fcfbcc..6b303205e93 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47611.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47611.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47611", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-02T15:15:14.980", - "lastModified": "2024-10-02T15:15:14.980", + "lastModified": "2024-10-02T16:35:34.060", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 0.0 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47803.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47803.json new file mode 100644 index 00000000000..011839eeb48 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47803.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-47803", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2024-10-02T16:15:10.630", + "lastModified": "2024-10-02T16:15:10.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins 2.478 and earlier, LTS 2.462.2 and earlier does not redact multi-line secret values in error messages generated for form submissions involving the `secretTextarea` form field." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3451", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47804.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47804.json new file mode 100644 index 00000000000..c4c54aeb9d3 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47804.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-47804", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2024-10-02T16:15:10.697", + "lastModified": "2024-10-02T16:15:10.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "If an attempt is made to create an item of a type prohibited by `ACL#hasCreatePermission2` or `TopLevelItemDescriptor#isApplicableIn(ItemGroup)` through the Jenkins CLI or the REST API and either of these checks fail, Jenkins 2.478 and earlier, LTS 2.462.2 and earlier creates the item in memory, only deleting it from disk, allowing attackers with Item/Configure permission to save the item to persist it, effectively bypassing the item creation restriction." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3448", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47805.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47805.json new file mode 100644 index 00000000000..0f584a6835c --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47805.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-47805", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2024-10-02T16:15:10.753", + "lastModified": "2024-10-02T16:15:10.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins Credentials Plugin 1380.va_435002fa_924 and earlier, except 1371.1373.v4eb_fa_b_7161e9, does not redact encrypted values of credentials using the `SecretBytes` type when accessing item `config.xml` via REST API or CLI." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3373", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47806.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47806.json new file mode 100644 index 00000000000..f07b8dabfc9 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47806.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47806", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2024-10-02T16:15:10.807", + "lastModified": "2024-10-02T17:35:16.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `aud` (Audience) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3441%20(1)", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47807.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47807.json new file mode 100644 index 00000000000..47d18e1b8b5 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47807.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47807", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2024-10-02T16:15:10.857", + "lastModified": "2024-10-02T17:35:17.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins OpenId Connect Authentication Plugin 4.354.v321ce67a_1de8 and earlier does not check the `iss` (Issuer) claim of an ID Token, allowing attackers to subvert the authentication flow, potentially gaining administrator access to Jenkins." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2024-10-02/#SECURITY-3441%20(2)", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-54xx/CVE-2024-5480.json b/CVE-2024/CVE-2024-54xx/CVE-2024-5480.json index a3f45375265..6c6d90e52b8 100644 --- a/CVE-2024/CVE-2024-54xx/CVE-2024-5480.json +++ b/CVE-2024/CVE-2024-54xx/CVE-2024-5480.json @@ -2,59 +2,15 @@ "id": "CVE-2024-5480", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:09.177", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:15:10.913", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability in the PyTorch's torch.distributed.rpc framework, specifically in versions prior to 2.2.2, allows for remote code execution (RCE). The framework, which is used in distributed training scenarios, does not properly verify the functions being called during RPC (Remote Procedure Call) operations. This oversight permits attackers to execute arbitrary commands by leveraging built-in Python functions such as eval during multi-cpu RPC communication. The vulnerability arises from the lack of restriction on function calls when a worker node serializes and sends a PythonUDF (User Defined Function) to the master node, which then deserializes and executes the function without validation. This flaw can be exploited to compromise master nodes initiating distributed training, potentially leading to the theft of sensitive AI-related data." - }, - { - "lang": "es", - "value": "Una vulnerabilidad en el framework torch.distributed.rpc de PyTorch, espec\u00edficamente en versiones anteriores a la 2.2.2, permite la ejecuci\u00f3n remota de c\u00f3digo (RCE). El framework, que se utiliza en escenarios de capacitaci\u00f3n distribuida, no verifica adecuadamente las funciones que se llaman durante las operaciones RPC (llamada a procedimiento remoto). Esta supervisi\u00f3n permite a los atacantes ejecutar comandos arbitrarios aprovechando las funciones integradas de Python, como la evaluaci\u00f3n, durante la comunicaci\u00f3n RPC entre m\u00faltiples CPU. La vulnerabilidad surge de la falta de restricci\u00f3n en las llamadas a funciones cuando un nodo trabajador serializa y env\u00eda una PythonUDF (funci\u00f3n definida por el usuario) al nodo maestro, que luego deserializa y ejecuta la funci\u00f3n sin validaci\u00f3n. Esta falla puede explotarse para comprometer los nodos maestros que inician el entrenamiento distribuido, lo que podr\u00eda conducir al robo de datos confidenciales relacionados con la IA." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV30": [ - { - "source": "security@huntr.dev", - "type": "Secondary", - "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 10.0, - "baseSeverity": "CRITICAL" - }, - "exploitabilityScore": 3.9, - "impactScore": 6.0 - } - ] - }, - "weaknesses": [ - { - "source": "security@huntr.dev", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-77" - } - ] - } - ], - "references": [ - { - "url": "https://huntr.com/bounties/39811836-c5b3-4999-831e-46fee8fcade3", - "source": "security@huntr.dev" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json index 7c8ca958e37..1b493c617bf 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6094.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6094", "sourceIdentifier": "contact@wpscan.com", "published": "2024-07-24T06:15:01.903", - "lastModified": "2024-08-01T14:00:11.220", + "lastModified": "2024-10-02T17:44:06.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:technowich:wp_ulike_-_most_advanced_wordpress_marketing_toolkit:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.7.1", - "matchCriteriaId": "FB57C794-CD8E-4682-AB5F-E8D8131583FC" + "matchCriteriaId": "1EF5D0F2-4301-4698-BDFC-D4DC0A0FD21F" } ] } diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6360.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6360.json new file mode 100644 index 00000000000..e7df6dc1c1b --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6360.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-6360", + "sourceIdentifier": "security@opentext.com", + "published": "2024-10-02T16:15:11.103", + "lastModified": "2024-10-02T16:15:11.103", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect Permission Assignment for Critical Resource vulnerability in OpenText\u2122 Vertica could allow Privilege Abuse and result in\u00a0unauthorized access or privileges to Vertica agent apikey.\nThis issue affects Vertica: from 10.0 through 10.X, from 11.0 through 11.X, from 12.0 through 12.X, from 23.0 through 23.X, from 24.0 through 24.X." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:L/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:X/RE:L/U:Green", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "YES", + "recovery": "USER", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "LOW", + "providerUrgency": "GREEN", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000033373?language=en_US", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6510.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6510.json index f41227688ed..a9021344f27 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6510.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6510.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6510", "sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674", "published": "2024-09-12T15:18:26.347", - "lastModified": "2024-09-12T18:14:03.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:17:46.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", "type": "Secondary", @@ -59,10 +89,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:avg:internet_security:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "24.1", + "matchCriteriaId": "CC4689F8-6777-46DE-8C27-4C2AA3E4F4E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cirosec.de/sa/sa-2023-008", - "source": "a341c0d1-ebf7-493f-a84e-38cf86618674" + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6517.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6517.json index 11ca8ca9f7d..ac5be9dc9e0 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6517.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6517.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6517", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-26T06:15:04.767", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:15:56.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "El complemento Contact Form 7 Math Captcha de WordPress hasta la versi\u00f3n 2.0.1 no desinfecta ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dotsquares:contact_form_7_math_captcha:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.1", + "matchCriteriaId": "C2758702-3B5A-4311-8892-007C9F51A336" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d04bab9c-7cb4-4d21-b70b-a4a7fabc3c20/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7315.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7315.json index 49601166513..a7aa8921de8 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7315.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7315.json @@ -2,16 +2,43 @@ "id": "CVE-2024-7315", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-02T06:15:09.963", - "lastModified": "2024-10-02T06:15:09.963", + "lastModified": "2024-10-02T17:35:18.430", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Migration, Backup, Staging WordPress plugin before 0.9.106 does not use sufficient randomness in the filename that is created when generating a backup, which could be bruteforced by attackers to leak sensitive information about said backups." + }, + { + "lang": "es", + "value": "El complemento Migration, Backup, Staging de WordPress anterior a 0.9.106 no utiliza suficiente aleatoriedad en el nombre del archivo que se crea al generar una copia de seguridad, lo que podr\u00eda ser forzado por atacantes para filtrar informaci\u00f3n confidencial sobre dichas copias de seguridad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/456b728b-a451-4afb-895f-850ddc4fb589/", diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7617.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7617.json index c4b8c00fdb2..7c87391d42c 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7617.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7617.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7617", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.603", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:02:25.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:itpathsolutions:contact_form_to_any_api:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.2", + "matchCriteriaId": "F83A9C7A-EEE3-49E0-AF36-F4D244EC7FAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/contact-form-to-any-api/trunk/admin/partials/cf7-to-any-api-admin-entries.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/39487908-5cc5-42ac-8af4-65626694b1e4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7772.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7772.json index b761a035920..79aff80c341 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7772.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7772.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7772", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-26T05:15:12.263", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:10:49.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.6.6", + "matchCriteriaId": "C23104B4-E4D5-4CE0-8133-566FBC08A12B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/ajax-handler.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3139412/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b546d24-82c1-4598-8926-6e73a4784b38?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7781.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7781.json index b47b2e78e53..67b47f22306 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7781.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7781.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7781", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-26T05:15:12.470", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:21:03.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,22 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.7.8", + "matchCriteriaId": "60704039-8642-47A2-8565-56462D56EEDC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/facebook.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/social-login-handler/google.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3153667/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efd279c2-9e95-45bd-9494-fb53a6333c65?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7878.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7878.json index 9bbcaa89e61..00dee0ab7ff 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7878.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7878", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-25T06:15:05.650", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:41:44.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.7.4", + "matchCriteriaId": "78CD85C5-753B-467E-B391-828CB365E34D" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/9166cf91-69e5-4786-a6a9-816db7d47b07/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8349.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8349.json index 64f766fb62a..753ca97084b 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8349.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8349", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.817", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:50:09.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uncannyowl:uncanny_groups_for_learndash:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.1.1", + "matchCriteriaId": "A6B478AF-801A-43B4-AF80-EA80339FE5C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/64cf0ae2-8d66-40d1-8bb6-0cab1dafab0d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8350.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8350.json index c304135eaeb..f2dd9a1e3c6 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8350.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8350.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8350", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:04.013", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:10:47.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:uncannyowl:uncanny_groups_for_learndash:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.1.1", + "matchCriteriaId": "A6B478AF-801A-43B4-AF80-EA80339FE5C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/karlemilnikka/CVE-2024-8349-and-CVE-2024-8350", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a38a58de-5f7d-4033-9a65-41b590b7d510?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json index 8f9bcbcb09f..248e84c05ab 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8434.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8434", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:04.213", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:25:30.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themehunk:easy_mega_menu_plugin:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.0", + "matchCriteriaId": "A0A3958A-90B9-48C9-8BDB-4E310B2318E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-base.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-nav-menu-settings.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-setting.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3156084/themehunk-megamenu-plus/tags/1.1.0/inc/megamenu-widgets.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be3869a9-f72d-4bbb-ba51-d2761ca761f2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8476.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8476.json index 45cb6b10075..6e75d635f1e 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8476.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8476.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8476", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:04.403", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:31:00.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpplugin:easy_paypal_events:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.2", + "matchCriteriaId": "5FB75C60-E23F-4B67-94AD-1C2A06823371" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easy-paypal-events-tickets/tags/1.2.1/includes/private_buttons.php#L273", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-paypal-events-tickets/tags/1.2.1/includes/private_buttons.php#L5", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3155809/easy-paypal-events-tickets/trunk/includes/private_buttons.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/602d337e-0778-4182-8e77-0eb3b37d5a7a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8481.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8481.json index 14ca637b884..a08805bb489 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8481.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8481", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:04.593", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:59:52.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blogcoding:special_text_boxes:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "6.2.2", + "matchCriteriaId": "90B9CFDE-2767-423D-9FD4-71355C89D99C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-special-textboxes/trunk/stb-class.php#L36", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/15b2a08f-2122-4eaf-ab46-1945cf6a68ca?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8483.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8483.json index 6e2edbbca48..63c393c5e40 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8483.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8483.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8483", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:04.790", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:42:30.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:madrasthemes:mas_static_content:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.9", + "matchCriteriaId": "C0922AA1-EEE0-4C46-8513-A82BBAFBF6F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/mas-static-content/tags/1.0.8/includes/class-mas-static-content-shortcodes.php#L35", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151679%40mas-static-content&new=3151679%40mas-static-content&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/794bc5cd-c9ac-4583-ae3d-a92361374b5f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8484.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8484.json index f2a26f75f74..8d909c556d0 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8484.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8484.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8484", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:04.990", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:44:13.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jianbo:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.7.1", + "matchCriteriaId": "3B85C713-4794-4A95-B021-7B8375DA22C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-comments-controller.php#L247", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e0945eb-ceec-4536-822a-fe864c21b580?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8485.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8485.json index 971f6f28a57..676fac0c39c 100644 --- a/CVE-2024/CVE-2024-84xx/CVE-2024-8485.json +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8485.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8485", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:05.190", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:19:15.993", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jianbo:rest_api_to_miniprogram:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.7.1", + "matchCriteriaId": "3B85C713-4794-4A95-B021-7B8375DA22C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/rest-api-to-miniprogram/tags/4.7.0/includes/api/ram-rest-weixin-controller.php#L264", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b53066d3-2ff3-4460-896a-facd77455914?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8549.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8549.json index 2e181288c05..f1583a8c6d8 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8549.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8549.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8549", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:05.393", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:04:41.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xtendify:simple_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.3", + "matchCriteriaId": "CE693C78-B144-4CA0-929F-8BD6FD78F7DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3156894/google-calendar-events/trunk/includes/admin/notices.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3156894%40google-calendar-events&new=3156894%40google-calendar-events&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/17ae3f22-6426-48f7-93e6-c0ad515b329a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8552.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8552.json index 58381fa11ba..c4238912a0f 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8552.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8552.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8552", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-26T03:15:03.000", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:00:45.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpchill:download_monitor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.0.10", + "matchCriteriaId": "0787A2E6-9163-4688-8F8B-CF25D7AEE349" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/download-monitor/tags/5.0.8/src/AjaxHandler.php#L317", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3157424/#file17", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3acaedff-f616-4b66-9208-f7e6a4df920d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8621.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8621.json index 879801735ac..ae0587cd986 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8621.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8621.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8621", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:05.600", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:10:27.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mmrs151:daily_prayer_time:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2024.09.14", + "matchCriteriaId": "377D8F00-A04A-4EE9-8F6B-F08A25A9A19F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/daily-prayer-time-for-mosques/tags/2024.08.26/Models/QuranADay/QuranDB.php#L72", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3151906/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/866e4bc3-080a-4498-b210-e692d72d3db0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8713.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8713.json index 6203346b458..d921abc9c76 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8713.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8713.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8713", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:05.840", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:22:33.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pierros:kodex_posts_likes:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.5.0", + "matchCriteriaId": "8449A154-3564-4BF9-ADFB-91D2F7593113" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/kodex-posts-likes/trunk/admin/partials/settings.php#L14", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/44780988-cadf-4ff2-9ba9-148b7b6650df?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8723.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8723.json index 1e1cf3aa188..5e6b4ef6726 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8723.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8723.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8723", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-26T03:15:03.310", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:00:23.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wangbin:012_ps_multi_languages:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.6", + "matchCriteriaId": "39330F28-2539-410D-B71A-5DDE1ED4B065" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.svn.wordpress.org/012-ps-multi-languages/trunk/includes/ps-multilingual-edit-post.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30a1517e-5ea5-47a1-afe8-9543e1ffd199?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8741.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8741.json index 4dcadcdddfc..0e869bb13c4 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8741.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8741.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8741", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:06.037", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T16:37:16.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:outtheboxthemes:beam_me_up_scotty:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.22", + "matchCriteriaId": "EC91F8D0-E5B9-428C-AE03-2316BFEB1B4C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/beam-me-up-scotty/tags/1.0.21/library/template-parts/tabs.php#L27", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3156146/beam-me-up-scotty/trunk/library/template-parts/tabs.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3428bc71-64f9-4f8d-85c8-7dda81b2ac18?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8803.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8803.json index 87144f8d1f7..0d4770aadfc 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8803.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8803.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8803", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-26T03:15:03.640", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-02T17:15:12.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:madfishdigital:bulk_noindex_\\&_nofollow_toolkit:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.16", + "matchCriteriaId": "5DFED2FC-61BD-4776-84F2-E3CA78EE5F40" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bulk-noindex-nofollow-toolkit-by-mad-fish/trunk/inc/bulk-noindex-toolkit-class.php?rev=3047303#L452", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3157176/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d6e1cc0d-2c5f-4e34-bd19-d7c90cd4dff6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9423.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9423.json new file mode 100644 index 00000000000..7acee94eeca --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9423.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9423", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-10-02T16:15:11.250", + "lastModified": "2024-10-02T16:15:11.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain HP LaserJet printers may potentially experience a denial of service when a user sends a raw JPEG file to the printer. The printer displays a \u201cJPEG Unsupported\u201d message which may not clear, potentially blocking queued print jobs." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-241" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11266441-11266463-16/hpsbpi03976", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 14b5a1480c2..5cae7c360e7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-02T16:00:17.859417+00:00 +2024-10-02T18:00:19.734939+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-02T15:40:36.090000+00:00 +2024-10-02T17:59:52.013000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264319 +264355 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `36` -- [CVE-2024-44097](CVE-2024/CVE-2024-440xx/CVE-2024-44097.json) (`2024-10-02T14:15:05.670`) -- [CVE-2024-44193](CVE-2024/CVE-2024-441xx/CVE-2024-44193.json) (`2024-10-02T15:15:14.920`) -- [CVE-2024-47611](CVE-2024/CVE-2024-476xx/CVE-2024-47611.json) (`2024-10-02T15:15:14.980`) -- [CVE-2024-47612](CVE-2024/CVE-2024-476xx/CVE-2024-47612.json) (`2024-10-02T15:15:15.133`) +- [CVE-2024-20477](CVE-2024/CVE-2024-204xx/CVE-2024-20477.json) (`2024-10-02T17:15:17.130`) +- [CVE-2024-20490](CVE-2024/CVE-2024-204xx/CVE-2024-20490.json) (`2024-10-02T17:15:17.350`) +- [CVE-2024-20491](CVE-2024/CVE-2024-204xx/CVE-2024-20491.json) (`2024-10-02T17:15:17.563`) +- [CVE-2024-20492](CVE-2024/CVE-2024-204xx/CVE-2024-20492.json) (`2024-10-02T17:15:17.763`) +- [CVE-2024-20515](CVE-2024/CVE-2024-205xx/CVE-2024-20515.json) (`2024-10-02T17:15:17.973`) +- [CVE-2024-20516](CVE-2024/CVE-2024-205xx/CVE-2024-20516.json) (`2024-10-02T17:15:18.200`) +- [CVE-2024-20517](CVE-2024/CVE-2024-205xx/CVE-2024-20517.json) (`2024-10-02T17:15:18.417`) +- [CVE-2024-20518](CVE-2024/CVE-2024-205xx/CVE-2024-20518.json) (`2024-10-02T17:15:18.637`) +- [CVE-2024-20519](CVE-2024/CVE-2024-205xx/CVE-2024-20519.json) (`2024-10-02T17:15:18.837`) +- [CVE-2024-20520](CVE-2024/CVE-2024-205xx/CVE-2024-20520.json) (`2024-10-02T17:15:19.050`) +- [CVE-2024-20521](CVE-2024/CVE-2024-205xx/CVE-2024-20521.json) (`2024-10-02T17:15:19.280`) +- [CVE-2024-20522](CVE-2024/CVE-2024-205xx/CVE-2024-20522.json) (`2024-10-02T17:15:19.490`) +- [CVE-2024-20523](CVE-2024/CVE-2024-205xx/CVE-2024-20523.json) (`2024-10-02T17:15:19.707`) +- [CVE-2024-20524](CVE-2024/CVE-2024-205xx/CVE-2024-20524.json) (`2024-10-02T17:15:19.930`) +- [CVE-2024-33209](CVE-2024/CVE-2024-332xx/CVE-2024-33209.json) (`2024-10-02T16:15:10.300`) +- [CVE-2024-33210](CVE-2024/CVE-2024-332xx/CVE-2024-33210.json) (`2024-10-02T16:15:10.383`) +- [CVE-2024-41290](CVE-2024/CVE-2024-412xx/CVE-2024-41290.json) (`2024-10-02T17:15:20.217`) +- [CVE-2024-46626](CVE-2024/CVE-2024-466xx/CVE-2024-46626.json) (`2024-10-02T17:15:20.320`) +- [CVE-2024-47803](CVE-2024/CVE-2024-478xx/CVE-2024-47803.json) (`2024-10-02T16:15:10.630`) +- [CVE-2024-47804](CVE-2024/CVE-2024-478xx/CVE-2024-47804.json) (`2024-10-02T16:15:10.697`) +- [CVE-2024-47805](CVE-2024/CVE-2024-478xx/CVE-2024-47805.json) (`2024-10-02T16:15:10.753`) +- [CVE-2024-47806](CVE-2024/CVE-2024-478xx/CVE-2024-47806.json) (`2024-10-02T16:15:10.807`) +- [CVE-2024-47807](CVE-2024/CVE-2024-478xx/CVE-2024-47807.json) (`2024-10-02T16:15:10.857`) +- [CVE-2024-6360](CVE-2024/CVE-2024-63xx/CVE-2024-6360.json) (`2024-10-02T16:15:11.103`) +- [CVE-2024-9423](CVE-2024/CVE-2024-94xx/CVE-2024-9423.json) (`2024-10-02T16:15:11.250`) ### CVEs modified in the last Commit -Recently modified CVEs: `40` +Recently modified CVEs: `44` -- [CVE-2024-0132](CVE-2024/CVE-2024-01xx/CVE-2024-0132.json) (`2024-10-02T14:45:36.160`) -- [CVE-2024-0133](CVE-2024/CVE-2024-01xx/CVE-2024-0133.json) (`2024-10-02T14:43:22.433`) -- [CVE-2024-2698](CVE-2024/CVE-2024-26xx/CVE-2024-2698.json) (`2024-10-02T15:15:14.603`) -- [CVE-2024-3635](CVE-2024/CVE-2024-36xx/CVE-2024-3635.json) (`2024-10-02T14:30:24.627`) -- [CVE-2024-38380](CVE-2024/CVE-2024-383xx/CVE-2024-38380.json) (`2024-10-02T14:22:25.323`) -- [CVE-2024-38812](CVE-2024/CVE-2024-388xx/CVE-2024-38812.json) (`2024-10-02T14:16:47.610`) -- [CVE-2024-45186](CVE-2024/CVE-2024-451xx/CVE-2024-45186.json) (`2024-10-02T14:35:06.610`) -- [CVE-2024-45823](CVE-2024/CVE-2024-458xx/CVE-2024-45823.json) (`2024-10-02T14:49:59.157`) -- [CVE-2024-45825](CVE-2024/CVE-2024-458xx/CVE-2024-45825.json) (`2024-10-02T14:43:08.720`) -- [CVE-2024-45826](CVE-2024/CVE-2024-458xx/CVE-2024-45826.json) (`2024-10-02T14:35:38.017`) -- [CVE-2024-46655](CVE-2024/CVE-2024-466xx/CVE-2024-46655.json) (`2024-10-02T15:40:36.090`) -- [CVE-2024-46808](CVE-2024/CVE-2024-468xx/CVE-2024-46808.json) (`2024-10-02T14:23:39.863`) -- [CVE-2024-46822](CVE-2024/CVE-2024-468xx/CVE-2024-46822.json) (`2024-10-02T14:24:01.757`) -- [CVE-2024-46824](CVE-2024/CVE-2024-468xx/CVE-2024-46824.json) (`2024-10-02T14:29:08.417`) -- [CVE-2024-46829](CVE-2024/CVE-2024-468xx/CVE-2024-46829.json) (`2024-10-02T14:27:57.920`) -- [CVE-2024-46831](CVE-2024/CVE-2024-468xx/CVE-2024-46831.json) (`2024-10-02T14:26:13.807`) -- [CVE-2024-46835](CVE-2024/CVE-2024-468xx/CVE-2024-46835.json) (`2024-10-02T14:24:18.930`) -- [CVE-2024-46844](CVE-2024/CVE-2024-468xx/CVE-2024-46844.json) (`2024-10-02T14:22:50.533`) -- [CVE-2024-46845](CVE-2024/CVE-2024-468xx/CVE-2024-46845.json) (`2024-10-02T14:18:32.923`) -- [CVE-2024-46847](CVE-2024/CVE-2024-468xx/CVE-2024-46847.json) (`2024-10-02T14:16:08.180`) -- [CVE-2024-46860](CVE-2024/CVE-2024-468xx/CVE-2024-46860.json) (`2024-10-02T14:04:38.863`) -- [CVE-2024-47609](CVE-2024/CVE-2024-476xx/CVE-2024-47609.json) (`2024-10-02T14:35:07.770`) -- [CVE-2024-8885](CVE-2024/CVE-2024-88xx/CVE-2024-8885.json) (`2024-10-02T14:15:05.927`) -- [CVE-2024-9198](CVE-2024/CVE-2024-91xx/CVE-2024-9198.json) (`2024-10-02T14:33:52.780`) -- [CVE-2024-9199](CVE-2024/CVE-2024-91xx/CVE-2024-9199.json) (`2024-10-02T14:33:54.607`) +- [CVE-2024-47611](CVE-2024/CVE-2024-476xx/CVE-2024-47611.json) (`2024-10-02T16:35:34.060`) +- [CVE-2024-5480](CVE-2024/CVE-2024-54xx/CVE-2024-5480.json) (`2024-10-02T16:15:10.913`) +- [CVE-2024-6094](CVE-2024/CVE-2024-60xx/CVE-2024-6094.json) (`2024-10-02T17:44:06.180`) +- [CVE-2024-6510](CVE-2024/CVE-2024-65xx/CVE-2024-6510.json) (`2024-10-02T17:17:46.450`) +- [CVE-2024-6517](CVE-2024/CVE-2024-65xx/CVE-2024-6517.json) (`2024-10-02T17:15:56.760`) +- [CVE-2024-7315](CVE-2024/CVE-2024-73xx/CVE-2024-7315.json) (`2024-10-02T17:35:18.430`) +- [CVE-2024-7617](CVE-2024/CVE-2024-76xx/CVE-2024-7617.json) (`2024-10-02T16:02:25.020`) +- [CVE-2024-7772](CVE-2024/CVE-2024-77xx/CVE-2024-7772.json) (`2024-10-02T16:10:49.387`) +- [CVE-2024-7781](CVE-2024/CVE-2024-77xx/CVE-2024-7781.json) (`2024-10-02T16:21:03.113`) +- [CVE-2024-7878](CVE-2024/CVE-2024-78xx/CVE-2024-7878.json) (`2024-10-02T17:41:44.133`) +- [CVE-2024-8349](CVE-2024/CVE-2024-83xx/CVE-2024-8349.json) (`2024-10-02T16:50:09.673`) +- [CVE-2024-8350](CVE-2024/CVE-2024-83xx/CVE-2024-8350.json) (`2024-10-02T17:10:47.267`) +- [CVE-2024-8434](CVE-2024/CVE-2024-84xx/CVE-2024-8434.json) (`2024-10-02T17:25:30.140`) +- [CVE-2024-8476](CVE-2024/CVE-2024-84xx/CVE-2024-8476.json) (`2024-10-02T17:31:00.583`) +- [CVE-2024-8481](CVE-2024/CVE-2024-84xx/CVE-2024-8481.json) (`2024-10-02T17:59:52.013`) +- [CVE-2024-8483](CVE-2024/CVE-2024-84xx/CVE-2024-8483.json) (`2024-10-02T16:42:30.347`) +- [CVE-2024-8484](CVE-2024/CVE-2024-84xx/CVE-2024-8484.json) (`2024-10-02T17:44:13.687`) +- [CVE-2024-8485](CVE-2024/CVE-2024-84xx/CVE-2024-8485.json) (`2024-10-02T16:19:15.993`) +- [CVE-2024-8549](CVE-2024/CVE-2024-85xx/CVE-2024-8549.json) (`2024-10-02T16:04:41.970`) +- [CVE-2024-8552](CVE-2024/CVE-2024-85xx/CVE-2024-8552.json) (`2024-10-02T17:00:45.083`) +- [CVE-2024-8621](CVE-2024/CVE-2024-86xx/CVE-2024-8621.json) (`2024-10-02T16:10:27.313`) +- [CVE-2024-8713](CVE-2024/CVE-2024-87xx/CVE-2024-8713.json) (`2024-10-02T16:22:33.487`) +- [CVE-2024-8723](CVE-2024/CVE-2024-87xx/CVE-2024-8723.json) (`2024-10-02T17:00:23.603`) +- [CVE-2024-8741](CVE-2024/CVE-2024-87xx/CVE-2024-8741.json) (`2024-10-02T16:37:16.407`) +- [CVE-2024-8803](CVE-2024/CVE-2024-88xx/CVE-2024-8803.json) (`2024-10-02T17:15:12.677`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 4ba3234d6dc..3a7662cff2e 100644 --- a/_state.csv +++ b/_state.csv @@ -138850,7 +138850,7 @@ CVE-2019-3004,0,0,2efc7f7d88f5aff516fa57b9566a0d09c25f9cec93e6d5a20fbd6c3e4b7e69 CVE-2019-3005,0,0,5fd2eab716b73f493b782c4947c1f9f5075a8998f20980c68330830c02645397,2021-02-22T14:41:07.527000 CVE-2019-3008,0,0,4a9acb031316e7185b1ecbabc7f0a6b6ad53b785e5f0e71f4ce9ab56458db4bd,2019-10-21T15:20:06.707000 CVE-2019-3009,0,0,4b79fade18b2303017cee0d6f5907b663b8230787a2be51018dd366fb572f2fc,2023-11-07T03:09:46.080000 -CVE-2019-3010,0,1,4d15bb06f6997745b751cdf536d342473965ea1ee277a8a9821f8fd7d948243f,2024-10-02T14:26:24.847000 +CVE-2019-3010,0,0,4d15bb06f6997745b751cdf536d342473965ea1ee277a8a9821f8fd7d948243f,2024-10-02T14:26:24.847000 CVE-2019-3011,0,0,6c3ce7483f4c5da6d34e8f6b398287be5326f52b1289caa022ba543249611bb3,2023-11-07T03:09:46.160000 CVE-2019-3012,0,0,e8dad39d8c9a365595bf46c3c95802f5a2984e0853cb1909aa108af5a330b544,2019-10-21T15:21:29.617000 CVE-2019-3014,0,0,f1f960b6d836340bbdc087c522e457af239e88af8692e227a8fe8e387245ab71,2019-10-21T13:16:25.453000 @@ -154746,7 +154746,7 @@ CVE-2020-25533,0,0,22b0472be3f7a02ec2f0d0ad18465cceb9b38a6dc078a221c80f4709f5177 CVE-2020-25537,0,0,079e520785884b60c6c94552474278f37b9d9064b531f7b9bef0271a3c3726d7,2020-12-04T16:01:49.357000 CVE-2020-25538,0,0,5332fc9b37432e8c9ab81b8f5bce073530a235c7cacfe55a7b93c4c73aae58d4,2021-07-21T11:39:23.747000 CVE-2020-25540,0,0,2ca248b357bd039497f25236f818e4ee81410cbfbcdb2bd5023e29cde2c96a87,2023-12-07T14:22:18.950000 -CVE-2020-2555,0,1,9e0b1acf4abe21f9ece6ed27e21fd73331510c130cc5290041b586bca6f48be9,2024-10-02T14:24:50.520000 +CVE-2020-2555,0,0,9e0b1acf4abe21f9ece6ed27e21fd73331510c130cc5290041b586bca6f48be9,2024-10-02T14:24:50.520000 CVE-2020-25557,0,0,ba7e6e69e9eb291583fa26ec421902479a3af8435a3ba56dad4071d2f9cf8c8a,2021-07-21T11:39:23.747000 CVE-2020-25559,0,0,4bccb58c8c9c8959436042e779063f9c0f8e5febd5ef5ab5053dd6f27d4d4b14,2020-09-21T15:19:30.877000 CVE-2020-2556,0,0,d33e26f0b2b7738761c45d3cab98c1b1ea0d45fbd62d16082aeb66e6210120ea,2022-10-25T17:57:43.913000 @@ -168741,7 +168741,7 @@ CVE-2021-22514,0,0,8e3a075292032f763628c85554f5c2f69f3a2119c7d4d915625b0f6c61d01 CVE-2021-22515,0,0,d5d9c4633cb99577d00912a48205489b53f3ad8216660fc95e68df9cb4700418,2023-11-07T03:30:17.387000 CVE-2021-22516,0,0,360fc4a2a6473080797119cb4592870152572368993c6eb823854ef0d1d34fac,2023-11-07T03:30:17.613000 CVE-2021-22517,0,0,3f8db58a324ed832f25a5c30c02cf604eadc18ad7b27ab795858edb5dc2a1474,2023-11-07T03:30:17.900000 -CVE-2021-22518,0,1,94a182ef95da3b6df3464b445a6e337e37bf8ebbe7672ce4b9ddd87c67d9c8a9,2024-10-02T15:10:41.610000 +CVE-2021-22518,0,0,94a182ef95da3b6df3464b445a6e337e37bf8ebbe7672ce4b9ddd87c67d9c8a9,2024-10-02T15:10:41.610000 CVE-2021-22519,0,0,9e3616afe340966651f08a0581129e9a33a0208f1e92c7b863668a89efe71aaf,2023-11-07T03:30:18.160000 CVE-2021-2252,0,0,f732e389d5f0da8a27d20c1ea9b59e42162179f0f11af0391630f653380a4d63,2021-04-29T12:58:18.223000 CVE-2021-22521,0,0,520037ed9a82a64b433b975e996f24f9dc1e905547ecb64e14a0ed212673c8fb,2023-11-07T03:30:18.417000 @@ -172859,7 +172859,7 @@ CVE-2021-27912,0,0,19148a6b4be6511067ebb8120b362588e1573f54967fc3540726b708fba4e CVE-2021-27913,0,0,167d05a43c4b8a3a9a5f9095ae1170cc5f9466459db5849cf91ef768c53d596c,2021-09-03T16:43:47.267000 CVE-2021-27914,0,0,675b39026c04fc757a33b18eab7c2aa058775623331c1d7c9d085c842a052b1d,2022-06-08T18:45:22.737000 CVE-2021-27915,0,0,aa4b9f4c69d7d5ac6f5dbddcc007e3027f3bc066eee27bd2a695f6cfc3b6d157,2024-09-29T00:22:31.787000 -CVE-2021-27916,0,1,553745efa02c296e12860271d4afc5e607d72abe30d8e6b9c112f9ed77eecd96,2024-10-02T14:29:42.407000 +CVE-2021-27916,0,0,553745efa02c296e12860271d4afc5e607d72abe30d8e6b9c112f9ed77eecd96,2024-10-02T14:29:42.407000 CVE-2021-27917,0,0,5465a3d7f25a5154d30a82cd6f06e15430a49f302876406aa605d64d13a082bc,2024-09-27T15:13:58.927000 CVE-2021-27918,0,0,0518da32da0b62ea5fcb12a67bfb4a45de87702f6745ca2fb1540144faa372aa,2022-12-13T16:28:13.860000 CVE-2021-27919,0,0,ff72fa8dcdbe5235ea458afc8e87af812a5a4a7f37cb1ded6eeda83ce3037733,2023-11-07T03:32:02.603000 @@ -182223,7 +182223,7 @@ CVE-2021-40423,0,0,e70e7b6c63f7747ab6d60cb7eaca40f23cfcf6f4031a82b5a9e5bc13c852d CVE-2021-40424,0,0,6cc9f49e082e3140aee85ce6a2c7035115acb383bfe5dffbaec66b3dd76ae3a8,2022-04-22T18:59:38.313000 CVE-2021-40425,0,0,986c807d5d980cb91d8cccc408073c21b5a6706f05cca05fa89896fb2c9a146d,2022-04-21T15:47:50.853000 CVE-2021-40426,0,0,5d72a17907f1725e43fb0aab61001410ddfaa528a0774ae1abefe783386aca67,2023-02-23T00:15:10.890000 -CVE-2021-4043,0,1,0bfab4fb689e8679f38fbb30b1e5e7858abc28c11dd0358aada30d2c0341cc95,2024-10-02T14:26:43.490000 +CVE-2021-4043,0,0,0bfab4fb689e8679f38fbb30b1e5e7858abc28c11dd0358aada30d2c0341cc95,2024-10-02T14:26:43.490000 CVE-2021-40438,0,0,5414e0c1495a90d6f42b1bae6a30b531da4e2d738b2ecf4184cc8a70d5198a3d,2024-07-24T17:08:07.093000 CVE-2021-40439,0,0,2a8b255e58952b8e3bc2fe39246b2c6164ca9e4eabf1fba2b4937eec3211dc19,2023-11-07T03:38:35.240000 CVE-2021-4044,0,0,063b69fc68b4e42b2f1ddc7170cc4d1cada10e4b27aa7dc6eec919242eaaa7d1,2023-11-09T14:44:33.733000 @@ -195096,7 +195096,7 @@ CVE-2022-26317,0,0,9c3778762ebd62b5c88b18d617a321f87f2f3cd2e79d6a4238ec738f50f6b CVE-2022-26318,0,0,3164c0ae6f338172eda55b12f58a3708a3217e7c65e42299722e7024448c4e8e,2023-08-08T14:21:49.707000 CVE-2022-26319,0,0,df89539e33ae729765bbf5708419e9238cd5395f00f3879c2a7d76f26e1eb725,2022-03-19T23:55:42.653000 CVE-2022-26320,0,0,0821ab29948bcb8ff6394127add06f2455ef2463ce545b333685d1b7d5e7ee9b,2022-03-23T15:02:20.840000 -CVE-2022-26322,0,1,84f8c164b41682263e956a9ba382aa197b0de6ad62d3cd0de407813d0934663e,2024-10-02T15:03:41.997000 +CVE-2022-26322,0,0,84f8c164b41682263e956a9ba382aa197b0de6ad62d3cd0de407813d0934663e,2024-10-02T15:03:41.997000 CVE-2022-26325,0,0,71c58e61480c4b27374f3a990d8a54d98de2bdee3e9fb84b64281d4b075b3b7a,2023-11-07T03:44:56.980000 CVE-2022-26326,0,0,9ad27885fa0c540266ca1167975a0cab125c731a5ab45882b07301ce6001b68d,2023-11-07T03:44:57.197000 CVE-2022-26327,0,0,7940acac4e72dc19f89caa27a931bc65c9c7e042d50d2b29976f338f3c1d6aed,2024-08-21T17:25:08.560000 @@ -203634,7 +203634,7 @@ CVE-2022-3680,0,0,4045a251fd074dc1e78a757b3250a9f45dbb1c048a72547f43ae93ad5dd948 CVE-2022-36800,0,0,dd1af9dfe900eb3e2d7479d8dda8d0887ce7def8c5fc17c6c520bcbd1cb0496b,2023-08-08T14:22:24.967000 CVE-2022-36801,0,0,6ee5b9b9e2a587ee6808d637ba4173972a9016f471a78c39081d815f64f7b29a,2022-08-12T17:38:37.907000 CVE-2022-36802,0,0,3502c01758a1fbb120eb1199a3a435b4eaa88bb4300cfcf4c2a8cb28d6077b9d,2022-10-17T15:08:01.323000 -CVE-2022-36803,0,1,8bf391ac2eb3e6ee9d8828e1361ac87e802988d8d37cb0a535af2291dbd1c770,2024-10-02T15:35:01.363000 +CVE-2022-36803,0,0,8bf391ac2eb3e6ee9d8828e1361ac87e802988d8d37cb0a535af2291dbd1c770,2024-10-02T15:35:01.363000 CVE-2022-36804,0,0,0ca1f04aaa3e26878886d510c1f32bf471ffd055bf07c2485f77648a7440ec06,2024-06-28T13:57:13.930000 CVE-2022-3681,0,0,1233abe7c4aafe7eacd841955e89714c7f64b04fb29227eb9e9865f916fa993c,2023-11-07T19:41:49.927000 CVE-2022-36816,0,0,b89d07853852f63402717c19ee118a9de73ed0e7e365ca4c6f66e736a6bff74d,2023-11-09T05:15:09.047000 @@ -208954,8 +208954,8 @@ CVE-2022-43778,0,0,4ffedd6ef15aa68b1f76290cb40f93173a989ab39e1c9a29be9185def3ad2 CVE-2022-43779,0,0,ac7258ee065eeae3f2bf2159db27a71db91fb9574201804606ee3ffa98c3a4a0,2023-02-21T21:15:29.363000 CVE-2022-4378,0,0,9488633d6af78a0385852c5ee7d85cb1cdede0fd5deafc39814648ca4fd73e71,2023-11-07T03:57:42.020000 CVE-2022-43780,0,0,67e9f2507e99989c68962e08b111d075a78382033c9d8f577c31ab5768a4c0a1,2022-12-14T21:28:00.977000 -CVE-2022-43781,0,1,f7564d3900e6b6c513af8d4b923e6fffc8487a97c96e96fbc5a708a0a969e0e4,2024-10-02T15:35:02.723000 -CVE-2022-43782,0,1,6c2d60a58890ad311a32b31e022e89f7347b3c9809b612f3df6dc2cd477d6070,2024-10-02T15:35:03.590000 +CVE-2022-43781,0,0,f7564d3900e6b6c513af8d4b923e6fffc8487a97c96e96fbc5a708a0a969e0e4,2024-10-02T15:35:02.723000 +CVE-2022-43782,0,0,6c2d60a58890ad311a32b31e022e89f7347b3c9809b612f3df6dc2cd477d6070,2024-10-02T15:35:03.590000 CVE-2022-43783,0,0,30a2cfa25cbd2ef42b6241aafb23a57c895fa79e502d250ebdf143065bf0de2f,2023-11-15T07:15:07.320000 CVE-2022-43784,0,0,572c4a443dfbc984c09b87b5ea7bee4f603c5ffd7f01185882cf67bb7c1fe356,2023-11-15T07:15:07.620000 CVE-2022-43785,0,0,0a6076ba241cde2b011f8a567255044938473bf5e7e94b4e1840c6184f433283,2023-11-15T07:15:07.667000 @@ -214847,7 +214847,7 @@ CVE-2023-20570,0,0,dfe48ab7be186e12e0df2907f1611ee83f54971ec11802e508a83413b0802 CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55e7c,2023-11-28T18:05:25.177000 CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000 CVE-2023-20575,0,0,2e65bf0d5b77958c50a50d7734bf1302e45afedfe49795c175183e4bccf178d7,2023-07-19T18:32:04.807000 -CVE-2023-20578,0,0,0a9c6b1ac58ffe336f69161832ca2f5abd3de5034b5ba44c81c718f1dcfd9dad,2024-08-14T02:07:05.410000 +CVE-2023-20578,0,1,e2aae81ed2b9fe5469de595a7d4e7bc7f74e6a04f637c722d6521fd97e68f844,2024-10-02T17:35:44.117000 CVE-2023-20579,0,0,b4a70474e393f8888455713a6b442ef3e5379ac960e74bb0629b9958558f0077,2024-02-14T13:59:35.580000 CVE-2023-2058,0,0,0c817ab6ea98d27963a0bdd6b94d4e88089c1ee4704beb5ad1d7199dfd901fb8,2024-05-17T02:22:37.783000 CVE-2023-20583,0,0,a212d56af862f7656348d6c69619b40cd14646d40284557522dffd91a69163f7,2023-08-04T17:31:53.953000 @@ -225994,7 +225994,7 @@ CVE-2023-34256,0,0,06e655546c54f56248a7bbbb0bd9dfe93b8c16a4183434e9ab515b7b0eb05 CVE-2023-34257,0,0,0320d12b069a7394c51c703bc5f9098562946b70a12bfe53ad75f5a07d652796,2024-08-02T16:16:11.363000 CVE-2023-34258,0,0,2e656b6b465dd8addf89d28d27a2f63785e04de044f2ca4973a2e285fba2546b,2023-06-08T17:26:19.893000 CVE-2023-34259,0,0,710e591d41187a09c0c879c2b28e77b17f59e8df4a70e82104fd10051415f806,2024-09-06T14:35:03.133000 -CVE-2023-3426,0,0,935e9c3168851c6b164d09f4971cdc352a7eb4e1fb48d323d9ca5e3f69c4f253,2023-08-05T03:45:57.627000 +CVE-2023-3426,0,1,07a43f31a932247ee02fb8af2b49e82b8d9f9dbafa6d1a14a263c24c5cfe3593,2024-10-02T16:15:08.500000 CVE-2023-34260,0,0,c253d0086191543f48833b7cd2c6b64feac20efd450b29e43c25d5bd3f3dfe93,2023-11-13T17:38:02.170000 CVE-2023-34261,0,0,1729daad30a7372c87b9ad3bf7407e2b7cbc075d6b545c22578d51675898073f,2024-09-05T15:35:08.697000 CVE-2023-34262,0,0,e781415bd7c8ab28701dd349c10478f0e9c97337cc272573568c5630115e9d21,2024-05-03T12:50:34.250000 @@ -229516,7 +229516,7 @@ CVE-2023-39054,0,0,f833ae43e0ade72388da1f9c7c8f6fb4e7cdfde8ad9a67b03dab336fcef59 CVE-2023-39056,0,0,a31be9e1f2f2ce024577389a44b0d64791d4f8214fe68fa844dd6e3e825d2389,2023-09-19T21:25:03.967000 CVE-2023-39057,0,0,601d99c09f27b5ba170ec8ad96aa1bdfa16724520be499f1107219c96e2eca70,2024-09-05T16:35:13.513000 CVE-2023-39058,0,0,c859360d758c635b4461bde9305dfc7f921e430c4f43b04685530cd4ee9bde54,2023-09-21T19:33:37.093000 -CVE-2023-39059,0,0,d03db2419f848e834209670dfaa88b40205ec6bc4b60cbbbae6e240d2976015d,2023-08-30T00:30:06.513000 +CVE-2023-39059,0,1,d6ad793b1e30fb5a4d810fed87734b42d3814a1eff91b596267a1270d867e801,2024-10-02T16:35:25.547000 CVE-2023-3906,0,0,0ea4f9c458c7cefbf14811ad5f7e6a91096f5efdcc77090d83066140a3405bde,2023-10-02T19:42:18.340000 CVE-2023-39061,0,0,9dfe3616284c4b6a06d602215c89caae5dd22e63bafe5de26477f48449ad0a2b,2023-08-24T21:05:08.520000 CVE-2023-39062,0,0,1b3e02272dd236f49ba8355d88521d297ed47d621a736a2c7fbac748a9f65c3a,2023-08-29T23:40:24.717000 @@ -229903,7 +229903,7 @@ CVE-2023-39504,0,0,98e25b8b4c93afa9b617aacdfaa97a07977cfc3118c1b43d834ba9f6312af CVE-2023-39505,0,0,887b872aec02a21bb8065c0c7bd8588eda69ec0b4c2d5ba1f644df3556beb18d,2024-05-03T12:50:12.213000 CVE-2023-39506,0,0,f60dbdbbfbe509aa3c77ae412d5d35a06b8548b148ea5113391dede7f2942898,2024-05-03T12:50:12.213000 CVE-2023-39507,0,0,932000ee6c05e0ab417b82c0122256dfab7c4426eee6d2ce22c53e3b0dd2ba54,2023-08-22T16:54:49.080000 -CVE-2023-39508,0,0,d83cff5c7a9f39581c7213135aaaae08a82f50b2357e90ccaedcad4c42ed5b26,2023-08-09T17:52:57.137000 +CVE-2023-39508,0,1,0475dc7a3c76146c461d057ef4794deff2fb0d66986569c6bd72034b25d8d2a3,2024-10-02T17:35:14.147000 CVE-2023-39509,0,0,81753f4ec30f3ee72106ba4d88c503fb5b7f0ae91ea64c932d500cc56d115ab6,2023-12-22T19:45:01.103000 CVE-2023-39510,0,0,0c2f76b2427a8d8df6ec4c504402ea4f6e0208187521d62f9166f6770c6f220a,2023-11-09T05:15:10.427000 CVE-2023-39511,0,0,81ff1805f1766f9b1a656e89cd0072d87bbb33d5412916577d40ce5bb5525760,2023-11-03T21:15:15.240000 @@ -231027,7 +231027,7 @@ CVE-2023-40997,0,0,dece227e404a159aaa40a2b1c2185c27c7fc67a7d474fb6b6ca1b3a1165b7 CVE-2023-40998,0,0,bc3fb678d532ebde1a82e61a18ed44acade69d14d10ebc19fb9bff309e0cdc2f,2023-12-14T08:15:40.460000 CVE-2023-4100,0,0,fa22ea8a138e16722e3a417d2a7e9fbb233887c8a39e7dc8c61b9ee97c02de35,2023-10-04T21:27:54.943000 CVE-2023-41000,0,0,d4b8fd436935dcbb6e6c0d9e1ff2b8c51ed8a590b0dcf579368c06082d37efcc,2023-09-13T17:56:45.940000 -CVE-2023-41005,0,1,3daaf64f7f524c91c07117e8cf34166e8ffdbe5acf507dc276539eac6b6645de,2024-10-02T15:35:08.587000 +CVE-2023-41005,0,0,3daaf64f7f524c91c07117e8cf34166e8ffdbe5acf507dc276539eac6b6645de,2024-10-02T15:35:08.587000 CVE-2023-41009,0,0,bab7e6af797997c9d8e91e6ad13bb34a2b0f541f389f29191222f82ffdfaf308,2023-09-08T16:51:19.520000 CVE-2023-4101,0,0,7d42de21f526b12720e2f221bcd7b07a3e448f58519099a893632db895d1f5b0,2023-10-10T14:26:51.557000 CVE-2023-41010,0,0,57d782f3c378b7f881c1d1b707976bd9fa2294337386be7a963ca7c0036f4888,2023-09-19T02:17:50.343000 @@ -231386,7 +231386,7 @@ CVE-2023-41372,0,0,35677ebd042661e79325ccc23249826f0e6827b72e19c266e97d4bd4197a6 CVE-2023-41373,0,0,5f858e0195caa8aa2a8c7543f70062980d9188f53cffba696962fcc32c2ea8a9,2023-10-17T20:15:51.720000 CVE-2023-41374,0,0,b864fcf3ca00311d710c6c0797be775b4f55280cea90725da2f952400c671bb8,2023-09-22T16:32:30.470000 CVE-2023-41375,0,0,4caaa89bdaf6fc373f3aa10e01d6183849538d31e03e375f5636c002b49579ab,2023-09-22T16:31:50.917000 -CVE-2023-41376,0,1,c4558ae758060816ad43837b68ee4ebe6503a51389f228498c1381a71b3c4bd7,2024-10-02T15:35:09.327000 +CVE-2023-41376,0,0,c4558ae758060816ad43837b68ee4ebe6503a51389f228498c1381a71b3c4bd7,2024-10-02T15:35:09.327000 CVE-2023-41377,0,0,20fe65dce688a5c8814f6a060b1896579ae2dcc89be369ecab60330310b67f0b,2023-11-07T04:20:59.033000 CVE-2023-41378,0,0,ba961345e0136f6a60fcac5e9ee9fe21f16c70a1865b4d2513e303e9f2222eb5,2023-11-14T17:48:01.570000 CVE-2023-4138,0,0,a5bf3d6644739a9ac794c17bb10baedf889afaf83b38a1d9add5981825ea5495,2023-08-08T19:39:05.930000 @@ -234163,7 +234163,7 @@ CVE-2023-45637,0,0,c2102573a58b7f61128f6708ee3dce28b4eda5296a931ce506187a6d5a8de CVE-2023-45638,0,0,6df0e645e66ef324c17833ab8b07fa38ea477fc98fc12ef701def438c3cf757b,2023-10-18T22:46:07.233000 CVE-2023-45639,0,0,09a43d88ae7f3eb21f87388095cc506b7cf82cea9c4eaa2c8bdec0bbf15f54ba,2023-10-19T17:44:02.860000 CVE-2023-4564,0,0,b127f10b71c0cf46376e4cce21da60250007071625a35d82d3184bcd3210d33f,2024-10-01T11:15:11.710000 -CVE-2023-45640,0,0,6bf3f98302880e07e863237068f3348202a18ebfe439f2d6882c6e9553a84f19,2023-11-01T16:19:20.753000 +CVE-2023-45640,0,1,0217b4a0cbfd4469d891614da2897a0768356aa9241ddec77558ef374f5f1a43,2024-10-02T17:44:06.180000 CVE-2023-45641,0,0,6adff5e3699983b9eacf89f0f7a340ba3721c212f78c4da7c13fa3a0174d2fb4,2023-10-19T18:19:25.680000 CVE-2023-45642,0,0,ac1742b6c5c96baf0e87c66e370b2b9ecbf2f7f1e99e7a9d808246155f9331cf,2023-10-19T18:56:54.393000 CVE-2023-45643,0,0,4487aa9880e87f7ccba9d4d1a5ee925bdcd1e35a7eb22d0a0864b7ff83e6d50a,2023-10-19T20:29:06.500000 @@ -238042,7 +238042,7 @@ CVE-2023-51147,0,0,75e5ad9e43cde03291b18d115e151db0aadaa5d5d0263e6c24a28fb6db5ae CVE-2023-51148,0,0,bce6f23f629ff4a4d092df77207bd3625ab8bab51457c9d3b72eb9275af90b21,2024-08-03T19:35:01.547000 CVE-2023-5115,0,0,14c531f4587abd09fae2cb04ef8d601a42e68cf9b74459554a2ea4cdee69467d,2024-09-16T15:15:15.890000 CVE-2023-51154,0,0,733ec9b18ea85f01f34e9765897ada4e832b65ac33fdca877dda8af7f30fd092,2024-01-10T15:58:18.733000 -CVE-2023-51157,0,0,f217a5eb5347bd845b55f58f96ca86920fea3bf514334f71b05b4b52c85d689e,2024-09-26T13:32:02.803000 +CVE-2023-51157,0,1,8f9b732372eef7b0a17c80ee530e72ee53023301d6e9793fef1728afd0fae67b,2024-10-02T16:58:20.160000 CVE-2023-5116,0,0,591765d4d588c72144ede930c6a51f214c6b6a2dea94dcfbd541442fb6e59c4b,2023-11-07T04:23:28.397000 CVE-2023-5118,0,0,d240cca45e4e2f327ad2cb7dc08143e95ad38b48016fa92edb8ad9cf216f86ce,2024-01-18T16:01:37.653000 CVE-2023-5119,0,0,2d2d0554c11c06d2226e53937c1b8bc6add5c04011b3ac8deec483b514b75e12,2023-11-27T16:33:20.673000 @@ -239461,11 +239461,11 @@ CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd7 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 CVE-2023-52946,0,0,20e045551a05525bd02d771d699e1c8ac48012af353f0f8ecae8c441edb3d8bd,2024-09-26T13:32:02.803000 -CVE-2023-52947,0,1,63d645c926faea55b9fdad340f3f464b9fdc9faedf4a6e963e4826e43b2cd432,2024-10-02T15:26:28.213000 -CVE-2023-52948,0,1,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db543f5,2024-10-02T15:26:30.160000 -CVE-2023-52949,0,1,57e7b479eb0b4cd4da85e5578fdc01b85634bb050edda133619d47c1369d88c5,2024-10-02T15:26:32.077000 +CVE-2023-52947,0,0,63d645c926faea55b9fdad340f3f464b9fdc9faedf4a6e963e4826e43b2cd432,2024-10-02T15:26:28.213000 +CVE-2023-52948,0,0,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db543f5,2024-10-02T15:26:30.160000 +CVE-2023-52949,0,0,57e7b479eb0b4cd4da85e5578fdc01b85634bb050edda133619d47c1369d88c5,2024-10-02T15:26:32.077000 CVE-2023-5295,0,0,41c6baf71065d9210a6020c54df01a479effe3ab43eb4f6a24f246bdbfb6c99e,2023-11-07T04:23:49.733000 -CVE-2023-52950,0,1,8f3573aeaa08ecbde7fa2e7d1621b857fef69d5f70409675af871fb9ea9d77f3,2024-10-02T15:26:33.837000 +CVE-2023-52950,0,0,8f3573aeaa08ecbde7fa2e7d1621b857fef69d5f70409675af871fb9ea9d77f3,2024-10-02T15:26:33.837000 CVE-2023-5296,0,0,476d33b024be332ac896dbf35bcf9a4f784c8ee1e5e045f6783134e6c34f6d9c,2024-05-17T02:32:59.083000 CVE-2023-5297,0,0,ae358353c2ceed16fa9e9e76c2608b86123b91774a8853eb6bb1140ab0dca019,2024-05-17T02:32:59.190000 CVE-2023-5298,0,0,b737514e302eee8d165af79674626b1e30c9fc6b7145814e6b6dce9deaaa8577,2024-05-17T02:32:59.290000 @@ -241337,8 +241337,8 @@ CVE-2024-0111,0,0,745fe4fa8ac2297a871814d16ec0cf5bf56a98c3501448d82308b7dc75a74f CVE-2024-0113,0,0,30ea5d78769c707d77ab5e88a1087a3bf4be86e316909498095d743b94b19e08,2024-09-11T17:34:37.667000 CVE-2024-0115,0,0,90525cb6d1df6f268f81b58c98763d2a78ce3017a9779cdc04eec9f2dd2bca4d,2024-09-11T17:24:27.393000 CVE-2024-0116,0,0,adad8d5a6569e5102a9d95bdf9068d17c8ef5bd5a7c84947191f2698e1d6ce25,2024-10-01T05:15:11.920000 -CVE-2024-0132,0,1,f1d27ee91d38f95f18265c56576359c7b74449c09c2448ac9270cfde0a145c24,2024-10-02T14:45:36.160000 -CVE-2024-0133,0,1,1869d101f5a07bee8a308ca6354c7bbc691223866612cf3986da3052ed18f6e1,2024-10-02T14:43:22.433000 +CVE-2024-0132,0,0,f1d27ee91d38f95f18265c56576359c7b74449c09c2448ac9270cfde0a145c24,2024-10-02T14:45:36.160000 +CVE-2024-0133,0,0,1869d101f5a07bee8a308ca6354c7bbc691223866612cf3986da3052ed18f6e1,2024-10-02T14:43:22.433000 CVE-2024-0151,0,0,e688008e47f7f2b2995cf15f9fce74bb525b3898f5e47db0ad5b6ce2aa86a255,2024-08-09T19:35:02.910000 CVE-2024-0153,0,0,27805279095cb051183cab09aac75c2d46b1759d5204833928b95d85cf667e87,2024-07-03T01:44:37.677000 CVE-2024-0154,0,0,e0c538dbc1a8e60b09b037cacd452435c496c209b1106146ca859e110f3efaa6,2024-03-13T18:15:58.530000 @@ -243273,6 +243273,7 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000 CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000 CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000 +CVE-2024-20365,1,1,9ac35643a14b4115b7c187beac895c8d8c440eb3244ed73c9e636f89defa28a7,2024-10-02T17:15:14.863000 CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000 CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000 CVE-2024-20368,0,0,11ba77e6ca928b43fcf33bd9b64c67655ca382b15bfec85a328bbca787a43cf3,2024-04-03T17:24:18.150000 @@ -243284,11 +243285,13 @@ CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0 CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000 CVE-2024-20381,0,0,1d137d93b0598fd47692ad3c3d2e46a37f7acfa84f78f58b2c3c09528c8e86fc,2024-09-25T17:15:15.240000 CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000 +CVE-2024-20385,1,1,681f7a9dddec2cafc08e3e1ee3d5736115f7fe839148bd2db8a126953b48d445,2024-10-02T17:15:15.110000 CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000 CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000 CVE-2024-20390,0,0,5a2907cab8e9bf15e845ea050c44bed3aeb43d2fce6592a7a3404a48f7d61dbb,2024-09-12T12:35:54.013000 CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000 +CVE-2024-20393,1,1,6a8ae6a5d98b5a27852168969ae6d1daa91d258030662c336f6a3ac851bb7ba3,2024-10-02T17:15:15.337000 CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000 CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000 CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000 @@ -243311,16 +243314,23 @@ CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000 +CVE-2024-20432,1,1,9afe8e56de2f474245e53b7438e12b65e4560d02a3f69fb1fa2454f77ac4ba13,2024-10-02T17:15:15.550000 CVE-2024-20433,0,0,cac88c988c19685837ee5dbc2d656503922c9f0b9e71ea73ee8edd842ba62056,2024-09-26T13:32:02.803000 CVE-2024-20434,0,0,880e05acefa3209e23abe1c6ab99bf4f9ab4fd2e1403678e2af13f0c181f3b38,2024-09-26T13:32:02.803000 CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 CVE-2024-20436,0,0,41bc6e4345819d91a4b8a7e2df98b24823b53ecbe6191936af5242501e9ac76c,2024-09-26T13:32:02.803000 CVE-2024-20437,0,0,180b6b0015b269c98df26bf106a68aa4ffa1964219b67b451003fdc3def577fa,2024-09-26T13:32:02.803000 +CVE-2024-20438,1,1,f3d6c5fb0395310f3106449e7d7514e80194fac91de81eefde865f13ecb37ec7,2024-10-02T17:15:15.753000 CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000 CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000 CVE-2024-20440,0,0,c9c53dc5c2cee258d8848cdc1782766d626f4ac361af7ec1e658341d1dc604f2,2024-09-19T13:42:41.017000 +CVE-2024-20441,1,1,ea7ec35099b3479b4a42dc1cec8b048cb09038cde53348977420d31e6502eef4,2024-10-02T17:15:15.967000 +CVE-2024-20442,1,1,dce46f9f985e9e115d9996e7eefe607767c670f164ae30e0b6a0d6faadde003c,2024-10-02T17:15:16.177000 CVE-2024-20443,0,0,272afbe0465f6648950651b716899dcfcb722318ac954aaaf0e63544fb83de9e,2024-08-23T15:18:06.347000 +CVE-2024-20444,1,1,bbe205adb01d80650f424c608a627fdcc9c45f394d384bea90f956f34c6ed80e,2024-10-02T17:15:16.390000 CVE-2024-20446,0,0,e9357eb0aa4f61946fea3c9e67283cca574773e1e525326f07a38ede4840249f,2024-08-29T13:25:27.537000 +CVE-2024-20448,1,1,9c2556f7d1f0f64d32fa6bc38cdd8bff54cfbeaea06b86b28528329d348a558b,2024-10-02T17:15:16.597000 +CVE-2024-20449,1,1,841aae85b390779b5a1b3e9e068174d54cac131c7c210518d30c93691fa5019b,2024-10-02T17:15:16.820000 CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58aa0,2024-03-01T14:04:26.010000 CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000 CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000 @@ -243333,7 +243343,9 @@ CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419 CVE-2024-20467,0,0,e522c87bb5703dc456a43be83e9a8d8f7e55a99582e1fa59e471a197999a14be,2024-09-26T13:32:02.803000 CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 +CVE-2024-20470,1,1,0c6df7dcadd459068a09105d73d9b9cc9b5e48af790790caa4837dada6103d64,2024-10-02T17:15:17.027000 CVE-2024-20475,0,0,41064f149816a8d964e76d7aae3e94d00a39e375d0b6b927e67dd24f6bcf5eaa,2024-09-26T13:32:02.803000 +CVE-2024-20477,1,1,c50f95b5999c3ee6cce4ec009056fa2b4185b6ff8a367d09599ec578443f8d8d,2024-10-02T17:15:17.130000 CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 @@ -243343,6 +243355,9 @@ CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e89 CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000 CVE-2024-20489,0,0,21cc73253209554f6b4b15a9223bc3f2b9ae3b7c0f2dd8d7b8823af1edcfee1e,2024-09-12T12:35:54.013000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 +CVE-2024-20490,1,1,ec927651c32c903b11e9798fae33257de45aefb41a28e42aba7eeae99644d03a,2024-10-02T17:15:17.350000 +CVE-2024-20491,1,1,447e13224740a72f3cf370277e4a25a3f94d2b6121177e45dd771d452eb8b07c,2024-10-02T17:15:17.563000 +CVE-2024-20492,1,1,133fac4f14030aac16725c48ad6e12cc8163d4bd26fcc24e348b091eb8be4c04,2024-10-02T17:15:17.763000 CVE-2024-20496,0,0,127f60097f974f24aadc62900a388547cdf18c3a62d9e6416696d085e67625df,2024-09-26T13:32:02.803000 CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 @@ -243352,7 +243367,17 @@ CVE-2024-20506,0,0,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3 CVE-2024-20508,0,0,a4fe0896946d7cf41903535dbf2f0ff3799c2bdde7a0579e98abf95ba0605e78,2024-09-26T13:32:02.803000 CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 CVE-2024-20510,0,0,77e73cd6363cb5f1f2bcc9093ebb94dae24f275478be794b11c101171344660f,2024-09-26T13:32:02.803000 +CVE-2024-20515,1,1,0d1ea5fc0395aeba8d912b33829b73c6e969e0e6b8085212bd58f0a2b6be4bc3,2024-10-02T17:15:17.973000 +CVE-2024-20516,1,1,07c81f6263ffabf8b1d2a73001a0fcf7e8a4965f15caa0bb6884fc278b2b4a16,2024-10-02T17:15:18.200000 +CVE-2024-20517,1,1,969af6eead693d2fcb8ede1efbf6a0f6bb85028e0ee6315d2fb937e7bc3da884,2024-10-02T17:15:18.417000 +CVE-2024-20518,1,1,a53e69d54de767534e5b85992f4736a54495e651d0cc9e7ba20057e6b1917cfb,2024-10-02T17:15:18.637000 +CVE-2024-20519,1,1,03929cac62fa50b8991b095c6ab97754cbf7b1971bb4fac47b68e70d367a28a2,2024-10-02T17:15:18.837000 CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000 +CVE-2024-20520,1,1,06d0bc3faa846706c688273d17cb961483e7a5d4478394e43483da9fee14e442,2024-10-02T17:15:19.050000 +CVE-2024-20521,1,1,516d9d1c2d87560684d5a622f6b1e5604f449cf1f4aedad1c3a8810b8e801cb9,2024-10-02T17:15:19.280000 +CVE-2024-20522,1,1,feb40575a0c32d2adb983c9b84f5d6f10aadd63215236f2284e450fd3982d5d3,2024-10-02T17:15:19.490000 +CVE-2024-20523,1,1,8c45695f65f7576d13a20c6cdc2eb52929e511b8ef2b7253add70c9a5f4302f4,2024-10-02T17:15:19.707000 +CVE-2024-20524,1,1,cefcbef896e744cbccb73890a15b1caf90e8cad7faa4e5f01be7bdda92685a1a,2024-10-02T17:15:19.930000 CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000 CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000 CVE-2024-2055,0,0,07b933beaff1c6c6636c1d85ffcd111ff83285195075526678d7cb747831ae01,2024-08-26T16:35:08.047000 @@ -246596,12 +246621,12 @@ CVE-2024-2514,0,0,956e72a82145af5df3731620e2db9c4a0fa06ee5f96614ef673f99b0f16dc3 CVE-2024-25140,0,0,02a3bba96efcbad73ad6520b616dcfe50317ca878d5df8798f56ac79d62fc648,2024-08-29T20:36:15.900000 CVE-2024-25141,0,0,8a66a513cc3d5a929dbc0c208ddda5ccbe2cb769979056b34d518690cf1f89c1,2024-08-15T20:35:03.310000 CVE-2024-25142,0,0,19d4bb5bd9d9370afd571c0a6d80ffe65e65cfd553d5b4ccef4ef771df0d1e04,2024-06-17T12:42:04.623000 -CVE-2024-25143,0,0,10a6bb922da86e2acb7fedc41f329f10932019b09aa65cbea04bcb9e229da526,2024-02-07T17:04:54.407000 -CVE-2024-25144,0,0,8416cb9676120788fbc94760aa779f11f83eeafe55e75ecc3de9574dca979c73,2024-02-15T04:36:24.350000 +CVE-2024-25143,0,1,31d25cf0fb6ca436405cd759cee1d69276c6aefe963bad6366e8c8192c1421e9,2024-10-02T16:15:09.833000 +CVE-2024-25144,0,1,e105222f7a750ee8fa3f0de9d118bf1e3ac02f5c85afcbf968453073cccaf090,2024-10-02T16:15:09.950000 CVE-2024-25145,0,0,019019fbbbd35f7bb94f83f848a86247a2567342a1d429cff7e78b25bbb4c980,2024-02-15T15:10:35.503000 CVE-2024-25146,0,0,2df270f52850547876c3822e2ea04ebd4280017868acba4a2703de60feb94949,2024-02-15T04:37:12.337000 CVE-2024-25147,0,0,5f589c94d4539a75e7bd13c4a6e3893feb672773db12c998a1191bd7d8e5d6df,2024-02-22T19:07:37.840000 -CVE-2024-25148,0,0,1bb9b4d761d3b47398fbe7e9fb558a373f38d4df7189bcdd55e4764ee660a73a,2024-02-15T04:37:31.957000 +CVE-2024-25148,0,1,12cf371e60d0fe8beb6847bfd3ee7abc066265872293d2f0ff3d19c190e10c32,2024-10-02T16:15:10.087000 CVE-2024-25149,0,0,0dcfefe4eb72411e258f347a5e85512d947dc552eaf5a2d3bf9f1091ea5082e7,2024-02-20T19:50:53.960000 CVE-2024-2515,0,0,d53a54e6a2a251d59bea1146e400f57238ec6368cfc33345b9fce382f9f57216,2024-05-17T02:38:16.260000 CVE-2024-25150,0,0,b41fd0065cf0c548a9bf97e8fc529393a18612fd746cbcce411c874e683aa818,2024-02-20T19:50:53.960000 @@ -247418,7 +247443,7 @@ CVE-2024-26261,0,0,513bda7a092399193b5a95cba8191ef907d5160f5f00ea0bdca470614c45d CVE-2024-26262,0,0,477ca5f77e6d6ee11fb6414baf836a33792fc56d3dd35a0da6288b09c184bb21,2024-02-15T06:23:39.303000 CVE-2024-26263,0,0,652374740b3eebe8eb0261cbf85b2a6a1582520a998306145fd8c761f4f86104,2024-02-15T06:23:39.303000 CVE-2024-26264,0,0,bf52114dfe3cf3dd2fc7560bc6730e53c624d928ff0554d70b0919142e972a3c,2024-02-15T06:23:39.303000 -CVE-2024-26265,0,0,4355cf6e870d853a3433153da6bd074bb1138daae6af3eca76056ab318abbd4e,2024-02-20T19:50:53.960000 +CVE-2024-26265,0,1,48d2b9174778d4a475c5945869a28953f11cb3bc76a0cba653842a8fa9da595b,2024-10-02T16:15:10.190000 CVE-2024-26266,0,0,cd4c3538fa5abe1895c4c4433d10b2216b10f5bef416f2e6936da725b6d985af,2024-02-22T19:07:37.840000 CVE-2024-26267,0,0,526b093bece853e53698efa67210e9eb2a6f80299ca5ca39b60b96f837bf6a69,2024-02-20T19:50:53.960000 CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93cc1f,2024-02-20T19:50:53.960000 @@ -247989,7 +248014,7 @@ CVE-2024-26976,0,0,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4bae CVE-2024-26977,0,0,1ebc6c5c595b695887aee884e1b3633cb0833cb65f13c96d7b2e671b86068f61,2024-05-01T13:02:20.750000 CVE-2024-26978,0,0,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000 CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709b88,2024-06-12T16:15:11.147000 -CVE-2024-2698,0,1,40bd5a1cdf4bb74113246fbb824eb2e69afabe86a31672736550bc5463d9a867,2024-10-02T15:15:14.603000 +CVE-2024-2698,0,0,40bd5a1cdf4bb74113246fbb824eb2e69afabe86a31672736550bc5463d9a867,2024-10-02T15:15:14.603000 CVE-2024-26980,0,0,66004865e97bac01ca2fcc8b2212adb69ec738c42c9473f52383ac2219c51794,2024-05-17T11:15:08.357000 CVE-2024-26981,0,0,d2097042ff43763161fba07eb2edb36cfb373acac608a1af8d5b7b1aed54db35,2024-06-27T12:15:23.460000 CVE-2024-26982,0,0,1a2169fa3b40190b3ed39d1072c0508ff86c68871ae50c9090fd9edb12452c09,2024-05-03T06:15:10.953000 @@ -252496,7 +252521,9 @@ CVE-2024-33181,0,0,050373cfb1c1e53ba8267dbc3fabd7fa63ef5d1b950dbe9c6f1ffa2007dbe CVE-2024-33182,0,0,85cf52b790aabe853226358e7739617cb8f2d818ce16c35309a03355724b6ba5,2024-08-01T13:51:45.673000 CVE-2024-3319,0,0,3b63602fbf088f6ff76602ae3f5143e8ab646a9d9d32adce3daded5265d3ba0c,2024-05-15T16:40:19.330000 CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000 +CVE-2024-33209,1,1,097f8cdeebb5719cc6dca525a22d2c26b06526a45c93f45fb4dbe02ed149fcdb,2024-10-02T16:15:10.300000 CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000 +CVE-2024-33210,1,1,ea119992daacb8d52af556b012e2d35a09b3683a173069df0c6e1c2c4f9d3945,2024-10-02T16:35:30.553000 CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 CVE-2024-33212,0,0,e1465636a9a0085dbcb931f6bf0bf00f21c6133d537bb14ffddf0238c4968d35,2024-08-16T16:35:11.323000 CVE-2024-33213,0,0,535ed6b61a2defaf607542370541a34cb9da6a875bd2f52f1cf422d4fb6cc3a0,2024-07-03T01:57:36.257000 @@ -254724,7 +254751,7 @@ CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c97 CVE-2024-3632,0,0,b5152c6f3734461efaf203a246eaafe8ef0e2600523c2de907e61dd2f01c5bfc,2024-08-01T13:56:37.647000 CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26 CVE-2024-3634,0,0,5d02e3f893ea5650c3ad2b96f123134b624618fa357ff3bdcb3a7b4c93242ece,2024-05-15T16:40:19.330000 -CVE-2024-3635,0,1,b778d7b498dcea7fa24c3ef8d2fdc2e16efa86aeebfac3bfee1e098824c6eea4,2024-10-02T14:30:24.627000 +CVE-2024-3635,0,0,b778d7b498dcea7fa24c3ef8d2fdc2e16efa86aeebfac3bfee1e098824c6eea4,2024-10-02T14:30:24.627000 CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000 CVE-2024-36359,0,0,f23101db48854affc5e103b47d6b2305b7e6ac13ffa7941483a75abefead3f7b,2024-06-11T13:54:12.057000 CVE-2024-3636,0,0,4d79aacd53f2ff2167f5a1fa2a92eed22c11ede875a2d9112617f861658a4106,2024-08-07T16:35:14.110000 @@ -256119,7 +256146,7 @@ CVE-2024-38374,0,0,b039c6889e3b25105130cda3cb4d6252830c58349362eac54e70e39939e4b CVE-2024-38375,0,0,626cc37017b5b99d342165d2bf910513bdb2fdf5a18a0e825a4ce243860e1792,2024-06-27T12:47:19.847000 CVE-2024-38379,0,0,24d3b7135776280dd8cbf565222ffc49917d8846e2a67b6430e1fef8b4588944,2024-09-19T16:46:38.287000 CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d07b,2024-08-06T19:35:06.410000 -CVE-2024-38380,0,1,772c1db87e773ec094b30af8e675fcdb7ae8ec5c736b7a94607b2b1a80aeb8ac,2024-10-02T14:22:25.323000 +CVE-2024-38380,0,0,772c1db87e773ec094b30af8e675fcdb7ae8ec5c736b7a94607b2b1a80aeb8ac,2024-10-02T14:22:25.323000 CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000 CVE-2024-38382,0,0,5eb9605172a2cc2881cc14a987b3697e7a685364bc9cd84ed64848cef9c33fdc,2024-09-04T17:10:56.497000 CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000 @@ -256474,7 +256501,7 @@ CVE-2024-38809,0,0,3253fab0ee312e8a4e0cc4bceda27a807a19a408952e7e246fe3ca5d4d34e CVE-2024-3881,0,0,3699310594a82ce285b52bf9c21755fa8173160a66408c76064512e538b3fcc8,2024-05-17T02:40:10.360000 CVE-2024-38810,0,0,a8d05ba61ad79ab8e573251f3391c7e33071f14ecb67883defa939520cad5b0a,2024-08-20T15:44:20.567000 CVE-2024-38811,0,0,7963530e20965c3e978de3e3d7e692a26c21382a2c5c912f03ba846ab4c56eb4,2024-09-17T13:33:32.957000 -CVE-2024-38812,0,1,34d8657a2d86accb47b9e7e7219bd48126133821add77e5ea4911708e30f2104,2024-10-02T14:16:47.610000 +CVE-2024-38812,0,0,34d8657a2d86accb47b9e7e7219bd48126133821add77e5ea4911708e30f2104,2024-10-02T14:16:47.610000 CVE-2024-38813,0,0,3d08a10b622d3af5696a9ed2c2a45317011023f873f91120d4c5c5927c60a9b1,2024-10-02T13:59:52.887000 CVE-2024-38816,0,0,6659455d4c0832fae3abce29bdd91d446a380e8317fc9229e602957b66269232,2024-09-13T14:06:04.777000 CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 @@ -257891,6 +257918,7 @@ CVE-2024-4128,0,0,68bc0506eec8fccf6c4228f6f90915fa5b089633c8bc20338b2c6bd4b4236a CVE-2024-41281,0,0,acd5274a5314a460f4482234d2c8af8da53f6324e375946a6feb8a82983d1186,2024-08-01T13:58:25.943000 CVE-2024-41285,0,0,f9d8e2fe08b82d3f5c7f4ac42e37bd0268ac10deb583909c52659b72a2361eca,2024-08-27T16:03:16.043000 CVE-2024-4129,0,0,f2fba94e29dd925b8a56a23f2711717731ea628ca4457222b442fc21c3f8c80a,2024-05-14T16:11:39.510000 +CVE-2024-41290,1,1,c3129718b4e2614ba7f02c883e3040dce1f0d9288913fd384da98563a7fa2fa5,2024-10-02T17:15:20.217000 CVE-2024-41304,0,0,97c8e67643f8470191a2e05ce641725b816a8cc5ff59a9e38a00154810fc7f9e,2024-08-23T16:35:06.883000 CVE-2024-41305,0,0,44375e3d9aedae768570d453a5746b314221c07760efe679991b65a52a72cbb1,2024-08-08T14:36:06.423000 CVE-2024-41308,0,0,0cfb1f5a539d1b3ab56fa248bc4e6b56744120f3ffd7eb646c940bb1f8d27a55,2024-08-08T15:04:28.510000 @@ -259540,7 +259568,7 @@ CVE-2024-44093,0,0,6e42d0c910911c845327d3b84b7e4c2d7f7d958e5900913b50cb61055b864 CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb9901c,2024-09-18T13:37:12.887000 CVE-2024-44095,0,0,e0006363027abcd9487b2555f5c10f6b2763af7e9102189a399193814a56d2b1,2024-09-18T13:34:31.617000 CVE-2024-44096,0,0,d8c4df36682fa8ff2c29981f1e88279da6a08cd48c4fd6b3719d80ee95e04fe2,2024-09-18T13:33:37.863000 -CVE-2024-44097,1,1,a065476bacab76518a8237c8819efbf4009f746d42ba2a0a7004b317d4355f61,2024-10-02T14:15:05.670000 +CVE-2024-44097,0,1,f41d5fa67208a9b458a91150035acf19555d230546c738fc3f37c0daec84b350,2024-10-02T17:35:15.257000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-44103,0,0,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000 CVE-2024-44104,0,0,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000 @@ -259607,7 +259635,7 @@ CVE-2024-44189,0,0,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6 CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000 CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000 -CVE-2024-44193,1,1,731a8455ca405a13d2cad952c5793257b9b4090d0ffd26a9fb96713cef9f2fd8,2024-10-02T15:15:14.920000 +CVE-2024-44193,0,0,731a8455ca405a13d2cad952c5793257b9b4090d0ffd26a9fb96713cef9f2fd8,2024-10-02T15:15:14.920000 CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000 CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000 CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000 @@ -259983,7 +260011,7 @@ CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af13 CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000 CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000 CVE-2024-45182,0,0,9a85c862314a6425e6060387f72c5f336d253a6faf88611dfadeddbd5da8c540,2024-09-18T20:26:11.023000 -CVE-2024-45186,0,1,dd0cb6069a7a3676314323dba5e5a8af7d4dda1193d70390cbae04ecfb4affaa,2024-10-02T14:35:06.610000 +CVE-2024-45186,0,0,dd0cb6069a7a3676314323dba5e5a8af7d4dda1193d70390cbae04ecfb4affaa,2024-10-02T14:35:06.610000 CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000 CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000 CVE-2024-45189,0,0,b34fadec0fb3db465bf6b7b191f2d87a7b9589d6e1c6f03c86e02522d36fb854,2024-09-12T20:42:30.850000 @@ -260255,10 +260283,10 @@ CVE-2024-45815,0,0,06eeda73da6aeda58a6c8960f205d7a720011d27a4bce46e59b74e204055e CVE-2024-45816,0,0,405ccbf15ea8ae9fcc093aec52f9637ed1c1902b9f58c1816b340eb464d6fa85,2024-09-23T18:41:15.603000 CVE-2024-45817,0,0,e07d99c01a67ff9168fe9a30ba6036e488afb3a202828a218275538560c3273c,2024-09-26T13:32:02.803000 CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000 -CVE-2024-45823,0,1,69c87ecc16422910e33b859f46eb5ec7fd2de42f8535f15441d6fdd097693e33,2024-10-02T14:49:59.157000 +CVE-2024-45823,0,0,69c87ecc16422910e33b859f46eb5ec7fd2de42f8535f15441d6fdd097693e33,2024-10-02T14:49:59.157000 CVE-2024-45824,0,0,10e16d904d2154d7119c6df05a22810044cd3b50093fd71dfd8bbe566411a270,2024-09-12T18:14:03.913000 -CVE-2024-45825,0,1,772075ec5deeaf7c7029f931ec15621230c7b2330dcd87b5ccf7ab7721cf06f6,2024-10-02T14:43:08.720000 -CVE-2024-45826,0,1,09e161f625f954ed804a43ac07521f29edea4489bb062a3b0321529236e21762,2024-10-02T14:35:38.017000 +CVE-2024-45825,0,0,772075ec5deeaf7c7029f931ec15621230c7b2330dcd87b5ccf7ab7721cf06f6,2024-10-02T14:43:08.720000 +CVE-2024-45826,0,0,09e161f625f954ed804a43ac07521f29edea4489bb062a3b0321529236e21762,2024-10-02T14:35:38.017000 CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000 CVE-2024-45833,0,0,d66bcdb35ef05ab6c240a22f01c308be4dcef309fd562be6507d54a47e85401a,2024-09-23T13:43:42.073000 CVE-2024-45835,0,0,2bbb89ffd28b8dc1adee7dde89d168866e6c50e525c50f0b4fc33c67b9ff7524,2024-09-17T12:11:48.833000 @@ -260327,11 +260355,11 @@ CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000 CVE-2024-46079,0,0,de738a0bd882f39ea47b8b780287948857238b9c551e4d68f6db004a475649c2,2024-10-01T20:35:15.110000 CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000 -CVE-2024-46080,0,0,fc601b9ca1b02c7d9ec64ffd3e18ec37b90c292805b3e0ba6020447020b8c32c,2024-10-01T21:15:06.767000 +CVE-2024-46080,0,1,f0f886b5c60d620e0a3763900e062e8d713a9754171e96277dfc24d03f0b830b,2024-10-02T16:35:31.633000 CVE-2024-46081,0,0,ce234681fd295fa30b0365e788d91f8af933d72fe65b9789b0e2a2d1afc6dfb2,2024-10-01T20:35:15.930000 -CVE-2024-46082,0,0,d95641b6e12ce4e2c315980636fb143c9979cbf517556c795f433f4f608511d1,2024-10-01T21:15:06.857000 +CVE-2024-46082,0,1,dbbad918d972834efcdd6cc5d1be5c5f58c54cd9d7a61b0321ac2e925a0ee93b,2024-10-02T16:35:32.440000 CVE-2024-46083,0,0,9a57be1cd20a7d38e5aef4fd8fde4bd404240de87843aaaa1ae4ab3787c965a8,2024-10-01T20:35:16.743000 -CVE-2024-46084,0,0,03932b1e786313bde47afcea58437164dbad1a2165bf11903e8b6ec41ebf5c6d,2024-10-01T21:15:06.950000 +CVE-2024-46084,0,1,1afba640ca072b9ac5b46978318c5ed068f301a6f2980e4922a8af26224f7bc5,2024-10-02T16:35:33.230000 CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000 CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000 CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000 @@ -260415,8 +260443,8 @@ CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4 CVE-2024-46475,0,0,f67981ea4dc5deb130e35e5981398b3bd014da3c6f6093379b2c49fae0dcdd4f,2024-09-30T18:35:09.327000 CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000 CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000 -CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000 -CVE-2024-46489,0,0,8b9d2d65fe9d89854929481ea662e27274eb10088356e47bf59cefd0f4ce4dee,2024-09-26T16:35:24.797000 +CVE-2024-46488,0,1,41c2092a15aede67b224d6f9481dd8740d600089d5047373dfa98024a8d780a7,2024-10-02T16:21:36.507000 +CVE-2024-46489,0,1,0556d6a2fec67f99959df88dbf0bb95ed9722504d8b825a29e35fd84905c2afd,2024-10-02T16:24:32.300000 CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000 CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000 CVE-2024-46503,0,0,4ac1b38036fe75f045c23095200c8437ffa99be96a41471b5f7bf60edd9894cc,2024-10-01T15:35:15.667000 @@ -260477,6 +260505,7 @@ CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 +CVE-2024-46626,1,1,b4c0ee4e29af16d2e43907e99e25ce6985822dbfcb4efcef23652ddba549adc0,2024-10-02T17:35:15.457000 CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000 CVE-2024-46628,0,0,f50f1f0723583928f80e0fb1e30a1b830ba848791b571a0759dc9426674fa140,2024-09-30T12:46:20.237000 CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000 @@ -260493,7 +260522,7 @@ CVE-2024-46648,0,0,634f7d679e68e222ea2e94cd89bc02a5346db8ce64e1a6f0ded51b9c29194 CVE-2024-46649,0,0,2f03d297d29de9b605649bc98c942e9f2148e6f94209c6c18583bdb8afcc27d4,2024-09-26T13:32:55.343000 CVE-2024-46652,0,0,4b3d12d4ca4fe0d1464490ffd2a8b0a83e7537df776bf6ec5250968017288c8b,2024-09-26T13:32:55.343000 CVE-2024-46654,0,0,2f7453f2aae63e8bba7fabf459346ff6b4ea9f03b817ee7480b6439401e40c66,2024-09-26T13:32:55.343000 -CVE-2024-46655,0,1,697c64074c19e469267289c3c91c136c8f9dbd6565ff633ca73da48524a9c0e1,2024-10-02T15:40:36.090000 +CVE-2024-46655,0,0,697c64074c19e469267289c3c91c136c8f9dbd6565ff633ca73da48524a9c0e1,2024-10-02T15:40:36.090000 CVE-2024-4666,0,0,574e789fc18a09e540199055631026983551e2de180e4487a378ddd991d469a5,2024-05-15T16:40:19.330000 CVE-2024-4667,0,0,5f6a087811f370dc89d31ef88ad63586b7ea4db405d3be18d05609409a87488f,2024-07-12T14:25:13.923000 CVE-2024-46672,0,0,2e3294d68f2514ca48393470be5abdd07b9de47f0436f7ee27b5dadd28da80e2,2024-09-13T16:29:17.123000 @@ -260645,7 +260674,7 @@ CVE-2024-46804,0,0,2fde954d7701fe2244ffccb1e1435e60de864c686b315e9228ec7893126c8 CVE-2024-46805,0,0,5159fe471f89438fefa0d5d140686d61da2d0cea3c78eb408a0a4757fbac85e9,2024-10-02T12:58:59.767000 CVE-2024-46806,0,0,ed4e1fd2116041561a62c2ee66c4e33780a9a4381fdf02b9a845a019cc19fcf8,2024-10-02T13:17:04.640000 CVE-2024-46807,0,0,b76c0c8bfa99626db7385b1837463a89a2e9018b1d828861a724cca1379fa995,2024-09-30T12:45:57.823000 -CVE-2024-46808,0,1,088bcd1b8f3aeced54cc16a0776395f8722d270bfa484c0611e347ee4f8d57a9,2024-10-02T14:23:39.863000 +CVE-2024-46808,0,0,088bcd1b8f3aeced54cc16a0776395f8722d270bfa484c0611e347ee4f8d57a9,2024-10-02T14:23:39.863000 CVE-2024-46809,0,0,76e7d93e2fcac77b727fe55d77bd4ffccf126388001c0509474bbeb489abf906,2024-09-30T12:45:57.823000 CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000 CVE-2024-46810,0,0,a004c05f40757352e590e4add8906fd2708235fe021561ff9969f78d0a01b392,2024-09-30T12:45:57.823000 @@ -260661,21 +260690,21 @@ CVE-2024-46819,0,0,a7df575d1b5203b7d18b4381810a990ecbae0552b68c1b660793d4465a3dd CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000 CVE-2024-46820,0,0,e02b77fbfb7c27b691f35a8ec06822e6f9168446acdd71a423d10b4bf4e98574,2024-09-30T12:45:57.823000 CVE-2024-46821,0,0,a58e1f258f369639bd3c99b89ead13b97a56b7b3683a78b0943484df7d677421,2024-09-30T12:45:57.823000 -CVE-2024-46822,0,1,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000 +CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000 CVE-2024-46823,0,0,74e6b65053b916be51d6af5908af9de8bcd9c2ddf8063fe700f6963a1faa4849,2024-09-30T12:45:57.823000 -CVE-2024-46824,0,1,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000 +CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000 CVE-2024-46825,0,0,aa389e364217a0b9e16c3fcf17f7f0c6382d69ded44339c5aa61a7007a867b8d,2024-09-30T12:45:57.823000 CVE-2024-46826,0,0,be734978861d0287bcd7e4a1cb0186beed982fdcb864acc473dc75997a104c25,2024-09-30T12:45:57.823000 CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000 CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000 -CVE-2024-46829,0,1,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000 +CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000 CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000 CVE-2024-46830,0,0,5a3220ccf0c3370380e51de1b5caff7b25885a9b9d75271a4ec592a9375f4960,2024-09-30T12:45:57.823000 -CVE-2024-46831,0,1,14ae7f8e12870e945bdd58f18dc055e43068d59dc30de785d452dc677b096ef6,2024-10-02T14:26:13.807000 +CVE-2024-46831,0,0,14ae7f8e12870e945bdd58f18dc055e43068d59dc30de785d452dc677b096ef6,2024-10-02T14:26:13.807000 CVE-2024-46832,0,0,8056b5e14167e4606637fcebc8226e228ba73f7d145bd772a270292fde9f772f,2024-09-30T12:45:57.823000 CVE-2024-46833,0,0,fae6ea6196846013711f1d6709341f19b674b8cfa05631975d23add168bca551,2024-09-30T12:45:57.823000 CVE-2024-46834,0,0,dfbe2716c14d1826440661fb87f8c8d7efb813d6e40029f94868f663adf505ad,2024-09-30T12:45:57.823000 -CVE-2024-46835,0,1,496f6218adc12a648799c8b8c9fb7dccdd2a7aad915e4acf068fab956eb83221,2024-10-02T14:24:18.930000 +CVE-2024-46835,0,0,496f6218adc12a648799c8b8c9fb7dccdd2a7aad915e4acf068fab956eb83221,2024-10-02T14:24:18.930000 CVE-2024-46836,0,0,b54d41ae5ec465d61622911e4de8c30a51746c8af7c3149de1568c26e0143a26,2024-09-30T12:45:57.823000 CVE-2024-46837,0,0,973e22b93c60a220a53fc9bfa0f28bffad9d8b2bb149dda4f854bc862f5ccb09,2024-09-30T12:45:57.823000 CVE-2024-46838,0,0,9183a6da766b06f913d1a3a8712e6c6d56d2e3592b7da6af3b2719974e1942f7,2024-09-30T12:45:57.823000 @@ -260685,10 +260714,10 @@ CVE-2024-46840,0,0,d8e5431b753614a53a08cede9d1dc8d8174b6d84df5473ed659ee61687059 CVE-2024-46841,0,0,89d23cf5d6a67427b3a52d9320f801118193f51775c7e9f100ee3dbac22f74cd,2024-09-30T12:45:57.823000 CVE-2024-46842,0,0,22faf02261aa59d11cf2767b0d7c9469127ac25d1afcaba10a2d060d376b0a90,2024-09-30T12:45:57.823000 CVE-2024-46843,0,0,eb3231d989152db17c7206ea44c2fc597f70c097ca38cf8e226bf5d34b414947,2024-09-30T12:45:57.823000 -CVE-2024-46844,0,1,68130d99ba2d9b6411c30fe89ce02f5f664105b08e8d9b6d10d8d24d40fbca31,2024-10-02T14:22:50.533000 -CVE-2024-46845,0,1,775e48219f57ae411a9fd39af0ffe3f35a42c275a25b80d4e64503a6fc153604,2024-10-02T14:18:32.923000 +CVE-2024-46844,0,0,68130d99ba2d9b6411c30fe89ce02f5f664105b08e8d9b6d10d8d24d40fbca31,2024-10-02T14:22:50.533000 +CVE-2024-46845,0,0,775e48219f57ae411a9fd39af0ffe3f35a42c275a25b80d4e64503a6fc153604,2024-10-02T14:18:32.923000 CVE-2024-46846,0,0,90e473ff3287976c7a74ed9b83a018488b7185ddf6d520cb6c65035a8de1c7f9,2024-09-30T12:45:57.823000 -CVE-2024-46847,0,1,c7a299dfd11a6ada51f8fcb0d442182a51fbf3432bebe2696fbf544d4f917c06,2024-10-02T14:16:08.180000 +CVE-2024-46847,0,0,c7a299dfd11a6ada51f8fcb0d442182a51fbf3432bebe2696fbf544d4f917c06,2024-10-02T14:16:08.180000 CVE-2024-46848,0,0,75be985f4c307071e6330022d7ad7e21418ad2edaa3f1ab8b4ddbeb44c053e41,2024-09-30T12:45:57.823000 CVE-2024-46849,0,0,7b1f01f53478d25b12adf0d307135ae5baaf89880e33ec19f4066834baf76dc3,2024-10-02T13:25:27.163000 CVE-2024-4685,0,0,38350af74ad68911fd851342727812175d5d39b6f847c1ca12945db68e23926c,2024-06-04T19:20:46.443000 @@ -260703,7 +260732,7 @@ CVE-2024-46857,0,0,8dec4e3463ee57c87efc640c94114393b6fa85793860c8b91fb9a36833ad8 CVE-2024-46858,0,0,49cb83621376018f4b52cc3254920fbddd535744ae8d27d488860900395f707b,2024-10-01T17:10:14.703000 CVE-2024-46859,0,0,219881cf57e0abd9fdd1246bb95fa67acffa1997ce6f943edb640b7145167614,2024-09-30T12:45:57.823000 CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c891096,2024-06-20T20:15:19.483000 -CVE-2024-46860,0,1,da16c5af34531df299c8ad7ccf3e24722b563106cc1b923e33d44e44e1ad84df,2024-10-02T14:04:38.863000 +CVE-2024-46860,0,0,da16c5af34531df299c8ad7ccf3e24722b563106cc1b923e33d44e44e1ad84df,2024-10-02T14:04:38.863000 CVE-2024-46861,0,0,c6ebac6253a83dc2f920da893d314648878d5859bee9d7cdfe7dfd4445c9abef,2024-09-30T12:45:57.823000 CVE-2024-46862,0,0,8ed5b69c03f390ff3625d3e803e9cc39c3a1ad18d3dc6c15990d96abef3f3d32,2024-09-30T12:45:57.823000 CVE-2024-46863,0,0,d79d5950a88e299aa0f19f6f5fd912414b163ffb8236ed8adb506b0f7f1da245,2024-09-30T12:45:57.823000 @@ -260829,7 +260858,7 @@ CVE-2024-47182,0,0,e6d6599745fb7b6ca571eb228e79e45bdc8c54e3ef9ca737532323ab39f37 CVE-2024-47184,0,0,8c33cb631f21c310fa82c8b5254a8b4bd69f77d420e21f25811748f0f58bb5de,2024-09-30T12:45:57.823000 CVE-2024-47186,0,0,85f9ee5a5901f7a68ce64fa53ba9991136dfecf88b48bceba5f09bc991f04ddc,2024-09-30T12:45:57.823000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 -CVE-2024-47197,0,0,e744485fe82b2c7f5b7c9d650df3296f2a00094efea0a5ed0597ce38048212b5,2024-09-26T13:32:02.803000 +CVE-2024-47197,0,1,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000 CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000 CVE-2024-4721,0,0,58190a4c7e114543454f0451ab9386f5b2fe1b56ab67d3c8b011dbecb251f4fd,2024-05-17T02:40:34.750000 CVE-2024-47210,0,0,ca2b900fbd9eb194b293e1ce40d6ad1fe1c427789838eaeabb19878edb5f2c77,2024-09-26T13:32:55.343000 @@ -260856,12 +260885,12 @@ CVE-2024-47294,0,0,616aaa0c0c25f743060360eec6e57e8d54e0c598ed571a7197a1a16575817 CVE-2024-47295,0,0,c93abca76c7aa66145a5a013b2ec6fc0d6f01bbea875548408ba1b2806e98d17,2024-10-01T14:35:03.430000 CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000 CVE-2024-47303,0,0,4fd81bf971579cf0e00271b5e072c908021bfefdc76c11f84286ad7788e9cb34,2024-09-26T13:32:02.803000 -CVE-2024-47305,0,0,2c8f799a296592421ee25aa9899e311f2f61ad0eb53c72b4da9231822f1148ec,2024-09-26T13:32:02.803000 +CVE-2024-47305,0,1,7c018d03a71f28200e41a87d693293b1e365b3b52710d7dc9c8bc548afdcc447,2024-10-02T16:35:40.077000 CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000 CVE-2024-47315,0,0,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000 CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000 CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000 -CVE-2024-47330,0,0,a0e4c848573d9b135f4e2651c83b6b523e8c5bd0ca01b687162a3441017ae278,2024-09-26T13:32:02.803000 +CVE-2024-47330,0,1,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 CVE-2024-47337,0,0,3f50b583aae71c6f8cadac0ae6ee64e91fb1dabd9a75ac191a842163ad487c42,2024-09-26T13:32:02.803000 CVE-2024-4734,0,0,0eefea1299cd16be8adb4bc3a22d24ee524acae6c15e2191dca2420e7021d6ef,2024-05-15T16:40:19.330000 CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000 @@ -260902,10 +260931,10 @@ CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f289 CVE-2024-4760,0,0,68ac2eabdd1ace978fad05fc48c22bb964a87e93631e50aa97e53cb7b4952d59,2024-05-16T15:44:44.683000 CVE-2024-47604,0,0,b6b4fc903f99b2043f88ddbd3163a454dae216b1bade4187e503e59baa13044e,2024-10-01T16:15:10.003000 CVE-2024-47608,0,0,183b8f26709f0bb4c9315ae5ac8f0737eedb89fb07f4c926502b272e6d5567a7,2024-10-01T17:15:08.970000 -CVE-2024-47609,0,1,555d6b2b05ef097d6f46eab3f45f164bfb9fab39f1ce72e0c1426713e9aa488b,2024-10-02T14:35:07.770000 +CVE-2024-47609,0,0,555d6b2b05ef097d6f46eab3f45f164bfb9fab39f1ce72e0c1426713e9aa488b,2024-10-02T14:35:07.770000 CVE-2024-4761,0,0,490aec64931f999440aa7ba804cefb45baa762d4b1b18a12f1a0ce61a5d54b49,2024-08-14T17:06:52.260000 -CVE-2024-47611,1,1,5ab68f9c4958181cdd0e1935d8e73708b53540cfb109e2caf4693dd5d7fc6ffa,2024-10-02T15:15:14.980000 -CVE-2024-47612,1,1,1981a610491546210a30a6a2dd9f593698e6ec4275e7e7b83130f7f983dd1587,2024-10-02T15:15:15.133000 +CVE-2024-47611,0,1,b926e9df1217329843befb987d6ebbb03fb5af9de6c2becfc5849934dc4fb029,2024-10-02T16:35:34.060000 +CVE-2024-47612,0,0,1981a610491546210a30a6a2dd9f593698e6ec4275e7e7b83130f7f983dd1587,2024-10-02T15:15:15.133000 CVE-2024-4763,0,0,674813a6ab24bd703f885b42dfe132f3057b83ab6d40519e0af01ad0b69a7ece,2024-08-19T13:00:23.117000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 CVE-2024-47641,0,0,d8a923752c07b02ea5386415a7b0ad8cc8f9093d938474666f31f411f6951ce8,2024-09-30T13:15:02.570000 @@ -260925,6 +260954,11 @@ CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737b CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 +CVE-2024-47803,1,1,a9a67b61fdcb4757c6e6d3bc6151177c2c973b5e0c1d174afc8511a1486e7b9e,2024-10-02T16:15:10.630000 +CVE-2024-47804,1,1,5eaf8294cfcd4a5d65dc8d9fb1b6d4ecd42b0948f1ec1702cde5a1152ffc7e83,2024-10-02T16:15:10.697000 +CVE-2024-47805,1,1,ded7232315a4d8c49b960c86dc1c18b5736d1b2cce6e8cb380ebda3a9f4d22dd,2024-10-02T16:15:10.753000 +CVE-2024-47806,1,1,fdec1ce2d6768d8f1e400b23e12eedeca48d26ee6da805999377b112efa98557,2024-10-02T17:35:16.567000 +CVE-2024-47807,1,1,fbf2b5641e02496ca57a08a6b36ab0493bfa73ffbb1f158c0fd3bb3a55b43be4,2024-10-02T17:35:17.357000 CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000 CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 @@ -261548,7 +261582,7 @@ CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb8 CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000 CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000 CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000 -CVE-2024-5480,0,0,e3b751f5e1aae9a001af5fbca0b04d0edc5a2fa5a73d6ec1b3a09941cad9078b,2024-06-07T14:56:05.647000 +CVE-2024-5480,0,1,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000 CVE-2024-5481,0,0,32222ebb3f7a972393fb918a0cdb6b7e38cf91a107006665f6c1b1bad41a3e4f,2024-06-11T18:00:09.740000 CVE-2024-5482,0,0,3b1b42d732a855ed8e91ef26579f45fec6ebdee965d18872f2c0403904f8cdcc,2024-06-07T14:56:05.647000 CVE-2024-5483,0,0,2e97255179d42c1fdc159b28df8a118b6b7a66fe00e7310d283bd122fc23ff3b,2024-06-11T17:19:17.143000 @@ -262068,7 +262102,7 @@ CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96 CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000 CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000 CVE-2024-6091,0,0,bb7b961b168ed94110b11915eb6181b2a134b2679cab348c5f10ff830194015b,2024-09-18T18:41:31.247000 -CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000 +CVE-2024-6094,0,1,a9245b81080ea9d563a7d1371ac80737595d4976477fa1dd135b34ffbaefce92,2024-10-02T17:44:06.180000 CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 CVE-2024-6096,0,0,6b5f1375532be5fbd8f0909be12e0ecac09c21eb2b2624e229274d814c555540,2024-07-26T12:57:36.633000 CVE-2024-6098,0,0,1e4b831acb54559fe2b2c3035d21285846ee1f7c1168caf02f0b4b909cceaf4f,2024-08-19T13:00:23.117000 @@ -262300,6 +262334,7 @@ CVE-2024-6355,0,0,7f4c7fb5a41a7b4cf241f6b370777bf2a8cf0ede73cf75d47093e841c71a69 CVE-2024-6357,0,0,d17a8b9a4a9bc17bd90a79ef1b2a022c26416b8ede91adaf116bd0fc1d0de886,2024-08-19T17:23:16.973000 CVE-2024-6358,0,0,3e184968ad38f7e6dfc49915eadebc5cb02badfeeeea523a574397eb20c849cc,2024-08-19T17:31:29.647000 CVE-2024-6359,0,0,093dea73109d9b2f23d9e6885d4ebbb2b84fce28b7a075a363fc879a286259cb,2024-08-19T17:30:31.880000 +CVE-2024-6360,1,1,a6ef0453763d95703475c0dd0195f8c2e77e9db2febc3a4a627687c5fe42e38d,2024-10-02T16:15:11.103000 CVE-2024-6361,0,0,a3e4bbdd0f4905fca66747fb0442673a0924c1ae81b12b0ea7c60a6803fd61d3,2024-08-28T18:17:35.497000 CVE-2024-6362,0,0,aeb770c7b39ef36db7bd4a49056b449aeba256942be50c6b83f329d15f15257d,2024-08-01T14:00:20.147000 CVE-2024-6363,0,0,455979652b8642d7eb5b747949e6f02be3f028b83d7cfc357521a34bb9d7438e,2024-08-01T17:00:53.130000 @@ -262422,11 +262457,11 @@ CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48 CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08dcb,2024-08-21T12:30:33.697000 CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000 -CVE-2024-6510,0,0,271701171f98244795ebd972ebc5048aac2cefcf02c3610beea189409c6fb6ff,2024-09-12T18:14:03.913000 +CVE-2024-6510,0,1,5e8ec1aef4696d364d1cf0507192e6236a7f19c30decdfeea7966d96cda0feda,2024-10-02T17:17:46.450000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 CVE-2024-6512,0,0,906938fa7a056c51f95f91dd79dd34ac36ca181a28b11365ac04b0f9d5c62236,2024-10-01T16:36:43.733000 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 -CVE-2024-6517,0,0,284a9e11267ab25537790597701cb80256104a9ef1a0a6406ea3f17ec8a06130,2024-09-26T13:32:02.803000 +CVE-2024-6517,0,1,f170167d48def43eb19df077ff3ef68c655e06896ed245e4dd4a412fc6b98463,2024-10-02T17:15:56.760000 CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000 CVE-2024-6520,0,0,788783a471766cea8e4d7400c47ef97ab3609f9b749a996b82510813b15dd35e,2024-08-27T13:15:39.697000 CVE-2024-6521,0,0,3aa5a2c2ac838fced00e2bfb97108d19e91480ed8940bd254983de5af0ee5d87,2024-08-27T13:14:02.300000 @@ -263039,7 +263074,7 @@ CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda CVE-2024-7312,0,0,dc3f367e0f0a86ec8a8ee4af9b89c7ef895e4bddfa2b420824b06225d6049fc1,2024-09-13T16:27:50.577000 CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000 CVE-2024-7314,0,0,64aaecd133deeb35ae51feed7f4d71099832a2945a1861cec1e5be771eb8caf9,2024-09-17T15:45:01.970000 -CVE-2024-7315,0,0,c76281c597cfe81f1f3116f1e5bb315d0944617079208c3562ff072b668f5bf4,2024-10-02T06:15:09.963000 +CVE-2024-7315,0,1,b057ae02c6cc52cf777ade7c122b7553edb576e1de9f895eb67f853c43c86693,2024-10-02T17:35:18.430000 CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 CVE-2024-7318,0,0,3b07c549e5fb2dfd376a8d14b85e9bdf6d56cc8a33e82cf1a53a16bb45702ca6,2024-09-20T16:02:06.977000 CVE-2024-7319,0,0,91324dd5cce8fc33151e2efd0732f449f761808f1b2abe94f46ca69302c16039,2024-09-24T17:00:00.917000 @@ -263281,7 +263316,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 -CVE-2024-7617,0,0,409a017f77e68a0b333125e7ee4e0eae38f8476b171c8d41c358d00abeebdfba,2024-09-26T13:32:02.803000 +CVE-2024-7617,0,1,f10dacf5f8900d3fef92c918260a2e6611d516244a821eb5484728f5e78850cb,2024-10-02T16:02:25.020000 CVE-2024-7618,0,0,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00 CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000 CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000 @@ -263408,12 +263443,12 @@ CVE-2024-7756,0,0,1b8e4c66c7bf8f5bb87e6dc0c53f1d7bb597ab897e7e923ca54d526835e888 CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000 CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000 CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000 -CVE-2024-7772,0,0,c8a2214184ae5302e25d01656ca4793d6f8521697bc26b9cba85e2932172367a,2024-09-26T13:32:02.803000 +CVE-2024-7772,0,1,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000 CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000 CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000 CVE-2024-7778,0,0,2fe0c9b8600c103dc69d73ebe792b6f5d96c6eaccbc88de74e66c7097ae3a047,2024-09-26T22:22:04.053000 CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000 -CVE-2024-7781,0,0,82f0f06f464f4c11f034a45b76a02bf3fd17c439601993902c095779d8e71986,2024-09-26T13:32:02.803000 +CVE-2024-7781,0,1,195406e4d26756061eec11348aa250b24d79fc541f740fe89b1afbbb454c19eb,2024-10-02T16:21:03.113000 CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000 CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000 CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000 @@ -263486,7 +263521,7 @@ CVE-2024-7869,0,0,45609c63caff2a26adcc7ef2195d5ac5e058ebc9157c26bc66abdd8f75364a CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000 CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000 -CVE-2024-7878,0,0,139e3daa6f4fd230b34cc8d339a87a35cd26f13df528a2d86f4bf5e471de4cb8,2024-09-26T13:32:02.803000 +CVE-2024-7878,0,1,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000 CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000 CVE-2024-7885,0,0,00a94d4ae6360fffd4cee9a0730f977e7daf66b2923a263383684377db4f8a54,2024-10-01T11:15:11.850000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 @@ -263809,8 +263844,8 @@ CVE-2024-8345,0,0,bea7763926b715c0e51801ea13b0e6641ca2b2321817703caee6bafdff4fc9 CVE-2024-8346,0,0,b4457249ac6e42b712016be7384df47b946c6e796e6e27191d31db6f56c0933d,2024-09-04T16:37:22.077000 CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3cb,2024-09-04T16:42:49.037000 CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000 -CVE-2024-8349,0,0,66c929a2bd31259ac7f99499cacb7946e158950a66ce33bab4e6efb6d8c7636a,2024-09-26T13:32:02.803000 -CVE-2024-8350,0,0,f8ffd63945ba91a36195e839079351a67afb6a0aef5d0bff0efca569bbd0260e,2024-09-26T13:32:02.803000 +CVE-2024-8349,0,1,c5156d79e59cd80a9f637ce807d739d5f9bbbaf01e3f3140af43137a484694a9,2024-10-02T16:50:09.673000 +CVE-2024-8350,0,1,c0d58d04c994f4448c198b4f5c8008888aa77e46ed6f78c2de3ffb535372e657,2024-10-02T17:10:47.267000 CVE-2024-8353,0,0,dcc35089fec5ab9bf27f5fe03523b4e62e247a4803b51263049a1132141d0f36,2024-10-01T14:31:21.430000 CVE-2024-8354,0,0,cccb2137017cf69831f7ecbf78dca654eaa8501214a295601783df83128f0494,2024-10-01T13:15:02.903000 CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000 @@ -263861,7 +263896,7 @@ CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da968796778028 CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000 CVE-2024-8430,0,0,de3b67a4916feceb0eaac5d01380b94825ca04564095cedc02abe04981e18fc5,2024-10-01T09:15:03.790000 CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000 -CVE-2024-8434,0,0,a7dd938925c560d2c4358a00a748e9c070db95d94d7906c441d33bc026b679c8,2024-09-26T13:32:02.803000 +CVE-2024-8434,0,1,f17fd5eecfec4b6092d883a27ff9fa9dfcb00839b391edc337e18ff19734c460,2024-10-02T17:25:30.140000 CVE-2024-8436,0,0,0d153a053863f3621c53c1e26deb2ddde74385c0ccdd737c792b34eb9af883c1,2024-09-26T13:32:02.803000 CVE-2024-8437,0,0,e197ee77442bbe9c0c205a562fa2fee4cf9645f10acbb85445e512103cf01a70,2024-09-26T13:32:02.803000 CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 @@ -263895,14 +263930,14 @@ CVE-2024-8470,0,0,bea6b0b968688b42b5644ab4cec20c893536d252388507a633ee5ebbe07507 CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76cb,2024-09-06T11:44:22.510000 CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 -CVE-2024-8476,0,0,be59b11c1279f7ecf320b80a6c3e28b451b362fed6870ef30fbe31812ac167ae,2024-09-26T13:32:02.803000 +CVE-2024-8476,0,1,092ef960d66528d11d9417cebbf68782d16f414858b72459c24698ae73498ac1,2024-10-02T17:31:00.583000 CVE-2024-8478,0,0,175c7b9f94662d755813fa2228cd0539f44691d1180c4633af22a35129eb9a32,2024-09-26T15:53:44.297000 CVE-2024-8479,0,0,895a7d94fd595e323b99eff6522688473ca450b242af8c3d5ea382e2a282a9b2,2024-09-27T16:12:10.427000 CVE-2024-8480,0,0,73de76891190d432c360d36e1da93720f2abf11adbca08499bebf4ffb87eb2bd,2024-09-26T18:13:58.470000 -CVE-2024-8481,0,0,67325c0356d12406e49fab472e21b05bb6061508372f0502a0ce3d40d30f14ca,2024-09-26T13:32:02.803000 -CVE-2024-8483,0,0,32ab224ff359b84d82ed4ce77aef264a7f492427c24d93140e77029461e7169c,2024-09-26T13:32:02.803000 -CVE-2024-8484,0,0,d0fccdedacf4dc6329ba9866ef74b74fbb5f8d079ba99b2fc034c60f4afe6c85,2024-09-26T13:32:02.803000 -CVE-2024-8485,0,0,2d19876b7de8e9f56ec7e63c79b17d47547448dd4997ef0bac6df72b646b7654,2024-09-26T13:32:02.803000 +CVE-2024-8481,0,1,f7ded0bc8510c8370341acc7cc1290a608973497f13c998f4c94b53ba9c9ee83,2024-10-02T17:59:52.013000 +CVE-2024-8483,0,1,7b9d62ad2c15cc912981452040d1345e4ce933202d5b94754bb2f4a4c6c39a92,2024-10-02T16:42:30.347000 +CVE-2024-8484,0,1,f455d9eda6cfa730254e6d1c54e42895291597af75d213a155b8f2778e2c53b8,2024-10-02T17:44:13.687000 +CVE-2024-8485,0,1,a23363c7e119dcd66690422c5888ab97f710d472d308cfeb1e931d4e39313163,2024-10-02T16:19:15.993000 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 @@ -263925,8 +263960,8 @@ CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd CVE-2024-8546,0,0,21c437f0d9de25e8960a2d9fbc9927a015111c992509c4b53747f59b9615f4f7,2024-09-26T13:32:02.803000 CVE-2024-8547,0,0,a5c726f624e35e2e38ae2311e7ed395da023cf1c888c1c750584ab5f9e849229,2024-10-01T14:32:43.330000 CVE-2024-8548,0,0,cca495c452a8db9d34b67e92dde5b83e8275bbf017fdb41e2dc638aa49309d62,2024-10-01T08:15:03.400000 -CVE-2024-8549,0,0,26824bba4a7be5d3e1980cceb3f14676382c512f326742b207079a7edab4cb14,2024-09-26T13:32:02.803000 -CVE-2024-8552,0,0,6594d79506dd28071c715cfa6c7597507b339576bdff1f377ea688092ea69413,2024-09-26T13:32:02.803000 +CVE-2024-8549,0,1,9d15342b3eb4ac6ebd08188bbf5727cd19e2d1db961fed83db600a8a3150700d,2024-10-02T16:04:41.970000 +CVE-2024-8552,0,1,ab7cb4c880b3ec4297f7ff802068bed1b689ce05b544a01cb748e0f63a229aea,2024-10-02T17:00:45.083000 CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000 CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000 CVE-2024-8557,0,0,86ab04a42076aa0fe9f792cba1f27d54b98becfc358809b664a63ce528fde776,2024-09-10T14:19:36.280000 @@ -263968,7 +264003,7 @@ CVE-2024-8609,0,0,fe7ca13c3d9b9fe01af247daf88d9820e61ee6ae3eab253016b6fdcb76d719 CVE-2024-8610,0,0,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000 CVE-2024-8611,0,0,3d63bb09edc11ef6327fe857dfe381551fd3ed233dd119eaa741dce3b9b25e8e,2024-09-18T17:24:34.163000 CVE-2024-8612,0,0,7904070a64ce6b0c617a391de31eeccb03d9f0e9421f89781a9fa23b513c6a78,2024-09-26T13:32:55.343000 -CVE-2024-8621,0,0,dcbb859ce5593edd8e79faad0107a5a3ad583b9f901a844fb2c6407d40470a96,2024-09-26T13:32:02.803000 +CVE-2024-8621,0,1,da11617ee187bea39361c3e736358efdd8e000970ca04e836eaac8c5eeb75dea,2024-10-02T16:10:27.313000 CVE-2024-8622,0,0,3dd68829fc11e22f0c21c42ebfb82eece7f179bcaa47d99ccdf324ecdb81f1e2,2024-09-26T14:59:27.770000 CVE-2024-8623,0,0,b38d11e5ea040f7d1c1df76eb8b329847342918d3746a88d315f2eac79041136,2024-09-26T16:46:28.590000 CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec06617,2024-09-26T16:45:40.470000 @@ -264031,13 +264066,13 @@ CVE-2024-8709,0,0,c4b78e9440da9a95da6880cb2eb594efc3dc26da0951b28cab597493ad1bb0 CVE-2024-8710,0,0,4c5169ef585cdb335030b939d5748b4dbbc0a0ee6166dc565231ca1259e5b90c,2024-09-13T16:25:47.510000 CVE-2024-8711,0,0,0a0fc486d277b8c36cfb49b6365925dae98dcfc88dd0e7309623a05e1f41ecb4,2024-09-13T16:18:15.670000 CVE-2024-8712,0,0,2cf01b3948959a9bde5d2a30913b311e3b77a5b6a2ce30febed88c3b53c36dc6,2024-09-30T12:45:57.823000 -CVE-2024-8713,0,0,77e6eb32497c4838ab6eff0729860dc19e9280431833bec790cbdd0c191045a7,2024-09-26T13:32:02.803000 +CVE-2024-8713,0,1,83e5cc73079f308b101a704f144a5b41b482803341d183db1c76abb1d6f85d87,2024-10-02T16:22:33.487000 CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce13,2024-09-26T20:06:46.330000 CVE-2024-8715,0,0,f0a4fb777a1271394a60c2f9ce37f6ba7325c02d49be07fd888bdf4eaa659dd6,2024-10-01T14:37:08.807000 CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000 CVE-2024-8718,0,0,52332c777c4318a883c04078e91634a6ef8ae6a5900124887917d48dd5005b5e,2024-10-01T08:15:04.030000 CVE-2024-8720,0,0,289b8fb0fc4d8050af052d36e1efbd05b6c287bfb2c648706b6f45f067f38dc4,2024-10-01T08:15:04.237000 -CVE-2024-8723,0,0,778d0a0398aed78fe986c3e106c93b2232e3d42b0102981078399ce3c143c0f8,2024-09-26T13:32:02.803000 +CVE-2024-8723,0,1,730229d7deadc7b514e5d898656fee12ba111958411cb7eec6e86089a429ce7e,2024-10-02T17:00:23.603000 CVE-2024-8724,0,0,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000 CVE-2024-8725,0,0,bda4a6515a704fa51f2d759f535270e57676d8c1b87d3a5cc5dc6f9e3d99ebf6,2024-10-01T14:16:42.727000 CVE-2024-8727,0,0,dbb2d03b3a0ceaa8f4191f7e51c855a7d6e37cf9570fe18e85d885b4a36917be,2024-10-01T08:15:04.433000 @@ -264048,7 +264083,7 @@ CVE-2024-8732,0,0,fdb5356750581bee2cd15ce9454648108e6d01424f144ebcf561e47c2245ea CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000 CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000 CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000 -CVE-2024-8741,0,0,ebfff4bd34d6f1e59ccb711fa16a5a762da7637ea4f4dc16823735f487b153a0,2024-09-26T13:32:02.803000 +CVE-2024-8741,0,1,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000 CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000 CVE-2024-8747,0,0,c8071dd8d89406610db13dc6a04dbbb98461ebd7257641ae31a11de6b1ad5c9f,2024-09-26T19:23:12.477000 CVE-2024-8749,0,0,dc7dd50ec6adedb45c385a82f706a7ab45f55e506e70a64a626b0d8f521f6289,2024-09-18T18:53:54.860000 @@ -264084,7 +264119,7 @@ CVE-2024-8797,0,0,bc71120ba9c562037001bef5ed49069a2fb96f9263b3c8e2a617e34946a91f CVE-2024-8799,0,0,00121647efdfbda1953f2b1e9dcd564fbf00607f157bcfec6188d74e35b1233b,2024-10-01T09:15:05.220000 CVE-2024-8800,0,0,d956ac136643b04f0243a452c8ccfdf197118d0e853c27476b810517af98011a,2024-10-02T08:15:02.510000 CVE-2024-8801,0,0,b5bc4f982a594acb6aaf56b2e8a82653b32de0b2ae7bfdf440e37c28bdd34de7,2024-09-30T14:23:46.140000 -CVE-2024-8803,0,0,1e21e2187793442a371c4b65c97d90253ace224e18e6d0a30f5421631b4c2a19,2024-09-26T13:32:02.803000 +CVE-2024-8803,0,1,1e0c20c4da3042f287bedde6aa980588230b643699023347d741bb81db132ef8,2024-10-02T17:15:12.677000 CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000 CVE-2024-8853,0,0,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000 CVE-2024-8858,0,0,7079c00755886d6a772dfe4739e2ab877421c8ca6f44d64619219a76da96e341,2024-09-26T13:32:02.803000 @@ -264104,7 +264139,7 @@ CVE-2024-8877,0,0,072c8e486444961bae4945079e8c7eda87a37fe8ff462296a0eff944cb3f18 CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488d1,2024-09-30T15:21:31.693000 CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000 CVE-2024-8883,0,0,d39bf3fdabe814eab7383cf7d0056d70749ac8a21f6ccaada9d165b73ef13b6c,2024-10-01T13:15:03.313000 -CVE-2024-8885,0,1,0da336e48d8fed3d105ca935ca0555e852ee8f847a7fb52241b5e47fe0bb5262,2024-10-02T14:15:05.927000 +CVE-2024-8885,0,0,0da336e48d8fed3d105ca935ca0555e852ee8f847a7fb52241b5e47fe0bb5262,2024-10-02T14:15:05.927000 CVE-2024-8887,0,0,0407ca62fcbad308289f29aa7a81815bcc03d59968582f8cfbf5cd23bcc12817,2024-10-01T17:30:07.597000 CVE-2024-8888,0,0,3a815de886bf077ac63d6810f20ea887274d5ca628e3e664db2efb49b96f7c7b,2024-10-01T19:30:35.400000 CVE-2024-8889,0,0,409f189e1cc8763baf41f6d7663087a2138f3ee0ecad616a441fc7d44385c004,2024-09-20T12:30:51.220000 @@ -264236,8 +264271,8 @@ CVE-2024-9174,0,0,b84c9c7a9f9cd2234390c1ae1f1de568c65321ae63b8ba2386d7dc05a06798 CVE-2024-9177,0,0,538b136929b66f2da77b71c4f345460987a86315e3e44122bd269ab3a2a9e52e,2024-09-30T12:46:20.237000 CVE-2024-9189,0,0,6fc70667b6c052aedd9065fd849720c6949b418d7c844ad831e0ce3249ae6d1c,2024-09-30T12:45:57.823000 CVE-2024-9194,0,0,24e26748ef3bff41d7a06efd6c027f138154eafd040f89b986b59a112235298b,2024-10-01T15:35:17.550000 -CVE-2024-9198,0,1,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 -CVE-2024-9199,0,1,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000 +CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 +CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000 CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000 CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000 CVE-2024-9209,0,0,7d3bad6781486e2f4da7df129717b8a491edccf73b369d5a2d34b95179369883,2024-10-01T09:15:06.110000 @@ -264317,4 +264352,5 @@ CVE-2024-9403,0,0,66d9e463986ac67ad9bceb6cae4045b10ea740cc9a13552aa6348c37ab2ae3 CVE-2024-9405,0,0,e9703465f499653ca07470a1ffd16e91f994c6f46933e9f402589910617b650e,2024-10-01T12:15:03.893000 CVE-2024-9407,0,0,844e60b42bd22ac882920576f0244b4221aa1cb4e0aeb01caf7aa58317c74c32,2024-10-01T21:15:08.530000 CVE-2024-9411,0,0,0ed7229fadcaa0ba2be6aae3ed0a903fea8ee7057f413ca8d29b7080b09aae26,2024-10-01T21:35:07.620000 +CVE-2024-9423,1,1,c94940e86c4d0857c214a72b7785993b36e482d8dc6d4d5d12ed70a35b4f0f3b,2024-10-02T16:15:11.250000 CVE-2024-9429,0,0,db0d8ee6274f5889e645bc8f06bc2c127c429edd7f6e0ee6aa8f7a2649e83d4c,2024-10-02T13:15:12.617000