Auto-Update: 2024-10-11T22:00:17.668179+00:00

This commit is contained in:
cad-safe-bot 2024-10-11 22:03:17 +00:00
parent 4ecf9f90c1
commit 82587b7962
92 changed files with 2821 additions and 264 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26081",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-07-20T04:15:09.683",
"lastModified": "2022-03-30T13:29:50.043",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:30.537",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-26086",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-08-16T01:15:06.353",
"lastModified": "2022-03-30T13:13:35.317",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:30.887",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -74,6 +94,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39109",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-09-01T06:15:06.583",
"lastModified": "2021-09-10T12:47:12.187",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:31.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -74,6 +94,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39113",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-08-30T07:15:06.737",
"lastModified": "2022-03-30T13:29:49.377",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:32.623",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -74,6 +94,16 @@
"value": "CWE-613"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39115",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-09-01T23:15:07.430",
"lastModified": "2022-04-25T18:16:18.227",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:33.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39119",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-09-01T23:15:07.480",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:33.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -74,6 +94,16 @@
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39127",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-10-21T03:15:07.177",
"lastModified": "2022-07-12T17:42:04.277",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:34.470",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-39128",
"sourceIdentifier": "security@atlassian.com",
"published": "2021-09-16T06:15:06.833",
"lastModified": "2022-08-01T16:13:08.583",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:34.647",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-40331",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-05T08:15:08.683",
"lastModified": "2023-05-11T14:14:20.707",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:34.843",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4437",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-12T20:15:07.993",
"lastModified": "2024-05-17T02:03:39.323",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T21:57:49.223",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -76,26 +96,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:dbartholomae:lambda-middleware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.0.4",
"matchCriteriaId": "3E5B585D-EB1B-4559-BD1D-2574968430A6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dbartholomae/lambda-middleware/commit/f689404d830cbc1edd6a1018d3334ff5f44dc6a6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dbartholomae/lambda-middleware/pull/57",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/dbartholomae/lambda-middleware/releases/tag/%40lambda-middleware%2Fframeguard_v1.1.0",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://vuldb.com/?ctiid.253406",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.253406",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47937",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-15T10:15:10.457",
"lastModified": "2024-03-29T10:15:07.963",
"lastModified": "2024-10-11T21:35:37.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0604",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-08-07T15:15:10.797",
"lastModified": "2023-11-07T04:00:58.193",
"lastModified": "2024-10-11T21:35:37.363",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1222",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-07T22:15:09.787",
"lastModified": "2023-03-11T02:38:47.470",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:37.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1227",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-07T22:15:10.087",
"lastModified": "2023-03-11T02:37:32.080",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:38.673",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-1228",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2023-03-07T22:15:10.147",
"lastModified": "2023-03-11T02:34:27.697",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:39.530",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20821",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-09-04T03:15:08.480",
"lastModified": "2023-09-07T19:14:35.620",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:40.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-20822",
"sourceIdentifier": "security@mediatek.com",
"published": "2023-09-04T03:15:08.647",
"lastModified": "2023-09-07T19:14:27.697",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:40.800",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-21166",
"sourceIdentifier": "security@android.com",
"published": "2023-12-04T23:15:22.477",
"lastModified": "2023-12-22T01:15:08.430",
"lastModified": "2024-10-11T21:35:42.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25754",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-08T12:15:09.613",
"lastModified": "2023-05-12T01:28:48.043",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:43.887",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-28936",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-12T08:15:08.857",
"lastModified": "2023-05-22T14:52:42.507",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:47.317",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2843",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-08-07T15:15:10.977",
"lastModified": "2023-11-07T04:13:25.340",
"lastModified": "2024-10-11T21:35:48.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29032",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-12T08:15:08.930",
"lastModified": "2023-05-22T14:54:43.230",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:47.677",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29246",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-12T08:15:08.997",
"lastModified": "2023-05-22T14:55:15.440",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:48.157",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30680",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2023-08-10T02:15:10.713",
"lastModified": "2023-11-07T04:13:53.580",
"lastModified": "2024-10-11T21:35:49.307",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "CWE-269"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30691",
"sourceIdentifier": "mobile.security@samsung.com",
"published": "2023-08-10T02:15:11.630",
"lastModified": "2023-11-07T04:13:55.870",
"lastModified": "2024-10-11T21:35:50.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -69,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31058",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-22T13:15:09.843",
"lastModified": "2023-05-27T00:48:58.773",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:51.460",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31098",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-22T16:15:10.150",
"lastModified": "2023-05-31T13:55:07.513",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:51.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31103",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-22T16:15:10.277",
"lastModified": "2023-05-27T02:19:27.643",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:51.893",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31206",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-22T14:15:09.583",
"lastModified": "2023-05-31T01:25:33.760",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:52.067",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-31453",
"sourceIdentifier": "security@apache.org",
"published": "2023-05-22T14:15:09.643",
"lastModified": "2023-05-27T01:20:20.410",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:52.737",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3365",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-08-07T15:15:11.193",
"lastModified": "2023-11-07T04:18:36.100",
"lastModified": "2024-10-11T21:36:07.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36655",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-06T16:15:07.047",
"lastModified": "2023-12-12T16:39:02.243",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:35:56.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-37572",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-05T06:15:48.617",
"lastModified": "2024-01-25T20:15:35.540",
"lastModified": "2024-10-11T21:35:59.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42364",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T23:15:07.313",
"lastModified": "2023-11-30T05:07:10.827",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:08.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42740",
"sourceIdentifier": "security@unisoc.com",
"published": "2023-12-04T01:15:11.650",
"lastModified": "2023-12-07T17:08:37.267",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:10.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44113",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.113",
"lastModified": "2023-12-11T16:15:48.920",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:10.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46818",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-27T04:15:10.907",
"lastModified": "2023-12-13T00:15:07.247",
"lastModified": "2024-10-11T21:36:11.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46886",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-29T05:15:07.863",
"lastModified": "2023-12-05T13:02:07.903",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:12.497",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47016",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-22T07:15:07.530",
"lastModified": "2023-11-29T18:03:48.853",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:13.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-48023",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-28T08:15:07.060",
"lastModified": "2024-08-02T22:15:27.340",
"lastModified": "2024-10-11T21:36:14.160",
"vulnStatus": "Modified",
"cveTags": [
{
@ -43,6 +43,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -56,6 +76,16 @@
"value": "CWE-918"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48886",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-01T23:15:07.920",
"lastModified": "2023-12-06T20:20:06.700",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:15.233",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48945",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-29T20:15:07.797",
"lastModified": "2023-12-05T18:33:48.857",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:15.990",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49030",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T21:15:07.820",
"lastModified": "2023-12-13T21:22:09.877",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:16.747",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-49040",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-27T17:15:08.380",
"lastModified": "2023-12-01T20:06:11.127",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:17.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49298",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-24T19:15:07.587",
"lastModified": "2024-03-18T22:15:07.413",
"lastModified": "2024-10-11T21:36:18.810",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-639"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6273",
"sourceIdentifier": "psirt@huawei.com",
"published": "2023-12-06T09:15:08.857",
"lastModified": "2023-12-12T18:36:55.433",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:21.740",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21534",
"sourceIdentifier": "report@snyk.io",
"published": "2024-10-11T13:15:15.667",
"lastModified": "2024-10-11T13:15:15.667",
"lastModified": "2024-10-11T21:36:23.557",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25110",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-12T20:15:08.803",
"lastModified": "2024-02-12T20:39:09.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T21:55:24.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:azure:uamqp:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2023-12-01",
"matchCriteriaId": "8AD9A9AD-50B0-4FB1-96AC-0ADE8FB5E04B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Azure/azure-uamqp-c/commit/30865c9ccedaa32ddb036e87a8ebb52c3f18f695",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Azure/azure-uamqp-c/security/advisories/GHSA-c646-4whf-r67v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25825",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T16:15:04.277",
"lastModified": "2024-10-10T12:51:56.987",
"lastModified": "2024-10-11T21:36:24.583",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que FydeOS for PC 17.1 R114, FydeOS for VMware 17.0 R114, FydeOS for You 17.1 R114 y OpenFyde R114 estaban configurados con la contrase\u00f1a ra\u00edz guardada como comod\u00edn. Esto permite a los atacantes obtener acceso a la ra\u00edz sin una contrase\u00f1a."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-259"
}
]
}
],
"references": [
{
"url": "https://fydeos.io/",

View File

@ -2,24 +2,15 @@
"id": "CVE-2024-36051",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T13:15:14.187",
"lastModified": "2024-10-10T13:15:14.187",
"vulnStatus": "Received",
"lastModified": "2024-10-11T21:15:06.843",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In btcd before 0.24.2, removeOpcodeByData mishandles the consensus rules for legacy signature verification. There can be a standard transaction that would be considered valid by Bitcoin Core but invalid by btcd."
"value": "Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2024-38365. Reason: This record is a duplicate of CVE-2024-38365. Notes: All CVE users should reference CVE-2024-38365 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": [
{
"url": "https://delvingbitcoin.org/t/cve-2024-38365-public-disclosure-btcd-findanddelete-bug/1184",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/btcsuite/btcd/releases/tag/v0.24.2",
"source": "cve@mitre.org"
}
]
"references": []
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-38365",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T20:15:04.733",
"lastModified": "2024-10-11T20:15:04.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "btcd is an alternative full node bitcoin implementation written in Go (golang). The btcd Bitcoin client (versions 0.10 to 0.24) did not correctly re-implement Bitcoin Core's \"FindAndDelete()\" functionality. This logic is consensus-critical: the difference in behavior with the other Bitcoin clients can lead to btcd clients accepting an invalid Bitcoin block (or rejecting a valid one). This consensus failure can be leveraged to cause a chain split (accepting an invalid Bitcoin block) or be exploited to DoS the btcd nodes (rejecting a valid Bitcoin block). An attacker can create a standard transaction where FindAndDelete doesn't return a match but removeOpCodeByData does making btcd get a different sighash, leading to a chain split. Importantly, this vulnerability can be exploited remotely by any Bitcoin user and does not require any hash power. This is because the difference in behavior can be triggered by a \"standard\" Bitcoin transaction, that is a transaction which gets relayed through the P2P network before it gets included in a Bitcoin block. `removeOpcodeByData(script []byte, dataToRemove []byte)` removes any data pushes from `script` that contain `dataToRemove`. However, `FindAndDelete` only removes exact matches. So for example, with `script = \"<data> <data||foo>\"` and `dataToRemove = \"data\"` btcd will remove both data pushes but Bitcoin Core's `FindAndDelete` only removes the first `<data>` push. This has been patched in btcd version v0.24.2. Users are advised to upgrade. There are no known workarounds for this issue."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-670"
}
]
}
],
"references": [
{
"url": "https://delvingbitcoin.org/t/cve-2024-38365-public-disclosure-btcd-findanddelete-bug/1184",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/btcsuite/btcd/commit/04469e600e7d4a58881e2e5447d19024e49800f5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/btcsuite/btcd/releases/tag/v0.24.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/btcsuite/btcd/security/advisories/GHSA-27vh-h6mc-q6g8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44414",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T17:15:03.880",
"lastModified": "2024-10-11T17:15:03.880",
"lastModified": "2024-10-11T21:36:31.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A vulnerability was discovered in FBM_292W-21.03.10V, which has been classified as critical. This issue affects the sub_4901E0 function in the msp_info.htm file. Manipulation of the path parameter can lead to command injection."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/IotChan/cve/blob/main/wayos/FBM_292W/CVE-2024-44414",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-45184",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:06.947",
"lastModified": "2024-10-11T21:15:06.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modems with chipset Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, and Modem 5300. A USAT out-of-bounds write due to a heap buffer overflow can lead to a Denial of Service."
}
],
"metrics": {},
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
},
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-45184/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45316",
"sourceIdentifier": "PSIRT@sonicwall.com",
"published": "2024-10-11T13:15:16.010",
"lastModified": "2024-10-11T13:15:16.010",
"lastModified": "2024-10-11T21:36:32.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Improper link resolution before file access ('Link Following') vulnerability in SonicWall Connect Tunnel (version 12.4.3.271 and earlier of Windows client) allows users with standard privileges to delete arbitrary folders and files, potentially leading to local privilege escalation attack."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "PSIRT@sonicwall.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45519",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-02T22:15:02.770",
"lastModified": "2024-10-10T15:04:49.143",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:33.567",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2024-10-03",
"cisaActionDue": "2024-10-24",
@ -80,7 +80,7 @@
"description": [
{
"lang": "en",
"value": "CWE-78"
"value": "CWE-284"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45746",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T17:15:19.727",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T21:36:34.350",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en Trusted Firmware-M hasta 2.1.0. Los mensajes de buz\u00f3n proporcionados (y controlados) por el usuario contienen un puntero a una lista de argumentos de entrada (in_vec) y argumentos de salida (out_vec). Estos punteros de lista nunca se validan. Cada lista de argumentos contiene un puntero de b\u00fafer y un campo de longitud de b\u00fafer. Despu\u00e9s de una llamada PSA, la longitud de los argumentos de salida detr\u00e1s del puntero sin marcar se actualiza en mailbox_direct_reply, independientemente del resultado de la llamada. Esto permite que un atacante escriba en cualquier parte del firmware seguro, lo que se puede utilizar para tomar el control del flujo de control, lo que conduce a la ejecuci\u00f3n remota de c\u00f3digo (RCE)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://trustedfirmware-m.readthedocs.io/en/latest/security/security_advisories/user_pointers_mailbox_vectors_vulnerability.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46088",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T16:15:08.357",
"lastModified": "2024-10-11T16:15:08.357",
"lastModified": "2024-10-11T21:36:35.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An arbitrary file upload vulnerability in the ProductAction.entphone interface of Zhejiang University Entersoft Customer Resource Management System v2002 to v2024 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "http://zhejiang.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46307",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T17:15:19.813",
"lastModified": "2024-10-10T12:51:56.987",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T21:36:36.520",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Un vac\u00edo en la l\u00f3gica de pago de Sparkshop v1.16 permite a los atacantes modificar arbitrariamente la cantidad de productos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-841"
}
]
}
],
"references": [
{
"url": "http://sparkshop.com",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46468",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:07.040",
"lastModified": "2024-10-11T21:15:07.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Server-Side Request Forgery (SSRF) vulnerability exists in the jpress <= v5.1.1, which can be exploited by an attacker to obtain sensitive information, resulting in an information disclosure."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/ilikeoyt/b396bbb9ef858105c46e999630e7afbe",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/JPressProjects/jpress/issues/190",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47553",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-08T09:15:17.847",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T20:04:08.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +115,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.0",
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47562",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-08T09:15:18.110",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T20:04:35.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -84,6 +104,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +125,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.0",
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47563",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-08T09:15:18.403",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T20:05:05.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -95,10 +115,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.0",
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47565",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-10-08T09:15:18.730",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-11T20:05:59.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
@ -85,8 +105,18 @@
},
"weaknesses": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -95,10 +125,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sinec_security_monitor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.9.0",
"matchCriteriaId": "BBEABA88-D7CD-47F5-9635-C493A750EFD7"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-430425.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-47884",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-11T20:15:04.993",
"lastModified": "2024-10-11T20:15:04.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "foxmarks is a CLI read-only interface for Firefox's bookmarks and history. A temporary file was created under the /tmp directory with read permissions for all users containing a copy of Firefox's database of bookmarks, history, input history, visits counter, use counter, view counter and more confidential information about the history of using Firefox. Permissions default to 0o600 for NamedTempFile. However, after copying the database, its permissions were copied with it resulting in an insecure file with 0x644 permissions. A malicious user is able to read the database when the targeted user executes foxmarks bookmarks or foxmarks history. This vulnerability is patched in v2.1.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-378"
}
]
}
],
"references": [
{
"url": "https://github.com/zefr0x/foxmarks/commit/c3706bd882b3d61b353e4193f7d2dcfabd0c9a8e",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/zefr0x/foxmarks/security/advisories/GHSA-8rh2-6pwm-5vvq",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47975",
"sourceIdentifier": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f",
"published": "2024-10-07T19:15:10.877",
"lastModified": "2024-10-10T12:57:21.987",
"lastModified": "2024-10-11T20:15:05.143",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -41,7 +41,7 @@
},
"references": [
{
"url": "https://https://www.solidigm.com/support-page/support-security.html",
"url": "https://www.solidigm.com/support-page/support-security.html",
"source": "f946a70c-00eb-42ce-8e9b-634d1f7b5a6f"
}
]

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-48768",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.253",
"lastModified": "2024-10-11T20:15:05.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in almaodo GmbH appinventor.ai_google.almando_control 2.3.1 allows a remote attacker to obtain sensitive information via the firmware update process"
}
],
"metrics": {},
"references": [
{
"url": "http://appinventoraigooglealmandocontrol.com",
"source": "cve@mitre.org"
},
{
"url": "http://www.almando.com/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/appinventor.ai_google.almando_control/appinventor.ai_google.almando_control.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.almando.com/media/firmware/almando.json",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48769",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.353",
"lastModified": "2024-10-11T20:15:05.353",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in BURG-WCHTER KG de.burgwachter.keyapp.app 4.5.0 allows a remote attacker to obtain sensitve information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://burg-wchter.com",
"source": "cve@mitre.org"
},
{
"url": "http://deburgwachterkeyappapp.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/de.burgwachter.keyapp.app/de.burgwachter.keyapp.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48770",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.450",
"lastModified": "2024-10-11T20:15:05.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Plug n Play Camera com.wisdomcity.zwave 1.1.0 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://comwisdomcityzwave.com",
"source": "cve@mitre.org"
},
{
"url": "http://plug.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.wisdomcity.zwave/com.wisdomcity.zwave.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48771",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.537",
"lastModified": "2024-10-11T20:15:05.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in almando GmbH Almando Play APP (com.almando.play) 1.8.2 allows a remote attacker to obtain sensitive information via the firmware update process"
}
],
"metrics": {},
"references": [
{
"url": "http://almando.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.almando.play/com.almando.play.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48772",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:07.127",
"lastModified": "2024-10-11T21:15:07.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in C-CHIP (com.cchip.cchipamaota) v.1.2.8 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://comcchipcchipamaota.com",
"source": "cve@mitre.org"
},
{
"url": "http://www.c-chip.com.cn/english/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.cchip.cchippamaota/com.cchip.cchipamaota.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48773",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.637",
"lastModified": "2024-10-11T20:15:05.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in WoFit v.7.2.3 allows a remote attacker to obtain sensitive information via the firmware update process"
}
],
"metrics": {},
"references": [
{
"url": "http://comchenyumorepro.com",
"source": "cve@mitre.org"
},
{
"url": "http://wo-smart.com/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.chenyu.morepro/com.chenyu.morepro.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48774",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.720",
"lastModified": "2024-10-11T20:15:05.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Fermax Asia Pacific Pte Ltd com.fermax.vida 2.4.6 allows a remote attacker to obtain sensitve information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://comfermaxvida.com",
"source": "cve@mitre.org"
},
{
"url": "http://fermax.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.fermax.vida/com.fermax.vida.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48775",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.810",
"lastModified": "2024-10-11T20:15:05.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Plug n Play Camera com.ezset.delaney 1.2.0 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://comezsetdelaney.com",
"source": "cve@mitre.org"
},
{
"url": "http://plug.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ezset.delaney/com.ezset.delaney.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48776",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.903",
"lastModified": "2024-10-11T20:15:05.903",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Shelly com.home.shelly 1.0.4 allows a remote attacker to obtain sensitive information via the firmware update process"
}
],
"metrics": {},
"references": [
{
"url": "http://comhomeshelly.com",
"source": "cve@mitre.org"
},
{
"url": "http://shelly.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.home.shelly/com.home.shelly.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48777",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:05.997",
"lastModified": "2024-10-11T20:15:05.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LEDVANCE com.ledvance.smartplus.eu 2.1.10 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://comledvancesmartpluseu.com",
"source": "cve@mitre.org"
},
{
"url": "http://ledvance.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.ledvance.smartplus.eu/com.ledvance.smartplus.eu.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48778",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:06.090",
"lastModified": "2024-10-11T20:15:06.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in GIANT MANUFACTURING CO., LTD RideLink (tw.giant.ridelink) 2.0.7 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://giant.com",
"source": "cve@mitre.org"
},
{
"url": "http://ridelink.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/tw.giant.ridelink/tw.giant.ridelink.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48784",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:06.180",
"lastModified": "2024-10-11T20:15:06.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Incorrect Access Control issue in SAMPMAX com.sampmax.homemax 2.1.2.7 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://comsampmaxhomemax.com",
"source": "cve@mitre.org"
},
{
"url": "http://sampmax.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.sampmax.homemax/com.sampmax.homemax.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48786",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:06.277",
"lastModified": "2024-10-11T20:15:06.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in SWITCHBOT INC SwitchBot (com.theswitchbot.switchbot) 5.0.4 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://switchbot.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.theswitchbot.switchbot/com.theswitchbot.switchbot.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48787",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T20:15:06.407",
"lastModified": "2024-10-11T20:15:06.407",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Revic Optics Revic Ops (us.revic.revicops) 1.12.5 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://revic.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/us.revic.revicops/us.revic.revicops.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48788",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:07.220",
"lastModified": "2024-10-11T21:15:07.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in YESCAM (com.yescom.YesCam.zwave) 1.0.2 allows a remote attacker to obtain sensitive information via the firmware update process."
}
],
"metrics": {},
"references": [
{
"url": "http://yescam.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.yescam.YesCam.zwave/com.yescam.YesCam.zwave.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48813",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T16:15:13.453",
"lastModified": "2024-10-11T16:15:13.453",
"lastModified": "2024-10-11T21:36:43.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "SQL injection vulnerability in employee-management-system-php-and-mysql-free-download.html taskmatic 1.0 allows a remote attacker to execute arbitrary code via the admin_id parameter of the /update-employee.php component."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://gitee.com/lssrain/taskmatic/issues/IAUXOL",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48827",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T16:15:13.550",
"lastModified": "2024-10-11T16:15:13.550",
"lastModified": "2024-10-11T21:36:44.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in sbondCo Watcharr v.1.43.0 allows a remote attacker to execute arbitrary code and escalate privileges via the Change Password function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://github.com/sbondCo/Watcharr",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48933",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T23:15:11.017",
"lastModified": "2024-10-10T12:51:56.987",
"lastModified": "2024-10-11T21:36:45.080",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross Site Scripting (XSS) en LemonLDAP::NG anterior a 2.19.3 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios en la p\u00e1gina de inicio de sesi\u00f3n a trav\u00e9s de un nombre de usuario si userControl se ha configurado con un valor no predeterminado que permite caracteres HTML especiales."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3232",

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48937",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:07.307",
"lastModified": "2024-10-11T21:15:07.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows XSS. JavaScript code in the short description of the SLA field in Activity Dialogues is executed."
}
],
"metrics": {},
"references": [
{
"url": "https://www.znuny.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.znuny.org/en/advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.znuny.org/en/advisories/zsa-2024-05",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-48938",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T21:15:07.387",
"lastModified": "2024-10-11T21:15:07.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Znuny before LTS 6.5.1 through 6.5.10 and 7.0.1 through 7.0.16 allows DoS/ReDos via email. Parsing the content of emails where HTML code is copied from Microsoft Word could lead to high CPU usage and block the parsing process."
}
],
"metrics": {},
"references": [
{
"url": "https://www.znuny.com",
"source": "cve@mitre.org"
},
{
"url": "https://www.znuny.org/en/advisories",
"source": "cve@mitre.org"
},
{
"url": "https://www.znuny.org/en/advisories/zsa-2024-04",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48941",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T00:15:02.673",
"lastModified": "2024-10-11T19:06:20.467",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:46.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48942",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T00:15:02.737",
"lastModified": "2024-10-11T19:10:20.137",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:47.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-799"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48957",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T02:15:02.990",
"lastModified": "2024-10-11T16:12:54.243",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:47.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48958",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-10T02:15:03.057",
"lastModified": "2024-10-11T16:11:55.487",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-11T21:36:48.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48987",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-11T13:15:16.197",
"lastModified": "2024-10-11T13:15:16.197",
"lastModified": "2024-10-11T21:36:49.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Snipe-IT before 7.0.10 allows remote code execution (associated with cookie serialization) when an attacker knows the APP_KEY. This is exacerbated by .env files, available from the product's repository, that have default APP_KEY values."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://github.com/snipe/snipe-it/releases/tag/v7.0.10",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-11T20:00:17.844245+00:00
2024-10-11T22:00:17.668179+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-11T19:57:58.937000+00:00
2024-10-11T21:57:49.223000+00:00
```
### Last Data Feed Release
@ -33,39 +33,65 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265396
265417
```
### CVEs added in the last Commit
Recently added CVEs: `11`
Recently added CVEs: `21`
- [CVE-2024-44157](CVE-2024/CVE-2024-441xx/CVE-2024-44157.json) (`2024-10-11T18:15:08.030`)
- [CVE-2024-44807](CVE-2024/CVE-2024-448xx/CVE-2024-44807.json) (`2024-10-11T18:15:08.133`)
- [CVE-2024-46532](CVE-2024/CVE-2024-465xx/CVE-2024-46532.json) (`2024-10-11T18:15:08.267`)
- [CVE-2024-47331](CVE-2024/CVE-2024-473xx/CVE-2024-47331.json) (`2024-10-11T19:15:09.783`)
- [CVE-2024-47353](CVE-2024/CVE-2024-473xx/CVE-2024-47353.json) (`2024-10-11T19:15:10.003`)
- [CVE-2024-48020](CVE-2024/CVE-2024-480xx/CVE-2024-48020.json) (`2024-10-11T19:15:10.220`)
- [CVE-2024-48033](CVE-2024/CVE-2024-480xx/CVE-2024-48033.json) (`2024-10-11T19:15:10.430`)
- [CVE-2024-48040](CVE-2024/CVE-2024-480xx/CVE-2024-48040.json) (`2024-10-11T19:15:10.660`)
- [CVE-2024-48041](CVE-2024/CVE-2024-480xx/CVE-2024-48041.json) (`2024-10-11T19:15:10.880`)
- [CVE-2024-8912](CVE-2024/CVE-2024-89xx/CVE-2024-8912.json) (`2024-10-11T19:15:11.110`)
- [CVE-2024-9539](CVE-2024/CVE-2024-95xx/CVE-2024-9539.json) (`2024-10-11T18:15:08.887`)
- [CVE-2024-38365](CVE-2024/CVE-2024-383xx/CVE-2024-38365.json) (`2024-10-11T20:15:04.733`)
- [CVE-2024-45184](CVE-2024/CVE-2024-451xx/CVE-2024-45184.json) (`2024-10-11T21:15:06.947`)
- [CVE-2024-46468](CVE-2024/CVE-2024-464xx/CVE-2024-46468.json) (`2024-10-11T21:15:07.040`)
- [CVE-2024-47884](CVE-2024/CVE-2024-478xx/CVE-2024-47884.json) (`2024-10-11T20:15:04.993`)
- [CVE-2024-48768](CVE-2024/CVE-2024-487xx/CVE-2024-48768.json) (`2024-10-11T20:15:05.253`)
- [CVE-2024-48769](CVE-2024/CVE-2024-487xx/CVE-2024-48769.json) (`2024-10-11T20:15:05.353`)
- [CVE-2024-48770](CVE-2024/CVE-2024-487xx/CVE-2024-48770.json) (`2024-10-11T20:15:05.450`)
- [CVE-2024-48771](CVE-2024/CVE-2024-487xx/CVE-2024-48771.json) (`2024-10-11T20:15:05.537`)
- [CVE-2024-48772](CVE-2024/CVE-2024-487xx/CVE-2024-48772.json) (`2024-10-11T21:15:07.127`)
- [CVE-2024-48773](CVE-2024/CVE-2024-487xx/CVE-2024-48773.json) (`2024-10-11T20:15:05.637`)
- [CVE-2024-48774](CVE-2024/CVE-2024-487xx/CVE-2024-48774.json) (`2024-10-11T20:15:05.720`)
- [CVE-2024-48775](CVE-2024/CVE-2024-487xx/CVE-2024-48775.json) (`2024-10-11T20:15:05.810`)
- [CVE-2024-48776](CVE-2024/CVE-2024-487xx/CVE-2024-48776.json) (`2024-10-11T20:15:05.903`)
- [CVE-2024-48777](CVE-2024/CVE-2024-487xx/CVE-2024-48777.json) (`2024-10-11T20:15:05.997`)
- [CVE-2024-48778](CVE-2024/CVE-2024-487xx/CVE-2024-48778.json) (`2024-10-11T20:15:06.090`)
- [CVE-2024-48784](CVE-2024/CVE-2024-487xx/CVE-2024-48784.json) (`2024-10-11T20:15:06.180`)
- [CVE-2024-48786](CVE-2024/CVE-2024-487xx/CVE-2024-48786.json) (`2024-10-11T20:15:06.277`)
- [CVE-2024-48787](CVE-2024/CVE-2024-487xx/CVE-2024-48787.json) (`2024-10-11T20:15:06.407`)
- [CVE-2024-48788](CVE-2024/CVE-2024-487xx/CVE-2024-48788.json) (`2024-10-11T21:15:07.220`)
- [CVE-2024-48937](CVE-2024/CVE-2024-489xx/CVE-2024-48937.json) (`2024-10-11T21:15:07.307`)
- [CVE-2024-48938](CVE-2024/CVE-2024-489xx/CVE-2024-48938.json) (`2024-10-11T21:15:07.387`)
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `69`
- [CVE-2024-25108](CVE-2024/CVE-2024-251xx/CVE-2024-25108.json) (`2024-10-11T19:31:20.060`)
- [CVE-2024-25122](CVE-2024/CVE-2024-251xx/CVE-2024-25122.json) (`2024-10-11T19:15:51.707`)
- [CVE-2024-47161](CVE-2024/CVE-2024-471xx/CVE-2024-47161.json) (`2024-10-11T19:54:07.317`)
- [CVE-2024-47948](CVE-2024/CVE-2024-479xx/CVE-2024-47948.json) (`2024-10-11T19:56:44.863`)
- [CVE-2024-47949](CVE-2024/CVE-2024-479xx/CVE-2024-47949.json) (`2024-10-11T19:57:06.207`)
- [CVE-2024-47950](CVE-2024/CVE-2024-479xx/CVE-2024-47950.json) (`2024-10-11T19:57:16.883`)
- [CVE-2024-47951](CVE-2024/CVE-2024-479xx/CVE-2024-47951.json) (`2024-10-11T19:57:58.937`)
- [CVE-2024-48941](CVE-2024/CVE-2024-489xx/CVE-2024-48941.json) (`2024-10-11T19:06:20.467`)
- [CVE-2024-48942](CVE-2024/CVE-2024-489xx/CVE-2024-48942.json) (`2024-10-11T19:10:20.137`)
- [CVE-2023-49298](CVE-2023/CVE-2023-492xx/CVE-2023-49298.json) (`2024-10-11T21:36:18.810`)
- [CVE-2023-6273](CVE-2023/CVE-2023-62xx/CVE-2023-6273.json) (`2024-10-11T21:36:21.740`)
- [CVE-2024-21534](CVE-2024/CVE-2024-215xx/CVE-2024-21534.json) (`2024-10-11T21:36:23.557`)
- [CVE-2024-25110](CVE-2024/CVE-2024-251xx/CVE-2024-25110.json) (`2024-10-11T21:55:24.837`)
- [CVE-2024-25825](CVE-2024/CVE-2024-258xx/CVE-2024-25825.json) (`2024-10-11T21:36:24.583`)
- [CVE-2024-36051](CVE-2024/CVE-2024-360xx/CVE-2024-36051.json) (`2024-10-11T21:15:06.843`)
- [CVE-2024-44414](CVE-2024/CVE-2024-444xx/CVE-2024-44414.json) (`2024-10-11T21:36:31.953`)
- [CVE-2024-45316](CVE-2024/CVE-2024-453xx/CVE-2024-45316.json) (`2024-10-11T21:36:32.947`)
- [CVE-2024-45519](CVE-2024/CVE-2024-455xx/CVE-2024-45519.json) (`2024-10-11T21:36:33.567`)
- [CVE-2024-45746](CVE-2024/CVE-2024-457xx/CVE-2024-45746.json) (`2024-10-11T21:36:34.350`)
- [CVE-2024-46088](CVE-2024/CVE-2024-460xx/CVE-2024-46088.json) (`2024-10-11T21:36:35.423`)
- [CVE-2024-46307](CVE-2024/CVE-2024-463xx/CVE-2024-46307.json) (`2024-10-11T21:36:36.520`)
- [CVE-2024-47553](CVE-2024/CVE-2024-475xx/CVE-2024-47553.json) (`2024-10-11T20:04:08.623`)
- [CVE-2024-47562](CVE-2024/CVE-2024-475xx/CVE-2024-47562.json) (`2024-10-11T20:04:35.480`)
- [CVE-2024-47563](CVE-2024/CVE-2024-475xx/CVE-2024-47563.json) (`2024-10-11T20:05:05.143`)
- [CVE-2024-47565](CVE-2024/CVE-2024-475xx/CVE-2024-47565.json) (`2024-10-11T20:05:59.237`)
- [CVE-2024-47975](CVE-2024/CVE-2024-479xx/CVE-2024-47975.json) (`2024-10-11T20:15:05.143`)
- [CVE-2024-48813](CVE-2024/CVE-2024-488xx/CVE-2024-48813.json) (`2024-10-11T21:36:43.527`)
- [CVE-2024-48827](CVE-2024/CVE-2024-488xx/CVE-2024-48827.json) (`2024-10-11T21:36:44.280`)
- [CVE-2024-48933](CVE-2024/CVE-2024-489xx/CVE-2024-48933.json) (`2024-10-11T21:36:45.080`)
- [CVE-2024-48941](CVE-2024/CVE-2024-489xx/CVE-2024-48941.json) (`2024-10-11T21:36:46.327`)
- [CVE-2024-48942](CVE-2024/CVE-2024-489xx/CVE-2024-48942.json) (`2024-10-11T21:36:47.090`)
- [CVE-2024-48957](CVE-2024/CVE-2024-489xx/CVE-2024-48957.json) (`2024-10-11T21:36:47.930`)
- [CVE-2024-48958](CVE-2024/CVE-2024-489xx/CVE-2024-48958.json) (`2024-10-11T21:36:48.687`)
- [CVE-2024-48987](CVE-2024/CVE-2024-489xx/CVE-2024-48987.json) (`2024-10-11T21:36:49.470`)
## Download and Usage

View File

@ -171637,12 +171637,12 @@ CVE-2021-26077,0,0,02e08de0d632c624730c8774c99bd24dfe8606653cfd8990192c284751494
CVE-2021-26078,0,0,19d44d301c34559aa7e535a2c95a1914b3f243433e99ae8bc66eab6bb04ad7b2,2022-04-22T16:19:22.313000
CVE-2021-26079,0,0,84bc5e8ef644ee056dc6f2a6254f08c1d929a10578f87f9698ccea543ceb6e72,2022-03-30T13:29:49.883000
CVE-2021-26080,0,0,b53eb4bc325828bd746bf6750d195c14901ce3ded11c10203a211f6729162c7f,2022-05-05T15:39:14.867000
CVE-2021-26081,0,0,c19c185db9e7343ca87033abe4c1c941d2dfefde2e0c23a58b6eab66157b0048,2022-03-30T13:29:50.043000
CVE-2021-26081,0,1,f2605b0e8babf40cfb8aa75eff0a48f1738b9e911ffe4e9bd1225e0891bfe89d,2024-10-11T21:35:30.537000
CVE-2021-26082,0,0,0dc3d9ccd828c4a8758df38110e688698200af9c0035a3012ace93ee51ae6cbc,2022-03-30T13:29:49.920000
CVE-2021-26083,0,0,d3a7d29a3a38b4dc9eddd6c5555b9b2f95a558a4ab11a36abea202d9eea7c32e,2022-03-30T13:29:50.080000
CVE-2021-26084,0,0,a1656afe81933b1c8c3923e4e66d77b668a59c557cdd4f7efcbaa6552d4b0288,2023-08-08T14:21:49.707000
CVE-2021-26085,0,0,11f3b4177eb8408d0910a3035774b54a0a29f0e5252269407ccd5f909211d083,2023-08-08T14:22:24.967000
CVE-2021-26086,0,0,63010973af82898017708d16d6c1ae980079877d2dcc811b57763195401368ed,2022-03-30T13:13:35.317000
CVE-2021-26086,0,1,d1c64f9ea76a65a71afdc7a24fcf30f7872c74fc93a4f7f790bb9daa276285fe,2024-10-11T21:35:30.887000
CVE-2021-26088,0,0,18b02b5f3440df38db64fa8dfdb7678844c837abccb395a9e4d54f83924742c9,2021-08-02T17:48:37.477000
CVE-2021-26089,0,0,8b742860ae453e0ed338e655cc73a13e4754396bfee05f9d1b2f874fc3120824,2022-03-30T15:35:48.173000
CVE-2021-26090,0,0,914f3b63c4c051b830b9c7ec11628d2c8542a82ededc67fd3e52331171fbfe56,2021-07-13T19:26:47.023000
@ -181117,17 +181117,17 @@ CVE-2021-39089,0,0,b3631fcb9efa1715975936eb680017242d9c2c85b9e6537a4e8f14545ec90
CVE-2021-3909,0,0,1e115f91e313d788a54a194be8fc7e2e617bccf9c4eba70061cbfb2bf7cc821d,2022-04-04T14:02:00.640000
CVE-2021-39090,0,0,6dea48cc6d7341189ab07f71be44fe69be35dda384985a4517f7566da1c162fb,2024-02-29T13:49:29.390000
CVE-2021-3910,0,0,6f123e5522f5e164c5e5565cc72d027942b2b3fe8027fe120501878ff25d6d64,2022-04-04T14:02:40.253000
CVE-2021-39109,0,0,4c338d8f6f9383be14956e809acbe947fc202696d4ae66ad2e8709d427c9ea7e,2021-09-10T12:47:12.187000
CVE-2021-39109,0,1,ad30f1de8a1037bc2581a0c7934909cc8e6f9bddd5b4bd19fdf1397f078d288b,2024-10-11T21:35:31.727000
CVE-2021-3911,0,0,bcc49f392d55f1d62b6dd48e57db75eed6b38bedad23a2b1dcca4cfdd87305b8,2022-04-04T14:03:15.373000
CVE-2021-39111,0,0,1527d3f5175db995666bb0ad07cb696e76f9d5ce7dd23360522a46e48f55c346,2022-03-30T13:29:49.233000
CVE-2021-39112,0,0,7b1bbb2594fba60f65dbb47e921949c584537d87144a6deb2530909a1e66f270,2022-03-30T13:29:49.803000
CVE-2021-39113,0,0,34345939136940038ee3a38274e42d15f7902103a3be7e936e7ad75cba80deb2,2022-03-30T13:29:49.377000
CVE-2021-39113,0,1,6302ee6a500ea4646823b0cb69be79dcf823e644db3e9240c12e76bf939e77e6,2024-10-11T21:35:32.623000
CVE-2021-39114,0,0,91bb300b928a2e7c1d42863cf149e080ec34fb17bb3f12f372376e10a70a3b3e,2024-10-07T19:36:10.220000
CVE-2021-39115,0,0,3edadea3bb79510465312b5ed43b357dd9837c0ef0dbf8d050d2cfbe35d4b421,2022-04-25T18:16:18.227000
CVE-2021-39115,0,1,e378f669bd801f2158434b04ae6636baef4f6417e3ee2718dc271975e3e38f63,2024-10-11T21:35:33.387000
CVE-2021-39116,0,0,a42315d93d2fd10c554b2c15934daf6b946942b74ba2ba4fbf662199cd5b29b6,2022-03-28T16:18:14.047000
CVE-2021-39117,0,0,0f5bdd3a21f39c9eaa09674f49f313b346bf46d979c65d077a542c986dc638e1,2021-09-02T02:41:23.137000
CVE-2021-39118,0,0,1dca3fcc868d73a6830344f61fc34a24f260e3fea15472c3de321b7e44e97c44,2024-10-10T16:35:00.827000
CVE-2021-39119,0,0,19d82c9ad15e2315e337669b0ea8aa57ac063c6e8f2ab13ad8070419810cfcfb,2022-07-12T17:42:04.277000
CVE-2021-39119,0,1,63817b7e629a2e47ad527eb1e85cbb021d8a8b1daede521bdda6605fa998aef8,2024-10-11T21:35:33.657000
CVE-2021-3912,0,0,e8c5a6132b4c804f3ef396cb77b6bb9032c86570b20db73e367107d41f114ccb,2022-08-09T14:39:02.117000
CVE-2021-39121,0,0,633d5656fffda0e45c49d4bc8d151e90cce078ce60d3d369ea3f30579930e1fe,2022-03-30T13:29:49.280000
CVE-2021-39122,0,0,26149ef002d4e9a7fb45aff5028aefd1ed4c77fde5f79f78add3a2655fb29488,2024-10-10T16:35:01.610000
@ -181135,8 +181135,8 @@ CVE-2021-39123,0,0,d8ded4795afd17038afe886f1f3897d474faab2d00d931d0d440eecea5b8a
CVE-2021-39124,0,0,2b58fd447d3cafa91334dabd9357b993b27ae7c16f1985b8ba8afc2558c4088b,2022-02-24T20:18:49.327000
CVE-2021-39125,0,0,4c8f1895e82d1bcd913a7b42e9a1b5d82429da426af796f023bfb884e96ba7ec,2024-10-09T17:35:02.380000
CVE-2021-39126,0,0,c5fcfc69aba84d73b9f8c74c936a36d81151cadeddc7fa2ff49085a699b83f32,2022-04-15T15:29:12.737000
CVE-2021-39127,0,0,3633d3c73b39c6ff31d41b803d67091de27a5d10e7274dd536bd56bf63949af3,2022-07-12T17:42:04.277000
CVE-2021-39128,0,0,3afe35281fb278b542f828cba3a2f1783f1fe9e90ef4145351a04c21b5a2970f,2022-08-01T16:13:08.583000
CVE-2021-39127,0,1,f10825757c7a91c2861384a0825f649ff45a47ef04df9b84de3b7b39bd226f8b,2024-10-11T21:35:34.470000
CVE-2021-39128,0,1,21d96a6ecb1f49c672c9f3f8005674568ca0013ac0525dcbbbd71ccb8aa5a1e9,2024-10-11T21:35:34.647000
CVE-2021-3913,0,0,fc2c037c086845d2beb4d0a45f9c1668f832bc18a64296f540c1af7061ff42c0,2023-11-07T03:38:24.337000
CVE-2021-39131,0,0,da8a15d9cd66f4a2b12d48578b405671069a05239664ddbd82b3c34fb9b65287,2023-11-07T03:37:32.110000
CVE-2021-39132,0,0,2a5aa910692ca0cf14d592b29d972fa780f6efcc218e69787943a33186984dad,2021-09-08T15:08:51.240000
@ -182128,7 +182128,7 @@ CVE-2021-40327,0,0,1a7ad4e4ead25409148fd1aa7fa5fa01966e96fa123c3248ea5da0622f288
CVE-2021-40329,0,0,97410d5d837dd9d8314134f4f8ece2887d0625a74fea0b74512addf53499b5ea,2023-11-07T03:38:33.140000
CVE-2021-4033,0,0,34839132754f35e32f12e219c804a2f594b5526c44317d5f4b100d1d6568236e,2021-12-13T13:35:21.703000
CVE-2021-40330,0,0,1f8b0e9115526d0c0ed89b0fda20903ff997dabdd914aa8445c7ba61caf0054d,2022-11-07T18:37:36.590000
CVE-2021-40331,0,0,4d719b599bcb0cca1b22ad0fa4bad7e32f35ba67b979380ec0b4b83bfdd4d457,2023-05-11T14:14:20.707000
CVE-2021-40331,0,1,f7e43e6cdb8d5a5ff907af7af042cfff038955e44e686c634c12912c32a8d8d3,2024-10-11T21:35:34.843000
CVE-2021-40333,0,0,c6050d68128ac5155b38b31b7c93ea8d4f5eb3506ebffe22f328c8f16486308d,2021-12-07T15:37:13.893000
CVE-2021-40334,0,0,387ad412be108dcb2c21119e96c8d8bdd71ff1bdc97be9d0bc16cd19c916fde7,2021-12-08T17:15:04.157000
CVE-2021-40335,0,0,1376da3bee3ebb9ad85117c52acf4c319af705a158fc667fe21680a5f7fc5d27,2023-04-19T15:32:25.210000
@ -185148,7 +185148,7 @@ CVE-2021-44366,0,0,4a89de015bf9b7a66e29757e88272099f01bc3ab2a1487b2fda1ee75ecbc4
CVE-2021-44367,0,0,1605d844c9e5db8cbed196052359abac11c94134854fff4bb6ede41f9e8356dd,2022-10-25T17:48:52.363000
CVE-2021-44368,0,0,2516ddc19d7d92c05031263e0499dd0f253e4997e5b6b1bf67822c996d1a4fc8,2022-10-25T17:48:45.527000
CVE-2021-44369,0,0,77e43fe84b0fb647ad0044b34f1a3492081c5fcc81df21502084b5726ab51197,2022-10-25T17:46:17.980000
CVE-2021-4437,0,0,19ffe5992b59a0cb5c2b35a7d9f3bf92723f41217a8431fd2dbb2eda5dab4ac4,2024-05-17T02:03:39.323000
CVE-2021-4437,0,1,4307662943a4ae7dc6e4b15c8ff6026a032a0a6d532bcd6d12567d52960c9c97,2024-10-11T21:57:49.223000
CVE-2021-44370,0,0,9af46e11bae28fbadb87226907950e88bba28ecc54af1404cab0e34bc39a5874,2022-10-25T17:46:12.847000
CVE-2021-44371,0,0,89b52dc690602cbe68b55a87fbd6d72b883452b896f39fccf20c8c348fec061c,2022-10-25T17:46:01.507000
CVE-2021-44372,0,0,ac6a9497f723b5624b15f732d0926312adfa142514ab38927a66f85f0aa11fa4,2022-10-25T17:45:53.307000
@ -211692,7 +211692,7 @@ CVE-2022-47933,0,0,8575177dcb264fd6409843e6716e0a03011f111fed8a11eae81d0423338da
CVE-2022-47934,0,0,7c3386439e3a91acfaf64f61ee3c54bedd66b5a7dde9a16f5388905bf9bfade4,2022-12-30T22:05:01.683000
CVE-2022-47935,0,0,1f1e4e55198665e6591aac6b1530e64bc2ff4cafee98113ef0c766b6b849b00e,2023-06-23T16:10:38.623000
CVE-2022-47936,0,0,678dc8449eb9b2e8c9d95aae31d2e8ad19ae792b1f5ba5e5e346d28fdc928f8c,2023-02-22T16:12:32.210000
CVE-2022-47937,0,0,636176527665617f3facff8634e8954d2158730f82a85997de2b9511eefce0e0,2024-03-29T10:15:07.963000
CVE-2022-47937,0,1,71722ce2ff44817cbdd57ad837a627739bb6a685518083ab1c5334482dee4c2e,2024-10-11T21:35:37.030000
CVE-2022-47938,0,0,442c25e602433938a9921e75f8e951b83ddd7027b36d46a901abb14bb5ea6d5b,2023-01-23T18:55:50.117000
CVE-2022-47939,0,0,9ba60aa5756ff0c30fab8973f90a56883f8c984d8e5f8b0a23e7965824254a07,2023-05-16T11:03:04.080000
CVE-2022-4794,0,0,ee360b4b0c4a7c5112485848378596f0e5c13dfd91e03c2acd2d31e120780c38,2023-11-07T03:58:57.833000
@ -213172,7 +213172,7 @@ CVE-2023-0599,0,0,5686bc478536d2af4a08a62d479e1ee372e25dfec1430cab955da4964dc416
CVE-2023-0600,0,0,2bafcb5a6bec776bb87d12c308d2035da5f53941826f81d73c1665662d2df686,2023-11-07T04:00:57.287000
CVE-2023-0602,0,0,6aac3717fe596372d68440bc08a87dd36208833d7b8e2f47242b7013204f6acc,2023-11-07T04:00:57.607000
CVE-2023-0603,0,0,cc5a6788d2b5297ba76742466901b67d92f338059a9666645a54913dbf3a18c9,2023-11-07T04:00:57.990000
CVE-2023-0604,0,0,b10fdf6da930ab49b7b09213885b95cf3ad6afbd487ba3baf0ad4efe8cada1b3,2023-11-07T04:00:58.193000
CVE-2023-0604,0,1,0d9f2a82827dc6d2ca81f952e3a634b3050c6330c65e02df638fe9104b5a9c17,2024-10-11T21:35:37.363000
CVE-2023-0605,0,0,b4cdce19dd771047667c5d8484a8eeac4ae7e1a4284b664abfcf5f22d1dc8c0c,2023-11-07T04:00:58.510000
CVE-2023-0606,0,0,4fa9daf3dd97b942d572d5fb0fd253099d191b6c3a2c97768f69ca8e52dcef2a,2023-02-07T21:53:01.957000
CVE-2023-0607,0,0,0977f17919dae8453974cff4dbdd91e4a0a498dd1397d080af1e4bd67b4f008f,2023-02-08T15:30:47.177000
@ -213762,13 +213762,13 @@ CVE-2023-1218,0,0,ec56e0d68eb6a436785dfbe4c3088933562fd74219e7cf2b39837283335654
CVE-2023-1219,0,0,e0b63667958055de2e61621f4b2f1c374c934d4bbe27912990905508743e587a,2023-04-10T20:15:08.343000
CVE-2023-1220,0,0,f7505c07dea267c6ec67dd3c3a9a00c14e34e9ea02282e8c58bd4c932382f869,2023-04-10T20:15:08.417000
CVE-2023-1221,0,0,f18e400dfc0680f68802e6939c519c06d9d3cf47fb6439707c672de2d8bf79b4,2023-03-11T02:39:03.177000
CVE-2023-1222,0,0,a3831cef2b104afe45fcbf75e8599f5265c07baa14741962bba753fb390eaa3b,2023-03-11T02:38:47.470000
CVE-2023-1222,0,1,190d0da05e93e72aeeebe8898c45012067f66d519dabac52f25cd78ef25d0d0e,2024-10-11T21:35:37.550000
CVE-2023-1223,0,0,948ee91eada12d7d20e5b2b1fb298c9e614c851df4f101d24d278c07dc3fa4af,2023-03-11T02:38:37.183000
CVE-2023-1224,0,0,83965c642d0895e8d67a8e92ac147fd77b821460f719ee5d81ea3eb1c738667b,2023-03-11T02:38:23.370000
CVE-2023-1225,0,0,80c20890a23559bdc5b7fa970d8463f90a69a2c7075b827a51af790020086d1a,2023-03-11T02:38:08.387000
CVE-2023-1226,0,0,2ad6b159af45931c53837c91fb91c88edce6b6520870bfe20222d782b9f37bc5,2023-03-11T02:37:54.820000
CVE-2023-1227,0,0,5f56cc29a2b284cf3e350a0eae643c83571ac110f0b2e0fbf03592dcffb2b1c1,2023-03-11T02:37:32.080000
CVE-2023-1228,0,0,41f4190ab3907addc1aada2a918bc6e878bd253fd272831a8a6149644d34a9b7,2023-03-11T02:34:27.697000
CVE-2023-1227,0,1,4416a112bf31ba24906f018a763efd36bf80aa24e3ee9364c649f0ff50d3638f,2024-10-11T21:35:38.673000
CVE-2023-1228,0,1,7b874778a82a1d186215c231190a0d7f83dfcce09bc598f78de98453f1e71add,2024-10-11T21:35:39.530000
CVE-2023-1229,0,0,ed1fd60ca5ec5b93f7801dfb7d3d96a6422b1a1787005fc60fbf302b8ab00bd5,2023-03-11T02:34:10.100000
CVE-2023-1230,0,0,52ed8ce3f4ef971e55f7a79489bbce2bcc33eba8d0ed341a746b46665534af4a,2023-03-11T02:33:48.303000
CVE-2023-1231,0,0,6a027ec06b6b49d26db5893b9039be668cba34b98b18258318e070862afed236,2023-03-10T20:44:11.770000
@ -215077,8 +215077,8 @@ CVE-2023-20818,0,0,45ae32b47377e91ea351a73468b41994cd1d3b4ec51c18c8865d863ed741c
CVE-2023-20819,0,0,c056b87b2ebed256b5107aaf5ce311d220de95b3b3db7b11c4effe7a4eed0352,2024-09-21T16:35:01.573000
CVE-2023-2082,0,0,24dcd898b1f3567259f4f6aad9d57c28cbb421cc1896ebbe2df775b7cf6101c6,2023-11-07T04:11:54.467000
CVE-2023-20820,0,0,b8ce0f691521cb188b31615a2914ada5344f69549b9bff1e5f48aff8b60d954f,2023-09-07T19:14:49.727000
CVE-2023-20821,0,0,56097556eb1ad331e0b189d13a8b1a23a2b3597ff14666e0ee3d23e7f183ab98,2023-09-07T19:14:35.620000
CVE-2023-20822,0,0,3b47b6e37180258fa596ce8a0087c8d042ef6b8e78e2889f5bb02fa551389bd3,2023-09-07T19:14:27.697000
CVE-2023-20821,0,1,8327befa080929697855725e0adfa9c4c52e91db2435d8ca8eb0b8f8f0fbf0a0,2024-10-11T21:35:40.520000
CVE-2023-20822,0,1,1f6ec27ffdb5a941621c6474350c0681bf9aba6107f5e57c20c3f9cc636b94a7,2024-10-11T21:35:40.800000
CVE-2023-20823,0,0,e5030abbdc1b76a1fdf724e78a79e9447430af00d8598a10a707b12f48ab94c7,2023-09-07T19:06:39.267000
CVE-2023-20824,0,0,6caacf9d3f8a58027c0dab9caf4b9b264fdfa1d70dcd710a95edcc7d198dbed4,2023-09-07T19:06:55.563000
CVE-2023-20825,0,0,3b7e714e9925156ab37c943a82248f5bb6cc462ec9ffd9479518f0eaa72d4ea8,2023-09-07T19:14:16.880000
@ -215442,7 +215442,7 @@ CVE-2023-21162,0,0,53a8ac5e4c08c742da489aa4a1930121d0240090d407c260527f1733a5605
CVE-2023-21163,0,0,e1bf515351b1761cdba7776dedb7ad81d82fdaad5ca8377172cbcfcc0240c5cf,2023-12-22T01:15:08.300000
CVE-2023-21164,0,0,01b382fffb5e5d9b3a30dac5d37cea570048c5928ecd40106e3efa2b15b6c909,2023-12-22T01:15:08.367000
CVE-2023-21165,0,0,49665acf34e44b9a5db54449c0fd8ec4121198343175bb379f5ff7e055e44d83,2024-08-26T18:35:01.380000
CVE-2023-21166,0,0,c1534cec306f9fa0c721b8473b0a23285b1565d6ed8a55331c8871a3ffa16f7d,2023-12-22T01:15:08.430000
CVE-2023-21166,0,1,3563bd6cc87d7d516a51625b438f198e468235d9fd72ca0f7d445b9c8fd9e2ad,2024-10-11T21:35:42.090000
CVE-2023-21167,0,0,abcd952fac072d0bc1118cbcd9d5548df8e9eed8603f390785dfcfd7e5f1b301,2023-07-06T00:56:31.923000
CVE-2023-21168,0,0,45f187edb3d6a556377088ef681aead14d96b9c1cf96ab06f4e5d771a7fe9d68,2023-06-30T18:55:53.630000
CVE-2023-21169,0,0,f6358e462e45f570c6fc6c58f703809142b2c766eb204766c16b52b514101016,2023-06-30T17:50:07.150000
@ -219277,7 +219277,7 @@ CVE-2023-25750,0,0,32abd5ac7462a7988d6e952dc7c341500f225339c8d9ee8d8c2a9abdd6d7a
CVE-2023-25751,0,0,b31def6c0ae5f8e6acffbcb949c9aca0323d89757962bc728dec0dfd07a8f461,2023-06-08T17:14:09.333000
CVE-2023-25752,0,0,966be40d80116dc1505f15ee1fa5c94414ca60ef8a285f44f4a4ef96c38ebf29,2023-06-09T18:40:27.807000
CVE-2023-25753,0,0,72a2591941e2999ca50ef0826984c1251d9ec22ad17ff67848b12641800a3db4,2023-10-25T17:20:20.830000
CVE-2023-25754,0,0,67d382ae20f179948a879a7487097e5a4e610f3cc304f79748d62178f6b262d3,2023-05-12T01:28:48.043000
CVE-2023-25754,0,1,52c608b894b14a11459a026abb3e19096de7d0e9506d1f689baa0ac85162faa5,2024-10-11T21:35:43.887000
CVE-2023-25755,0,0,2ad8e62512bcab645070be69ed3379e39a05671be85d7b1db198e6bfe107a77f,2023-04-18T17:13:39.970000
CVE-2023-25756,0,0,6a076ace74fd00dbb1e543f39927cb4206204e317efa9a6079bf1da5f8304909,2023-12-21T22:15:11.410000
CVE-2023-25757,0,0,98490eda1b235a7210d98228f2fa4211cc2f99377e1606feea486f97b0901931,2023-11-07T04:09:10.673000
@ -221449,7 +221449,7 @@ CVE-2023-28426,0,0,b0d610d812fdd44aac0d33b8712f468c0ca967ab4b29253831843a96e926e
CVE-2023-28427,0,0,a016c28b60c6a524149fffa0a1eae3ceca42ecca3dcd534a4fbf7ef3979b3de4,2023-05-30T06:16:28.550000
CVE-2023-28428,0,0,2ff2cf1bce95574395d36e93f1db103830769a43ec6c30927a5bab2fccafef6d,2023-03-24T18:35:15.180000
CVE-2023-28429,0,0,fed65bde8b338976aee55f6348d2088e5faa1d87fefbc398b2fdb1e170b398e6,2023-03-23T14:08:30.080000
CVE-2023-2843,0,0,1e5ea8676b0de723f3313b924444f2fe84753972ee83d381f9d1f3df302fb961,2023-11-07T04:13:25.340000
CVE-2023-2843,0,1,d0c7c231b30766b222d2acfca6b09d89318ffa117ec061cef7af25fa01a8a01b,2024-10-11T21:35:48.967000
CVE-2023-28430,0,0,59dc391beaf71ecea58fbe0afc3339d914d596f3da9a1d5d3e39837719a0f1d4,2023-04-03T18:38:13.673000
CVE-2023-28431,0,0,f63b509ce3469ae05fc1eead07f88c18ce879e4b4075f298c6a7ae2158a5172b,2023-11-07T04:10:35.300000
CVE-2023-28432,0,0,1333b4c2290f0e39ee15c53a791a545a639f60f0d21af5471a2d916ec629ab86,2024-06-27T19:30:51.627000
@ -221917,7 +221917,7 @@ CVE-2023-28932,0,0,c27edb7177ffb1e28b222f4c9bea001b1ab4e7dabfe7ec30c9d9613d07224
CVE-2023-28933,0,0,5ce46109e79bea8882816ddff82fb199f9ef887c387f06ca945e17126aa66f4e,2023-06-16T03:57:30.010000
CVE-2023-28934,0,0,4eab8436dac264b2200990ccb31618c962abf371fe7021d35f56b20df7a84412,2023-08-10T03:49:58.650000
CVE-2023-28935,0,0,63d693fd9b62dae4e8403e6669a45bfd676f7312996626e62115ea5b187457dc,2023-11-07T04:10:58.823000
CVE-2023-28936,0,0,e3902d009a5044eb7658c42f69eadf603aeaac553b8dcfd8f3ae096639647206,2023-05-22T14:52:42.507000
CVE-2023-28936,0,1,999ac9569f4890af2f8cee442eed571b392d2129167cc54e6520c79e6509ca4b,2024-10-11T21:35:47.317000
CVE-2023-28937,0,0,49df2c40f793aeab1c1d58cb1954b3d606331d90ad9ced192296130e2c071e4d,2023-06-13T10:15:10.047000
CVE-2023-28938,0,0,92210f1f66544f8435cbf427094b0b1ab5ebdd85d822693044e20f1239f1b230,2023-11-07T04:10:58.907000
CVE-2023-2894,0,0,6ca89d7459b7b40bb60063165aea0f40ebea74dd437e97c3894273316c03d57b,2023-11-07T04:13:29.760000
@ -222004,7 +222004,7 @@ CVE-2023-29029,0,0,5e6e421b33e3e5d9f7cdafb6e12d91df76bc2403d9fc3881c476b9a5cf1f1
CVE-2023-2903,0,0,aaea51c0dae990d6dd39141bdd8d94364592da662815c4bbc7055b31bbbee04b,2024-05-17T02:23:21.450000
CVE-2023-29030,0,0,e9ef9db54073b4abc8f90733a96671c703c39318b5fe8ad16e23b723f424d5b6,2023-12-20T02:50:13.797000
CVE-2023-29031,0,0,6e315e892fd8b32306a207bfcf1ba1a412c9898dcf2cac17776b91000c43d392,2023-12-20T02:52:31.047000
CVE-2023-29032,0,0,4b7296c51e4f5aa3e5c99c0c7bf6c40eb9c445fdd877d429aacae75a15835074,2023-05-22T14:54:43.230000
CVE-2023-29032,0,1,65652d5939932a58db7c7c31cd4a8c6c8e6eabb81d228696f6adf8ed599048d4,2024-10-11T21:35:47.677000
CVE-2023-29033,0,0,4401012f4d52ad7f28d1c206cb19cc0edfb2aae23b2113336a308cca14438a87,2023-11-07T04:11:00.917000
CVE-2023-29034,0,0,63627d7e3c954dba61d5a731250c84dbbab4add009f084967b5b07d39c5c695b,2023-11-07T04:11:01.140000
CVE-2023-29035,0,0,8ee8460d02c99ad18c91b9fc9d76d40231da08fe8377ffa72b072fbd8445ef2d,2023-11-07T04:11:01.440000
@ -222182,7 +222182,7 @@ CVE-2023-29242,0,0,b61b510d1f58b7f0d5a338add68b354218b1c2308336d527a49331a9e2d27
CVE-2023-29243,0,0,8725de0b480e293af5f5e87a983092ba629b47c9b3a192ae1fceec5139111ba1,2023-11-07T04:11:08.053000
CVE-2023-29244,0,0,fd105b38b3d195c238b5968b40ac7f34e4f4dc15ba8cf11199615ee5ac2d2d49,2024-01-30T15:17:47.337000
CVE-2023-29245,0,0,36663441326991b70a4a638f7835ab4b96bdc7534da1afdff5817a73607c1710,2024-09-20T11:15:12.980000
CVE-2023-29246,0,0,66dc05c67373539e60513d12bb8d5ea5cbab81162146e8ad3ad6542b8a2951e0,2023-05-22T14:55:15.440000
CVE-2023-29246,0,1,6bb7192469082356b1b64076cedd0dcdf9100de4e8ffeab251065485a62fdeed,2024-10-11T21:35:48.157000
CVE-2023-29247,0,0,bb0e3571a900cf515f84f932527ebb6318ef77da20d3db85fc0074ca4d75811e,2023-05-11T23:24:54.837000
CVE-2023-2925,0,0,6dfd7b78d36e2a725703c314ea807457e2096a4bbbc04df212c7a1d27031a788,2024-05-17T02:23:22.303000
CVE-2023-29255,0,0,53fc91dd29a24d530b08bb237aab4984395bd1091218cb2be1e1c61150e68b45,2023-05-11T15:15:11.510000
@ -223143,7 +223143,7 @@ CVE-2023-30677,0,0,15b84e220c20ea5b9c5ab958d09338f2a41be1fd2eaa676181325b1bba1ce
CVE-2023-30678,0,0,3180130b2ed001edd24ab6ea36d292accf5ada0caaa839819a8019a3801d2b53,2023-11-07T04:13:53.220000
CVE-2023-30679,0,0,824006b3a5533c0b45896acf6d107e7102da99ff822ab30a78bfc55516b50948,2023-11-07T04:13:53.373000
CVE-2023-3068,0,0,aadb93be9e92cad2116a19c0c6e455a065a2c859817861a18dad816a63b1b9fb,2024-05-17T02:27:14.860000
CVE-2023-30680,0,0,3b1636221f6d2e1bb6d88f0b4433ad48be681b133f59045753b44a2db5b8ce1d,2023-11-07T04:13:53.580000
CVE-2023-30680,0,1,285d56401f6a07bb921b0d12b0c7e6f43b8f47e4a3e74c093a47dd127d07e321,2024-10-11T21:35:49.307000
CVE-2023-30681,0,0,cf6bb0cb53b5344d5fadf0cef7e6b4b3caa76c081889d43d8d2cf22af5eceea0,2023-11-07T04:13:53.780000
CVE-2023-30682,0,0,c220bbd4c2fb9521bf7598802a94e2da50eef3c727ad588e10f7c49461aa0af7,2023-11-07T04:13:53.993000
CVE-2023-30683,0,0,b4d64ed2cdc4f31fe7ab7ab5a66ef5840da9712e12fcccdd44f20cac7fb08440,2023-11-07T04:13:54.210000
@ -223155,7 +223155,7 @@ CVE-2023-30688,0,0,c53151afb5102f3217216532637be1d695ccda2c0b7c2290a68d22084ae1f
CVE-2023-30689,0,0,443ba1b08e22c6d35e8db568880e90ee09c679a9b16b8334cb0474df6c175bb3,2023-11-07T04:13:55.497000
CVE-2023-3069,0,0,941bf12ae0941b8065c6b0a088eb76a6ba68b4ed708ecd123ceeccfd378cafe8,2023-06-08T17:43:09.440000
CVE-2023-30690,0,0,590cc00fc998ed3a3fb346a031e3cb388e44a83e13e3b1943f763131e52c1172,2023-11-07T04:13:55.683000
CVE-2023-30691,0,0,f959a3d7646b772ced829b280a5fb3951fbf54514832e59425c5da05d45b28f5,2023-11-07T04:13:55.870000
CVE-2023-30691,0,1,e113dbae411ed96797e7c892d0028302a96e366e16b1ec6d8b0402ad2e59b765,2024-10-11T21:35:50.390000
CVE-2023-30692,0,0,912c54bc037de3c3810d7245f595df8f5d89fe264b85f3b6fcdf861b5a7a12b2,2023-11-07T04:13:56.050000
CVE-2023-30693,0,0,fff97ba59de8d74af7ee96f8c4cdc0ad746e4d49a08891c6d1de3f7bd1fca4de,2023-11-07T04:13:56.233000
CVE-2023-30694,0,0,e142299bb0ffa8115187ba86e35c661564aa62bb32dcc5036727d4394b0f27ad,2023-11-07T04:13:56.410000
@ -223466,7 +223466,7 @@ CVE-2023-31047,0,0,799c27446196896a2155b4ff736d0e4c98fa4d3a17dd14303b0af7537b3e6
CVE-2023-31048,0,0,085198888c668c9620ecdd2cd8b8ba13b5e86067bb31f7fd09ae2d0369478942,2024-10-09T14:35:02.490000
CVE-2023-3105,0,0,be99bcf9045a615beffe2a865c2ddddc0783f9f4b672f8174022afca2422f44d,2023-11-07T04:17:55.157000
CVE-2023-31056,0,0,4f2fef484ed386abb0f005ab89606a773da4d5a08e2c27112d7f1b7e48a4a1e7,2023-04-29T03:06:14.197000
CVE-2023-31058,0,0,ca7da33276284c78442c38f8f57df235ece18c6aca5dbfb6dd049ebe8205ac85,2023-05-27T00:48:58.773000
CVE-2023-31058,0,1,ade590edc32ab8e9e54c5074b1bf85ac7bb23f853e8f68d9180b8009050e898b,2024-10-11T21:35:51.460000
CVE-2023-31059,0,0,e14e22e75ebb3d0b9350c447e3c85cb104031b5ae3d37a3a2618a4acbf316129,2023-05-02T18:17:24.350000
CVE-2023-3106,0,0,62a56ae616a68416c0b18a9575f7bc7ccd3f822655fb78901478f3605c5ced22,2024-02-15T16:03:47.757000
CVE-2023-31060,0,0,6f9406e888f485a404f4f8338945073a4e198040211d3022cd3b4f5043d25253,2023-05-02T18:17:13.847000
@ -223506,13 +223506,13 @@ CVE-2023-31093,0,0,06983497186135ed5ecfd0305eb5f3e74038e29e3b5223942fd4c72c40255
CVE-2023-31094,0,0,3fac97ef9e52114096168bfe7d0ff558d3e5b9fe8637a2dfd95141c8b30bc890,2023-08-23T16:45:37.677000
CVE-2023-31095,0,0,98e0f47eba8da250ce26faae77d30e0457e0c45653a31789fae2ad954aab38e8,2024-01-05T16:11:09.767000
CVE-2023-31096,0,0,a698767f9322d993190762ac896ddab6d6251e7fd40e72d56e0e836c0e80b816,2023-10-18T20:27:16.947000
CVE-2023-31098,0,0,7762b7eafd22172ea8485d8980463d4841a6c3b6a880a4a18cc3ad17d161a68c,2023-05-31T13:55:07.513000
CVE-2023-31098,0,1,14eedebe497b043a040aa43f7c4ed51804f7d428c8495f30e932783aa2450352,2024-10-11T21:35:51.640000
CVE-2023-31099,0,0,316dca47a441bcbff49b7c01682f0edc834d3579c34610a0d65d4f7cacad7083,2023-05-10T03:53:41.293000
CVE-2023-3110,0,0,b29dcd6052905acdf5c62021f47c31535233f1a817dcc0ff8104fbe3e3af0bcc,2024-09-25T16:15:07.760000
CVE-2023-31100,0,0,52728b9e8ab26aa70b0ab55039f170907999be466f5e8b560dabc4fb805a29bd,2024-02-01T02:30:22.687000
CVE-2023-31101,0,0,77f4e544f11b5e739b1479f6e19b6ccd2456975f67b8561aaa2c58229b75968c,2023-05-27T02:26:38.467000
CVE-2023-31102,0,0,5080e71e8f917eeae0dd70983299a81d3f1547c01aad2307d315c1afe001c7a1,2024-09-06T14:35:01.717000
CVE-2023-31103,0,0,6ebfd0cb1ac0bdf08f28442094dae38ea2ac9a0d7b487e908849ac1cf56c0fa7,2023-05-27T02:19:27.643000
CVE-2023-31103,0,1,809bab36002ef9b1b43b1344077ff28861780b3f6764aa2ad6f32709c882354d,2024-10-11T21:35:51.893000
CVE-2023-3111,0,0,88f6d634aaf66868e24baf1dc9c03254a9f0153d8412ca9a1ccbb2e70bf88d7f,2023-11-07T04:17:55.503000
CVE-2023-31114,0,0,a2299262529dc59f23001a6935a0db69324f1ad31cfb90d0de3beb6d9fb6507e,2023-06-14T13:43:45.193000
CVE-2023-31115,0,0,d960eaeb6dbc21cc73b425e3c0785949186cf6ed6abc9c699693915783165158,2023-06-14T14:20:47.187000
@ -223606,7 +223606,7 @@ CVE-2023-31199,0,0,8d7b060eb02713c69989cbab19e9c758ca7c5f6e9ad083c0785dec0d89e5b
CVE-2023-3120,0,0,e6895dafe5ff48a74fbb7623bd5f31e99c0aef7c6fb472b6941fbae2bac1c09c,2024-05-17T02:27:17.227000
CVE-2023-31200,0,0,b08cfdcc73010ea2925f7f53dcef9219870f8ec80fbf062295b9a648e5236ed2,2023-06-16T14:52:35.283000
CVE-2023-31203,0,0,e20ee84ba3753fe4459b52304841db8ed359cfcb0631867aff4534b827d7bfa7,2023-11-21T17:54:07.040000
CVE-2023-31206,0,0,a8d72bdc931be244e474c0480916a79eccf4e243c7050b62fa92dd3a089b14e7,2023-05-31T01:25:33.760000
CVE-2023-31206,0,1,25e23c13d9831f5998b463b3d2aa2e355f26213068d19caded25aa093420307f,2024-10-11T21:35:52.067000
CVE-2023-31207,0,0,547125180cffd0c493ff8787c644b028bd8f18938978f39df407f0a197af0c90,2024-07-23T19:37:16.630000
CVE-2023-31208,0,0,95c19457e4d84f3e922d42dc0c6a1550abef2b702e7ba80d1256849ed16f675d,2024-07-23T19:37:16.630000
CVE-2023-31209,0,0,b0d163613db3908a63b52fa8aa8684ce97e73a6c6a29472adafd5e4272934788,2024-08-26T10:15:05.083000
@ -223757,7 +223757,7 @@ CVE-2023-31449,0,0,3451165bd3ed8d2b6ebe5cc0c3e992059167a53b54f44250d1b558afc42bf
CVE-2023-3145,0,0,e4ac08615370eaad33b01386af0172683b8135a7c7e8e0c71f01de69ce50b6a6,2024-05-17T02:27:18.220000
CVE-2023-31450,0,0,9e30c992e822d2b68d74d2a8d194f06939e7fdea2fdbdba0e28f76e634fabb13,2023-08-16T12:15:13.460000
CVE-2023-31452,0,0,d5233b326dfebf1aec68f02d9fcb6fa1d3bc948b779e40e75772432c36647f0e,2023-08-22T19:16:36.270000
CVE-2023-31453,0,0,8c5439c77f5ac70ee7eeca548be6217fdbe67dec5d5b151033909ded4b7f80e5,2023-05-27T01:20:20.410000
CVE-2023-31453,0,1,c6756f366ebb475e0422a45205045f225ff03979cfbd40f3f36a03e749cdbc5b,2024-10-11T21:35:52.737000
CVE-2023-31454,0,0,65a5c55e0a52a03fb203761aff4e9cd84d1993242224cb54891dd692fb352f80,2024-10-09T18:35:03.897000
CVE-2023-31455,0,0,4ccdc62b7d1bc8d7540e6ef563302b5c558316c03f4bb563f04dedd76ece2b0a,2023-12-29T18:37:53.267000
CVE-2023-31456,0,0,aaf00595412e051e28f410bb113696538d36695c90fe7a624e06e913e84f09ce,2024-07-17T13:34:20.520000
@ -225478,7 +225478,7 @@ CVE-2023-33640,0,0,a2ff624980a241771ec12a877d3503b1209ebab90cc610023c86eb505cac8
CVE-2023-33641,0,0,79acf4986f162843691a2b72219151aedf9f149b939d0fc17611dde1c9a5e617,2023-11-07T04:15:21.130000
CVE-2023-33642,0,0,72b9c73f13d1abd4404a501a8474d5713a59bbef4a8fe8f0a7849d08f30cf2fd,2023-11-07T04:15:22.083000
CVE-2023-33643,0,0,de44da91865bfc44b8599d934b6c5739d22b12e6b538ec5135b80002e7940729,2023-11-07T04:15:23.020000
CVE-2023-3365,0,0,658a6717b6ab36667d4a952df4b60c65760e95919c59a50fae5c6c68a12a55a3,2023-11-07T04:18:36.100000
CVE-2023-3365,0,1,9c07765ab05709912a68cc259248efc80762531e78ea9b93f41c1cc59dd0cbfe,2024-10-11T21:36:07.410000
CVE-2023-33651,0,0,6013bcfe52325757972c756accb5b125c0547eb5545111d63a0789e765f38e90,2023-06-16T16:54:38.667000
CVE-2023-33652,0,0,a348c6d06327b6b71d67feb8e70e66deef6cab842010d68767b531e7ed4979a1,2023-06-14T17:25:10.197000
CVE-2023-33653,0,0,9b40b09562a22f1c2ca910844c079849ae19d457706a26766d423f43689de011,2023-06-14T17:34:14.437000
@ -227570,7 +227570,7 @@ CVE-2023-36650,0,0,be2b71d0d66a16f4c8cd42bdd01be878ce44425525cc93932948793e6c348
CVE-2023-36651,0,0,4c1d4adb66cef0eadf148d8f50fc37885bcdb5efb639fc520f869744083f2ddc,2023-12-14T00:12:41.860000
CVE-2023-36652,0,0,a2787e5cf53250440611d8133a893e8bdc348b5f2a2db5baf59eb736b7f10dcc,2023-12-13T20:42:54.737000
CVE-2023-36654,0,0,b36d6d9f752a5213a6216ce0e4a7d21c2d423b3688fdb6327d6815617611a9b9,2023-12-13T20:51:12.487000
CVE-2023-36655,0,0,a89556c902d15f663602ab929246af6ace62c5cd68ff043e1877eb1a1c793186,2023-12-12T16:39:02.243000
CVE-2023-36655,0,1,d2d3d645c8a9a2e3b128eb9289690d64304c238f075c4d61d993b422619b22d8,2024-10-11T21:35:56.680000
CVE-2023-36656,0,0,735dddcf8910a0866717b6bc8754faf47c7f17448c2036bba3347e6902cc1fc9,2023-07-27T03:41:14.130000
CVE-2023-36657,0,0,2588fa2bf8db4eaaf48523a93c92753dbdc20026b1953339c176632f28d2f7ad,2023-09-19T13:09:27.470000
CVE-2023-36658,0,0,bdd858a44d8b4e44abb8aef9864e3311714227cf7ece7dea327d0dec04f1ce3c,2023-10-03T15:48:36.427000
@ -228300,7 +228300,7 @@ CVE-2023-37569,0,0,be20d0356f2c200800e9a1ff4189db4c145199bfef9933e7503391fe9a342
CVE-2023-3757,0,0,1b1f64474dd054615952b29305a209bce29590d122224127f40785e8609d0c45,2024-05-17T02:27:45.957000
CVE-2023-37570,0,0,7e289a5a4950965acdd1fd46726f7973787c6dd68d8dab611608d873ea7d2cfb,2023-08-10T18:04:45.327000
CVE-2023-37571,0,0,f68e1617c611ca2617b892341a9747e5e63386893a6ded3b46d66fd735976dd0,2024-02-05T18:26:05.757000
CVE-2023-37572,0,0,280c7bcd03136a465411f3eccb8bc327a7cad9aec603472f40d1beb0bc76a237,2024-01-25T20:15:35.540000
CVE-2023-37572,0,1,5f6e1a2a4673c3299770822fa529112309ba2b5cf7de0bb0f88188f7f34f2d7d,2024-10-11T21:35:59.080000
CVE-2023-37573,0,0,243d404588957d91a8c506aa6999786f555598af6bdcb95c82c48037f6a1eeb4,2024-04-09T21:15:12.433000
CVE-2023-37574,0,0,83aa5f2ffe12a03679f8cb62a3b0802b5e54dcad0965e9e4263299d7b703d4a3,2024-04-09T21:15:12.523000
CVE-2023-37575,0,0,62cd2e14a8fc6c354397e472566b7eef8d6561dc2667760caf079d12d107c6d0,2024-04-09T21:15:12.613000
@ -232030,7 +232030,7 @@ CVE-2023-4236,0,0,924b94bd8f0a77971953a5c369ed9c0dcd2eabf4ae855e4fac2037d561c7a8
CVE-2023-42361,0,0,980df72722edeff41fc9b24f077dd47835d868523d73c5daeeb0e6e47ec3cab8,2023-11-15T15:36:46.743000
CVE-2023-42362,0,0,8b4a6f0f5fcef1b3349470e98c5950e51de404839b937ab34f5ae50f377d54a8,2023-09-19T19:34:03.287000
CVE-2023-42363,0,0,180f5da82e3a5c686901ab47f072f1c9e480db17de45e8e75faad3cc96fcbb65,2023-11-30T05:06:49.523000
CVE-2023-42364,0,0,db3ea44df92b5966860e81b8cb44bfd7893db544d20f70cc01c6b1c57a525f3f,2023-11-30T05:07:10.827000
CVE-2023-42364,0,1,c97fb0877e6ed1a03f89f750771c88d1dd91299c500b1da32c4b44394c8cb2d4,2024-10-11T21:36:08.877000
CVE-2023-42365,0,0,b406aedf5cff3690cb0cdced542258b1116fc3739fd082c9556fafea525dcb3b,2023-11-30T05:08:08.770000
CVE-2023-42366,0,0,96aa4788059f0643e44792bf7c219cbf02f22946e327a1c617c1427bb3d00c10,2023-11-30T05:08:23.197000
CVE-2023-4237,0,0,6cf38aec3bd975284a4d86b8e8e2c267e312c6daf36ee9d95139bc404b921d75,2023-12-01T12:15:07.670000
@ -232324,7 +232324,7 @@ CVE-2023-42737,0,0,16bcd45da01433936a127815c41414104fe3f0b940c80d39f9b5a90966e13
CVE-2023-42738,0,0,4f4f4f4689ddc0d711dfb1b46996240f8f4fb2d2fed0cbfb0206977ae4a55c17,2023-12-07T16:57:39.837000
CVE-2023-42739,0,0,30127b11627b71cbfcc86d1cdb8d285936fe67fcf167f85cd24855089fc0814c,2023-12-07T17:01:41.877000
CVE-2023-4274,0,0,8f05f67d174babedda688e67da482c480c7c4b0cf7965a77cd94338132a5cf6d,2023-11-07T04:22:23.610000
CVE-2023-42740,0,0,fd80d5b5b1a1ae2f7d8aca555a7691ab4ddb852698639a8eebc66bed4ce65050,2023-12-07T17:08:37.267000
CVE-2023-42740,0,1,baf2360aaca910646c7828da5e118e0a2e1cf714b297d951c4a6bf5b7c883a4c,2024-10-11T21:36:10.030000
CVE-2023-42741,0,0,6bb339d296bc2b39b0c777989be986cbbb6048bd95584f8743ec496c58805851,2023-12-07T17:48:25.020000
CVE-2023-42742,0,0,c26f687aff16d89e309eb82ebfd27427342a6f4b5867fa588d2835cbbeb6fd9c,2023-12-07T17:49:35.703000
CVE-2023-42743,0,0,04a69723be349a43806488743a38ddc8014435d25282060f69044cb9eeb00940,2023-12-07T18:34:08.913000
@ -233245,7 +233245,7 @@ CVE-2023-4411,0,0,6e725a6355592906aa726b75cfa40dd898dfaa8ce2088ab50158f3f470f027
CVE-2023-44110,0,0,6da985b2f0aa8cfb90e8416c0becac5ed4cfc8fa06677e5f03d25c0397429276,2023-10-14T02:19:27.097000
CVE-2023-44111,0,0,c0a3e4a60f05f147f7c03f67d5539be0a49fe5e2188c17a95f51935484f99a11,2023-10-16T14:16:11.993000
CVE-2023-44112,0,0,9044646509c0033586ef4f69542d901e20ffe7a1a37decb64e02006441036d0c,2024-09-03T20:35:03.557000
CVE-2023-44113,0,0,92eceff5133860799bf3cc17863e171f23292cd5506efc657e986d14244904f4,2023-12-11T16:15:48.920000
CVE-2023-44113,0,1,90e5ac936d2728795f2e61db5baaf27e79031e66315c049726f9bd7cd5ab4b8d,2024-10-11T21:36:10.877000
CVE-2023-44114,0,0,7028f58ee4eb36fe2acab86791256944bcb21b37de97bb881857379a64abfd36,2023-10-13T20:31:20.313000
CVE-2023-44115,0,0,b7f7869cb4a1913e0115e8ca5c0b52d2e9d66ae077a332b8410d6be19488c6a6,2024-09-04T19:35:06.837000
CVE-2023-44116,0,0,7395e52236a43197316234ce58b9e618c72fd59ec56d0c273504aa334a55e762,2023-10-15T01:49:29.117000
@ -235107,7 +235107,7 @@ CVE-2023-46814,0,0,3cecb5f50c237020a17039ffce04adce16d590a4b77f65a0bce23076a5def
CVE-2023-46815,0,0,73a8d2839a8f681dd5b4deacb0da64bfc7a2eb89a272b7c57e16fb00a27289cd,2023-11-07T20:46:40.287000
CVE-2023-46816,0,0,457f8b7969b679493dd123ee82eb2b848a16353b6b57ef98524a216099740713,2023-11-07T20:47:44.823000
CVE-2023-46817,0,0,c622a0bab2dc85efdb3e6cac535b776216f5068d508925e89ceecc35669aaa4c,2024-09-06T14:35:06.507000
CVE-2023-46818,0,0,f234f9e3a48282f81299c3ff6ed7b1a1d071eb6e821f675508ca8b30a7e7e109,2023-12-13T00:15:07.247000
CVE-2023-46818,0,1,01d2269ae0b39e41d52ff5a3fc19bc5832b5c9076b28f167560a99959d469982,2024-10-11T21:36:11.727000
CVE-2023-46819,0,0,b9144c8b43b7e50be02f0a7adb87559b3a81cc8b960f11a9c9b61dc6bebac590,2024-09-04T19:35:08.043000
CVE-2023-4682,0,0,c1c0d3bcf2f406c6bcb06b0a440260f9dabf84e5ad23fa025bbfa655e8c647fb,2023-09-05T16:24:54.687000
CVE-2023-46820,0,0,aa393ad58ea962d201742c7c0922f5354d3e88c5c877ebf040d42c8c1854c0a0,2023-12-06T17:29:13.157000
@ -235148,7 +235148,7 @@ CVE-2023-4687,0,0,354f0681027854970a7f0f0533bc3851ddac446f09d1cbaeefe24a425dff4d
CVE-2023-46870,0,0,ff18f06b6c4d39998df5f876e3bd0b3d5c3cee594f43c4568fd49a4689d51e0b,2024-08-20T14:35:03.573000
CVE-2023-46871,0,0,cc2b23a2a7c0d7957b39709ec8c2aa588579f2c75f2b7fdd7c7f3d3e75ed4b10,2023-12-12T20:19:53.150000
CVE-2023-4688,0,0,985476e8d06e20422659b9d794536014224e53fcc3c17d4243bfab5155c29d50,2023-09-06T20:45:12.027000
CVE-2023-46886,0,0,b203c4f31661b6385b16f32ae599f556bf0f1ac3bf629827b03deea7d1699a90,2023-12-05T13:02:07.903000
CVE-2023-46886,0,1,287bc75cd1a4dbdaf029391d872f9209d3e2fcda816a0f76342e84c456b66b78,2024-10-11T21:36:12.497000
CVE-2023-46887,0,0,ec61bd4cc7b9fd5e65f023c914218af7187f8f9230837439b51c8f659a316456,2023-12-05T14:19:33.893000
CVE-2023-46889,0,0,b744010e75c78d2ed0acbd5fd12013a3a7a7541db52eae97c00d7dfb974ac8c9,2024-01-31T16:36:18.020000
CVE-2023-4689,0,0,d4a10840539c0269a31b628af9b7dce36883b587501ab931d1721e7b7accc0db,2023-11-21T01:03:38.423000
@ -235216,7 +235216,7 @@ CVE-2023-47007,0,0,49f0b3a68efe7b594b8345cc617f72bfd332aea920a34e101aa6c03ece0a2
CVE-2023-47008,0,0,e0e309a0a65b9836e68b5ee4cbcb4b9a7e5b6f69ec3a43f0327be97180cbd7d3,2024-01-19T19:15:08.330000
CVE-2023-4701,0,0,43ec92fa3ed154d03a458e8422915dc45577247db51777e6112aadb19888d225,2023-11-07T04:22:51.240000
CVE-2023-47014,0,0,682694dbf9d4101908e947c17cbd72e7a531426890a47cd106e30625b893fb0c,2023-11-29T02:29:03.067000
CVE-2023-47016,0,0,022a565e849362a53cce692564370d7c82a841cb97a3025eed716d8a174e0047,2023-11-29T18:03:48.853000
CVE-2023-47016,0,1,cfdc54048014ecbbc02e010d9a7968e2e23f1f8be3787ed93b31bbd7f4a81378,2024-10-11T21:36:13.327000
CVE-2023-4702,0,0,e06fb0bf4f4c3d1004eb791d9898a0243b850391adc4c30c6d753399916e9846,2023-11-30T09:15:07.560000
CVE-2023-47020,0,0,acb130981e53142228088038570ba24a86616788f4df890f5097a82dd3ab0cde,2024-02-15T03:21:44.417000
CVE-2023-47022,0,0,8586e193a772040e8837f9502b0e732b51d694bea22906ffdd22e1a077e4dc8a,2024-02-13T18:14:14.547000
@ -235875,7 +235875,7 @@ CVE-2023-4802,0,0,2c1584c4a67b39a645b83631e146797b804919cf6a93945659db703ae55b43
CVE-2023-48020,0,0,b777d49d7fd809eed124fea08e8c5e9b16e23f27e9f36139f2a67d2db2a1fade,2023-11-17T21:27:51.187000
CVE-2023-48021,0,0,ab9cdbb8af138e4e4cf831360195e597283273a30fb3493658cce65a93e2b463,2023-11-18T03:27:32.867000
CVE-2023-48022,0,0,3dccd5ecde72b45982bfeb1b905e4a8f189ed6e6fb8c69446ba7ff664a946b57,2024-08-02T22:15:27.193000
CVE-2023-48023,0,0,aff18d87b5001b1c597fc13419d45d5ac5309f6a5de4074a51027abf1b3c8874,2024-08-02T22:15:27.340000
CVE-2023-48023,0,1,7ec214c77f08ab7c0eac2ab3c9df7279d18c47bca98e16c5db36d13bb6a11227,2024-10-11T21:36:14.160000
CVE-2023-48024,0,0,2269b4005a674f6940ddab7d9b7ebe254d967dce741388b14c84dd975cafd8bc,2023-11-25T02:23:37.257000
CVE-2023-48025,0,0,e61bc975fbdaf1e268790a874eba9c57bb1a52c2023b1e744d5f48fa89d23fe9,2023-11-25T01:21:30.640000
CVE-2023-48028,0,0,0e1ab4ac014a228cdd818faede93333dad036fb11ec48e54aea7fa9ba944cfce,2023-11-25T02:14:32.110000
@ -236615,7 +236615,7 @@ CVE-2023-4888,0,0,f48596506d19a7921bde66b5add4c77321ae9d54b2d07f9e6a73048dc47a7e
CVE-2023-48880,0,0,6fcad3f26f96ba1e4ef3a9f940f69a7dd8cf91117756f880f777dc4d4a1faa15,2023-12-05T16:38:50.380000
CVE-2023-48881,0,0,0cbaaa1bbb47c786686a6f28b74d3087ab100225b35b19dfb7423e939140bda0,2023-12-05T16:41:54.707000
CVE-2023-48882,0,0,cf2277c9dd01257361265dee40dae857ff900487abeed00d8050a6134e220cd9,2023-12-05T16:45:50.737000
CVE-2023-48886,0,0,40e7b2171bf655d4eaaafc758adfb6d1dc6cf44b07326f9921a16c820ea9865d,2023-12-06T20:20:06.700000
CVE-2023-48886,0,1,85f38ea88b1786d7e9c637c001bdc895a50475bf9aa28ee01776925a8f6f6a88,2024-10-11T21:36:15.233000
CVE-2023-48887,0,0,c6554ca244deb7459ceb1d3266c93be31dece4df8d670851d804b3d33fa3817e,2023-12-06T20:14:56.987000
CVE-2023-4889,0,0,866a7413fc17b996e93601ed6be945e8f6df9735df666d1f5924384ca7eb7187,2023-11-21T20:28:48.533000
CVE-2023-48893,0,0,5043ec8dc2f1768fadeb39d099a00fdee7291c475c685e34a7d4cf80fe0e4a4c,2023-12-31T00:15:44.330000
@ -236641,7 +236641,7 @@ CVE-2023-48930,0,0,75a0241af933fadab2c43d5cc139ef80206ba0235f92ea9a2565c6f4f8111
CVE-2023-48938,0,0,98f86836ae03a10653170ec5f755b7030d988d78ee243ac1c19e2cbcc7f939f9,2024-04-23T22:15:06.927000
CVE-2023-48939,0,0,7e8e8e24234caf6f99bf5bc93e04f2c01c41c03d784bca00c0a0f7f832eba137,2024-04-23T22:15:06.983000
CVE-2023-48940,0,0,8e6111884988523f8d5c0aa8bad3ee1d6ab7188e50766b79b1214ce2a8a1c188,2023-12-11T19:43:51.563000
CVE-2023-48945,0,0,22f2942ccc6e2b32f23e5b550984b26d0a1bf1df5969c01a52e94990a966f07d,2023-12-05T18:33:48.857000
CVE-2023-48945,0,1,acda4f43439f6df637808c06acf1601a3ffffe2ad32251eff961f925975b58b9,2024-10-11T21:36:15.990000
CVE-2023-48946,0,0,247eb573f3f05884bec23b778366cb9717fb143e49c04ea7c1a2c333c7aba39b,2023-11-30T22:10:42.030000
CVE-2023-48947,0,0,b4d4bd23acb2c8ea68903fb835be8a564702d163029d2e79b5a29499fc98595e,2023-11-30T22:10:49.160000
CVE-2023-48948,0,0,fe86ec75533e6aa04f7202e4f111f6d88937587cf5f7b360a54961bce2ba0b66,2023-11-30T22:10:35.630000
@ -236678,12 +236678,12 @@ CVE-2023-4902,0,0,1c630014e1f492dc36454d008b93afa0e3495205ff31887e9f7ebd51443239
CVE-2023-49028,0,0,fe8fbc5b935280df3e15ff9fbeb139a04b1c5cf428503dc526722e75e3d5e71d,2023-12-13T21:21:46.707000
CVE-2023-49029,0,0,99d8eae69fbef2f03c1f635775f53f7d1f003e752878865563c9f1d3e969e543,2023-12-01T20:09:11.957000
CVE-2023-4903,0,0,3729bb8198936fea24f72d8f038013b2ff557d3961ef545c8ec32fa2509aad08,2024-01-31T17:15:17.143000
CVE-2023-49030,0,0,161162baeab0ace49a87223347116d37e6813a3718821dc72ac83187ce1b3b39,2023-12-13T21:22:09.877000
CVE-2023-49030,0,1,cd8137c64604484e5020c8bc92f0d951de1f0a86b5e66b9aaee6957ffa71fa5d,2024-10-11T21:36:16.747000
CVE-2023-49032,0,0,f2436d8fab621b1e5a4298543c17126757707cbdaf0da85067715221827cf7d9,2024-01-02T16:31:49.530000
CVE-2023-49034,0,0,816645fd7298eed3a2dc63a90d9993dc418475d46d396a4cdeacf4e6f6e778b0,2024-08-29T20:35:37.610000
CVE-2023-49038,0,0,33dd36bcea8b024203bc56e9dc0761eb263e731cd037e94d5db258eb90d03006,2024-02-06T16:35:06.483000
CVE-2023-4904,0,0,22f0e4ebb1c236a8f4a4174844bf38ca3c3fa7a301baac2a19ad8b895b968130,2024-01-31T17:15:17.417000
CVE-2023-49040,0,0,bff653a8d43264473976fccd5a1707295dc84f512c2f76ecd910d80fc1aeefe3,2023-12-01T20:06:11.127000
CVE-2023-49040,0,1,22c5aad951ced3f840bf68f97c393d061c14a18365206d352749bf9760be009d,2024-10-11T21:36:17.520000
CVE-2023-49042,0,0,9c37d5f1658e04d1a7b873d677708eccedcf69c1a7bbe8a3b05538749713db3f,2023-12-01T20:05:35.273000
CVE-2023-49043,0,0,bab12967da04292d10677236191241bb7add573656e588d03a27f1280e988ac6,2023-12-01T02:29:56.040000
CVE-2023-49044,0,0,01083404d6542db84d7b1c5fab7dd537e073ed1545ee545b3aae6273dffc3b69,2023-12-01T04:01:05.950000
@ -236908,7 +236908,7 @@ CVE-2023-49294,0,0,026c94a6497c707a206c55f90329c31b76e5e8c660ac2ff03e3a53eba6193
CVE-2023-49295,0,0,389dcf49dd7093fa28aff07e2fe2daf1b3c94c4d2638dbc0252077cad1cc0e05,2024-02-21T03:15:08.410000
CVE-2023-49296,0,0,844860b1330c53f29812313bc41439d8487e47a9ce79b27712557e3e8c46844f,2023-12-19T15:43:13.307000
CVE-2023-49297,0,0,80d1ebecc869e8c71166893b32eeac85f1386c27bb00b2290640ae2caf953e1c,2023-12-16T02:15:07.680000
CVE-2023-49298,0,0,aa849e15e26e4ce69d7b1aabc72060dde2cd470700d01a170fe51677adb48fa6,2024-03-18T22:15:07.413000
CVE-2023-49298,0,1,d7a4880415067d8c3b446d6797a646fb49f10851b1b279e63e476c96d8034c48,2024-10-11T21:36:18.810000
CVE-2023-49299,0,0,ada605fd2b85a30076978a2cea5959fe25630ec90635c2c18a60a96527d236ac,2024-08-26T21:35:02.680000
CVE-2023-4930,0,0,42c54f6cdb9052f80c7b88bfe87d4a5ab8a2f899d5d2a07a6f5fa45df3083af1,2023-11-14T15:33:54.183000
CVE-2023-4931,0,0,b5b8d32009dd89996d453ce70e2aed589da6480c3033a7e9ca915c81e23407de,2023-12-01T19:06:42.203000
@ -240378,7 +240378,7 @@ CVE-2023-6269,0,0,0bfa35c6ca8316c74fb5cc127597f80feb0289558fe11e8a4f742ed223ba9b
CVE-2023-6270,0,0,d00bdd52db567626fb03ea16d06bfd12d7d4f39059f0134b911e740fab0af4ee,2024-06-27T13:15:54.233000
CVE-2023-6271,0,0,717e6a717943e060a373ce872007f05c269902f7664a73fe4041c85411200802,2024-01-08T17:31:37.350000
CVE-2023-6272,0,0,b3d74ad4c919a040d83c5a29b80ccb7c9a4c62b82fbdaa1b46a6c93e4299c5de,2023-12-22T18:34:10.253000
CVE-2023-6273,0,0,bfe15761d0e2bb921ed3c0d0c2c36c03a1656966fe638d3401638d2cebdb2618,2023-12-12T18:36:55.433000
CVE-2023-6273,0,1,75256f527525717ce8c04d11fd8686d46ab3a61f90753d911e4db38480b9c305,2024-10-11T21:36:21.740000
CVE-2023-6274,0,0,4f530dd28ac44051dca761bb89d18362b76653c5f1bd1f7f9a0b0b7fc6974e6b,2024-05-17T02:33:36.680000
CVE-2023-6275,0,0,1df4a2d506677de951981566edaf40c947c0fb87ae017e4f3b204b0bc3f9bb45,2024-05-17T02:33:36.787000
CVE-2023-6276,0,0,24c3dc4dd47e004cfc2d394ab4aa6804146bc09890750cb25a878e0ee9940b41,2024-05-17T02:33:36.890000
@ -244248,7 +244248,7 @@ CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957
CVE-2024-21531,0,0,556b4244c50c270222e18b4d703d3656d63fc81c95a1cab5391fb75a68df3d26,2024-10-04T13:51:25.567000
CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000
CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000
CVE-2024-21534,0,0,e9a2fb876451236a63c5658427831aeaad2a3c760a252645fbb31cc597f5996c,2024-10-11T13:15:15.667000
CVE-2024-21534,0,1,7edd88deeb19b219ecc2b90a3976d54902d3b9e86766a1e32c231ec19796b637,2024-10-11T21:36:23.557000
CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000
CVE-2024-21545,0,0,614ed901d7a98204a096c9331020afa9e58729de6a0c722ccca7898674ea9a4d,2024-09-26T13:32:02.803000
CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000
@ -246645,10 +246645,10 @@ CVE-2024-25102,0,0,133268ffc984c42d69b4bf70a18b06bfa00e6f9b1a6b7979b0b7751daa3af
CVE-2024-25103,0,0,bc16d0a18e5413d69ce0cfa7d659612fbf4d905c382e53747393112e47b23dfa,2024-09-23T12:15:03.290000
CVE-2024-25106,0,0,69f4a5df8f9163ba3cc00a57d78f06705015dcf6a2341378521404b16f38f37b,2024-02-15T18:53:44.707000
CVE-2024-25107,0,0,2f7af5f36b252a42eb30d1f8972da5732bf420e322522d60adcccf7f4819b86a,2024-02-15T18:52:25.613000
CVE-2024-25108,0,1,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
CVE-2024-25108,0,0,ea86aeb46132d1436758572e531bfe9d096e1704148614890b5ee2b811e5154b,2024-10-11T19:31:20.060000
CVE-2024-25109,0,0,c41f7e7a8b0352e7db5bd3620b2014d3afb64c0a666c2f8d504ee8ea7a10e96b,2024-09-05T13:18:39.687000
CVE-2024-2511,0,0,e85e202ac0d96bf0165ada9b88f1fcf9a6fbf365413ed057ebdfaf286537c656,2024-05-03T13:15:21.930000
CVE-2024-25110,0,0,2ad123d5329d817891e8dc3bae18c16385186216cc417eebddd2d60d9619e7fe,2024-02-12T20:39:09.773000
CVE-2024-25110,0,1,d26cbb0693a4d6c53e7081518beb8a84b92d2cd8bf57244ea03bf261dee5ab3f,2024-10-11T21:55:24.837000
CVE-2024-25111,0,0,260c08f765b0b23211db8fb3020f7ae46891432e3f36f885aebdb89bc620ed80,2024-06-10T18:15:27.443000
CVE-2024-25112,0,0,ffe546871aece44048a968db11eadb8d7bb7f19f007a9d8c711115c5f085f021,2024-02-13T14:01:40.577000
CVE-2024-25113,0,0,857a8a6c04923b8f13653e0c0fed4f0ffff75cf90412dfa840a70a6bc18a3ae7,2024-02-17T22:15:46.660000
@ -246660,7 +246660,7 @@ CVE-2024-25118,0,0,5a5d87ec39b0263d610d121aff303a2a887b58fc2c2bb0cb82e45c6c39356
CVE-2024-25119,0,0,e00eb90c0e2b5f9ee441104e8a867af994d0038db78cdde9e1777dc983844f96,2024-02-14T13:59:35.580000
CVE-2024-25120,0,0,22ab495202da9a816053ab6e8432de07c3fd99eeec113249a77e5d6da094b853,2024-02-14T13:59:35.580000
CVE-2024-25121,0,0,b0d544a773d2eed790454c3855c0d500355e4c566f69865a021ff361b9749a9b,2024-02-14T13:59:35.580000
CVE-2024-25122,0,1,e365e28bb2f56caaa3ef9b80a1cc325b36fe31e51625a47d99ef7167fe1c5bf2,2024-10-11T19:15:51.707000
CVE-2024-25122,0,0,e365e28bb2f56caaa3ef9b80a1cc325b36fe31e51625a47d99ef7167fe1c5bf2,2024-10-11T19:15:51.707000
CVE-2024-25123,0,0,d91338db3ed95b8913dc378067e1f32dfba4b3ec82603f1ac01d187651acb75a,2024-02-16T13:38:00.047000
CVE-2024-25124,0,0,d570849c8f0f5f2638ea1dc3ea0947e3bcb6425f6af78c4802a7a9fc8debac63,2024-02-22T19:07:27.197000
CVE-2024-25125,0,0,e8d3e2301ada9acbf67deee26992ba22f050532192238294c0e8c4b124dd2615,2024-02-14T13:59:35.580000
@ -247093,7 +247093,7 @@ CVE-2024-25808,0,0,c8b3842916e7c06900b08f9fd62594e0f61e1918f91fddba1f15f9656576b
CVE-2024-2581,0,0,41246128334c0147c39b69b67a7b8a68f9df4e44ae695bfb23a0c0e11cadb9ca,2024-05-17T02:38:20.983000
CVE-2024-25811,0,0,19975e07ecf1fabf59b175c7c29029eca5183606ae6164f55f4361c17d565764,2024-08-04T12:35:05.137000
CVE-2024-25817,0,0,594e7944f467d2705810e71e76846a873167e65fb8715f24384d52ab7508e60a,2024-08-08T21:35:05.550000
CVE-2024-25825,0,0,d8471d9f859d921205640c4475c10e3c70e3ce8e50306ca5fe30ffebb185a757,2024-10-10T12:51:56.987000
CVE-2024-25825,0,1,6969a65ff32df517f01853ea9bac1c1dcdc285c7b5d509f520f6310a7f1d76ea,2024-10-11T21:36:24.583000
CVE-2024-25828,0,0,bb5f11d12010040c46347f1b01567677eceaf6416fc48feec74112280779705c,2024-08-19T21:35:05.027000
CVE-2024-2583,0,0,bad6d25a4e56375c530c1d9887ed4d49edf53513d5bb806a8b8436b2ac73bef6,2024-08-01T13:49:48.777000
CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2bab0f,2024-08-13T19:35:05.710000
@ -254656,7 +254656,7 @@ CVE-2024-36048,0,0,5a5a6da2bab77110717de4a83cf2fd38c948b3573f3cee73605d8d6a5534f
CVE-2024-36049,0,0,16195e94e554c9cc2e1c5fb6b057cc3b79bc050cdc5b42034b6e0554be23efca,2024-08-26T16:35:09.153000
CVE-2024-3605,0,0,905473bba2f4b1f833e3696e0eb3a1556acdfbc79f67c22a9c6f82f499950cc7,2024-07-15T17:12:36.967000
CVE-2024-36050,0,0,c50ac6e5d9529aacb1e334d114a2f6f4418d441c20a736ae9e48551abc3029b2,2024-05-22T16:15:10.777000
CVE-2024-36051,0,0,5e2f599fa240a78163a70dc813cd791d8cbea53ca2a64bdc9b23f86599d83e21,2024-10-10T13:15:14.187000
CVE-2024-36051,0,1,06185d929bcef5b726eebc24c04947ea1ae42bf1c0763bf9aef66e711c162238,2024-10-11T21:15:06.843000
CVE-2024-36052,0,0,083dfa6efec8c8b05eaad2f1b8dc2dc652acb748c2d4396b452843d815f40c28,2024-08-20T15:35:18.753000
CVE-2024-36053,0,0,2b26adadb1e10190c0e2e5708c64683c631febead0f4dd9529189a0425d50810,2024-07-03T02:02:43.043000
CVE-2024-36054,0,0,573acf3e9153a838a6bd1e03653f71db08e33e3b8f5328f3fb3cc099e632a6e2,2024-08-19T19:35:07.003000
@ -256274,6 +256274,7 @@ CVE-2024-38360,0,0,62fab844597ca879d16a5f3bb413c82dd98eca8f8a8f42f5a5f8581c90bd1
CVE-2024-38361,0,0,f382ebba7fc984c6e86107cb94ceaca8dedca184f9f6123ffedcd7094bb741b0,2024-06-21T11:22:01.687000
CVE-2024-38363,0,0,4ba5b34714c88cf806284a26eaf8261d70f03ee7392713aa1b260c885e54e80f,2024-07-09T18:19:14.047000
CVE-2024-38364,0,0,2279d9d422aa31a74e603806d16ace0153ff248c4a5fbe8796ad93e25cd4d53d,2024-06-26T12:44:29.693000
CVE-2024-38365,1,1,e2d69c29dbd1ce8181392b9491fee732216a7aff80840aa22fe10aaaace6d17a,2024-10-11T20:15:04.733000
CVE-2024-38366,0,0,da439faf5ff6d8122b959647a313a26dc3be85c3289475c82985c89c575c78f2,2024-09-18T15:22:55.753000
CVE-2024-38367,0,0,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc7ac,2024-09-18T15:16:27.733000
CVE-2024-38368,0,0,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000
@ -259956,7 +259957,7 @@ CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb218
CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000
CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000
CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000
CVE-2024-44157,1,1,a28989cfff089fdc5c64928ba655211032121c3d0b825d46ac43db40236fab2c,2024-10-11T18:15:08.030000
CVE-2024-44157,0,0,a28989cfff089fdc5c64928ba655211032121c3d0b825d46ac43db40236fab2c,2024-10-11T18:15:08.030000
CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000
CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000
CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000
@ -260034,7 +260035,7 @@ CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9d
CVE-2024-44410,0,0,6c57a9bf372d97a29932dc411b42421130ab7221dd0f704bdc840e2d9eac456c,2024-09-10T19:00:29.527000
CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000
CVE-2024-44413,0,0,98007b7f42bd9dd2b67db2d4d0a20a162d5bedc49eb5cd3230e65681cbeadef2,2024-10-11T17:15:03.790000
CVE-2024-44414,0,0,39bbf18b52ff5a48ec3b4c759e29fd689c05910ff0a09f7c07e099969f878cdb,2024-10-11T17:15:03.880000
CVE-2024-44414,0,1,a7b9ca1dd549414d7968613c2793c071af3ecd185bb74b28866d8c4b42541001,2024-10-11T21:36:31.953000
CVE-2024-44415,0,0,ad755f39731002ab77617b43d94507b284d67e3ad7779c6cd8a779e287ac63c0,2024-10-11T17:15:03.967000
CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000
CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000
@ -260139,7 +260140,7 @@ CVE-2024-44796,0,0,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d
CVE-2024-44797,0,0,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000
CVE-2024-44798,0,0,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
CVE-2024-44807,1,1,810975d199c77bf9871ff49351113ab0bf71110290c932592e13dd1febb2d984,2024-10-11T18:15:08.133000
CVE-2024-44807,0,0,810975d199c77bf9871ff49351113ab0bf71110290c932592e13dd1febb2d984,2024-10-11T18:15:08.133000
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
@ -260417,6 +260418,7 @@ CVE-2024-4518,0,0,64c3b6e6e74f6d9fd929463119875b686279109a997143c5dd3ad8e2c1af13
CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778caba,2024-09-13T19:55:54.477000
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
CVE-2024-45182,0,0,9a85c862314a6425e6060387f72c5f336d253a6faf88611dfadeddbd5da8c540,2024-09-18T20:26:11.023000
CVE-2024-45184,1,1,62cc6d98bd66c7827ea33f57294b4d8f4d5634bae628f9d5a75d79bfa4694c18,2024-10-11T21:15:06.947000
CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
@ -260506,7 +260508,7 @@ CVE-2024-45312,0,0,ef764c6defa41a6edf70254d24eaf293afa21b3c3fa7a94ab70b620cdfc67
CVE-2024-45313,0,0,4968bb4eb1a02bcbcbe90803b30cccb5c26bf5a74af49d29e0350cd8e0738664,2024-09-25T18:12:53.543000
CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ecee3c,2024-09-12T16:39:53.690000
CVE-2024-45315,0,0,ba3d6bb772ee39d6bc5499016a92ac1f8c569adfb2fb030be2d2783f6d06e78e,2024-10-11T13:15:15.883000
CVE-2024-45316,0,0,4e5892b82028d8fdbdd8305179407511ff3766332bf35730ff0ba8e888812f60,2024-10-11T13:15:16.010000
CVE-2024-45316,0,1,917b9a2d81b07be65e7e4444a9aa32a338810fa9c3b1c434251c47ee009c89db,2024-10-11T21:36:32.947000
CVE-2024-45317,0,0,275e9c03739456c391fe81ca5fee61b756e8c635c4f5a6c7e3a5dd1910911ac8,2024-10-11T13:15:16.103000
CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000
CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000
@ -260621,7 +260623,7 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
CVE-2024-45519,0,0,8cf7771886ee091236ac393f14fcd9299d951c1d8323e7c75b78becbb53a0cf0,2024-10-10T15:04:49.143000
CVE-2024-45519,0,1,d22b7a0d5b70a1457efb1bbf828c84146c84f856205dcaa807aba3ef8eaee5ab,2024-10-11T21:36:33.567000
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
@ -260693,7 +260695,7 @@ CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000
CVE-2024-45745,0,0,095415295fb9e908dbd1bbbd24ecc8e41cf81936c17bbb0aa6290e6785ab228e,2024-09-30T12:45:57.823000
CVE-2024-45746,0,0,0480d752d9a964b227e21ac7d8461dc4b3c571e26c192948403806808a22adbc,2024-10-10T12:51:56.987000
CVE-2024-45746,0,1,902861897e83a8721d85c8381c9fc33c107d622749f6a985c29d3f01f324f690,2024-10-11T21:36:34.350000
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
@ -260834,7 +260836,7 @@ CVE-2024-46083,0,0,73f6a059a5ba6bc696db7247d8909675528ea79771aa3e324116789f85257
CVE-2024-46084,0,0,b76e6b13523e15b76b374f65868a92b58cdd010c840abd828b2c93c894b78869,2024-10-04T13:50:43.727000
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
CVE-2024-46086,0,0,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
CVE-2024-46088,0,0,8f412cc2c1eb899e794bb30fcae9111259ad7d234fc9926143ae8d038968838c,2024-10-11T16:15:08.357000
CVE-2024-46088,0,1,2a3f5b7161cfeaa0d531006e4014cfdcbe258baba00e87c6174d7dbe11360903,2024-10-11T21:36:35.423000
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
CVE-2024-46097,0,0,512a1e36bd43b76dc23993f25084db214121a78b92f1064375f403c11dada0c4,2024-09-30T12:45:57.823000
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
@ -260876,7 +260878,7 @@ CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a65
CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000
CVE-2024-46300,0,0,ac737436c281f2a0090533929879a33c37be3bd6f7970fe4b452f2dd4b8cf935,2024-10-10T18:52:42.790000
CVE-2024-46304,0,0,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000
CVE-2024-46307,0,0,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000
CVE-2024-46307,0,1,bcefd2fcb5d6dce55411fd3d95145ba5cbfd8953b6d7a19a92e4df75e273bea4,2024-10-11T21:36:36.520000
CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000
CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2b0a,2024-10-04T13:51:25.567000
CVE-2024-46316,0,0,54b9c1fe9acfe98423855e0709c0cdd187e74f76088027a762e1c19f14357911,2024-10-10T12:51:56.987000
@ -260921,6 +260923,7 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188
CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
CVE-2024-46468,1,1,677d6c831974a29d35fc0b66c11bf3eda1ab300e218b909f570b915ecb893dd4,2024-10-11T21:15:07.040000
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000
CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000
@ -260939,7 +260942,7 @@ CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
CVE-2024-46532,1,1,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
CVE-2024-46532,0,0,3cc4b0eac6406170fdb3268901170209dd1adc3b3b14e5bfd21137ddfc4e89d7,2024-10-11T18:15:08.267000
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
@ -261348,7 +261351,7 @@ CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f
CVE-2024-47159,0,0,f629ab8645ae2d3b373e84498ebe22f56e42f569db9052d68376aa856c847502,2024-09-24T18:09:50.877000
CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000
CVE-2024-47160,0,0,c1aad4fed9b1c25a1ac730f435c0afe6164d933ac9e43b9a1caf75e24768ef64,2024-09-24T18:03:48.370000
CVE-2024-47161,0,1,b4f14ace0eaf8823c777465f809d23f928c4c28c11d0aa00813c7f2bf032d71e,2024-10-11T19:54:07.317000
CVE-2024-47161,0,0,b4f14ace0eaf8823c777465f809d23f928c4c28c11d0aa00813c7f2bf032d71e,2024-10-11T19:54:07.317000
CVE-2024-47162,0,0,322233fc16cb60b7afacb06e9a8b8faccd2cf3bd8a5ab8537cf655de3bfbfae0,2024-09-24T17:57:43.827000
CVE-2024-47164,0,0,5859bc42ffdd144898177fea7518c38f0b763cb9f31d761bb56378ffa2f03ff9,2024-10-10T22:15:10.437000
CVE-2024-47165,0,0,6068da0b880a9925adbf77cd58fd288fd51574aa798be6053315e56aaf5343e3,2024-10-10T22:15:10.680000
@ -261430,7 +261433,7 @@ CVE-2024-47327,0,0,e69cbc80f68558286d87724bfb3ff74a4556470fe4bba849a3f65a9c4a316
CVE-2024-47329,0,0,959fd16ce295ac73c7340682dfbc4f00abc97a1906e836a2239dfaf44a22cfd5,2024-10-07T17:47:48.410000
CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000
CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000
CVE-2024-47331,1,1,596c791ac8b0a95707c17084b5d3daf2eae269336f00917824d2d3797b89022e,2024-10-11T19:15:09.783000
CVE-2024-47331,0,0,596c791ac8b0a95707c17084b5d3daf2eae269336f00917824d2d3797b89022e,2024-10-11T19:15:09.783000
CVE-2024-47332,0,0,bebcc62121f57accf95efc9e23e2cb785faddb62a35b4509d76c7928e0003c00,2024-10-07T17:47:48.410000
CVE-2024-47333,0,0,7b68cade94253428b89f07ec4ddffee957654bcbdc6a580835fa17b2ed55a3db,2024-10-07T17:47:48.410000
CVE-2024-47334,0,0,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000
@ -261453,7 +261456,7 @@ CVE-2024-47349,0,0,e6c8290f3997da4ca5815c85f88c430fa697e63af208e1750b560fe37e4f7
CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000
CVE-2024-47350,0,0,09067a079935a016b58f07623b3d09d0a14ce68a8d0e97bc64a38c36b79a09f5,2024-10-07T17:47:48.410000
CVE-2024-47352,0,0,594028d39b78ff520b0396c6a3ce285d2e384a0ebe8a52208931d1ced0ad3b29,2024-10-07T17:47:48.410000
CVE-2024-47353,1,1,46323252c46ba333ea4f36816ab9a80f2389e9d61296f8594ed082165cdc29c1,2024-10-11T19:15:10.003000
CVE-2024-47353,0,0,46323252c46ba333ea4f36816ab9a80f2389e9d61296f8594ed082165cdc29c1,2024-10-11T19:15:10.003000
CVE-2024-47354,0,0,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000
CVE-2024-47355,0,0,cf08585fe7cb6bc0c9335afe55d15aa081a8746842ce9e96d34e20bb3b2de71f,2024-10-07T17:47:48.410000
CVE-2024-47356,0,0,cfe95239cc4248246cd874a2cb2d77c8e851cdbbe7ac1a464fc0eb4a3c757f5f,2024-10-07T17:47:48.410000
@ -261557,7 +261560,7 @@ CVE-2024-47534,0,0,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a
CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000
CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000
CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000
CVE-2024-47553,0,0,5b7f6e3db0c5d07beacc6c421807da839b923c13d5a21906db06fcdfdd277917,2024-10-10T12:56:30.817000
CVE-2024-47553,0,1,2212e0c73d31ee4117260b14c09959b86700d87277dc600c8b069eb02d73b59b,2024-10-11T20:04:08.623000
CVE-2024-47554,0,0,ed4aff6ea0e7ac69533e960f0592e4849edcc0303a79e4282ca0e96ec7b37a4c,2024-10-04T13:50:43.727000
CVE-2024-47555,0,0,fd6842fa8e3868552d886daf37839c899991f22ed0d1cbcbe8a1f0bc204570fe,2024-10-10T12:57:21.987000
CVE-2024-47556,0,0,3777c77a7cfa512177d92b35ad1f5f20e21bfed49853fd196c2ebb401ca7bb5a,2024-10-10T12:57:21.987000
@ -261567,9 +261570,9 @@ CVE-2024-47559,0,0,f2239e2603f21aec2e0f34acae5f93ddc2655aaa3a316e518b18ca1d3ff15
CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000
CVE-2024-47560,0,0,b8abd4241aae2bbcacde7e0c93543de13fb150a4040a68118a29f4e634e60873,2024-10-04T13:51:25.567000
CVE-2024-47561,0,0,1187d18aeddf57f3855631575eec8fc1684027bd65a7263241fe4e3f5d2788bc,2024-10-04T13:50:43.727000
CVE-2024-47562,0,0,7ec8f24091ef1db96111468cc50e2d1097289554971c4da35d5316ab458714a9,2024-10-10T12:56:30.817000
CVE-2024-47563,0,0,bdbcbbb76e0636e15f56e3d6962c9c91dcec597d600bd2cdefb5a0a54f51e049,2024-10-10T12:56:30.817000
CVE-2024-47565,0,0,5141e78676b5af5f42d5e451346796e73dcb18b535173c1b6643180d5ecdafc9,2024-10-10T12:56:30.817000
CVE-2024-47562,0,1,f948ab473eac72b74771d65275c3bce022b2870f6200aad718c4a235ef7a7a2b,2024-10-11T20:04:35.480000
CVE-2024-47563,0,1,8e14a8aeeab89240dc7f71203e62b9d2c2b2c697ebcb095329938e996837371a,2024-10-11T20:05:05.143000
CVE-2024-47565,0,1,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29d8c,2024-10-11T20:05:59.237000
CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000
CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
@ -261709,6 +261712,7 @@ CVE-2024-47872,0,0,8471c34cf55992e157ff7eba332e41edd983c92bf011e2e751c8d26e7ec94
CVE-2024-47875,0,0,078af0f210e8e30655ff63e30537d1f8dba962d087e301c359afca4f246d0946,2024-10-11T15:15:05.860000
CVE-2024-47877,0,0,7531e66ff0397e313d2f97552017c7592a6d7da9498d96e0b29b6c2d6bd21145,2024-10-11T17:15:04.450000
CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000
CVE-2024-47884,1,1,8ad0ffb865c1d8a187664122ed1b8bd87a0aaa3d88b8a0a88659a06bdd059aed,2024-10-11T20:15:04.993000
CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000
CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000
CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000
@ -261718,11 +261722,11 @@ CVE-2024-47913,0,0,7dc94fcd4cdeeb6c0d9aba640aeb2f6806a34afc409a57e9cc79ea392fd74
CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000
CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000
CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000
CVE-2024-47948,0,1,aafd0e8fc979ea94b2b8df4bf3f1f60d1fa5454036169ceb387558bd65bac363,2024-10-11T19:56:44.863000
CVE-2024-47949,0,1,8ba4c45c98cb1da5a81b6d150df81b78f598bd9353dce1414e0f42eb2bdd7632,2024-10-11T19:57:06.207000
CVE-2024-47948,0,0,aafd0e8fc979ea94b2b8df4bf3f1f60d1fa5454036169ceb387558bd65bac363,2024-10-11T19:56:44.863000
CVE-2024-47949,0,0,8ba4c45c98cb1da5a81b6d150df81b78f598bd9353dce1414e0f42eb2bdd7632,2024-10-11T19:57:06.207000
CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e298,2024-06-04T19:20:49.590000
CVE-2024-47950,0,1,0333163b5a9f356fc60964ffdf9e21e2c5a0fd650f8b847ccf42b9907218b9aa,2024-10-11T19:57:16.883000
CVE-2024-47951,0,1,e529fafd02710d7ac35ac8b78eedca3443695e348ede4d153aabc61ddef6e118,2024-10-11T19:57:58.937000
CVE-2024-47950,0,0,0333163b5a9f356fc60964ffdf9e21e2c5a0fd650f8b847ccf42b9907218b9aa,2024-10-11T19:57:16.883000
CVE-2024-47951,0,0,e529fafd02710d7ac35ac8b78eedca3443695e348ede4d153aabc61ddef6e118,2024-10-11T19:57:58.937000
CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000
CVE-2024-47962,0,0,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000
CVE-2024-47963,0,0,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000
@ -261737,19 +261741,19 @@ CVE-2024-47971,0,0,534d5d54d79d2918bba754e46b72e551e8a383f4547c31054409d42c67920
CVE-2024-47972,0,0,f1d48d54249f69076bba9ceaeedc06de8049ec1414a8288f2e98e1dee9627b00,2024-10-10T12:57:21.987000
CVE-2024-47973,0,0,3a0aa017e97ae06d1cf3d1bc086b0dc9ef048219777341e2d17989996ce6923a,2024-10-10T12:57:21.987000
CVE-2024-47974,0,0,73b31df01d51a43c652bca2b8914e83bdb8e1c1870716321de5e5fac95abd7a7,2024-10-10T12:57:21.987000
CVE-2024-47975,0,0,9ad4ace9a8d8e08788b5e254d7be9129666651b52b755d634ac88116293043c7,2024-10-10T12:57:21.987000
CVE-2024-47975,0,1,f2fcfe13d795ec593199978d9bd2ccef6b74c32b8404475a2a1a928dd974eded,2024-10-11T20:15:05.143000
CVE-2024-47976,0,0,f9e6b9471c3a11e91c53ef084005aa6ebe42f6aee5aa56fec962d9e8dbc63529,2024-10-10T12:57:21.987000
CVE-2024-4798,0,0,a3036cf57ec44ed92aa705d72184468d7b712fcb492c4ff2950b8be117e0106e,2024-06-04T19:20:49.813000
CVE-2024-4799,0,0,bef187df7ab031f873bee32f009cee90466081192edf9662131655f9488e20b3,2024-06-04T19:20:49.917000
CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef97724,2024-06-04T19:20:50.013000
CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000
CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000
CVE-2024-48020,1,1,829c283ecb63389e2cff1a1741c3e7cb21cdcddc68038d515211bb86aa4c455f,2024-10-11T19:15:10.220000
CVE-2024-48020,0,0,829c283ecb63389e2cff1a1741c3e7cb21cdcddc68038d515211bb86aa4c455f,2024-10-11T19:15:10.220000
CVE-2024-4803,0,0,9495051e0864e5e76c8973a987e9e6eb1b1cb49bec9a5ab21c9648610125fd4d,2024-06-04T19:20:50.353000
CVE-2024-48033,1,1,43f4a76b8fc3610a7c182a16ab14a36b8f68d177db87ed6fd3f19819fe34cc88,2024-10-11T19:15:10.430000
CVE-2024-48033,0,0,43f4a76b8fc3610a7c182a16ab14a36b8f68d177db87ed6fd3f19819fe34cc88,2024-10-11T19:15:10.430000
CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000
CVE-2024-48040,1,1,c57148f5b85311d99b66a455ed18d7c7ea6a3284758e530142be56984028b4db,2024-10-11T19:15:10.660000
CVE-2024-48041,1,1,7cbfa9b2e3220db83ef3d6eff7a331f4c12bafdd869428a04141ba479dedb179,2024-10-11T19:15:10.880000
CVE-2024-48040,0,0,c57148f5b85311d99b66a455ed18d7c7ea6a3284758e530142be56984028b4db,2024-10-11T19:15:10.660000
CVE-2024-48041,0,0,7cbfa9b2e3220db83ef3d6eff7a331f4c12bafdd869428a04141ba479dedb179,2024-10-11T19:15:10.880000
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
@ -261809,11 +261813,26 @@ CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d8
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000
CVE-2024-48768,1,1,f49a3d229d332d1aeaab22a310afec1dc3a25e549cecd7c835037f404c4ef2de,2024-10-11T20:15:05.253000
CVE-2024-48769,1,1,f5f7709345dde987cbb78c184038995c0f3efe3656a1fa47254269b76e7f5bd6,2024-10-11T20:15:05.353000
CVE-2024-48770,1,1,eaf5f12c2e9d07a9fecc8d94181f5eabee6e28619c96df91735489ba947f01c1,2024-10-11T20:15:05.450000
CVE-2024-48771,1,1,a1657baf9f208adee3965a78a9c892c46093c662114a218d0a28379196fe5fe7,2024-10-11T20:15:05.537000
CVE-2024-48772,1,1,32f12fd8a1c4a633e62e5136b96048f77dd39e9830a108f380dec8524b539408,2024-10-11T21:15:07.127000
CVE-2024-48773,1,1,fb9691a9cbeb3dcf7d35171104667e63d6590496f59d7608ed0f35159a5ac59a,2024-10-11T20:15:05.637000
CVE-2024-48774,1,1,e09b2721d24693a01b4152318714272955f6ddb265558eb5b7bdfef8acd488c8,2024-10-11T20:15:05.720000
CVE-2024-48775,1,1,b8e85984d5af1131eaf26bd74e5d84ceee535ea1566997eda307a15588016b47,2024-10-11T20:15:05.810000
CVE-2024-48776,1,1,6d16bb28cf85e57cb7bf03baf362d7efa13854629c0f178451275913f461e9e1,2024-10-11T20:15:05.903000
CVE-2024-48777,1,1,f05bd4946b95fd59502390168a95058f9f6f02568ecf6644e1ddccf18dfd7bc1,2024-10-11T20:15:05.997000
CVE-2024-48778,1,1,876de449628179f0742b7e4aa6cb3314ccd387243c9b4fe010bd2b31547ce555,2024-10-11T20:15:06.090000
CVE-2024-48784,1,1,413a91fa2c4a61a33f7467c2f5b8058034c18bbf6bb09d8c92a1fe8bc838384d,2024-10-11T20:15:06.180000
CVE-2024-48786,1,1,c860c3ab3f85be5742131f9576a41113cc68380c4baa10b74833d50923537b25,2024-10-11T20:15:06.277000
CVE-2024-48787,1,1,7a215e7cb70a1e88ac1a7855c7c78ffe9117f0eb6f9844010ee3a49bb152ca60,2024-10-11T20:15:06.407000
CVE-2024-48788,1,1,d531b63d24b558dcbfd8469ce1a5194d6aa29d693230d82c5c128cd8fc89dcbd,2024-10-11T21:15:07.220000
CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000
CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000
CVE-2024-48813,0,0,9334ed90a2bc2f99bdf43ba394cf554b2394a010b57e23c65c6dbd91bcd5211a,2024-10-11T16:15:13.453000
CVE-2024-48813,0,1,738900377884500d6e48ef86e8a92a90f8f38c9de5c7e8958544d021c7ce9ab7,2024-10-11T21:36:43.527000
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
CVE-2024-48827,0,0,95a05cb105f9089ac3138fdbcd6ebf5bdb0df4dff79ffd2930892d4422629ef7,2024-10-11T16:15:13.550000
CVE-2024-48827,0,1,0692485b3e9c4ae06dd4ee6f885c25457f723f018116fcc7fc99c51a1476d31b,2024-10-11T21:36:44.280000
CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
@ -261826,18 +261845,20 @@ CVE-2024-48902,0,0,a199409fe89d504d5aac3fbfd93ec8ade919d8618d3b520517113fdc75e03
CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
CVE-2024-48933,0,0,3003e039111af51a407eaa338f91e1930c9de8b7e22ff78450b42fc9a05e6cc7,2024-10-10T12:51:56.987000
CVE-2024-48933,0,1,26e7fffc7245fc28a7fbe658a2efc943aeace159e18ee8e57ad42a85fc085d33,2024-10-11T21:36:45.080000
CVE-2024-48937,1,1,3c1c422bd05f20d9fa785840c74e61f1a28cdb3ffb554b324e1e75358cf0328a,2024-10-11T21:15:07.307000
CVE-2024-48938,1,1,2e142cf0915aad58cd815110a1eaf58520f2037c9760e54acc76c236a9314228,2024-10-11T21:15:07.387000
CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000
CVE-2024-48941,0,1,35ab7ff258205d0a73a0c5c3a4a13d58fc51339de1c036850059f90cd9a5f81c,2024-10-11T19:06:20.467000
CVE-2024-48942,0,1,ea39c98e10a8fc84511a95f9d84a08387c5a9e2c30ccf449a088f0db604ed8ce,2024-10-11T19:10:20.137000
CVE-2024-48941,0,1,96d5eae18aed5942dcf07fb408430a3860f6be4f858a12cc1546cac40f719d2f,2024-10-11T21:36:46.327000
CVE-2024-48942,0,1,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5dff,2024-10-11T21:36:47.090000
CVE-2024-48949,0,0,7d55724ab06b8de7edf1f4b8a08def014420bedd09e2e171d24560c893af6404,2024-10-10T12:51:56.987000
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
CVE-2024-48957,0,0,c46c0ac873aa42c5c5fce51c2fd190551560e6471a3ec20c35231306af233d10,2024-10-11T16:12:54.243000
CVE-2024-48958,0,0,78f8ea913e01786dab7124f80bf77d2db49d32828cc7ec77a90c7a2a507ee4f0,2024-10-11T16:11:55.487000
CVE-2024-48957,0,1,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
CVE-2024-48958,0,1,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
CVE-2024-48987,0,0,1b465c51a79913665e7786ff50ee27be5e1d6dd26e7dd86eff14b0f4535bc2bf,2024-10-11T13:15:16.197000
CVE-2024-48987,0,1,64f424ee48af139e34e17a3e5ae2f9d63d1fe08eda899c76ffae57a1fbf10f3f,2024-10-11T21:36:49.470000
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000
CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000
@ -264999,7 +265020,7 @@ CVE-2024-8908,0,0,814a632e733410078b07e9411999ce68ca7ad8b9d3cd0621cbfe771be63227
CVE-2024-8909,0,0,164deeef11f6495a80d20f0aa7bd15b53f984d767860039b14665a9aa77c7c0d,2024-09-23T17:51:11.790000
CVE-2024-8910,0,0,381e6285f77cbfcd68b12e9f3c36f92b4377fd4642413a4087debb4746eed093,2024-10-03T17:34:27.913000
CVE-2024-8911,0,0,3e740b3cf92ecc1f17356bd7912ea5093c6c60b7cb91fb7bff5c155129d89dfe,2024-10-10T12:56:30.817000
CVE-2024-8912,1,1,cc754920a66c9505b940e8219b2e4d1d89e8006fc7a2b380aec11b363ea547b9,2024-10-11T19:15:11.110000
CVE-2024-8912,0,0,cc754920a66c9505b940e8219b2e4d1d89e8006fc7a2b380aec11b363ea547b9,2024-10-11T19:15:11.110000
CVE-2024-8913,0,0,a55fc5932b647838acfa904d967ecbcbbf1a8451e2d81f1f3b7968e9aadf354c,2024-10-11T13:15:17.040000
CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
@ -265307,7 +265328,7 @@ CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0
CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
CVE-2024-9538,0,0,09ff8d828136926273e234a7df0de9f7df3e277701497c2d4680e9ae80291314,2024-10-11T13:15:19.373000
CVE-2024-9539,1,1,8966fc6636af6152e0414eab130e86797be15626adebb04d75d77ec16901db50,2024-10-11T18:15:08.887000
CVE-2024-9539,0,0,8966fc6636af6152e0414eab130e86797be15626adebb04d75d77ec16901db50,2024-10-11T18:15:08.887000
CVE-2024-9543,0,0,0c6f45a8dc106427c9aa4a27ce0a99c89f29e67e9019a384d028eb17f2682b51,2024-10-11T13:15:19.577000
CVE-2024-9549,0,0,de2015c0f448716988568c7b5dd774c121a80649e44094dfa56d887e4c1906a6,2024-10-10T13:14:51.793000
CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000

Can't render this file because it is too large.