From 83665e568dfc26c34eec8f7057bdcf0761cdd065 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 16 Oct 2024 16:03:25 +0000 Subject: [PATCH] Auto-Update: 2024-10-16T16:00:25.536278+00:00 --- CVE-2017/CVE-2017-89xx/CVE-2017-8907.json | 36 ++- CVE-2017/CVE-2017-95xx/CVE-2017-9512.json | 24 +- CVE-2023/CVE-2023-226xx/CVE-2023-22650.json | 16 +- CVE-2023/CVE-2023-280xx/CVE-2023-28018.json | 68 ++++- CVE-2023/CVE-2023-321xx/CVE-2023-32189.json | 88 ++++++ CVE-2023/CVE-2023-507xx/CVE-2023-50780.json | 64 ++++- CVE-2023/CVE-2023-63xx/CVE-2023-6368.json | 12 +- CVE-2023/CVE-2023-65xx/CVE-2023-6595.json | 12 +- CVE-2024/CVE-2024-05xx/CVE-2024-0564.json | 16 +- CVE-2024/CVE-2024-06xx/CVE-2024-0646.json | 14 +- CVE-2024/CVE-2024-08xx/CVE-2024-0841.json | 14 +- CVE-2024/CVE-2024-11xx/CVE-2024-1102.json | 14 +- CVE-2024/CVE-2024-212xx/CVE-2024-21258.json | 18 +- CVE-2024/CVE-2024-212xx/CVE-2024-21259.json | 18 +- CVE-2024/CVE-2024-212xx/CVE-2024-21260.json | 18 +- CVE-2024/CVE-2024-212xx/CVE-2024-21262.json | 18 +- CVE-2024/CVE-2024-212xx/CVE-2024-21271.json | 18 +- CVE-2024/CVE-2024-212xx/CVE-2024-21272.json | 18 +- CVE-2024/CVE-2024-212xx/CVE-2024-21274.json | 18 +- CVE-2024/CVE-2024-220xx/CVE-2024-22029.json | 56 ++++ CVE-2024/CVE-2024-220xx/CVE-2024-22030.json | 60 ++++ CVE-2024/CVE-2024-220xx/CVE-2024-22032.json | 104 +++++++ CVE-2024/CVE-2024-220xx/CVE-2024-22033.json | 100 +++++++ CVE-2024/CVE-2024-220xx/CVE-2024-22034.json | 44 +++ CVE-2024/CVE-2024-220xx/CVE-2024-22074.json | 100 ++++++- CVE-2024/CVE-2024-35xx/CVE-2024-3508.json | 14 +- CVE-2024/CVE-2024-382xx/CVE-2024-38229.json | 101 ++++++- CVE-2024/CVE-2024-452xx/CVE-2024-45217.json | 31 ++- CVE-2024/CVE-2024-452xx/CVE-2024-45219.json | 16 +- CVE-2024/CVE-2024-458xx/CVE-2024-45844.json | 100 +++++++ CVE-2024/CVE-2024-462xx/CVE-2024-46237.json | 64 ++++- CVE-2024/CVE-2024-469xx/CVE-2024-46980.json | 77 ++++- CVE-2024/CVE-2024-469xx/CVE-2024-46988.json | 79 +++++- CVE-2024/CVE-2024-471xx/CVE-2024-47139.json | 100 +++++++ CVE-2024/CVE-2024-473xx/CVE-2024-47351.json | 56 ++++ CVE-2024/CVE-2024-476xx/CVE-2024-47637.json | 56 ++++ CVE-2024/CVE-2024-476xx/CVE-2024-47645.json | 56 ++++ CVE-2024/CVE-2024-476xx/CVE-2024-47649.json | 56 ++++ CVE-2024/CVE-2024-476xx/CVE-2024-47652.json | 61 +++- CVE-2024/CVE-2024-476xx/CVE-2024-47653.json | 61 +++- CVE-2024/CVE-2024-476xx/CVE-2024-47654.json | 61 +++- CVE-2024/CVE-2024-476xx/CVE-2024-47655.json | 49 +++- CVE-2024/CVE-2024-476xx/CVE-2024-47656.json | 49 +++- CVE-2024/CVE-2024-476xx/CVE-2024-47657.json | 49 +++- CVE-2024/CVE-2024-480xx/CVE-2024-48026.json | 56 ++++ CVE-2024/CVE-2024-480xx/CVE-2024-48027.json | 56 ++++ CVE-2024/CVE-2024-480xx/CVE-2024-48028.json | 56 ++++ CVE-2024/CVE-2024-480xx/CVE-2024-48029.json | 56 ++++ CVE-2024/CVE-2024-480xx/CVE-2024-48030.json | 56 ++++ CVE-2024/CVE-2024-480xx/CVE-2024-48034.json | 56 ++++ CVE-2024/CVE-2024-480xx/CVE-2024-48035.json | 56 ++++ CVE-2024/CVE-2024-482xx/CVE-2024-48251.json | 75 ++++- CVE-2024/CVE-2024-482xx/CVE-2024-48253.json | 66 ++++- CVE-2024/CVE-2024-482xx/CVE-2024-48255.json | 66 ++++- CVE-2024/CVE-2024-482xx/CVE-2024-48257.json | 67 ++++- CVE-2024/CVE-2024-487xx/CVE-2024-48744.json | 21 ++ CVE-2024/CVE-2024-492xx/CVE-2024-49216.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49218.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49226.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49227.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49242.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49245.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49251.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49252.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49253.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49254.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49258.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49260.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49266.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49267.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49268.json | 56 ++++ CVE-2024/CVE-2024-492xx/CVE-2024-49270.json | 56 ++++ CVE-2024/CVE-2024-75xx/CVE-2024-7591.json | 10 +- CVE-2024/CVE-2024-85xx/CVE-2024-8519.json | 69 ++++- CVE-2024/CVE-2024-92xx/CVE-2024-9204.json | 42 ++- CVE-2024/CVE-2024-92xx/CVE-2024-9237.json | 47 +++- CVE-2024/CVE-2024-93xx/CVE-2024-9348.json | 78 ++++++ CVE-2024/CVE-2024-96xx/CVE-2024-9680.json | 99 ++++++- CVE-2024/CVE-2024-97xx/CVE-2024-9784.json | 78 +++++- CVE-2024/CVE-2024-98xx/CVE-2024-9893.json | 64 +++++ CVE-2024/CVE-2024-99xx/CVE-2024-9908.json | 83 +++++- CVE-2024/CVE-2024-99xx/CVE-2024-9909.json | 95 ++++++- CVE-2024/CVE-2024-99xx/CVE-2024-9910.json | 93 ++++++- CVE-2024/CVE-2024-99xx/CVE-2024-9911.json | 83 +++++- CVE-2024/CVE-2024-99xx/CVE-2024-9912.json | 83 +++++- CVE-2024/CVE-2024-99xx/CVE-2024-9913.json | 83 +++++- CVE-2024/CVE-2024-99xx/CVE-2024-9914.json | 83 +++++- CVE-2024/CVE-2024-99xx/CVE-2024-9915.json | 83 +++++- CVE-2024/CVE-2024-99xx/CVE-2024-9952.json | 67 ++++- README.md | 102 +++---- _state.csv | 294 +++++++++++--------- 91 files changed, 4937 insertions(+), 386 deletions(-) create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32189.json create mode 100644 CVE-2024/CVE-2024-220xx/CVE-2024-22029.json create mode 100644 CVE-2024/CVE-2024-220xx/CVE-2024-22030.json create mode 100644 CVE-2024/CVE-2024-220xx/CVE-2024-22032.json create mode 100644 CVE-2024/CVE-2024-220xx/CVE-2024-22033.json create mode 100644 CVE-2024/CVE-2024-220xx/CVE-2024-22034.json create mode 100644 CVE-2024/CVE-2024-458xx/CVE-2024-45844.json create mode 100644 CVE-2024/CVE-2024-471xx/CVE-2024-47139.json create mode 100644 CVE-2024/CVE-2024-473xx/CVE-2024-47351.json create mode 100644 CVE-2024/CVE-2024-476xx/CVE-2024-47637.json create mode 100644 CVE-2024/CVE-2024-476xx/CVE-2024-47645.json create mode 100644 CVE-2024/CVE-2024-476xx/CVE-2024-47649.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48026.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48027.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48028.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48029.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48030.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48034.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48035.json create mode 100644 CVE-2024/CVE-2024-487xx/CVE-2024-48744.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49216.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49218.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49226.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49227.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49242.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49245.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49251.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49252.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49253.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49254.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49258.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49260.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49266.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49267.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49268.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49270.json create mode 100644 CVE-2024/CVE-2024-93xx/CVE-2024-9348.json create mode 100644 CVE-2024/CVE-2024-98xx/CVE-2024-9893.json diff --git a/CVE-2017/CVE-2017-89xx/CVE-2017-8907.json b/CVE-2017/CVE-2017-89xx/CVE-2017-8907.json index e3e1bdcadef..88145149402 100644 --- a/CVE-2017/CVE-2017-89xx/CVE-2017-8907.json +++ b/CVE-2017/CVE-2017-89xx/CVE-2017-8907.json @@ -2,8 +2,8 @@ "id": "CVE-2017-8907", "sourceIdentifier": "security@atlassian.com", "published": "2017-06-14T20:29:00.140", - "lastModified": "2019-10-03T00:03:26.223", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T14:35:00.630", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2017/CVE-2017-95xx/CVE-2017-9512.json b/CVE-2017/CVE-2017-95xx/CVE-2017-9512.json index 6cc469103f6..040003e88ac 100644 --- a/CVE-2017/CVE-2017-95xx/CVE-2017-9512.json +++ b/CVE-2017/CVE-2017-95xx/CVE-2017-9512.json @@ -2,7 +2,7 @@ "id": "CVE-2017-9512", "sourceIdentifier": "security@atlassian.com", "published": "2017-08-24T17:29:00.383", - "lastModified": "2020-11-25T14:15:12.997", + "lastModified": "2024-10-16T14:35:02.177", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22650.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22650.json index 3c2973f2b8c..86993590c65 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22650.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22650.json @@ -2,13 +2,17 @@ "id": "CVE-2023-22650", "sourceIdentifier": "meissner@suse.de", "published": "2024-10-16T09:15:02.957", - "lastModified": "2024-10-16T09:15:02.957", + "lastModified": "2024-10-16T15:35:02.523", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in which Rancher does not automatically clean up a user which has been deleted from the configured authentication provider (AP). This characteristic also applies to disabled or revoked users, Rancher will not reflect these modifications which may leave the user\u2019s tokens still usable." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en la que Rancher no limpia autom\u00e1ticamente a un usuario que ha sido eliminado del proveedor de autenticaci\u00f3n (AP) configurado. Esta caracter\u00edstica tambi\u00e9n se aplica a los usuarios deshabilitados o revocados; Rancher no reflejar\u00e1 estas modificaciones, lo que puede dejar los tokens del usuario a\u00fan utilizables." } ], "metrics": { @@ -89,6 +93,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json index 60aeb80072a..7ab703afcd3 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28018.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28018", "sourceIdentifier": "psirt@hcl.com", "published": "2024-02-12T23:15:08.100", - "lastModified": "2024-02-13T14:01:49.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:48:54.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@hcl.com", "type": "Secondary", @@ -39,10 +59,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:connections:6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D9D30E64-F094-4692-A882-CAAA3AFE8C1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:connections:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FD4BF4C3-3D45-41A8-886F-521E095CBBF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:connections:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D55E0F2F-7C8D-4334-8B8D-CCF88431F6DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0108430", - "source": "psirt@hcl.com" + "source": "psirt@hcl.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json new file mode 100644 index 00000000000..27d610bbff3 --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32189.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2023-32189", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T14:15:04.140", + "lastModified": "2024-10-16T14:15:04.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure handling of ssh keys used to bootstrap clients allows local attackers to potentially gain access to the keys" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32189", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50780.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50780.json index 54bdf8f34af..24002b26d83 100644 --- a/CVE-2023/CVE-2023-507xx/CVE-2023-50780.json +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50780.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50780", "sourceIdentifier": "security@apache.org", "published": "2024-10-14T16:15:03.477", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T14:01:55.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,8 +15,41 @@ "value": "Apache ActiveMQ Artemis permite el acceso a informaci\u00f3n de diagn\u00f3stico y controles a trav\u00e9s de MBeans, que tambi\u00e9n se exponen a trav\u00e9s del endpoint autenticado Jolokia. Antes de la versi\u00f3n 2.29.0, esto tambi\u00e9n inclu\u00eda el MBean Log4J2. Este MBean no est\u00e1 pensado para exponerlo a usuarios no administrativos. Esto podr\u00eda eventualmente permitir que un atacante autenticado escriba archivos arbitrarios en el sistema de archivos y logre RCE indirectamente. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.29.0 o posterior, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@apache.org", "type": "Secondary", @@ -28,10 +61,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:activemq_artemis:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.29.0", + "matchCriteriaId": "943A1F43-43F2-4993-9D7F-2117C5499AA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.apache.org/thread/63b78shqz312phsx7v1ryr7jv7bprg58", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking", + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6368.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6368.json index bd7e11ba855..9100a2c968c 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6368.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6368.json @@ -2,13 +2,13 @@ "id": "CVE-2023-6368", "sourceIdentifier": "security@progress.com", "published": "2023-12-14T16:15:54.103", - "lastModified": "2023-12-19T17:48:19.703", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T15:15:13.703", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nIn WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate information related to a registered device being monitored by WhatsUp Gold.\n\n" + "value": "In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate information related to a registered device being monitored by WhatsUp Gold." }, { "lang": "es", @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@progress.com", "type": "Primary", "description": [ { @@ -71,12 +71,12 @@ ] }, { - "source": "security@progress.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-306" } ] } diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6595.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6595.json index eefbbe4bc0e..240c60404b4 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6595.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6595.json @@ -2,13 +2,13 @@ "id": "CVE-2023-6595", "sourceIdentifier": "security@progress.com", "published": "2023-12-14T16:15:54.453", - "lastModified": "2023-12-19T17:51:54.827", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T15:15:13.917", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nIn WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold.\n\n" + "value": "In WhatsUp Gold versions released before 2023.1, an API endpoint was found to be missing an authentication mechanism. It is possible for an unauthenticated attacker to enumerate ancillary credential information stored within WhatsUp Gold." }, { "lang": "es", @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@progress.com", "type": "Primary", "description": [ { @@ -71,12 +71,12 @@ ] }, { - "source": "security@progress.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-306" } ] } diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0564.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0564.json index 640e9b9b251..f823aa4c694 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0564.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0564", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-30T15:15:08.687", - "lastModified": "2024-02-08T16:36:48.837", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T15:15:14.110", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -61,8 +61,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-99" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json index 1bcb17c3e7c..e9f291f3204 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0646.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0646", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-17T16:15:47.190", - "lastModified": "2024-09-14T00:15:16.080", + "lastModified": "2024-10-16T15:15:14.333", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -61,8 +61,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1314" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json b/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json index 8d9f3c5e1ec..e68830e0f39 100644 --- a/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json +++ b/CVE-2024/CVE-2024-08xx/CVE-2024-0841.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0841", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-28T12:15:52.737", - "lastModified": "2024-09-14T00:15:16.693", + "lastModified": "2024-10-16T15:15:14.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "secalert@redhat.com", "type": "Primary", "description": [ { @@ -69,6 +69,16 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json index 67ad6365106..ce6908ec679 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1102.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1102", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-25T17:15:47.457", - "lastModified": "2024-07-03T01:44:59.757", + "lastModified": "2024-10-16T15:15:15.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -40,9 +40,19 @@ ] }, "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-523" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json index 0fdd7c32281..60d440d3ce4 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21258", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.410", - "lastModified": "2024-10-15T20:15:16.410", + "lastModified": "2024-10-16T15:35:06.670", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: User Interface). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Installed Base accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Installed Base de Oracle E-Business Suite (componente: Interfaz de usuario). Las versiones compatibles afectadas son 12.2.3-12.2.14. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle Installed Base. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso de lectura no autorizado a un subconjunto de datos accesibles de Oracle Installed Base. Puntuaci\u00f3n base de CVSS 3.1: 5,3 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json index 31fe3f207ac..d81339cff25 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21259.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21259", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.590", - "lastModified": "2024-10-15T20:15:16.590", + "lastModified": "2024-10-16T15:35:07.490", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.22 and prior to 7.1.2. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle VM VirtualBox de Oracle Virtualization (componente: Core). Las versiones compatibles afectadas son anteriores a la 7.0.22 y a la 7.1.2. Esta vulnerabilidad, que es dif\u00edcil de explotar, permite que un atacante con privilegios elevados que inicie sesi\u00f3n en la infraestructura donde se ejecuta Oracle VM VirtualBox comprometa Oracle VM VirtualBox. Si bien la vulnerabilidad se encuentra en Oracle VM VirtualBox, los ataques pueden afectar significativamente a otros productos (cambio de alcance). Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la toma de control de Oracle VM VirtualBox. Puntuaci\u00f3n base CVSS 3.1: 7,5 (impactos en la confidencialidad, la integridad y la disponibilidad). Vector CVSS: (CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21260.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21260.json index fd914103d82..c049329b138 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21260.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21260.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21260", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.777", - "lastModified": "2024-10-15T20:15:16.777", + "lastModified": "2024-10-16T15:35:08.260", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Core). Las versiones compatibles afectadas son 12.2.1.4.0 y 14.1.1.0.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de T3, IIOP ponga en peligro Oracle WebLogic Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetitivo (DOS completo) de Oracle WebLogic Server. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json index 2156b2322ca..cf95302bdd0 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21262.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21262", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:17.157", - "lastModified": "2024-10-15T20:15:17.157", + "lastModified": "2024-10-16T15:35:09.063", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/ODBC). Supported versions that are affected are 9.0.0 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Connectors. CVSS 3.1 Base Score 6.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto MySQL Connectors de Oracle MySQL (componente: Connector/ODBC). Las versiones compatibles afectadas son 9.0.0 y anteriores. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de m\u00faltiples protocolos ponga en peligro MySQL Connectors. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado actualizaciones, inserciones o eliminaciones no autorizadas de algunos datos accesibles de MySQL Connectors y la capacidad no autorizada de provocar una denegaci\u00f3n de servicio parcial (DOS parcial) de MySQL Connectors. Puntuaci\u00f3n base de CVSS 3.1: 6,5 (impactos en la integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L)." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json index c1e50021309..62a0bc02384 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21271.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21271", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.787", - "lastModified": "2024-10-15T20:15:18.787", + "lastModified": "2024-10-16T15:35:09.847", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle Field Service product of Oracle E-Business Suite (component: Field Service Engineer Portal). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Field Service. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Field Service accessible data as well as unauthorized access to critical data or complete access to all Oracle Field Service accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle Field Service de Oracle E-Business Suite (componente: Field Service Engineer Portal). Las versiones compatibles afectadas son 12.2.3-12.2.13. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP comprometa Oracle Field Service. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la creaci\u00f3n, eliminaci\u00f3n o modificaci\u00f3n no autorizada de datos cr\u00edticos o de todos los datos accesibles de Oracle Field Service, as\u00ed como el acceso no autorizado a datos cr\u00edticos o al acceso completo a todos los datos accesibles de Oracle Field Service. Puntuaci\u00f3n base CVSS 3.1: 8,1 (impactos en la confidencialidad y la integridad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N)." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json index 716b97a40e5..22af147c8fa 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21272.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21272", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:18.963", - "lastModified": "2024-10-15T20:15:18.963", + "lastModified": "2024-10-16T15:35:10.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/Python). Supported versions that are affected are 9.0.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vulnerability can result in takeover of MySQL Connectors. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto MySQL Connectors de Oracle MySQL (componente: Connector/Python). Las versiones compatibles afectadas son 9.0.0 y anteriores. Esta vulnerabilidad, que es dif\u00edcil de explotar, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de m\u00faltiples protocolos ponga en peligro MySQL Connectors. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la toma de control de MySQL Connectors. Puntuaci\u00f3n base CVSS 3.1: 7,5 (impactos en la confidencialidad, integridad y disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H)." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21274.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21274.json index 5bd553fedcf..0a5bb149054 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21274.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21274.json @@ -2,13 +2,17 @@ "id": "CVE-2024-21274", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:19.337", - "lastModified": "2024-10-15T20:15:19.337", + "lastModified": "2024-10-16T15:35:11.457", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle WebLogic Server. CVSS 3.1 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto Oracle WebLogic Server de Oracle Fusion Middleware (componente: Console). Las versiones compatibles afectadas son 12.2.1.4.0 y 14.1.1.0.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro Oracle WebLogic Server. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo frecuente y repetitivo (DOS completo) de Oracle WebLogic Server. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json new file mode 100644 index 00000000000..2a214d74e5d --- /dev/null +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-22029", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T14:15:04.500", + "lastModified": "2024-10-16T14:15:04.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure permissions in the packaging of tomcat allow local users that win a race during package installation to escalate to root" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22029", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22030.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22030.json new file mode 100644 index 00000000000..ae7e6c76e8a --- /dev/null +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22030.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-22030", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T14:15:04.753", + "lastModified": "2024-10-16T14:15:04.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified within Rancher that can be exploited\n in narrow circumstances through a man-in-the-middle (MITM) attack. An \nattacker would need to have control of an expired domain or execute a \nDNS spoofing/hijacking attack against the domain to exploit this \nvulnerability. The targeted domain is the one used as the Rancher URL." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22030", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/rancher/rancher/security/advisories/GHSA-h4h5-9833-v2p4", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22032.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22032.json new file mode 100644 index 00000000000..149b8f32a95 --- /dev/null +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22032.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2024-22032", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T14:15:05.000", + "lastModified": "2024-10-16T14:15:05.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in which an RKE1 cluster keeps \nconstantly reconciling when secrets encryption configuration is enabled.\n When reconciling, the Kube API secret values are written in plaintext \non the AppliedSpec. Cluster owners, Cluster members, and Project members\n (for projects within the cluster), all have RBAC permissions to view \nthe cluster object from the apiserver." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22032", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/rancher/rancher/security/advisories/GHSA-q6c7-56cq-g2wm", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22033.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22033.json new file mode 100644 index 00000000000..d66bb9eaefa --- /dev/null +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22033.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-22033", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T14:15:05.280", + "lastModified": "2024-10-16T14:15:05.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The OBS service obs-service-download_url was vulnerable to a command injection vulnerability. The attacker could provide a configuration to the service that allowed to execute command in later steps" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22033", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22034.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22034.json new file mode 100644 index 00000000000..547d2ce3ee3 --- /dev/null +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22034.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-22034", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T14:15:05.577", + "lastModified": "2024-10-16T14:15:05.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Attackers could put the special files in .osc into the actual package sources (e.g. _apiurl). This allows the attacker to change the configuration of osc for the victim" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2024-22034", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json index cc66c717f73..fe65dc03b89 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22074.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22074", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T21:15:48.180", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:39:58.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,103 @@ "value": "Dynamsoft Service 1.8.1025 a 1.8.2013, 1.7.0330 a 1.7.2531, 1.6.0428 a 1.6.1112, 1.5.0625 a 1.5.3116, 1.4.0618 a 1.4.1230 y 1.0.516 a 1.3.0115 tiene control de acceso incorrecto. Esto se solucion\u00f3 en 1.8.2014, 1.7.4212, 1.6.3212, 1.5.31212, 1.4.3212 y 1.3.3212." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dynamsoft:dynamsoft_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.516", + "versionEndExcluding": "1.3.3212", + "matchCriteriaId": "CEF6500D-E54C-4649-BA21-639CDC56AA4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dynamsoft:dynamsoft_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.1230", + "versionEndExcluding": "1.4.3212", + "matchCriteriaId": "26B0C115-CF41-4DA3-9AD1-1766C1AB361E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dynamsoft:dynamsoft_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.5.0625", + "versionEndExcluding": "1.5.31212", + "matchCriteriaId": "6F6E9392-D683-4908-B737-C5BC17709BB8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dynamsoft:dynamsoft_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.6.0428", + "versionEndExcluding": "1.6.3212", + "matchCriteriaId": "D8BFCB02-14DB-4E6E-8397-B7CDA1E7D074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dynamsoft:dynamsoft_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.7.0330", + "versionEndExcluding": "1.7.4212", + "matchCriteriaId": "1595FD37-FC51-41E2-8F4C-4FD08055BFF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dynamsoft:dynamsoft_service:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.8.1025", + "versionEndExcluding": "1.8.2014", + "matchCriteriaId": "99BFC038-39B1-4C7D-9C4B-3121F9D5631C" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dynamsoft.com/support/security-bulletin-dwt-2024-22074/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json index b32427bacca..2fce1fe7bd4 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3508.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3508", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-25T18:15:09.567", - "lastModified": "2024-07-03T02:06:18.367", + "lastModified": "2024-10-16T15:15:15.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -40,9 +40,19 @@ ] }, "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json index 5faa87371ef..2578d953826 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38229.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38229", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:08.153", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:36:38.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.20", + "matchCriteriaId": "18D2A92E-FB5F-4892-A7EF-0DBD26281248" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.15", + "matchCriteriaId": "34609790-24EF-448C-8AED-9BF831D73629" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10.0", + "versionEndExcluding": "17.10.8", + "matchCriteriaId": "480AA116-1C38-4778-A84D-321278AEC747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.11.0", + "versionEndExcluding": "17.11.5", + "matchCriteriaId": "AD8D6C06-D7AB-4E82-AAD6-4240603B6AC6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0", + "versionEndExcluding": "8.0.10", + "matchCriteriaId": "D977AC32-7583-44F0-B48D-ACB001DA164A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38229", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45217.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45217.json index 8444dc5f637..184332ffad6 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45217.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45217.json @@ -2,16 +2,43 @@ "id": "CVE-2024-45217", "sourceIdentifier": "security@apache.org", "published": "2024-10-16T08:15:05.353", - "lastModified": "2024-10-16T08:15:05.353", + "lastModified": "2024-10-16T15:35:13.167", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insecure Default Initialization of Resource vulnerability in Apache Solr.\n\nNew ConfigSets that are created via a Restore command, which copy a configSet from the backup and give it a new name, are created without setting the \"trusted\" metadata.\nConfigSets that do not contain the flag are trusted implicitly if the metadata is missing, therefore this leads to \"trusted\" ConfigSets that may not have been created with an Authenticated request.\n\"trusted\" ConfigSets are able to load custom code into classloaders, therefore the flag is supposed to only be set when the request that uploads the ConfigSet is Authenticated & Authorized.\n\nThis issue affects Apache Solr: from 6.6.0 before 8.11.4, from 9.0.0 before 9.7.0. This issue does not affect Solr instances that are secured via Authentication/Authorization.\n\nUsers are primarily recommended to use Authentication and Authorization when running Solr. However, upgrading to version 9.7.0, or 8.11.4 will mitigate this issue otherwise." + }, + { + "lang": "es", + "value": "Vulnerabilidad de inicializaci\u00f3n predeterminada insegura de recursos en Apache Solr. Los nuevos ConfigSets que se crean mediante un comando de restauraci\u00f3n, que copian un configSet de la copia de seguridad y le dan un nuevo nombre, se crean sin configurar los metadatos \"confiables\". Los ConfigSets que no contienen el indicador se conf\u00edan impl\u00edcitamente si faltan los metadatos, por lo tanto, esto genera ConfigSets \"confiables\" que pueden no haberse creado con una solicitud autenticada. Los ConfigSets \"confiables\" pueden cargar c\u00f3digo personalizado en los cargadores de clases, por lo tanto, se supone que el indicador solo se establece cuando la solicitud que carga el ConfigSet est\u00e1 autenticada y autorizada. Este problema afecta a Apache Solr: desde 6.6.0 hasta 8.11.4, desde 9.0.0 hasta 9.7.0. Este problema no afecta a las instancias de Solr que est\u00e1n protegidas mediante autenticaci\u00f3n/autorizaci\u00f3n. Se recomienda principalmente a los usuarios que utilicen autenticaci\u00f3n y autorizaci\u00f3n al ejecutar Solr. Sin embargo, actualizar a la versi\u00f3n 9.7.0 o 8.11.4 mitigar\u00e1 este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45219.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45219.json index 1e6d5c1958c..5da3d68854f 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45219.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45219.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45219", "sourceIdentifier": "security@apache.org", "published": "2024-10-16T08:15:05.473", - "lastModified": "2024-10-16T08:15:05.473", + "lastModified": "2024-10-16T15:35:13.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1, an attacker that can upload or register templates and volumes, can use them to deploy malicious instances or attach uploaded volumes to their existing instances on KVM-based environments and exploit this to gain access to the host filesystems that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of KVM-based infrastructure managed by CloudStack.\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue. \n\nAdditionally, all user-uploaded or registered KVM-compatible templates and volumes can be scanned and checked that they are flat files that should not be using any additional or unnecessary features. For example, operators can run this on their secondary storage(s) and inspect output. An empty output for the disk being validated means it has no references to the host filesystems; on the other hand, if the output for the disk being validated is not empty, it might indicate a compromised disk.\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info. If the output is not empty, that might indicate a compromised disk; check it carefully.\"; qemu-img info -U $file | grep file: ; printf \"\\n\\n\"; done\nThe command can also be run for the file-based primary storages; however, bear in mind that (i) volumes created from templates will have references for the templates at first and (ii) volumes can be consolidated while migrating, losing their references to the templates. Therefore, the command execution for the primary storages can show both false positives and false negatives.\n\nFor checking the whole template/volume features of each disk, operators can run the following command:\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info.\"; qemu-img info -U $file; printf \"\\n\\n\"; done" + }, + { + "lang": "es", + "value": "De manera predeterminada, los usuarios de cuentas en Apache CloudStack pueden cargar y registrar plantillas para implementar instancias y vol\u00famenes para adjuntarlos como discos de datos a sus instancias existentes. Debido a que faltan comprobaciones de validaci\u00f3n para plantillas o vol\u00famenes compatibles con KVM en CloudStack 4.0.0 a 4.18.2.3 y 4.19.0.0 a 4.19.1.1, un atacante que pueda cargar o registrar plantillas y vol\u00famenes puede usarlos para implementar instancias maliciosas o adjuntar vol\u00famenes cargados a sus instancias existentes en entornos basados en KVM y aprovechar esto para obtener acceso a los sistemas de archivos del host, lo que podr\u00eda provocar la vulneraci\u00f3n de la integridad y confidencialidad de los recursos, la p\u00e9rdida de datos, la denegaci\u00f3n de servicio y la disponibilidad de la infraestructura basada en KVM administrada por CloudStack. Se recomienda a los usuarios que actualicen a Apache CloudStack 4.18.2.4 o 4.19.1.2, o una versi\u00f3n posterior, que soluciona este problema. Adem\u00e1s, todas las plantillas y vol\u00famenes compatibles con KVM cargados o registrados por el usuario se pueden escanear y verificar que sean archivos planos que no deber\u00edan usar ninguna caracter\u00edstica adicional o innecesaria. Por ejemplo, los operadores pueden ejecutar esto en sus almacenamientos secundarios e inspeccionar la salida. Una salida vac\u00eda para el disco que se est\u00e1 validando significa que no tiene referencias a los sistemas de archivos del host; por otro lado, si la salida para el disco que se est\u00e1 validando no est\u00e1 vac\u00eda, podr\u00eda indicar un disco comprometido. for file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Recuperando informaci\u00f3n del archivo [$file]. Si la salida no est\u00e1 vac\u00eda, eso podr\u00eda indicar un disco comprometido; verif\u00edquelo cuidadosamente.\"; qemu-img info -U $file | grep file: ; printf \"\\n\\n\"; done El comando tambi\u00e9n se puede ejecutar para los almacenamientos primarios basados en archivos; Sin embargo, tenga en cuenta que (i) los vol\u00famenes creados a partir de plantillas tendr\u00e1n referencias a las plantillas al principio y (ii) los vol\u00famenes se pueden consolidar durante la migraci\u00f3n, perdiendo sus referencias a las plantillas. Por lo tanto, la ejecuci\u00f3n del comando para los almacenamientos primarios puede mostrar tanto falsos positivos como falsos negativos. Para verificar todas las caracter\u00edsticas de plantilla/volumen de cada disco, los operadores pueden ejecutar el siguiente comando: for file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Recuperando informaci\u00f3n del archivo [$file].\"; qemu-img info -U $file; printf \"\\n\\n\"; done" } ], "metrics": { @@ -45,6 +49,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45844.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45844.json new file mode 100644 index 00000000000..1892cb4c09f --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45844.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-45844", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-10-16T15:15:16.183", + "lastModified": "2024-10-16T15:15:16.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BIG-IP monitor functionality may allow an attacker to bypass access control restrictions, regardless of the port lockdown settings.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000140061", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json index aca54ec26b1..e112ceecef0 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46237.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46237", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T14:15:07.393", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:38:21.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "PHPGurukul Hospital Management System 4.0 es vulnerable a Cross Site Scripting (XSS) a trav\u00e9s de los par\u00e1metros patname, pataddress y medhis en doctor/add-patient.php y doctor/edit-patient.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/npemma2/PHP_Gurukul_Hospital_Management_System_XSS", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46980.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46980.json index 26abf82aafc..96a5a39f1af 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46980.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46980", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-14T18:15:03.947", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T14:05:27.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,22 +71,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "15.12-6", + "matchCriteriaId": "28A2E98A-A185-4019-B306-C439838FA151" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", + "versionEndExcluding": "15.13.99.37", + "matchCriteriaId": "25160A21-0C61-41A4-95C4-6632A50260A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.13-0", + "versionEndExcluding": "15.13-3", + "matchCriteriaId": "F685DF7C-1CA2-449B-84D5-7E8583E9958F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Enalean/tuleap/commit/dd94a799982cd78ab06142008d745edf9e8fd494", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-9fc9-47h6-82jj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=dd94a799982cd78ab06142008d745edf9e8fd494", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://tuleap.net/plugins/tracker/?aid=39689", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46988.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46988.json index 36ba9cd0b25..9782951bbec 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46988.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46988.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46988", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-14T18:15:04.173", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T14:07:32.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionEndExcluding": "15.12-6", + "matchCriteriaId": "28A2E98A-A185-4019-B306-C439838FA151" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", + "versionEndExcluding": "15.13.99.40", + "matchCriteriaId": "0F733ED0-CBE0-45C8-BA33-32B5803351CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "15.13-0", + "versionEndExcluding": "15.13-3", + "matchCriteriaId": "F685DF7C-1CA2-449B-84D5-7E8583E9958F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-g76g-hc92-96xw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://tuleap.net/plugins/tracker/?aid=39686", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47139.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47139.json new file mode 100644 index 00000000000..564b3d3f128 --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47139.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-47139", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2024-10-16T15:15:16.490", + "lastModified": "2024-10-16T15:15:16.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IQ Configuration utility that allows an attacker with the Administrator role to run JavaScript in the context of the currently logged-in user.\n\n\u00a0\n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000141080", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47351.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47351.json new file mode 100644 index 00000000000..65a4ff482b9 --- /dev/null +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47351.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47351", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:05.890", + "lastModified": "2024-10-16T14:15:05.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The CSSIgniter Team MaxSlider allows Path Traversal.This issue affects MaxSlider: from n/a through 1.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/maxslider/wordpress-maxslider-plugin-1-2-3-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json new file mode 100644 index 00000000000..951b481ad49 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47637.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47637", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:06.147", + "lastModified": "2024-10-16T14:15:06.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ": Relative Path Traversal vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Path Traversal.This issue affects LiteSpeed Cache: from n/a through 6.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-4-1-path-traversal-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47645.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47645.json new file mode 100644 index 00000000000..0f3de920868 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47645.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47645", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:06.407", + "lastModified": "2024-10-16T14:15:06.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Sajid Javed Top Bar \u2013 PopUps \u2013 by WPOptin allows PHP Local File Inclusion.This issue affects Top Bar \u2013 PopUps \u2013 by WPOptin: from n/a through 2.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wpoptin/wordpress-wpoptin-plugin-2-0-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47649.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47649.json new file mode 100644 index 00000000000..44b72610e89 --- /dev/null +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47649.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47649", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:06.667", + "lastModified": "2024-10-16T14:15:06.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in THATplugin Iconize.This issue affects Iconize: from n/a through 1.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/iconize/wordpress-iconize-plugin-1-2-4-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json index c54dc4fc638..dc1c80f955d 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47652.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47652", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.417", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T14:12:06.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } ] }, "weaknesses": [ { - "source": "vdisclose@cert-in.org.in", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shilpisoft:client_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.7.0", + "matchCriteriaId": "BC172203-D79B-43A2-A195-9C370BDEA79F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json index 766c8cb0a24..f1c56c48e8e 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47653.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47653", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.563", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:13:52.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ { - "source": "vdisclose@cert-in.org.in", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shilpisoft:client_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.7.0", + "matchCriteriaId": "BC172203-D79B-43A2-A195-9C370BDEA79F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json index 9f3ed3803eb..d879474a67c 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47654", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.680", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:17:33.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ { - "source": "vdisclose@cert-in.org.in", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shilpisoft:client_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.7.0", + "matchCriteriaId": "BC172203-D79B-43A2-A195-9C370BDEA79F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json index 44f8ca44c93..6be9b6f2437 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47655.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47655", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.797", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:26:15.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shilpisoft:client_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.7.0", + "matchCriteriaId": "BC172203-D79B-43A2-A195-9C370BDEA79F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json index b441c99e109..911fa77cbd1 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47656", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:11.910", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:32:01.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shilpisoft:client_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.7.0", + "matchCriteriaId": "BC172203-D79B-43A2-A195-9C370BDEA79F" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json index 37110d846b3..0fd0e99cfad 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47657.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47657", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T13:15:12.023", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:44:16.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,10 +95,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shilpisoft:net_back_office:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.5.002", + "matchCriteriaId": "085DF545-DC1D-4F26-8C86-B78B1E99F919" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48026.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48026.json new file mode 100644 index 00000000000..50df008bbed --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48026.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48026", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:06.933", + "lastModified": "2024-10-16T14:15:06.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Grayson Robbins Disc Golf Manager allows Object Injection.This issue affects Disc Golf Manager: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/disc-golf-manager/wordpress-disc-golf-manager-plugin-1-0-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48027.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48027.json new file mode 100644 index 00000000000..a86dee4b2f5 --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48027.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48027", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:07.183", + "lastModified": "2024-10-16T14:15:07.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in xaraartech External featured image from bing allows Upload a Web Shell to a Web Server.This issue affects External featured image from bing: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/external-featured-image-from-bing/wordpress-external-featured-image-from-bing-plugin-1-0-2-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48028.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48028.json new file mode 100644 index 00000000000..153af2ea99e --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48028.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48028", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:07.450", + "lastModified": "2024-10-16T14:15:07.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Boyan Raichev IP Loc8 allows Object Injection.This issue affects IP Loc8: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ip-loc8/wordpress-ip-loc8-plugin-1-1-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48029.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48029.json new file mode 100644 index 00000000000..00b4875fefe --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48029.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48029", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:07.693", + "lastModified": "2024-10-16T14:15:07.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ": Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Hung Trang Si SB Random Posts Widget allows PHP Local File Inclusion.This issue affects SB Random Posts Widget: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/sb-random-posts-widget/wordpress-sb-random-posts-widget-plugin-1-0-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48030.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48030.json new file mode 100644 index 00000000000..5c13c89589c --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48030.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48030", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:07.947", + "lastModified": "2024-10-16T14:15:07.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Gabriele Valenti Telecash Ricaricaweb allows Object Injection.This issue affects Telecash Ricaricaweb: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/telecash-ricaricaweb/wordpress-telecash-ricaricaweb-plugin-2-2-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48034.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48034.json new file mode 100644 index 00000000000..008e818c379 --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48034.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48034", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:08.200", + "lastModified": "2024-10-16T14:15:08.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Fliperrr Team Creates 3D Flipbook, PDF Flipbook allows Upload a Web Shell to a Web Server.This issue affects Creates 3D Flipbook, PDF Flipbook: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/create-flipbook-from-pdf/wordpress-creates-3d-flipbook-pdf-flipbook-plugin-1-2-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48035.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48035.json new file mode 100644 index 00000000000..40fd4b8f10d --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48035.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48035", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:08.463", + "lastModified": "2024-10-16T14:15:08.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Takayuki Imanishi ACF Images Search And Insert allows Upload a Web Shell to a Web Server.This issue affects ACF Images Search And Insert: from n/a through 1.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/acf-images-search-and-insert/wordpress-acf-images-search-and-insert-plugin-1-1-4-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48251.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48251.json index 20c6392371c..7bedc4f8c64 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48251.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48251.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48251", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T15:15:13.857", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T14:25:49.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,82 @@ "value": "Wavelog 1.8.5 permite la inyecci\u00f3n SQL get_band_confirmed de Activated_gridmap_model.php mediante banda, sat\u00e9lite, propagaci\u00f3n o modo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wavelog:wavelog:1.8.5:*:*:*:*:*:*:*", + "matchCriteriaId": "9C22D420-4A10-4066-AED2-1E5C24192902" + } + ] + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] }, { "url": "https://github.com/wavelog/wavelog/commit/0bf2675d93602b591850790c8fcfced886eca423", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://www.wavelog.org", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json index 0ca017ce602..9fb4e8f3b71 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48253", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T14:15:11.857", - "lastModified": "2024-10-15T19:35:37.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T14:27:17.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magicbug:cloudlog:2.6.15:*:*:*:*:*:*:*", + "matchCriteriaId": "D4E30153-EF1D-44A1-87F3-803F895BC6BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/magicbug/Cloudlog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.magicbug.co.uk/cloudlog/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json index 8a8b3e1b100..671d4f06fc4 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48255", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T14:15:11.937", - "lastModified": "2024-10-16T13:35:03.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T14:26:23.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magicbug:cloudlog:2.6.15:*:*:*:*:*:*:*", + "matchCriteriaId": "D4E30153-EF1D-44A1-87F3-803F895BC6BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/magicbug/Cloudlog", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.magicbug.co.uk/cloudlog/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json index 477d0339825..49a9e5cc678 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48257", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T15:15:13.947", - "lastModified": "2024-10-15T20:35:12.940", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T14:24:43.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wavelog:wavelog:1.8.5:*:*:*:*:*:*:*", + "matchCriteriaId": "9C22D420-4A10-4066-AED2-1E5C24192902" + } + ] + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/wavelog/wavelog/commit/0bf2675d93602b591850790c8fcfced886eca423", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Patch" + ] }, { "url": "https://www.wavelog.org", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48744.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48744.json new file mode 100644 index 00000000000..35df99f3bd9 --- /dev/null +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48744.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48744", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-16T15:15:16.850", + "lastModified": "2024-10-16T15:15:16.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /trms/listed- teachers.php in PHPGurukul Teachers Record Management System v2.1, which allows remote attackers to execute arbitrary code via \"searchinput\" POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Teachers%20Record/Reflected%20XSS.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49216.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49216.json new file mode 100644 index 00000000000..173190a17e1 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49216.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49216", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:08.707", + "lastModified": "2024-10-16T14:15:08.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Joshua Clayton Feed Comments Number allows Upload a Web Shell to a Web Server.This issue affects Feed Comments Number: from n/a through 0.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/feed-comments-number/wordpress-feed-comments-number-plugin-0-2-1-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49218.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49218.json new file mode 100644 index 00000000000..5debfe91420 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49218.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49218", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:08.967", + "lastModified": "2024-10-16T14:15:08.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Al Imran Akash Recently allows Object Injection.This issue affects Recently: from n/a through 1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/recently-viewed-most-viewed-and-sold-products-for-woocommerce/wordpress-recently-plugin-1-1-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49226.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49226.json new file mode 100644 index 00000000000..3590b11e545 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49226.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49226", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:09.280", + "lastModified": "2024-10-16T14:15:09.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in TAKETIN TAKETIN To WP Membership allows Object Injection.This issue affects TAKETIN To WP Membership: from n/a through 2.8.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/taketin-to-wp-membership/wordpress-taketin-to-wp-membership-plugin-2-8-0-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49227.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49227.json new file mode 100644 index 00000000000..001fed7a908 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49227.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49227", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:09.530", + "lastModified": "2024-10-16T14:15:09.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Deserialization of Untrusted Data vulnerability in Innovaweb Sp. Z o.O. Free Stock Photos Foter allows Object Injection.This issue affects Free Stock Photos Foter: from n/a through 1.5.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/free-stock-photos-foter/wordpress-free-stock-photos-foter-plugin-1-5-4-php-object-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49242.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49242.json new file mode 100644 index 00000000000..f5514cda12c --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49242.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49242", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:09.777", + "lastModified": "2024-10-16T14:15:09.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Shafiq Digital Lottery allows Upload a Web Shell to a Web Server.This issue affects Digital Lottery: from n/a through 3.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/digital-lottery/wordpress-digital-lottery-plugin-3-0-5-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49245.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49245.json new file mode 100644 index 00000000000..52b79b49cc2 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49245.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49245", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:10.057", + "lastModified": "2024-10-16T14:15:10.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ahime Ahime Image Printer.This issue affects Ahime Image Printer: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ahime-image-printer/wordpress-ahime-image-printer-plugin-1-0-0-arbitrary-file-download-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49251.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49251.json new file mode 100644 index 00000000000..6fb70475a14 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49251.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49251", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:10.310", + "lastModified": "2024-10-16T14:15:10.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ": Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Maantheme Maan Addons For Elementor allows Local Code Inclusion.This issue affects Maan Addons For Elementor: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/maan-elementor-addons/wordpress-maan-addons-for-elementor-plugin-1-0-1-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49252.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49252.json new file mode 100644 index 00000000000..05468b779e5 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49252.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49252", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:10.557", + "lastModified": "2024-10-16T14:15:10.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ": Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Teplitsa of social technologies Leyka.This issue affects Leyka: from n/a through 3.31.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/leyka/wordpress-leyka-plugin-3-31-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49253.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49253.json new file mode 100644 index 00000000000..a189d78f8f7 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49253.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49253", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:10.793", + "lastModified": "2024-10-16T14:15:10.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Relative Path Traversal vulnerability in James Park Analyse Uploads allows Relative Path Traversal.This issue affects Analyse Uploads: from n/a through 0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/analyse-uploads/wordpress-analyse-uploads-plugin-0-5-arbitrary-file-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49254.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49254.json new file mode 100644 index 00000000000..bbf40ca0e3f --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49254.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49254", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:11.040", + "lastModified": "2024-10-16T14:15:11.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in Sunjianle allows Code Injection.This issue affects ajax-extend: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/ajax-extend/wordpress-ajax-extend-plugin-1-0-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49258.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49258.json new file mode 100644 index 00000000000..3027b89146f --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49258.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49258", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:11.280", + "lastModified": "2024-10-16T14:15:11.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path Traversal: '.../...//' vulnerability in Limb WordPress Gallery Plugin \u2013 Limb Image Gallery.This issue affects WordPress Gallery Plugin \u2013 Limb Image Gallery: from n/a through 1.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/limb-gallery/wordpress-limb-gallery-plugin-1-5-7-arbitrary-file-download-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49260.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49260.json new file mode 100644 index 00000000000..e4a59824557 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49260.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49260", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:11.513", + "lastModified": "2024-10-16T14:15:11.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Limb WordPress Gallery Plugin \u2013 Limb Image Gallery allows Code Injection.This issue affects WordPress Gallery Plugin \u2013 Limb Image Gallery: from n/a through 1.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/limb-gallery/wordpress-limb-gallery-plugin-1-5-7-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49266.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49266.json new file mode 100644 index 00000000000..55e524fbced --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49266.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49266", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T15:15:17.033", + "lastModified": "2024-10-16T15:15:17.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Thimo Grauerholz WP-Spreadplugin allows Stored XSS.This issue affects WP-Spreadplugin: from n/a through 4.8.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-spreadplugin/wordpress-wp-spreadplugin-plugin-4-8-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49267.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49267.json new file mode 100644 index 00000000000..29eb2f997a1 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49267.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49267", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T15:15:17.303", + "lastModified": "2024-10-16T15:15:17.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in nayon46 Unlimited Addon For Elementor allows Stored XSS.This issue affects Unlimited Addon For Elementor: from n/a through 2.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/unlimited-addon-for-elementor/wordpress-unlimited-addon-for-elementor-plugin-2-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49268.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49268.json new file mode 100644 index 00000000000..d6ffd915f1f --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49268.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49268", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T15:15:17.567", + "lastModified": "2024-10-16T15:15:17.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in sunburntkamel disconnected allows Reflected XSS.This issue affects disconnected: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/disconnected/wordpress-disconnected-theme-1-3-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49270.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49270.json new file mode 100644 index 00000000000..d96ea51a54f --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49270.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49270", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T14:15:11.750", + "lastModified": "2024-10-16T14:15:11.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HashThemes Smart Blocks allows Stored XSS.This issue affects Smart Blocks: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/smart-blocks/wordpress-smart-blocks-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json index da4266d366f..ebf5fc6f6a0 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7591", "sourceIdentifier": "security@progress.com", "published": "2024-09-05T18:15:06.480", - "lastModified": "2024-09-19T18:19:12.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T15:15:17.913", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@progress.com", "type": "Primary", "description": [ { @@ -71,12 +71,12 @@ ] }, { - "source": "security@progress.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-78" } ] } diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json index 0c9c1691059..3f51568c510 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8519", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:11.433", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T14:06:04.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,26 +71,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.7", + "matchCriteriaId": "7BA3854E-0C81-4982-9AFB-B5C347A519E2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ultimatemember/ultimatemember/blob/7b8a7a7c039bde4539c07e049b19036192f1c133/includes/core/class-shortcodes.php#L433", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ultimatemember/ultimatemember/pull/1545", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3160947/ultimate-member/tags/2.8.7/includes/core/class-shortcodes.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/ultimate-member/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e394bb2-d505-4bf1-b672-fea3504bf936?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json index df0fffb2ba2..5353c2db51d 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9204.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9204", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:12.180", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T14:26:41.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nerdpress:smart_custom_404_error_page:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "11.4.8", + "matchCriteriaId": "92D520E4-ADFB-478F-8C6E-A3DD938B5CF6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/404page/tags/11.4.7/functions.php#L112", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/404page/tags/11.4.7/inc/class-404page.php#L1227", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3161639/#file2", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/93928123-c90d-4bbb-b51d-33e809867b79?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json index 00c67da066b..564e84c04c6 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9237.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9237", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:12.390", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T15:10:08.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,26 +51,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-centrics:fish_and_ships:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6", + "matchCriteriaId": "CAC7F8B5-7285-466B-A909-A7375227B516" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/fish-and-ships/tags/1.5.9/includes/wizard.php#L226", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fish-and-ships/tags/1.5.9/includes/wizard.php#L369", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/fish-and-ships/tags/1.5.9/includes/wizard.php#L479", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3161229%40fish-and-ships&new=3161229%40fish-and-ships&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ceaf64d6-9872-4572-807e-7fce76edee57?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9348.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9348.json new file mode 100644 index 00000000000..cf508a2696d --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9348.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-9348", + "sourceIdentifier": "security@docker.com", + "published": "2024-10-16T15:15:18.100", + "lastModified": "2024-10-16T15:15:18.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Docker Desktop before v4.34.3 allows RCE via unsanitized GitHub source link in Build view." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@docker.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.9, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@docker.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://docs.docker.com/desktop/release-notes/#4343", + "source": "security@docker.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json index 21a35898ec8..e4ab1af90bb 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9680", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-09T13:15:12.090", - "lastModified": "2024-10-16T01:00:01.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:07:36.123", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-10-15", "cisaActionDue": "2024-11-05", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -44,6 +64,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,18 +85,77 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "131.0.2", + "matchCriteriaId": "E6731FAC-8C66-4219-A8AC-7C50BDD13556" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.16.1", + "matchCriteriaId": "4900FB63-625D-497E-99C9-4F6C56651C98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", + "versionStartIncluding": "128.0", + "versionEndExcluding": "128.3.1", + "matchCriteriaId": "132A5FBE-6A6E-42DE-9218-BB571D76F192" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "115.16.0", + "matchCriteriaId": "DB9A49A0-8233-46B2-894A-FAD4DC6ED563" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.3.1", + "matchCriteriaId": "F48D7DE7-477D-4026-B6BD-BFE2BC5382F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:131.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FD5E6249-26BF-4E13-87D8-B15EF63A859F" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1923344", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-51/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-52/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json index 78155ca1e05..420a8f9f7d2 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9784", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T12:15:05.623", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T14:12:35.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,70 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06:*:*:*:*:*:*:*", + "matchCriteriaId": "7B93121E-DEF2-4DB6-ADA5-D548996E3FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formResetStatistic.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.279936", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.279936", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.414552", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9893.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9893.json new file mode 100644 index 00000000000..95459049308 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9893.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-9893", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-16T14:15:12.097", + "lastModified": "2024-10-16T14:15:12.097", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 3.1.14. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://nextendweb.com/social-login/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/nextend-facebook-connect/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e4588d1-f21e-48ba-a8cb-d18c421f000a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9908.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9908.json index 6b9c901260d..0ee474e1504 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9908.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9908.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9908", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T12:15:10.087", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:31:26.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetMACFilter.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280236", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280236", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418739", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9909.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9909.json index d5d85423d64..868985b61b7 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9909.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9909.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9909", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T14:15:02.857", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:30:48.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,7 +130,7 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -118,28 +138,87 @@ "value": "CWE-120" } ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetMuti.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280237", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280237", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418740", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9910.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9910.json index b4786a73cc8..19a93a3f585 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9910.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9910.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9910", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T15:15:11.117", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:32:30.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +150,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetPassword.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280238", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280238", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418741", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9911.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9911.json index f012a1363c7..0df33e68dc1 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9911.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9911.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9911", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T16:15:02.867", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:32:13.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetPortTr.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280239", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280239", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418742", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9912.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9912.json index 1c025226ae1..9dfd0f368be 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9912.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9912.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9912", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T17:15:10.813", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:31:57.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetQoS.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280240", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280240", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418743", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9913.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9913.json index 445bbdc267f..a26cd866b1d 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9913.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9913", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T18:15:02.807", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:31:38.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetRoute.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280241", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280241", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418745", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9914.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9914.json index cc4172aaac2..295cc8d36cf 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9914.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9914.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9914", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T18:15:03.090", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:27:00.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formSetWizardSelectMode.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280242", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280242", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418746", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9915.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9915.json index b61256ba9e0..00d0933aaf7 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9915.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9915.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9915", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-13T19:15:10.963", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:26:12.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:b1:*:*:*:*:*:*:*", + "matchCriteriaId": "6F28B093-482C-4105-A89D-8B1F1FFD59E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formVirtualServ.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.280243", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418747", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9952.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9952.json index 574c6360f0c..e13a5bd45c8 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9952.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9952", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-15T02:15:03.403", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T15:05:13.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/higordiego/bedd395e74a335f0145872c96d7cb92d", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280319", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280319", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.423229", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 7b7481b933b..ae37e7e61c8 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-16T14:00:23.627202+00:00 +2024-10-16T16:00:25.536278+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-16T13:58:39.297000+00:00 +2024-10-16T15:48:54.437000+00:00 ``` ### Last Data Feed Release @@ -33,61 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265830 +265868 ``` ### CVEs added in the last Commit -Recently added CVEs: `17` +Recently added CVEs: `38` -- [CVE-2020-36841](CVE-2020/CVE-2020-368xx/CVE-2020-36841.json) (`2024-10-16T13:15:11.733`) -- [CVE-2023-32190](CVE-2023/CVE-2023-321xx/CVE-2023-32190.json) (`2024-10-16T12:15:07.460`) -- [CVE-2023-32191](CVE-2023/CVE-2023-321xx/CVE-2023-32191.json) (`2024-10-16T13:15:12.067`) -- [CVE-2023-32192](CVE-2023/CVE-2023-321xx/CVE-2023-32192.json) (`2024-10-16T13:15:12.297`) -- [CVE-2023-32193](CVE-2023/CVE-2023-321xx/CVE-2023-32193.json) (`2024-10-16T13:15:12.540`) -- [CVE-2023-32194](CVE-2023/CVE-2023-321xx/CVE-2023-32194.json) (`2024-10-16T13:15:12.787`) -- [CVE-2023-32196](CVE-2023/CVE-2023-321xx/CVE-2023-32196.json) (`2024-10-16T13:15:13.060`) -- [CVE-2024-10021](CVE-2024/CVE-2024-100xx/CVE-2024-10021.json) (`2024-10-16T12:15:07.663`) -- [CVE-2024-10022](CVE-2024/CVE-2024-100xx/CVE-2024-10022.json) (`2024-10-16T12:15:08.163`) -- [CVE-2024-10023](CVE-2024/CVE-2024-100xx/CVE-2024-10023.json) (`2024-10-16T13:15:13.350`) -- [CVE-2024-10024](CVE-2024/CVE-2024-100xx/CVE-2024-10024.json) (`2024-10-16T13:15:13.650`) -- [CVE-2024-48042](CVE-2024/CVE-2024-480xx/CVE-2024-48042.json) (`2024-10-16T13:15:13.973`) -- [CVE-2024-49247](CVE-2024/CVE-2024-492xx/CVE-2024-49247.json) (`2024-10-16T13:15:14.277`) -- [CVE-2024-49257](CVE-2024/CVE-2024-492xx/CVE-2024-49257.json) (`2024-10-16T13:15:14.517`) -- [CVE-2024-49271](CVE-2024/CVE-2024-492xx/CVE-2024-49271.json) (`2024-10-16T13:15:14.787`) -- [CVE-2024-6380](CVE-2024/CVE-2024-63xx/CVE-2024-6380.json) (`2024-10-16T12:15:08.767`) -- [CVE-2024-8040](CVE-2024/CVE-2024-80xx/CVE-2024-8040.json) (`2024-10-16T12:15:09.013`) +- [CVE-2024-48027](CVE-2024/CVE-2024-480xx/CVE-2024-48027.json) (`2024-10-16T14:15:07.183`) +- [CVE-2024-48028](CVE-2024/CVE-2024-480xx/CVE-2024-48028.json) (`2024-10-16T14:15:07.450`) +- [CVE-2024-48029](CVE-2024/CVE-2024-480xx/CVE-2024-48029.json) (`2024-10-16T14:15:07.693`) +- [CVE-2024-48030](CVE-2024/CVE-2024-480xx/CVE-2024-48030.json) (`2024-10-16T14:15:07.947`) +- [CVE-2024-48034](CVE-2024/CVE-2024-480xx/CVE-2024-48034.json) (`2024-10-16T14:15:08.200`) +- [CVE-2024-48035](CVE-2024/CVE-2024-480xx/CVE-2024-48035.json) (`2024-10-16T14:15:08.463`) +- [CVE-2024-48744](CVE-2024/CVE-2024-487xx/CVE-2024-48744.json) (`2024-10-16T15:15:16.850`) +- [CVE-2024-49216](CVE-2024/CVE-2024-492xx/CVE-2024-49216.json) (`2024-10-16T14:15:08.707`) +- [CVE-2024-49218](CVE-2024/CVE-2024-492xx/CVE-2024-49218.json) (`2024-10-16T14:15:08.967`) +- [CVE-2024-49226](CVE-2024/CVE-2024-492xx/CVE-2024-49226.json) (`2024-10-16T14:15:09.280`) +- [CVE-2024-49227](CVE-2024/CVE-2024-492xx/CVE-2024-49227.json) (`2024-10-16T14:15:09.530`) +- [CVE-2024-49242](CVE-2024/CVE-2024-492xx/CVE-2024-49242.json) (`2024-10-16T14:15:09.777`) +- [CVE-2024-49245](CVE-2024/CVE-2024-492xx/CVE-2024-49245.json) (`2024-10-16T14:15:10.057`) +- [CVE-2024-49251](CVE-2024/CVE-2024-492xx/CVE-2024-49251.json) (`2024-10-16T14:15:10.310`) +- [CVE-2024-49252](CVE-2024/CVE-2024-492xx/CVE-2024-49252.json) (`2024-10-16T14:15:10.557`) +- [CVE-2024-49253](CVE-2024/CVE-2024-492xx/CVE-2024-49253.json) (`2024-10-16T14:15:10.793`) +- [CVE-2024-49254](CVE-2024/CVE-2024-492xx/CVE-2024-49254.json) (`2024-10-16T14:15:11.040`) +- [CVE-2024-49258](CVE-2024/CVE-2024-492xx/CVE-2024-49258.json) (`2024-10-16T14:15:11.280`) +- [CVE-2024-49260](CVE-2024/CVE-2024-492xx/CVE-2024-49260.json) (`2024-10-16T14:15:11.513`) +- [CVE-2024-49266](CVE-2024/CVE-2024-492xx/CVE-2024-49266.json) (`2024-10-16T15:15:17.033`) +- [CVE-2024-49267](CVE-2024/CVE-2024-492xx/CVE-2024-49267.json) (`2024-10-16T15:15:17.303`) +- [CVE-2024-49268](CVE-2024/CVE-2024-492xx/CVE-2024-49268.json) (`2024-10-16T15:15:17.567`) +- [CVE-2024-49270](CVE-2024/CVE-2024-492xx/CVE-2024-49270.json) (`2024-10-16T14:15:11.750`) +- [CVE-2024-9348](CVE-2024/CVE-2024-93xx/CVE-2024-9348.json) (`2024-10-16T15:15:18.100`) +- [CVE-2024-9893](CVE-2024/CVE-2024-98xx/CVE-2024-9893.json) (`2024-10-16T14:15:12.097`) ### CVEs modified in the last Commit -Recently modified CVEs: `61` +Recently modified CVEs: `51` -- [CVE-2024-39406](CVE-2024/CVE-2024-394xx/CVE-2024-39406.json) (`2024-10-16T13:37:57.910`) -- [CVE-2024-39408](CVE-2024/CVE-2024-394xx/CVE-2024-39408.json) (`2024-10-16T13:36:13.497`) -- [CVE-2024-39409](CVE-2024/CVE-2024-394xx/CVE-2024-39409.json) (`2024-10-16T13:35:32.290`) -- [CVE-2024-39410](CVE-2024/CVE-2024-394xx/CVE-2024-39410.json) (`2024-10-16T13:34:52.220`) -- [CVE-2024-39412](CVE-2024/CVE-2024-394xx/CVE-2024-39412.json) (`2024-10-16T13:33:27.910`) -- [CVE-2024-41867](CVE-2024/CVE-2024-418xx/CVE-2024-41867.json) (`2024-10-16T13:31:42.040`) -- [CVE-2024-42020](CVE-2024/CVE-2024-420xx/CVE-2024-42020.json) (`2024-10-16T13:15:54.167`) -- [CVE-2024-45148](CVE-2024/CVE-2024-451xx/CVE-2024-45148.json) (`2024-10-16T13:27:46.397`) -- [CVE-2024-47007](CVE-2024/CVE-2024-470xx/CVE-2024-47007.json) (`2024-10-16T13:23:03.467`) -- [CVE-2024-47008](CVE-2024/CVE-2024-470xx/CVE-2024-47008.json) (`2024-10-16T13:24:32.130`) -- [CVE-2024-47009](CVE-2024/CVE-2024-470xx/CVE-2024-47009.json) (`2024-10-16T13:26:39.990`) -- [CVE-2024-47010](CVE-2024/CVE-2024-470xx/CVE-2024-47010.json) (`2024-10-16T13:28:07.393`) -- [CVE-2024-47011](CVE-2024/CVE-2024-470xx/CVE-2024-47011.json) (`2024-10-16T13:28:40.480`) -- [CVE-2024-47134](CVE-2024/CVE-2024-471xx/CVE-2024-47134.json) (`2024-10-16T13:50:32.607`) -- [CVE-2024-48255](CVE-2024/CVE-2024-482xx/CVE-2024-48255.json) (`2024-10-16T13:35:03.290`) -- [CVE-2024-49382](CVE-2024/CVE-2024-493xx/CVE-2024-49382.json) (`2024-10-16T13:53:45.860`) -- [CVE-2024-49383](CVE-2024/CVE-2024-493xx/CVE-2024-49383.json) (`2024-10-16T13:53:04.380`) -- [CVE-2024-49384](CVE-2024/CVE-2024-493xx/CVE-2024-49384.json) (`2024-10-16T13:52:19.317`) -- [CVE-2024-49387](CVE-2024/CVE-2024-493xx/CVE-2024-49387.json) (`2024-10-16T13:58:39.297`) -- [CVE-2024-49388](CVE-2024/CVE-2024-493xx/CVE-2024-49388.json) (`2024-10-16T13:57:58.383`) -- [CVE-2024-8630](CVE-2024/CVE-2024-86xx/CVE-2024-8630.json) (`2024-10-16T13:15:59.997`) -- [CVE-2024-8921](CVE-2024/CVE-2024-89xx/CVE-2024-8921.json) (`2024-10-16T11:15:13.080`) -- [CVE-2024-9381](CVE-2024/CVE-2024-93xx/CVE-2024-9381.json) (`2024-10-16T13:30:34.740`) -- [CVE-2024-9975](CVE-2024/CVE-2024-99xx/CVE-2024-9975.json) (`2024-10-16T13:44:46.220`) -- [CVE-2024-9976](CVE-2024/CVE-2024-99xx/CVE-2024-9976.json) (`2024-10-16T13:42:24.153`) +- [CVE-2024-47652](CVE-2024/CVE-2024-476xx/CVE-2024-47652.json) (`2024-10-16T14:12:06.307`) +- [CVE-2024-47653](CVE-2024/CVE-2024-476xx/CVE-2024-47653.json) (`2024-10-16T15:13:52.280`) +- [CVE-2024-47654](CVE-2024/CVE-2024-476xx/CVE-2024-47654.json) (`2024-10-16T15:17:33.227`) +- [CVE-2024-47655](CVE-2024/CVE-2024-476xx/CVE-2024-47655.json) (`2024-10-16T15:26:15.350`) +- [CVE-2024-47656](CVE-2024/CVE-2024-476xx/CVE-2024-47656.json) (`2024-10-16T15:32:01.460`) +- [CVE-2024-47657](CVE-2024/CVE-2024-476xx/CVE-2024-47657.json) (`2024-10-16T15:44:16.807`) +- [CVE-2024-48251](CVE-2024/CVE-2024-482xx/CVE-2024-48251.json) (`2024-10-16T14:25:49.957`) +- [CVE-2024-48253](CVE-2024/CVE-2024-482xx/CVE-2024-48253.json) (`2024-10-16T14:27:17.693`) +- [CVE-2024-48255](CVE-2024/CVE-2024-482xx/CVE-2024-48255.json) (`2024-10-16T14:26:23.287`) +- [CVE-2024-48257](CVE-2024/CVE-2024-482xx/CVE-2024-48257.json) (`2024-10-16T14:24:43.237`) +- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-10-16T15:15:17.913`) +- [CVE-2024-8519](CVE-2024/CVE-2024-85xx/CVE-2024-8519.json) (`2024-10-16T14:06:04.263`) +- [CVE-2024-9204](CVE-2024/CVE-2024-92xx/CVE-2024-9204.json) (`2024-10-16T14:26:41.423`) +- [CVE-2024-9237](CVE-2024/CVE-2024-92xx/CVE-2024-9237.json) (`2024-10-16T15:10:08.390`) +- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-10-16T15:07:36.123`) +- [CVE-2024-9784](CVE-2024/CVE-2024-97xx/CVE-2024-9784.json) (`2024-10-16T14:12:35.597`) +- [CVE-2024-9908](CVE-2024/CVE-2024-99xx/CVE-2024-9908.json) (`2024-10-16T15:31:26.373`) +- [CVE-2024-9909](CVE-2024/CVE-2024-99xx/CVE-2024-9909.json) (`2024-10-16T15:30:48.017`) +- [CVE-2024-9910](CVE-2024/CVE-2024-99xx/CVE-2024-9910.json) (`2024-10-16T15:32:30.067`) +- [CVE-2024-9911](CVE-2024/CVE-2024-99xx/CVE-2024-9911.json) (`2024-10-16T15:32:13.470`) +- [CVE-2024-9912](CVE-2024/CVE-2024-99xx/CVE-2024-9912.json) (`2024-10-16T15:31:57.667`) +- [CVE-2024-9913](CVE-2024/CVE-2024-99xx/CVE-2024-9913.json) (`2024-10-16T15:31:38.627`) +- [CVE-2024-9914](CVE-2024/CVE-2024-99xx/CVE-2024-9914.json) (`2024-10-16T15:27:00.080`) +- [CVE-2024-9915](CVE-2024/CVE-2024-99xx/CVE-2024-9915.json) (`2024-10-16T15:26:12.137`) +- [CVE-2024-9952](CVE-2024/CVE-2024-99xx/CVE-2024-9952.json) (`2024-10-16T15:05:13.467`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c0ecd5f77e8..e3683550b02 100644 --- a/_state.csv +++ b/_state.csv @@ -108763,7 +108763,7 @@ CVE-2017-8903,0,0,62ee5a8e42805e997e0b44916472a6c55426cdfbb4a183666b858eaf9d4921 CVE-2017-8904,0,0,043c31ebe35f2be107136145756ff53e38e81758f6fec85a3630a6f571c80193,2019-10-03T00:03:26.223000 CVE-2017-8905,0,0,e868d622bd43a461e3d9be8166e53823068c652da7cc6b0b295966710e074805,2019-10-03T00:03:26.223000 CVE-2017-8906,0,0,5a4d6e2e9147df5232cb7681e16ca4d380f9eeafc13b8911d8aab42b12d5787c,2020-09-02T19:12:24.573000 -CVE-2017-8907,0,0,b6dbbda1a01f2804ba33cd442a2acefab2b8d2dc6440efa3185e0499f66ceebf,2019-10-03T00:03:26.223000 +CVE-2017-8907,0,1,febfdf2dcf0fb90cddc47c6d6deae84e7a8256c8f4be08970538f1859b22a78b,2024-10-16T14:35:00.630000 CVE-2017-8908,0,0,7b84bdf96429bf0883bc69650fedb99ea00b682633d5b5e40aff0dd73aba1e3e,2017-05-23T01:29:03.583000 CVE-2017-8911,0,0,afe251c5a36af4cb0b5616846816b72cc1f3d0719df3d6f3594d9b3d698f55a1,2017-11-04T01:29:55.303000 CVE-2017-8912,0,0,e33abb3b0c4c61d423ffd74824dcf3e940db6e20b7c961825cc365c433536dda,2024-08-05T17:15:35.287000 @@ -109310,7 +109310,7 @@ CVE-2017-9508,0,0,fd575a728495ddf07d36378bea37bce9e61fd2ca09088abdbc83aafcd02495 CVE-2017-9509,0,0,1e89a7078ad4c967d194a45cd3d199039fae9bd181b6056ad8491751aea448cf,2018-01-31T02:29:02.170000 CVE-2017-9510,0,0,4bdf5637c21ad97bb78f02877bdd16340bf2cb8432c6f5f890cbb5bfe52be635,2020-11-25T14:15:12.623000 CVE-2017-9511,0,0,86886d87c709fc55a181f2ed65e7cf65e96e51f2e7e37b90b5b6b8d148811b9b,2024-10-15T20:35:06.567000 -CVE-2017-9512,0,0,6d23f4756d81961928025fc77d67c192f6323102f21199d6d8897e5c3906fb78,2020-11-25T14:15:12.997000 +CVE-2017-9512,0,1,3029a2549ed01eb67cff98248843b4450ba9939caa906cd26eebcf5c6d1fd5b5,2024-10-16T14:35:02.177000 CVE-2017-9513,0,0,6995fad05e7e0cfe4cd854c103c35495b1db668b3ed5a14482f84849fe46a98e,2019-10-09T23:30:39.860000 CVE-2017-9514,0,0,8af9dcecfad72ac19be4a5ad46108f3350dd502ed166c178512e14dce5904b11,2019-10-03T00:03:26.223000 CVE-2017-9516,0,0,88416a394e3e93bbd6e624f0c85d645fcb9f8e52e4486612e25597dabb1d3ef1,2017-08-13T01:29:23.663000 @@ -147077,7 +147077,7 @@ CVE-2020-12100,0,0,5f2109d0519da00eb1bdab515eb32b6f3a0a3f9f65df0494c40483c00d981 CVE-2020-12101,0,0,cf9139625b9f0b649b840da134f242e5f2c9b3b4781e0b74e6764c945a49d354,2024-04-29T18:45:40.910000 CVE-2020-12102,0,0,334d46f056ec9e51869491b0d4c4f4d7fa1e52d8eb23bd7050ac5ca8d70d4a32,2024-05-14T20:15:09.087000 CVE-2020-12103,0,0,3a59f1d5a51ef8295c537e5c5ae4d8a9bf4c1114a44ce53252c59c94bd0f48e8,2024-05-14T20:15:10.827000 -CVE-2020-12104,0,1,c90556433517cb5d5d176b589f735a14d9a33bc7c2c612108f5c581d6d39d1b4,2024-10-16T13:47:56.247000 +CVE-2020-12104,0,0,c90556433517cb5d5d176b589f735a14d9a33bc7c2c612108f5c581d6d39d1b4,2024-10-16T13:47:56.247000 CVE-2020-12105,0,0,1b0104d22c7c0ec2e5d6aa96a93864fff5c8940b5e30c6bb86ba9c0774641660,2022-05-03T14:21:44.207000 CVE-2020-12106,0,0,4e3d882e5b691be673a8f21eb4e1ee34ab9fbe1cfb11e1d93d639fd0a32d63b7,2021-07-21T11:39:23.747000 CVE-2020-12107,0,0,3836f1f6d5d4faa7b159d018fe0bf113e537b6190554e79e8bc6cc3f85044739,2020-08-19T12:54:46.107000 @@ -148635,7 +148635,7 @@ CVE-2020-13819,0,0,7d0e5bc882687b412f2418ec24b1dd9be843e422397645300221984594963 CVE-2020-1382,0,0,a0876529db6daaa28aa38e9bd84657d2a2207ea6d0cf96033594f64082bf944d,2021-07-21T11:39:23.747000 CVE-2020-13820,0,0,9e496591ad44ca77dc312b3e2cd00368fda87f5d814828e305a47a94b328ec58,2023-11-07T03:16:58.837000 CVE-2020-13821,0,0,f7b5cad326778e202650f58face9ae8589633236a49053242bf79766a2119137,2020-12-23T15:43:39.817000 -CVE-2020-13822,0,1,c834d5de797a453847f9ed62ba35d05b71b8de7b69e23bae24f38a997c3916e3,2024-10-16T13:45:17.320000 +CVE-2020-13822,0,0,c834d5de797a453847f9ed62ba35d05b71b8de7b69e23bae24f38a997c3916e3,2024-10-16T13:45:17.320000 CVE-2020-13825,0,0,90e2a75836526776efb694fd8b4324e7d0c0929bd6d204e8655be433efd7a6be,2020-08-24T19:10:36.313000 CVE-2020-13826,0,0,2de936a392d9d270194c018ff6e3b59e6bfadf76e7599ac9624f9941458e1ae1,2021-07-21T11:39:23.747000 CVE-2020-13827,0,0,3bde90887e219f9516b1f289a5f508de896d1958530f2a37b0a1669873b3ae2c,2023-02-27T18:16:26.300000 @@ -156938,7 +156938,7 @@ CVE-2020-28493,0,0,d9353fe60ae6c63ec1bfff9f85ea0fb545c914cd07b141b9fe22f9fe82e65 CVE-2020-28494,0,0,d0b68aa88a2f74522ac851a9e05ce4a16763907497fa430f2c95ee5ec5fba84a,2021-07-21T11:39:23.747000 CVE-2020-28495,0,0,4c7c65ebefd525ba71ddc5b80d415a5a705a5e348fcffb403aaf04a11193ff38,2021-02-05T16:53:47.807000 CVE-2020-28496,0,0,c212ccab3408db34cea9b34fdae0f9e8498e95a619a07d99989b57116a41f0fc,2021-02-25T17:05:05.980000 -CVE-2020-28498,0,1,81f1cc60ea687112836a08bd67314553fd1edbaa1937c34ba15fa01caaae0212,2024-10-16T13:45:17.320000 +CVE-2020-28498,0,0,81f1cc60ea687112836a08bd67314553fd1edbaa1937c34ba15fa01caaae0212,2024-10-16T13:45:17.320000 CVE-2020-28499,0,0,ad90f9d4f5a379490af8b67dd55869494a0d6c6d5f0fd044b81d677ff00b0f28,2021-05-17T19:55:25.393000 CVE-2020-2850,0,0,50629eccd5b3b9281b1f179f2b8ae3ef11522dbc8e0dd62df5b2500c2045ae16,2020-04-16T13:58:17.320000 CVE-2020-28500,0,0,805928d1d84ab6637afb06f11309a9cee2a0de28cf92c1ebd57b39fabd99a064,2022-09-13T21:18:50.543000 @@ -159342,7 +159342,7 @@ CVE-2020-36838,0,0,3a7d865bc4e5d457aefd7a125a83f9e76c208c4baafa85f9e322ba36857e5 CVE-2020-36839,0,0,baa988307e623b23446b2949272b20cbda74bdb8e8bd2f74d8dcfc84a33c3f98,2024-10-16T07:15:09.433000 CVE-2020-3684,0,0,44aa34ae599eab5a673c5cc3034025c1f764a98b61a69b113aa70c68c71a7c49,2020-11-06T16:29:14.480000 CVE-2020-36840,0,0,19f312115ec11958b9e6a2d7c5d1461a9b9a720952690bab09ad8fcbc82536d2,2024-10-16T08:15:03.710000 -CVE-2020-36841,1,1,957b677fd33f2345981c4e7c86c2970f0c468056978102eb125099baf6872493,2024-10-16T13:15:11.733000 +CVE-2020-36841,0,0,957b677fd33f2345981c4e7c86c2970f0c468056978102eb125099baf6872493,2024-10-16T13:15:11.733000 CVE-2020-36842,0,0,2b0ab9021e8c3546f5c3ac016af5850bb6ea577b04ff806dd46ba7237500c4c0,2024-10-16T08:15:03.923000 CVE-2020-3685,0,0,01cf0158d1e280265cb87314ab78bb48a4960098d5e1ed486f7d5066d87b5a92,2021-01-29T23:46:03.037000 CVE-2020-3686,0,0,236df0d6a9e5b4a5d3130dbb24dece9578efd8fc6235301a045f147575f94cf1,2021-01-30T00:10:19.887000 @@ -170759,7 +170759,7 @@ CVE-2021-24870,0,0,b52951bbda633a2496785de6ed9c971a9349589104215e362b329e33b8594 CVE-2021-24871,0,0,8cee336be7c8e81d2a980ee98c9518731e7b00f3d824019a678875e57bcd313f,2021-12-16T20:47:02.653000 CVE-2021-24872,0,0,35696a0eb51e36407a79a9cbf68b6633c9b2efa0f8194208d2fbe0e29f79d3f6,2021-12-15T21:09:01.617000 CVE-2021-24873,0,0,0e2c879d3f204e9403ba3895a5ce0bec82190691622358ef65f867b35c2b7a4c,2021-11-24T16:36:55.757000 -CVE-2021-24874,0,1,64fdf80ee90d5b1d6de6a6b14f87c50343676a2a968b2332fa72c64a34fd2ccd,2024-10-16T13:26:19.017000 +CVE-2021-24874,0,0,64fdf80ee90d5b1d6de6a6b14f87c50343676a2a968b2332fa72c64a34fd2ccd,2024-10-16T13:26:19.017000 CVE-2021-24875,0,0,363986781c5722c301b08ee25bbae68391c570e0d127c7dac6174a02b15224e2,2021-11-24T19:59:07.813000 CVE-2021-24876,0,0,8f2daa7f2d0bb19d86a6056e36e486b9ddf7878105e11e83ffc9baf82bbb9df4,2021-11-29T20:18:36.847000 CVE-2021-24877,0,0,98729407b5f410a005c9d353823b0655188684ae05421381493036ad6847cd41,2021-11-26T15:29:32.943000 @@ -170806,7 +170806,7 @@ CVE-2021-24919,0,0,e0dc83f1f53f04e30af67db292687d70b47d2901d44a4a4094abe48112ee8 CVE-2021-24920,0,0,8ccf0cbf5d2d75602a322b800459180bd3da6e37f70ddcda3609c7c41762d147,2022-03-07T16:51:54.773000 CVE-2021-24921,0,0,c39a1fa5f466132c2f295410cc217d4dd877e75f08444981115aa25d5a6e62fd,2022-02-28T19:39:20.853000 CVE-2021-24922,0,0,a62ca72c02c4e8e14a9a21104b9fd358aa1e358b0b5f498ff2f1c6f0b27528c7,2021-12-15T19:17:30.217000 -CVE-2021-24923,0,1,2d2d758c7c6eebc8db1d3b61ec8993a8e8cf30a5b28f15322ff5bbaeaf0a4948,2024-10-16T13:26:19.017000 +CVE-2021-24923,0,0,2d2d758c7c6eebc8db1d3b61ec8993a8e8cf30a5b28f15322ff5bbaeaf0a4948,2024-10-16T13:26:19.017000 CVE-2021-24924,0,0,d5c09f8e01fce836950c01ae9d72864e07730e6c1acc3d045ff77bfe1c62f83d,2021-12-06T19:15:49.860000 CVE-2021-24925,0,0,43f0f7063c56c2126e4b2da1eca25ebb89b9598b9884aef1aef4b30bcf478804,2021-12-15T19:19:29.540000 CVE-2021-24926,0,0,ade879c2f6d36382ede146f6320a0f77f16920e22a1169dd3dca126280a41d2b,2022-02-04T18:10:31.700000 @@ -183535,12 +183535,12 @@ CVE-2021-42075,0,0,000a82d37ed29cee910dc4d2bb35e08cace658ab1a0cbe32b65e4d58eb7d4 CVE-2021-42076,0,0,67d37381120eacdc8025b22b07c44bb6c8764e4fb533f673681890b936e27812,2021-11-09T22:07:09.187000 CVE-2021-42077,0,0,98645f18b00acbbf0c5a4aca133d443cc300a213a1d1246bbc4446561627477d,2021-11-09T19:28:05.903000 CVE-2021-42078,0,0,f9c4ed900a7cc457676383c89604ac047264bd0c6268e21f9f2156657cef1ce4,2021-11-09T22:07:50.933000 -CVE-2021-42079,0,1,f2d0232174cdef0ac65a62301a79361e39709edcef7945f8a252784803c24c20,2024-10-16T12:15:03.330000 +CVE-2021-42079,0,0,f2d0232174cdef0ac65a62301a79361e39709edcef7945f8a252784803c24c20,2024-10-16T12:15:03.330000 CVE-2021-4208,0,0,2d1e899b3a2dc18e4d0e14dca0b4da56911208d8a128ca6b60723bc98cecb9ef,2022-02-28T20:44:21.043000 -CVE-2021-42080,0,1,4863517402ea4ae064cce4d190ff794e05d23afdb6886abdf0409131fd7d14bc,2024-10-16T12:15:03.660000 -CVE-2021-42081,0,1,07d978a5398e364de9533d1bd550c699f5e3c2588f10c43ef340b736650af00a,2024-10-16T12:15:03.917000 -CVE-2021-42082,0,1,52126f925f12f5bfcadb761c382bbd8aecd38f5d9e3257960591d441d24ea02c,2024-10-16T12:15:04.060000 -CVE-2021-42083,0,1,c10fde8c85fa8f4d2b4a18ad0ae53ddf337d4eb99e1f3433cd21ce5af76634f6,2024-10-16T12:15:04.310000 +CVE-2021-42080,0,0,4863517402ea4ae064cce4d190ff794e05d23afdb6886abdf0409131fd7d14bc,2024-10-16T12:15:03.660000 +CVE-2021-42081,0,0,07d978a5398e364de9533d1bd550c699f5e3c2588f10c43ef340b736650af00a,2024-10-16T12:15:03.917000 +CVE-2021-42082,0,0,52126f925f12f5bfcadb761c382bbd8aecd38f5d9e3257960591d441d24ea02c,2024-10-16T12:15:04.060000 +CVE-2021-42083,0,0,c10fde8c85fa8f4d2b4a18ad0ae53ddf337d4eb99e1f3433cd21ce5af76634f6,2024-10-16T12:15:04.310000 CVE-2021-42084,0,0,81065ef5f09344b2cb782a579e737f83a3f6ca39c592801b4564cfd3729a4041,2021-10-14T14:01:17.467000 CVE-2021-42085,0,0,3d24b94025f7037dea7492fe13c4b7c889f8e2725b5b1fc0aa9646e0f375be57,2021-10-13T20:30:38.137000 CVE-2021-42086,0,0,744eb91bf663a489a3723f87c99505cf072c48b027d221f331a36d29196226f2,2022-07-12T17:42:04.277000 @@ -184965,7 +184965,7 @@ CVE-2021-44054,0,0,fe12d0efdb6d5105654667af112ba35a00eb28953fe49396933dea52f92c7 CVE-2021-44055,0,0,36d086a0d865afcf75dd26dbd53eb99e6ce2fcd35caf2d6d5d5a6057d9767e37,2022-05-13T20:13:04.620000 CVE-2021-44056,0,0,8addbbbea73af6ebf0ae24e7a335e8cadec71c4b3189f8b9ae7b3717ab944269,2022-05-13T20:14:39.333000 CVE-2021-44057,0,0,f32a37ffbfbd3bde7a0b4b4c685341477054534ab9bc6a7b81c6ca45796fd4a5,2022-05-13T20:10:09.653000 -CVE-2021-4406,0,1,a5158228cbadb9a55a3074ff27c8fb5c85e60eddbef1e7b5652296510306f983,2024-10-16T12:15:04.490000 +CVE-2021-4406,0,0,a5158228cbadb9a55a3074ff27c8fb5c85e60eddbef1e7b5652296510306f983,2024-10-16T12:15:04.490000 CVE-2021-4407,0,0,8868f8e6298397f199da7799571646e132baa80008874a12ae7fe458e60186a9,2023-11-07T03:40:52.797000 CVE-2021-44076,0,0,9ebc136e380f43b1e756eaa21ff068495ea86d8e31a165ce24b3cace1556fef1,2022-09-17T03:45:01.677000 CVE-2021-44077,0,0,8337d84f511bb37dc2be298cdd0c1fb229c2333fc8ada2b995c6c4bdca398026,2023-08-08T14:21:49.707000 @@ -193485,7 +193485,7 @@ CVE-2022-24383,0,0,e447d7d9205166fb86d5a5967e3f74514587059d80957cbbb2197f8733e6f CVE-2022-24384,0,0,c8c54f246c395683b34fe69e0716c06cb09982df57d3b04973b292acd788f92d,2022-03-19T01:10:43.233000 CVE-2022-24385,0,0,ee57eb1c279ae326a5c0dac5cdc2e80222055e9a5199159daa29a76c075334d3,2022-03-19T01:10:50.360000 CVE-2022-24386,0,0,457222f095c62db0fb0ca8bf1941849311c926f62af825405c1c6aca5315e926,2024-09-13T18:12:44.327000 -CVE-2022-24387,0,1,1d7e42229c2657f23c2a379fa4dda7f34697a22903ffcf500a57f48755ed44a0,2024-10-16T12:15:04.657000 +CVE-2022-24387,0,0,1d7e42229c2657f23c2a379fa4dda7f34697a22903ffcf500a57f48755ed44a0,2024-10-16T12:15:04.657000 CVE-2022-24388,0,0,0aa162374a72e7b272071bc85f23bb3ac62a1dbd8bcfa58503cbe59a9d783e6a,2022-05-26T01:49:38.753000 CVE-2022-24389,0,0,1bfcfb3a923a3c536cc281292090c1401824e60d2f38b82785afa6c7ed823d33,2022-05-26T01:59:03.417000 CVE-2022-2439,0,0,71c4c44c3559f8dfdec520c0c7b7ccf9de70a0b28373021d99fd5226fd703f97,2024-09-26T13:32:55.343000 @@ -206926,7 +206926,7 @@ CVE-2022-41212,0,0,3aee6601ecb5b41394b21d287c82806881cbeec27c635ec77fc09f456f918 CVE-2022-41214,0,0,57a63dcb9dcef2d0f21c9b04f05402500987bd94c501c557a12d92cc1d0e9e1b,2023-11-07T03:52:44.250000 CVE-2022-41215,0,0,d6b56989d143f5b7ced880f0198bbb0aea11b6840881eb818f104364d0047d01,2023-11-07T03:52:44.333000 CVE-2022-41216,0,0,b51753b79cd3b73dda1fbafb0583b9dfb992bd7ffa5207deb922d4db751db73b,2024-09-13T18:08:43.850000 -CVE-2022-41217,0,1,ef03321142499fc7419a7ce5e88db20e188a7cffb612fb3a160d149af443bfe3,2024-10-16T12:15:04.860000 +CVE-2022-41217,0,0,ef03321142499fc7419a7ce5e88db20e188a7cffb612fb3a160d149af443bfe3,2024-10-16T12:15:04.860000 CVE-2022-41218,0,0,4d8d0f5612320f06b4d039e95a77096f203ac9352286eb59f9765d04c53bec07,2024-03-25T01:15:52.347000 CVE-2022-4122,0,0,f5151e95d79980c9d929f6448713384a73d5e1f0b0edb7410e38f0420d8822aa,2022-12-12T15:48:07.023000 CVE-2022-41220,0,0,da1cbb52d343b2134f8ea63cf473ac9cbe9d0168374bda3242bc76b5d9d8b0f8,2024-08-03T13:15:42.457000 @@ -209775,7 +209775,7 @@ CVE-2022-45049,0,0,d98b08f41c9f4c9b8c17761481eb8da8fc31beca12133aa5d1d9a4f2dd4ed CVE-2022-4505,0,0,80acf6850bff297cdcdcde9e235f2ea50363cd8a843569ae0e7b3ec505ac1090,2023-07-11T08:15:10.283000 CVE-2022-45050,0,0,6a37ecc7452e165ad3ae682d972aa78274210ba552c1115ed44bbaf958414280,2023-01-09T17:12:50.767000 CVE-2022-45051,0,0,4e552beb31f904d7ac3844f86db76bd9fc9a6e763f151f7268caf3ff4ad0b103,2023-01-11T03:05:10.367000 -CVE-2022-45052,0,1,04d1575250c1293df846f72aca4704340bf01fa0cd6fedf46fa5b4ab63d794c9,2024-10-16T12:15:05.160000 +CVE-2022-45052,0,0,04d1575250c1293df846f72aca4704340bf01fa0cd6fedf46fa5b4ab63d794c9,2024-10-16T12:15:05.160000 CVE-2022-45059,0,0,d33334463a33c5bae7491e5f05f48cf2f1272b7d9eb0571e9d0b56906c97a288,2023-11-07T03:54:29.960000 CVE-2022-4506,0,0,6eaca7d450e1159b3b0c00e9dbba66557efed1f01003df22ac4e40cc1645e937,2023-11-07T03:58:01.067000 CVE-2022-45060,0,0,ab2b4e231abf462892ff46383a29d0f52cc1dcee9bf3ea910e5e072bd622082b,2023-11-07T03:54:30.160000 @@ -211453,7 +211453,7 @@ CVE-2022-47443,0,0,f3515c60fd4f71ff9333641d9a1e0aa7946c04420fb0afbf849e665f04ab9 CVE-2022-47444,0,0,6624a8a1c3b9de9de1701d058fc5912d473ea3542c518e98f1d8de690761bc95,2023-11-07T03:56:15.930000 CVE-2022-47445,0,0,b11c350216f07ac5b657d219600f06905c0c0562ab8a865c5e75560f8682b702,2024-09-05T18:35:01.370000 CVE-2022-47446,0,0,83b1c896c5c167280e3a1efadbbd80b817554e557ce03717a283513f01e521e4,2023-05-30T17:47:25.017000 -CVE-2022-47447,0,1,5955dfc6cec68f406ba7d4f7829f67750169ce9fd780a2a7f6716ae9f2453857,2024-10-16T13:47:56.247000 +CVE-2022-47447,0,0,5955dfc6cec68f406ba7d4f7829f67750169ce9fd780a2a7f6716ae9f2453857,2024-10-16T13:47:56.247000 CVE-2022-47448,0,0,3fc801e4772dc4e483f5041fb67f263631a138235229f497dffcf10544b4f237,2023-05-30T17:45:12.073000 CVE-2022-47449,0,0,f6073a1b17ec4fa41311192d25996afaab7a92363c0277345010937216824fd0,2023-05-10T18:20:05.127000 CVE-2022-4745,0,0,167ce06261c5076745838b2dcaa3388a78ac0606306429453e09e207f90daf06,2023-11-07T03:58:46.707000 @@ -216806,11 +216806,11 @@ CVE-2023-22579,0,0,b50f51817f5ab55f90ca17e0a70b50b2a7f894e20f1a8ab175a13831f05df CVE-2023-2258,0,0,2111fd7aff14bd333121caf2dac078ba48b6ab8a9a535c7974b5ec7af774769a,2023-05-03T20:15:13.487000 CVE-2023-22580,0,0,48060b11ca3496a0342f2a08e850a8810444693991f5cd3ef61f9f628e8c7fc0,2023-04-28T18:52:21.847000 CVE-2023-22581,0,0,dbe8e80a125a9057948e68bca7230a78bb5a4b7e3bb2aab39d6610a03f0070c1,2023-05-02T19:16:34.527000 -CVE-2023-22582,0,1,cf329a854808f7208c5e3e3800300d304be782dbfdc793baec1ef6c1ace45547,2024-10-16T12:15:05.483000 -CVE-2023-22583,0,1,33fbce81cdccd7f3d37293ade3ec80a9908f552445fb87dad119e1b409b5853d,2024-10-16T12:15:05.707000 -CVE-2023-22584,0,1,af8ca952c62b02738757a7b333bfdb6278825d2bc6dec13179658ac78b50607b,2024-10-16T12:15:05.867000 -CVE-2023-22585,0,1,c2d5ebfe96532d7494693ccb578baf870c54dbf9ca7a116da9e3505e44e696c6,2024-10-16T12:15:06.003000 -CVE-2023-22586,0,1,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a10e1,2024-10-16T12:15:06.140000 +CVE-2023-22582,0,0,cf329a854808f7208c5e3e3800300d304be782dbfdc793baec1ef6c1ace45547,2024-10-16T12:15:05.483000 +CVE-2023-22583,0,0,33fbce81cdccd7f3d37293ade3ec80a9908f552445fb87dad119e1b409b5853d,2024-10-16T12:15:05.707000 +CVE-2023-22584,0,0,af8ca952c62b02738757a7b333bfdb6278825d2bc6dec13179658ac78b50607b,2024-10-16T12:15:05.867000 +CVE-2023-22585,0,0,c2d5ebfe96532d7494693ccb578baf870c54dbf9ca7a116da9e3505e44e696c6,2024-10-16T12:15:06.003000 +CVE-2023-22586,0,0,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a10e1,2024-10-16T12:15:06.140000 CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000 CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000 CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000 @@ -216867,7 +216867,7 @@ CVE-2023-22647,0,0,0681a89ef45e77cb88370b6be3b7fa1bc36fb3f322132affe5240d43f6147 CVE-2023-22648,0,0,efcbdf59a79cc8b674d3df58e9203094276b2160da909666a01d8f83b10e10b0,2024-10-09T09:15:04.260000 CVE-2023-22649,0,0,d4ebf42ad718951503cab5c9b7b7a3e67f336adaccd056c63ea4e50903ae1ff3,2024-10-16T08:15:04.390000 CVE-2023-2265,0,0,6f6b69921089c30ff5335917053cb9d5a1a7f59a21a953d6d1041152fa7874ac,2023-12-06T00:35:41.900000 -CVE-2023-22650,0,0,580262d04ddf34ae6b0fb497a834627526d09ac5a6bb987876be1c2a568653b7,2024-10-16T09:15:02.957000 +CVE-2023-22650,0,1,705ca8474813cc1639e9700f3a73d7de0d16e6629df5b18935ad6d70968b9f23,2024-10-16T15:35:02.523000 CVE-2023-22651,0,0,6d0f20aeda01e69ecd80dc8867cf7c9b361c7ee144fe7c3ff65cbb9e3210ad1c,2023-05-10T18:08:49.957000 CVE-2023-22652,0,0,b96b1da985da20364c0e2e7f35e5ae49a780ad08eb5a89d6ab26c66053650903,2023-09-13T03:15:07.693000 CVE-2023-22653,0,0,3d72c27281a8ea8408016eac6c592251cdcbf44d004ab30840957e6a323b7ed4,2023-08-02T15:34:59.683000 @@ -218460,7 +218460,7 @@ CVE-2023-24690,0,0,e2547dd910c57f1b22f5098edefee1c2fd4450e661ce4f71183eb31abaa7c CVE-2023-24698,0,0,9eabc9392f3eb51c31329d1b42a8ce11e17f2220f701712f00f2cc7c3d488a87,2023-08-15T13:35:18.067000 CVE-2023-2470,0,0,08c45f40e998215eae3bede674c7687151b938a249e0bdedf2c49640d6c5a3b4,2023-11-07T04:12:43.057000 CVE-2023-24709,0,0,a44d1abf1b51b002a1a36940e85deb0e91478cee4831ca0b9a57e1912bd50ac6,2023-04-10T20:15:09.513000 -CVE-2023-2472,0,1,65a10d9848ce0509536c037a8c964c58f82bfa3f18b74e8ffa29952f6a82f291,2024-10-16T13:26:19.017000 +CVE-2023-2472,0,0,65a10d9848ce0509536c037a8c964c58f82bfa3f18b74e8ffa29952f6a82f291,2024-10-16T13:26:19.017000 CVE-2023-24720,0,0,9226b5d1018d73f45aaefd8e3101bed72bd92e6f193e3914e55aed5ec06c5596,2023-04-12T17:11:20.667000 CVE-2023-24721,0,0,36c5b231ac40fad13b4992be5e40fb14a845817c3b03d5d72925828da8d5cfee,2023-04-14T18:51:08.097000 CVE-2023-24724,0,0,4a23d9573bb538b640e11ef479329a77c129b98d6eed84ab97293bd70ace2028,2023-11-07T04:08:39.583000 @@ -219470,11 +219470,11 @@ CVE-2023-25908,0,0,711438efc879e2da908e2fe34d4665fa30cbe36911b66474d51f45124f9d1 CVE-2023-25909,0,0,3a86e8d0a5a9c75a3b1ba6c2bad2da112b86b40373c068ef888ca6a2ada20e0e,2023-03-31T14:22:26.143000 CVE-2023-2591,0,0,96d5b6c54d43252f274ceb94cd62959a81cbf5756e69f0c5bf41509a0370f395,2023-05-15T06:15:09.727000 CVE-2023-25910,0,0,8820f037eb373093f9e7e9604082c261621d3d440b751f2aaafe310d86c53bc4,2024-05-14T16:15:28.993000 -CVE-2023-25911,0,1,4d70a282bfba98a9074899c40fb1bb9eea1ffda5de7053461b3d608a074e9fa5,2024-10-16T12:15:06.397000 -CVE-2023-25912,0,1,509f2d60312d748e00f47e4b6a3907b60209f5abee1c17e89e6f2341c971ad34,2024-10-16T12:15:06.553000 -CVE-2023-25913,0,1,d3b01a7e6e3bdc4679b239e3fd5c80b1402416d5dea2cc053bcdfeacc7b49bd1,2024-10-16T12:15:06.790000 -CVE-2023-25914,0,1,94e4d6f64339663bdaaf0e7f6ede3aec39430ba15fb568ca5059bc3d81a48ec2,2024-10-16T12:15:07.050000 -CVE-2023-25915,0,1,2e07e82a0215a37be87d12b1ad1b5f202cb89d3b909001b573d9eec559937ea5,2024-10-16T12:15:07.283000 +CVE-2023-25911,0,0,4d70a282bfba98a9074899c40fb1bb9eea1ffda5de7053461b3d608a074e9fa5,2024-10-16T12:15:06.397000 +CVE-2023-25912,0,0,509f2d60312d748e00f47e4b6a3907b60209f5abee1c17e89e6f2341c971ad34,2024-10-16T12:15:06.553000 +CVE-2023-25913,0,0,d3b01a7e6e3bdc4679b239e3fd5c80b1402416d5dea2cc053bcdfeacc7b49bd1,2024-10-16T12:15:06.790000 +CVE-2023-25914,0,0,94e4d6f64339663bdaaf0e7f6ede3aec39430ba15fb568ca5059bc3d81a48ec2,2024-10-16T12:15:07.050000 +CVE-2023-25915,0,0,2e07e82a0215a37be87d12b1ad1b5f202cb89d3b909001b573d9eec559937ea5,2024-10-16T12:15:07.283000 CVE-2023-2592,0,0,7e4a496757ad28922cc131b3dc6c5dcce821dacaa7d1248a91b5f3a5abc13651,2023-11-07T04:12:55.187000 CVE-2023-25921,0,0,db434be2822e9f805fcd7099a71822c578de64397a6bb25c1f1ea2030a0f42fd,2024-02-29T13:49:47.277000 CVE-2023-25922,0,0,8bbaac4e7be5e855017ab720e3a49ba12435c5575eb4c40dc6dd2b4acb226464,2024-02-29T13:49:47.277000 @@ -221089,7 +221089,7 @@ CVE-2023-28014,0,0,e9527285e1779684b7827d328d7b2a0939f2ce513889fe5afcff451f70169 CVE-2023-28015,0,0,fd2fa96d944cf7263a795762790ca20e9f0dfc22ff5dec06f6e24bfe3a45a540,2023-05-31T17:52:43.060000 CVE-2023-28016,0,0,5e771bf94a23ecc72dc9b17cbd4172aebdcb39e6635c7c46a54bb035f5898f33,2023-07-03T19:17:06.243000 CVE-2023-28017,0,0,e48baa44164852793de78a6b81bda626047ee252d2b4a469bf3ffd7338f36c44,2023-12-12T15:51:51.903000 -CVE-2023-28018,0,0,8e1acb4b1d5a3ed2df449eed4bcddd1a71d3ceb718579368d1da48a821cc2d5f,2024-02-13T14:01:49.147000 +CVE-2023-28018,0,1,942c4e4fe6dde4d1622ced3fb69940496dbd8529280a2e25050fdde4ad9e5c86,2024-10-16T15:48:54.437000 CVE-2023-28019,0,0,f6bb18f349755ba3d2ab21159ab78ba8838dfd349cdbe3c031b1cba5f5dab00d,2023-07-27T03:53:40.647000 CVE-2023-2802,0,0,fb41bf1f479860f7a17bb7980c60b61d0bea28d539ad0c4c0cb9f621282175e8,2023-11-07T04:13:21.240000 CVE-2023-28020,0,0,f920894565f4ff367c9ed56f9854dd70650f462a0fc5d8ee1880cd04aa48d06f,2023-07-27T03:56:44.280000 @@ -224290,13 +224290,14 @@ CVE-2023-32184,0,0,123bec51d72ff65d7213bf06e3d98dc3786350eb64238bdb1de857862a0ef CVE-2023-32186,0,0,e06556634f58d819dfae5b78cb8714f5c9bc5370508503590046fde23b8885e0,2023-09-22T02:00:06.313000 CVE-2023-32187,0,0,604bbf8f396584f0efa1594da6fe3c409bf951238cacbb8e57499c590e5e3fd1,2023-09-21T15:21:31.567000 CVE-2023-32188,0,0,414806e16a24df1ecbb6aadbe57c9884e174210dd398c42b014e332ad5c10d7d,2024-10-16T09:15:03.260000 +CVE-2023-32189,1,1,3f91195da7809b724aaa247d5c0f877138671319722cbf083a7e008380a7c33e,2024-10-16T14:15:04.140000 CVE-2023-3219,0,0,6eb56310ef4fd619262ae96943204b765f45a221a776e69bfc250b710761d69b,2023-11-07T04:18:14.830000 -CVE-2023-32190,1,1,506aec27991d4772be88a76d50cd44b48e86907fc0c8f0f8223fc2c6448d0dab,2024-10-16T12:15:07.460000 -CVE-2023-32191,1,1,5ba893f4fdb69c66bdfcbd5d71c019fcc35759e17b71a85ff4fbee016b65eb28,2024-10-16T13:15:12.067000 -CVE-2023-32192,1,1,cdd03a4f1481533d366cc92c2198ee88b86f88e5c8761f91fffc421021d38743,2024-10-16T13:15:12.297000 -CVE-2023-32193,1,1,515b91e441a27f79b30ea6e869fedba70054dfa58fe7b65ae5cd73cd9ba5c477,2024-10-16T13:15:12.540000 -CVE-2023-32194,1,1,9f00faaba13c9dba9727f29211f38af09e2a6ccc23288040dea8a061e4cf893e,2024-10-16T13:15:12.787000 -CVE-2023-32196,1,1,3dd5c164e1456347ab06fbe343f8075b758091f15ef870871cf4cc45c4173712,2024-10-16T13:15:13.060000 +CVE-2023-32190,0,0,506aec27991d4772be88a76d50cd44b48e86907fc0c8f0f8223fc2c6448d0dab,2024-10-16T12:15:07.460000 +CVE-2023-32191,0,0,5ba893f4fdb69c66bdfcbd5d71c019fcc35759e17b71a85ff4fbee016b65eb28,2024-10-16T13:15:12.067000 +CVE-2023-32192,0,0,cdd03a4f1481533d366cc92c2198ee88b86f88e5c8761f91fffc421021d38743,2024-10-16T13:15:12.297000 +CVE-2023-32193,0,0,515b91e441a27f79b30ea6e869fedba70054dfa58fe7b65ae5cd73cd9ba5c477,2024-10-16T13:15:12.540000 +CVE-2023-32194,0,0,9f00faaba13c9dba9727f29211f38af09e2a6ccc23288040dea8a061e4cf893e,2024-10-16T13:15:12.787000 +CVE-2023-32196,0,0,3dd5c164e1456347ab06fbe343f8075b758091f15ef870871cf4cc45c4173712,2024-10-16T13:15:13.060000 CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f910122,2023-06-27T12:44:47.967000 CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000 CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000 @@ -237844,7 +237845,7 @@ CVE-2023-50777,0,0,df0d9de6b8a0baaf3efff27900ebb62bf75a216074a2617fe71f734fe044c CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000 CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000 CVE-2023-5078,0,0,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000 -CVE-2023-50780,0,0,c16a87f5c648c3058ffaca07ab4bfbf4e9d01368183c447f1d04ab3f57ca89cb,2024-10-15T12:57:46.880000 +CVE-2023-50780,0,1,28dc81aeefcf81f77448e43ed4d0230c17bc81ccdd14731c897decaa0300412c,2024-10-16T14:01:55.103000 CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000 CVE-2023-50782,0,0,658725b86153a9f539275c901096223b399321aeaa417b3e344f544d03067a46,2024-09-27T19:15:09.603000 CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000 @@ -238989,7 +238990,7 @@ CVE-2023-52427,0,0,0a54450b6cf413ae3e0cd14ca73a4997d322ba669f6ff28b106bdd9dadc65 CVE-2023-52428,0,0,780a20df5925e099c50682efa6b9b5b9a7581e992635addf027a9478a9c99948,2024-02-11T22:29:15.837000 CVE-2023-52429,0,0,bb71f6867b546918a32b40939aad4a54664a6e064966565e92e979c5b5823dd4,2024-06-27T12:15:13.797000 CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700c3,2023-11-08T18:40:41.847000 -CVE-2023-52430,0,1,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000 +CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000 CVE-2023-52431,0,0,199f10747613e848b4be76ff988b9f76b50282c6e59f2e5da91f811ef18a5901,2024-08-01T18:35:05.050000 CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000 CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000 @@ -240515,7 +240516,7 @@ CVE-2023-6364,0,0,fba4607731a6fbc78b4193d2d92ff3c3c10642250022df3b4c2b27e59e7cab CVE-2023-6365,0,0,adfc971ce1542cf6b6b567819af477b3d1939f8ac3b728778258d524fc18b9de,2023-12-19T16:52:31.667000 CVE-2023-6366,0,0,a90661065572d79c101158308fe089b72abce2e5997d868a6480cd1c64aa03fa,2023-12-19T17:30:45.493000 CVE-2023-6367,0,0,31a3cbfe4a9d3e78c0d9bb53887319bd48bcd900056f55569fde0842228c6af5,2023-12-19T17:44:03.543000 -CVE-2023-6368,0,0,ac5f60f0e3f4bf945e45430940f83aac95c35ae4401e759fff23c76096e53c47,2023-12-19T17:48:19.703000 +CVE-2023-6368,0,1,edd41ec8c653429f8fd8f843d5c27d74a0d3773c7f5dc7568acd9e5ad6681ab2,2024-10-16T15:15:13.703000 CVE-2023-6369,0,0,a88316fb208d9bb5f8e86957bf4db92830182aa73bc7d417011d2f09a89ba0b0,2024-01-17T20:21:24.517000 CVE-2023-6371,0,0,d4b4540751d79ef1521731dc601f228596a26fff71adb9517265c51c31ce7b73,2024-03-28T12:42:56.150000 CVE-2023-6373,0,0,f53b88f0a09a4e4490672a52157293b07c299d50e67860a87677483c13a3a2a8,2024-01-23T14:53:25.540000 @@ -240710,7 +240711,7 @@ CVE-2023-6591,0,0,b3431473f4254d7e94a5d0a773451a8ff4e22dc82d431e43a20350544c6686 CVE-2023-6592,0,0,0adc812257fbd91a67a793f4568aaca2b31731b8c909103ecdfd8d33fef06ec4,2024-02-05T22:15:55.937000 CVE-2023-6593,0,0,fe1ee711e78c3bb0a13a29704dce0aafa9fa06e3727be5f19b50dd27ddc695a2,2023-12-15T14:38:03.057000 CVE-2023-6594,0,0,277e0f84fdab8db60396d1e087aca8094336e147a66dbbb03745e488ffdbc935,2024-01-11T23:32:17.207000 -CVE-2023-6595,0,0,5828390deb9ac42b20fb3473d28bc748e6ee820f5bb0240230ebb1293c95e276,2023-12-19T17:51:54.827000 +CVE-2023-6595,0,1,2d192c3d7af3a196a2524e511257a218e371ab6c5bf20a13cbfdd8e045fd7d03,2024-10-16T15:15:13.917000 CVE-2023-6596,0,0,ab67a540d15a590d789125c8fc5d7bb33a3b8094f82b04646bb0050a4ceeff6b,2024-04-25T17:24:59.967000 CVE-2023-6597,0,0,ac8c057de6d1c11d6944b0b9d92513a5893025dbfa0d30575569eb524fd5d853,2024-06-10T18:15:24.760000 CVE-2023-6598,0,0,44646d82b677b24aa988874a2f513c7a55374b6fc5e8239b526ea32f6db36822,2024-01-17T21:24:33.233000 @@ -241290,7 +241291,7 @@ CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d078 CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 -CVE-2023-7260,0,1,320b55d1f034809d79e51e192994ba6b2fe9aaa6c60b445d7c661747328ccbb2,2024-10-16T12:53:08.807000 +CVE-2023-7260,0,0,320b55d1f034809d79e51e192994ba6b2fe9aaa6c60b445d7c661747328ccbb2,2024-10-16T12:53:08.807000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 CVE-2023-7265,0,0,fb43e2fc7ead32f16ab1a40e592be4835649042e83490e66c86a7fe9f44ca4b0,2024-09-06T16:38:04.533000 @@ -241802,7 +241803,7 @@ CVE-2024-0560,0,0,409c0d8e6471fa649d49f48b1bab7c329ea2d720630383d0d79cff1c14ca25 CVE-2024-0561,0,0,09bd47669bfb1d5000475a8644f9647b8b9cfe657a0a22ee3ca31f75fdadd4e7,2024-03-12T12:40:13.500000 CVE-2024-0562,0,0,da76ada5e80bb87b4a110a9fa03a565bf9113fd5412b976afa32604e08bd486f,2024-08-27T14:57:10.957000 CVE-2024-0563,0,0,9ec355fcf8c2bfde63e8cd3b32f6b09899d66d999623867d4585cdbccddf2e84,2024-08-27T11:15:04.277000 -CVE-2024-0564,0,0,9f4cf532f2df225cad861ce2ec08ab9ceb4e29633d51c64f31796eb4bcd7e01c,2024-02-08T16:36:48.837000 +CVE-2024-0564,0,1,e658595f44d1aeec7c9b8d0db769cc2be653bf4eea6c6475809afc90d39e1035,2024-10-16T15:15:14.110000 CVE-2024-0565,0,0,ca58e43bc8d960bbfb34d32be78694d44cad238c92c5ee98dbd6b9bf2c483600,2024-09-14T00:15:15.387000 CVE-2024-0566,0,0,596c6a44a6236efe2ddb3202b638004a8482a0ee81f574b58e361ad51f787e1d,2024-10-09T15:23:20.433000 CVE-2024-0567,0,0,2f4df701f3416c48266db1bb8a27d322f4c7f91f5c54f623275f8e06a0796629,2024-09-16T13:15:08.680000 @@ -241876,7 +241877,7 @@ CVE-2024-0641,0,0,65eded4d16aec7accb7f6502f2049811c8c28b8c00f13f2b790f15971a21b9 CVE-2024-0642,0,0,015121aefe6958e10648c2f414972825fefb755d8d649c4c15f3edc1a228b9ed,2024-01-24T19:29:41.893000 CVE-2024-0643,0,0,40527bb444455f1148a87e26d7767c451ed5afb4beb3d0e2db91b98b906aa04a,2024-01-24T19:27:40.553000 CVE-2024-0645,0,0,9edf776dd2a288822d7555994ea5d2d0472b774fe6a1f1d2d90864238eedc130,2024-01-24T19:24:06.717000 -CVE-2024-0646,0,0,7c684db457303c9c7fa1b13949f5e77a938b248a4dad96ab1f1c30297ace1a7a,2024-09-14T00:15:16.080000 +CVE-2024-0646,0,1,d695b5db6f00365acf5d79fd7f5ba5c6649555425b93706b7f6ee168c23fc630,2024-10-16T15:15:14.333000 CVE-2024-0647,0,0,4342ee4e022da42dd14f7efff309eca411eedf49e01c3392607c214bf4e2c8ae,2024-05-17T02:34:50.107000 CVE-2024-0648,0,0,e765db4044e052d1da0ceb6682de48302ec32362748433b0a28b107b8f33a1ab,2024-05-17T02:34:50.217000 CVE-2024-0649,0,0,8817af05ac2e9ae88a24a135fe7609a1e8335ab7555312026caa5e9a07edf341,2024-05-17T02:34:50.330000 @@ -242063,7 +242064,7 @@ CVE-2024-0837,0,0,7bfac1e22acffb0a184b593e40514b77abae9f2890782fad20b9317457b8d0 CVE-2024-0838,0,0,42315cf4521d12889912cff1c85a301801b04fdac5417dd948a88540f6fba390,2024-02-29T13:49:29.390000 CVE-2024-0839,0,0,8d88255c4e5443aeff75b477726b775ced865793d0853cdbb79545b2aee78498,2024-03-13T18:16:18.563000 CVE-2024-0840,0,0,9078cee19016ff99f6316d01588830a1de32f2a2e70468f86ffd65c16b6e07e0,2024-04-30T13:11:16.690000 -CVE-2024-0841,0,0,b8f92b6cded6c278be3c966bfd73b8d9e4de7fc8271fe7bb6e7cf27c847ec3b8,2024-09-14T00:15:16.693000 +CVE-2024-0841,0,1,e759acba626ef8e90df6e1f6752e7a86645fb2109bb148610d7f5a6d39bd575d,2024-10-16T15:15:14.793000 CVE-2024-0842,0,0,4210cdc4d6e5b4c77c695a0006ea1b3761c085f39cf3f5e8e834b3dfab9d04fb,2024-02-15T19:11:14.253000 CVE-2024-0844,0,0,5710abfde87264801cb6724b4c6fe48d5e6aaa7ab9e4722684f52ede3f04eeea,2024-02-08T16:15:39.903000 CVE-2024-0845,0,0,e2d64147b9dd7a8d3079a1c37dbd9729e37a9ad5f80b1672f255d14d99a17688,2024-07-05T13:32:05.783000 @@ -242211,10 +242212,10 @@ CVE-2024-10004,0,0,231cc5ca14331ea97625043de7a57398d2b1f74e8058a5b71a2840a63876a CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10018,0,0,48094474c9a835a3211b517c0339040bcffcf76ffcf2e981b9d66c0ec82efb42,2024-10-16T03:15:02.620000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 -CVE-2024-10021,1,1,07e6b52c1364dda8ad8ea27c95a3dabc68a676e7ccf5b45ebdbee80a281368c4,2024-10-16T12:15:07.663000 -CVE-2024-10022,1,1,8fa31ce99ccec4e2e52ee9bec89d95d4d376e26078adaac9508062c560c7628d,2024-10-16T12:15:08.163000 -CVE-2024-10023,1,1,ccbf4801c6b8aa5cf2b2aedcb35d6690eb8e2dd2a5d829b16e4da410a1eee636,2024-10-16T13:15:13.350000 -CVE-2024-10024,1,1,ce51adeabcce6f84d32448bdacfff70e14a2ad81fddb95d38b3025cbc2a17cbd,2024-10-16T13:15:13.650000 +CVE-2024-10021,0,0,07e6b52c1364dda8ad8ea27c95a3dabc68a676e7ccf5b45ebdbee80a281368c4,2024-10-16T12:15:07.663000 +CVE-2024-10022,0,0,8fa31ce99ccec4e2e52ee9bec89d95d4d376e26078adaac9508062c560c7628d,2024-10-16T12:15:08.163000 +CVE-2024-10023,0,0,ccbf4801c6b8aa5cf2b2aedcb35d6690eb8e2dd2a5d829b16e4da410a1eee636,2024-10-16T13:15:13.350000 +CVE-2024-10024,0,0,ce51adeabcce6f84d32448bdacfff70e14a2ad81fddb95d38b3025cbc2a17cbd,2024-10-16T13:15:13.650000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 @@ -242310,7 +242311,7 @@ CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 CVE-2024-1099,0,0,60fc16226818d332b7b359f2f2234cb026357af6ad05031d156ab3f490bb4021,2024-05-17T02:35:14.133000 CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 -CVE-2024-1102,0,0,9f788b8998d0881c3a87580c29b86b36fe5ea4d008a4351422134cfe2f1cb098,2024-07-03T01:44:59.757000 +CVE-2024-1102,0,1,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685dd,2024-10-16T15:15:15.150000 CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000 CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000 CVE-2024-1106,0,0,0c083eb1d2872a0afc4685d759a53706a197f62b52430ade8cbb69025762b7cd,2024-02-27T14:20:06.637000 @@ -242647,7 +242648,7 @@ CVE-2024-1450,0,0,5c78ee7ecaa738b41245290c13db435007588e4f06193084183217b1157cb9 CVE-2024-1451,0,0,06be5f5604355f77fabf82dd57df1f8809446c587ecb10ad9e69cebf8ec03e7a,2024-03-04T20:12:59.223000 CVE-2024-1452,0,0,e53b6badbfb961b470f92bd813c19b81fa9530e5a4fab209b8360590eeab9b44,2024-03-13T18:15:58.530000 CVE-2024-1453,0,0,4c7fdd77bf9774c0b4902debd5fbb9a5a455811c9e20dd37093901421ad05d83,2024-03-01T22:22:25.913000 -CVE-2024-1454,0,1,18d85e22fa9ffdfecab668843fd14652fcb1ac45d6f86513cdcc76aa1478a0be,2024-10-16T13:57:49.460000 +CVE-2024-1454,0,0,18d85e22fa9ffdfecab668843fd14652fcb1ac45d6f86513cdcc76aa1478a0be,2024-10-16T13:57:49.460000 CVE-2024-1455,0,0,150cf04553026c6d927055f564987fc57df0c743f9421c15918b44f92d1a260f,2024-04-16T12:15:09.230000 CVE-2024-1456,0,0,5b0bf210be135d03b9e0f0aa4d44e1d74b665ecf3cd8074dce271769fca228b4,2024-04-16T13:24:07.103000 CVE-2024-1458,0,0,3592b3461bffe67c8c4bc63c3d6ff327fca1737b7c0b5caa3c39b57cb625a124,2024-04-10T13:24:00.070000 @@ -244120,12 +244121,12 @@ CVE-2024-21253,0,0,42535f4c287e67a28a65451bbeef8eb7dd78d47d09398c95f842cb9658f40 CVE-2024-21254,0,0,cd2913aaa8aee4ad5eccfc47b514b300ea2849b7dc85ed7b0279effcdb0d1ff3,2024-10-15T20:15:15.853000 CVE-2024-21255,0,0,a39973ac513195c68de6cce7f6f30a80736ff3fbaecdcc6886dc2dbca889d6e9,2024-10-15T20:15:16.040000 CVE-2024-21257,0,0,8e7727d500cb637d646e4dbd453d6b3f7360249a8f9b56ba6fd24dfe0ff76408,2024-10-15T20:15:16.220000 -CVE-2024-21258,0,0,e69c667f399872c54018f1694cfb6b3fc98d74ebac96037f7e5b288ba1efa95e,2024-10-15T20:15:16.410000 -CVE-2024-21259,0,0,9414436aa001440dbb70ebc4ed88ea82174570306d0e93b9c729da743359d81f,2024-10-15T20:15:16.590000 +CVE-2024-21258,0,1,e36a363226d96f58840ea3c3bd0279fbe5192f6c3218be95b1cac25941a1560b,2024-10-16T15:35:06.670000 +CVE-2024-21259,0,1,279de8cd2da968906e3f2e514000f06201bfd3b698cbb23ca56f47519cc5089a,2024-10-16T15:35:07.490000 CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000 -CVE-2024-21260,0,0,72438adb2d0c804453cac2dcc04e275cb93495a96219636d41d83bfc63a11bd7,2024-10-15T20:15:16.777000 +CVE-2024-21260,0,1,4347be6fedd4ac56bc931ba21cbb241e445cca8acd9cb052398d7c1c1e161d5f,2024-10-16T15:35:08.260000 CVE-2024-21261,0,0,f699605c630138a5c5a94a864d112e5cf32d36612853d753eff50cc016f016d1,2024-10-15T20:15:16.960000 -CVE-2024-21262,0,0,7d22323d4195a649f78ac9c2f252047e25e599d950f83b6a6687af8f792f6544,2024-10-15T20:15:17.157000 +CVE-2024-21262,0,1,90708a337e586834b151e806c25c89eabe837a3390ed4b0ca00d3a28d313e914,2024-10-16T15:35:09.063000 CVE-2024-21263,0,0,b81734807fafd89f08cdfe5bf71ce9461b8952c3037628d6d663a93477ecccd1,2024-10-15T20:15:17.340000 CVE-2024-21264,0,0,158bd967d3d4b3fdd08b78ab8343c5d51973598d9242e515e4e991d294376c9f,2024-10-15T20:15:17.533000 CVE-2024-21265,0,0,0fd686d2ec5596677c68bf30b6c00819390e60176f2aafcd5f3c202409f4becc,2024-10-15T22:35:01.220000 @@ -244135,10 +244136,10 @@ CVE-2024-21268,0,0,e61a6bc2d7ce72276102e92a19af903274e5ab6aefc0678fec4fd0f27e30c CVE-2024-21269,0,0,28e734998e6a63bf4bc52073310fcb21e096610f3c2085b5a135fd826a77eb99,2024-10-15T22:35:04.073000 CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73db,2024-03-08T14:02:57.420000 CVE-2024-21270,0,0,7fe6021508a0ac30d762a1cbb059c5d774e103b7cce49c5f915b036969710c24,2024-10-15T22:35:04.803000 -CVE-2024-21271,0,0,b85d49d8f9de00c029cd3202996b9b057d499d9f44df9f57d9687a0a9038b029,2024-10-15T20:15:18.787000 -CVE-2024-21272,0,0,c149d420ee7f3d8baef5e75358728372978558e6fb033c09a3d5d75f23e8c02f,2024-10-15T20:15:18.963000 +CVE-2024-21271,0,1,1cd8142374917742818b9a80a01e2f3a2262bf2324d3bf83f3a00fd53b661b85,2024-10-16T15:35:09.847000 +CVE-2024-21272,0,1,14fe5bf3f5a612f810b219edf6ff93306427ff55c5735bbd3af74c7d6fd33036,2024-10-16T15:35:10.650000 CVE-2024-21273,0,0,04496095cb8b4aaa02970f47691658c4e2810952d7922253a3c38fafccc67088,2024-10-15T20:15:19.140000 -CVE-2024-21274,0,0,62a4b2b2e4c942516aad07bf7b07a150c0cce85637c2314b2e9cae729fe68350,2024-10-15T20:15:19.337000 +CVE-2024-21274,0,1,80ea71e166430216edd0ec5e590e81c400886af68829f9b92a7ea09db6c4d7c5,2024-10-16T15:35:11.457000 CVE-2024-21275,0,0,b4813bbd023907b695e0cf42a56fa8818e71a3ced44a8782a2ee19565fc157a5,2024-10-15T22:35:05.663000 CVE-2024-21276,0,0,7b8f13275b3ccc4f9f965a2a8c6cc431eb79a3e0612d12a090ac8f6ddd7acb41,2024-10-15T22:35:06.370000 CVE-2024-21277,0,0,43f283e2376cf350bdf2ba383e12e147f6335825576d88a3828a1b33eec6c34d,2024-10-15T22:35:07.067000 @@ -244357,7 +244358,7 @@ CVE-2024-21488,0,0,83c39f70c0498b72911f550d6611f69059c8c9cdf3b0f0904578cd793bad0 CVE-2024-21489,0,0,6e86fec7408d381a4d3031befda9d6c352fa47e8cee94c50201daa0dfff4032f,2024-10-04T13:51:25.567000 CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000 CVE-2024-21490,0,0,8fef65cf0f770a0e61ceff38aa6805ccb146d3ccd992f46918345da0115fd835,2024-10-10T13:51:02.213000 -CVE-2024-21491,0,1,8b3f805634bd0202a6da1c84d9cc592601351153f9b1f8af4e7e32c9715d19c2,2024-10-16T13:25:47.870000 +CVE-2024-21491,0,0,8b3f805634bd0202a6da1c84d9cc592601351153f9b1f8af4e7e32c9715d19c2,2024-10-16T13:25:47.870000 CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3fc49,2024-02-20T19:50:53.960000 CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000 CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000 @@ -244651,7 +244652,7 @@ CVE-2024-2187,0,0,a8936a0952b83c5ba88ca6cea81f9850e57edc6e1289ba1fdb9217f4cb3f21 CVE-2024-21870,0,0,261e723ef3190c288a9a8c3f8500f3cefd68fef15433091d79f48a8358a48f68,2024-04-03T17:24:18.150000 CVE-2024-21871,0,0,9e312d84dd9b4a7b8467743245c308406e6b8b9b76e882b65ddead6c290aed9e,2024-09-16T18:03:16.707000 CVE-2024-21872,0,0,53e0faa097226f02f7b28a1019bf889e7e0fb2883871bfc21fe50f5bf87c752b,2024-05-28T17:15:09.413000 -CVE-2024-21875,0,1,d94092dada175a6c14145cd6d661efc5ba9ae7bfe0356d1291e89ee2b35fd0c0,2024-10-16T12:15:08.483000 +CVE-2024-21875,0,0,d94092dada175a6c14145cd6d661efc5ba9ae7bfe0356d1291e89ee2b35fd0c0,2024-10-16T12:15:08.483000 CVE-2024-21876,0,0,c3710b348c31e352259903f2c418ef0aba69493db54d12f1534898cd1d5b4667,2024-08-23T18:05:55.543000 CVE-2024-21877,0,0,e2e73302f5bf8afaaaffb2f0db0c2d16b586fe615b2b0992bf2ac9b6679823c9,2024-08-23T18:06:45.520000 CVE-2024-21878,0,0,789e3fe91c4f9f15772842a823deae244077b3af25e7833e3c5892430f68e0d6,2024-08-23T17:52:11.777000 @@ -244744,7 +244745,12 @@ CVE-2024-22025,0,0,c37311b2ce56df69ab782611ab699ce47988501146abd650aa709c2136307 CVE-2024-22026,0,0,4dc42eff10a0d63d4e6e79a7c42e9e031c3e8b304b1fa21458db78beb14efdf7,2024-05-23T15:17:25.833000 CVE-2024-22027,0,0,3d0c96b5121d14ad5b07896a4ad450229eb856557bf96a12fbaf8cb06d56efe7,2024-01-18T20:02:46.993000 CVE-2024-22028,0,0,7e34c9a53475d80dd7b3a13cb26dcaeaa9e734352ade695587a986ff6e9dab0d,2024-01-22T20:22:47.847000 +CVE-2024-22029,1,1,d00dacdc13e0c8fce758bf9e2d2a3a0103ea7c65bd3f5bed97d95c4651e55033,2024-10-16T14:15:04.500000 CVE-2024-2203,0,0,cca61da8371c28bd3605593db7eee591bd978cef090651cb80384fffb6a3ec59,2024-03-27T12:29:30.307000 +CVE-2024-22030,1,1,3dd4f2dc2ab5572376898f5626cc98b04013c8af9aa95b6af7c2e66740ac3b62,2024-10-16T14:15:04.753000 +CVE-2024-22032,1,1,3aca1e7e81078866b6ecf3f549baeacec688801dd6085ae8d4b8c1eb3d0d25a0,2024-10-16T14:15:05 +CVE-2024-22033,1,1,c99a05ea9daa7290e1455d929fb3232a0abc5ff7663094cbaaf6607ff5d04ec6,2024-10-16T14:15:05.280000 +CVE-2024-22034,1,1,79fb402439fe080010e23c86f10d37a50c63d61b09f54efbef5e3c061c709548,2024-10-16T14:15:05.577000 CVE-2024-22039,0,0,93b46f47ed43224423d7dcdd7cb5da88aa6d4c08cceaffd1397a4ad32f5be3ce,2024-05-14T16:16:04.450000 CVE-2024-2204,0,0,a1b09b74c91818340209a8ddf823ec1cf800d4476587d084b8cf03d19b7025dd,2024-03-15T12:53:06.423000 CVE-2024-22040,0,0,be358f199493e83f56d872322bfd43fdac4427b513b4fe755395a46f51c51b1d,2024-05-14T16:16:05.417000 @@ -244770,7 +244776,7 @@ CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11 CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000 CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000 CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000 -CVE-2024-22074,0,0,56771cd610dd31daee51ec58c4e8819920a60241dac3551d61392e3d2140ff10,2024-06-07T14:56:05.647000 +CVE-2024-22074,0,1,597eb5b51f6f6f2c4d569289cef4a67d7a503bfba7b03a39a3d413dc000d2aae,2024-10-16T15:39:58.847000 CVE-2024-22075,0,0,a5af4a36684a159511579f89d3ce85206e57c3558ab3a4b37d02f2a846a5e5f1,2024-01-10T15:06:42.563000 CVE-2024-22076,0,0,ad579321d212e2fb374b8124959febe687d1d1197907430ed2ba5046da4cb421,2024-02-22T02:15:49.207000 CVE-2024-22077,0,0,0d574f900f6ba15af6753de47087b404e70b7e744d15c464a0473f8e5a0b02bf,2024-08-03T20:35:03.080000 @@ -249703,7 +249709,7 @@ CVE-2024-28982,0,0,a19015356d660d2e2e0aa0476b84c95e664ecbb510badb624ee4eb55091f6 CVE-2024-28983,0,0,703d0fea3e992e6c157faf14895b95484e69f73d18d43a1bdd6448ade19b1d58,2024-09-18T14:36:16.267000 CVE-2024-28984,0,0,061a156a04ab4e4c76d21331d25299f4cff837eab5762774bbd4e38e96a6350a,2024-09-18T15:22:51.163000 CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000 -CVE-2024-28987,0,1,134caea59d5c8acf403cbb3a7d3c67116746c4784635b286d9fa1320e0c17afe,2024-10-16T13:05:08.363000 +CVE-2024-28987,0,0,134caea59d5c8acf403cbb3a7d3c67116746c4784635b286d9fa1320e0c17afe,2024-10-16T13:05:08.363000 CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 CVE-2024-28990,0,0,c552d85779f742e9eee5a53e7cb3b834247c40cd3dea313e4f856bb71772b3d4,2024-09-16T18:05:28.957000 CVE-2024-28991,0,0,f3a76278588de09c2001ab77f03da4ee20a5494ef74524c789ac890512227cb2,2024-09-16T18:06:20.037000 @@ -252770,7 +252776,7 @@ CVE-2024-33181,0,0,050373cfb1c1e53ba8267dbc3fabd7fa63ef5d1b950dbe9c6f1ffa2007dbe CVE-2024-33182,0,0,85cf52b790aabe853226358e7739617cb8f2d818ce16c35309a03355724b6ba5,2024-08-01T13:51:45.673000 CVE-2024-3319,0,0,158d523f4b4278449eb505d443711326036725edee1f3bf66f060fea5f4e72ad,2024-05-15T16:40:19.330000 CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000 -CVE-2024-33209,0,1,23a878e2073f134744034d1a78662ef24aa281701d58b60b1da6b83829cc478b,2024-10-16T13:33:21.313000 +CVE-2024-33209,0,0,23a878e2073f134744034d1a78662ef24aa281701d58b60b1da6b83829cc478b,2024-10-16T13:33:21.313000 CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000 CVE-2024-33210,0,0,a4330105a4d6b07d9316e6cba604bab6a3559db00469caeaea106e3e51ae6801,2024-10-04T13:50:43.727000 CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 @@ -254065,7 +254071,7 @@ CVE-2024-35060,0,0,afba2b727938592df1bdc4e63013255006d044a72a697f992c598613bec84 CVE-2024-35061,0,0,0df2890e20c38a1c44b9989903bccbfb46c27c7aacdaa254a5eaf724f2825eba,2024-07-17T16:15:04.877000 CVE-2024-3507,0,0,e1e1d417278f9c0917e2f747f1a5409d7cbe66638a172abe25b5d37d3cb7fea7,2024-05-09T09:15:09.623000 CVE-2024-35079,0,0,17d2b5f929ecb69204994e9f016f485442c4a9a5dcd82045a61fa12836a834bf,2024-08-20T15:35:13.923000 -CVE-2024-3508,0,0,2b43f9e122cbb6c5d0ee83530dba132ab3fde8d83c6c2582c0a69215807219e4,2024-07-03T02:06:18.367000 +CVE-2024-3508,0,1,ce82a7050fad9545b54b48fbeb7e72666687f8071a844658c7f2f064c0e3c0f7,2024-10-16T15:15:15.863000 CVE-2024-35080,0,0,c9a211365cbd542cdef0b29d59f3b2dfae2b1b61359fa8769a673763d1c1edb3,2024-07-03T02:01:19.997000 CVE-2024-35081,0,0,5f351d35a7c4bf1c7c66c04741787cf7f264d0978d7069822794634f96e6d2d6,2024-07-03T02:01:20.817000 CVE-2024-35082,0,0,50893ba92bdaace4fd9b61f50c725a7911d5b698ac51e1ad37d8182767cd2ba8,2024-05-24T01:15:30.977000 @@ -254408,7 +254414,7 @@ CVE-2024-35664,0,0,d79002de8da9e4d3f22c86ffd8612cf721c3746877f9a04d00f31875fb615 CVE-2024-35665,0,0,3ec6c16cd5ce59c400ebb223fa0493349556b644d7485525d7dad77d94866b13,2024-06-13T18:36:45.417000 CVE-2024-35666,0,0,7d30ae20e2b20547d79bad15b0051704877dbfaf3d285a1eae11b5b5283cb8bd,2024-06-05T19:56:00.610000 CVE-2024-35667,0,0,c32fdbccccc90d44083bd3cba19fae84edd3cb0342751cb4029eff2079dc1b43,2024-06-13T18:36:45.417000 -CVE-2024-35668,0,1,49b71c5733405679aa5a6cffbeb4b1f5d70ff1fc7782fb400e93b7a73851724d,2024-10-16T13:26:19.017000 +CVE-2024-35668,0,0,49b71c5733405679aa5a6cffbeb4b1f5d70ff1fc7782fb400e93b7a73851724d,2024-10-16T13:26:19.017000 CVE-2024-35669,0,0,20efb437d66c1878fd59888d419c698eccea67ad6491e02d87d867ff4b2f6a6c,2024-06-10T02:52:08.267000 CVE-2024-3567,0,0,46438f6ba8ccb224e08abd25ef147809187d2726401fa8ce52eb0ec2d0d324c4,2024-06-10T18:39:52.067000 CVE-2024-35670,0,0,51723aef74fe3b42251da8d8a3c5d9d4b5ca7558b70cc7d63f887d024b81fa64,2024-08-01T13:52:44.810000 @@ -256093,7 +256099,7 @@ CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e7520035 CVE-2024-37980,0,0,70458b75bacf19393793b89d35eb3b322f8d4d2f01c38ded10361b8e8312542e,2024-09-10T17:43:14.410000 CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000 CVE-2024-37982,0,0,1292ccc2fe03c8adf5b700bc537860b6176a2bf8245a83e69cdc6e18846029b1,2024-10-10T12:56:30.817000 -CVE-2024-37983,0,1,39a105b60c6e6ee1852628d9ff36501e8387b025b8bf6c3d832b1bcddc72f4a4,2024-10-16T13:15:20.690000 +CVE-2024-37983,0,0,39a105b60c6e6ee1852628d9ff36501e8387b025b8bf6c3d832b1bcddc72f4a4,2024-10-16T13:15:20.690000 CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000 CVE-2024-37985,0,0,8e75e8ded91c606cf6f8a7951d4db59fbd2c888177e5eb0c4c7845eff08923bb,2024-09-29T00:26:19.423000 CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000 @@ -256336,7 +256342,7 @@ CVE-2024-38225,0,0,a8f1d15f2be1c40a6f29c5f7c1fea9920ae59300774a3c9a21af35434dbe2 CVE-2024-38226,0,0,4bf5fa6111be97c9b6ca9705aef4b23890b24164017bf51690e04459d4fe4310,2024-09-12T01:00:01.133000 CVE-2024-38227,0,0,e1166a8b3601198afaa0f36efd17412978a4ad369bdfa6dfc4ece85e44aa4ac2,2024-09-17T16:57:39.267000 CVE-2024-38228,0,0,df0f9c7bad92e403c53d10121c41c8156540867d96dcbabab24d783749d190e6,2024-09-17T16:57:54.950000 -CVE-2024-38229,0,0,f8b41813b09662cabaabd493c77c81148896b6ad8c49323440120c43f14a9db7,2024-10-10T12:56:30.817000 +CVE-2024-38229,0,1,959a20fe8324b6d6d543e14da45f4fde0c0893ce05fa65ccd8516ca3a54f34b3,2024-10-16T15:36:38.317000 CVE-2024-3823,0,0,53ae63b27eb43a6740a92f1ff13f05ddd2a8941167fdfb2924cdfa6b561369e6,2024-05-15T16:40:19.330000 CVE-2024-38230,0,0,436e1a3ea40688620e23f71172bd013c1c71331c5024bfa4d058c80198524f43,2024-09-17T16:56:15.420000 CVE-2024-38231,0,0,05ee79528b663f84aad9814eb88867e2019ce1f3aa0eab3c47c2ec9d53782579,2024-09-17T16:52:56.323000 @@ -257083,7 +257089,7 @@ CVE-2024-39375,0,0,31332bf05b45d0877e0bebd823a0b8990f670564be1a4f26de0abecda30c1 CVE-2024-39376,0,0,094b2854b24d67516e532564da0172680d99cf6023e4bba311dd29dab7b73993,2024-09-17T18:32:09.573000 CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000 CVE-2024-39378,0,0,78d548832ec8eaca862f31d0849369d8a35a80bd3fe2e2677ab3e2744e35edc4,2024-09-18T19:16:39.390000 -CVE-2024-39379,0,1,937655b9f60345c2c3d4d209288aec8a6083432905819ab0ea023d403f9d9ae5,2024-10-16T13:38:32.573000 +CVE-2024-39379,0,0,937655b9f60345c2c3d4d209288aec8a6083432905819ab0ea023d403f9d9ae5,2024-10-16T13:38:32.573000 CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000 CVE-2024-39380,0,0,1910572fe42c7147873be8861011fe1658b3f4e08e9e17ecea7358ec80d109ff,2024-09-13T16:55:04.930000 CVE-2024-39381,0,0,c446a0a3cf348c0d4a05fe80309ddc5c180ba4a1c6f9ab0dd7c079d8ea253d78,2024-09-13T16:54:39.217000 @@ -257113,14 +257119,14 @@ CVE-2024-39402,0,0,8f9792ca39ac0f5735d2d339471513a0d0066ed8186936bed3b6cb6fc80ab CVE-2024-39403,0,0,07e4d8e2e8e77f045e47a14368527780bd5cf232eacf57cf163f25b08d6cbab6,2024-08-14T14:45:31.187000 CVE-2024-39404,0,0,0a57924699a1991f76f1f50910f14cbebc966dfeaddc9ac00c410fa553a973bd,2024-08-14T14:44:35.470000 CVE-2024-39405,0,0,eca7af29b059ce089e741bc6a4c7a853c086cfad9296c28a6d43dd725f7e44bb,2024-08-14T14:44:17.217000 -CVE-2024-39406,0,1,633fb315ca3cf7fbc901ff87493b47ea3021d4451c297abe74f6c359c41d4eb9,2024-10-16T13:37:57.910000 +CVE-2024-39406,0,0,633fb315ca3cf7fbc901ff87493b47ea3021d4451c297abe74f6c359c41d4eb9,2024-10-16T13:37:57.910000 CVE-2024-39407,0,0,a04cbb78d44437ccd0b191c3d3b80ebe08944fb4ba6ecee4b56aa111da23fcee,2024-08-14T14:42:50.467000 -CVE-2024-39408,0,1,a04b9d9586a65e8b3b2b8a3436bb7e17aeddb9297a359461cdebadedd6869697,2024-10-16T13:36:13.497000 -CVE-2024-39409,0,1,1d728e7ba1e6d584c5973295f3b86c5bdaca656c272947c18b496fe522679835,2024-10-16T13:35:32.290000 +CVE-2024-39408,0,0,a04b9d9586a65e8b3b2b8a3436bb7e17aeddb9297a359461cdebadedd6869697,2024-10-16T13:36:13.497000 +CVE-2024-39409,0,0,1d728e7ba1e6d584c5973295f3b86c5bdaca656c272947c18b496fe522679835,2024-10-16T13:35:32.290000 CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000 -CVE-2024-39410,0,1,d4fb76feb6d703aec325d1b8952b775465a1af0a318e675a0d1406b74d55e4e1,2024-10-16T13:34:52.220000 +CVE-2024-39410,0,0,d4fb76feb6d703aec325d1b8952b775465a1af0a318e675a0d1406b74d55e4e1,2024-10-16T13:34:52.220000 CVE-2024-39411,0,0,1272b538409151f4f62bcba24a09806ce4b7e124f6e1ad5512b378725548cd2c,2024-08-14T14:40:55.510000 -CVE-2024-39412,0,1,9c186aff7828cbce6c1530dfb5120772fbf9df3f5623d38a01aaf9818deea799,2024-10-16T13:33:27.910000 +CVE-2024-39412,0,0,9c186aff7828cbce6c1530dfb5120772fbf9df3f5623d38a01aaf9818deea799,2024-10-16T13:33:27.910000 CVE-2024-39413,0,0,4a894151c2ac93955d773bf053f53d0a6272124b1d199025eed7c821185013ca,2024-08-14T14:39:39.737000 CVE-2024-39414,0,0,a4bb8c6b936f8f3de2a8e0d95754370d5eb00e62f1de95bf54a93c835f112913,2024-08-14T14:39:26.427000 CVE-2024-39415,0,0,894bb113716af642843f4f18ce95fb8548231a5b76d859c1eef366fbd2f5e3ce,2024-08-14T14:34:26.620000 @@ -258567,7 +258573,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 -CVE-2024-41867,0,1,fd5c870db572cf0990aeab1137beb7b2d076ec970020111ee85606a94793d440,2024-10-16T13:31:42.040000 +CVE-2024-41867,0,0,fd5c870db572cf0990aeab1137beb7b2d076ec970020111ee85606a94793d440,2024-10-16T13:31:42.040000 CVE-2024-41868,0,0,474264e4381c67d192296dcca9e302a0bd9824b3109f4a89fdd2c65ae7fab6b0,2024-09-18T19:13:45.177000 CVE-2024-41869,0,0,b360088796a0288f30adc9e94f2784d3ed96eb99fe66d3cd813b58581cd0f09f,2024-09-19T15:09:52.967000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 @@ -258676,7 +258682,7 @@ CVE-2024-42017,0,0,7f9a4913b1239026519e3fb7d6fc6d114e8e4e346f101e97cc1469132655d CVE-2024-42018,0,0,48c29334c5da2098d436407e3b178f068ba556edf0bd6315b98cc5d6fe724ba8,2024-10-15T12:58:51.050000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 -CVE-2024-42020,0,1,d569e3e7cf117be8e1c9449013dcb5505f3719093aed1760ccc7c7a75a0722b3,2024-10-16T13:15:54.167000 +CVE-2024-42020,0,0,d569e3e7cf117be8e1c9449013dcb5505f3719093aed1760ccc7c7a75a0722b3,2024-10-16T13:15:54.167000 CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000 CVE-2024-42022,0,0,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000 CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000 @@ -260563,7 +260569,7 @@ CVE-2024-45143,0,0,c9b9a124829e0d2a7d474321709c5bbc931c06bd5326351ea6fa85f162edd CVE-2024-45144,0,0,64621bb6d61564f88f9feaa7e344b2f13a0396399af28a792d7d3f4e26dc3d76,2024-10-10T12:51:56.987000 CVE-2024-45145,0,0,c1818470b42fece224cd41c8bc05042642e8ea9d58b46cefbfb3b1af17d7185b,2024-10-10T12:51:56.987000 CVE-2024-45146,0,0,17ec48bf33b117e07b098d9477fe575ec7fef6e8962360588be61205dc1d5909,2024-10-10T12:51:56.987000 -CVE-2024-45148,0,1,0e90a71edeeb1f6c08cc4e8f74179b58bc7185e9e9129d62d43635e1d8f74649,2024-10-16T13:27:46.397000 +CVE-2024-45148,0,0,0e90a71edeeb1f6c08cc4e8f74179b58bc7185e9e9129d62d43635e1d8f74649,2024-10-16T13:27:46.397000 CVE-2024-45149,0,0,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4727,2024-10-11T22:12:25.263000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45150,0,0,dbe919e5c667b9926e7c591cb1e366017443e889755041e9c87b727b9667b713,2024-10-10T12:51:56.987000 @@ -260612,8 +260618,8 @@ CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 CVE-2024-45216,0,0,847241c32163fa2f1da44e964dd82e09a72e1b9e33fe800bf971295cc5f43631,2024-10-16T08:15:05.233000 -CVE-2024-45217,0,0,39e9fcd4bde0ccbb93f23fb3a4d5a3075f7982e2b29366e996c36d7651f566cc,2024-10-16T08:15:05.353000 -CVE-2024-45219,0,0,06b619a7ceeb8d6cb7f11a182142d97bca23ca2b11f4b8ef3e2808092ace22d3,2024-10-16T08:15:05.473000 +CVE-2024-45217,0,1,2c4074422990976f7faf45aed6e9fbb1bd1fc3a2c670c2c106a05596343bed4e,2024-10-16T15:35:13.167000 +CVE-2024-45219,0,1,901ed890ae1e72443199ca34a3e538e3cacb4f4e3a3045ce3793282c3cfc4348,2024-10-16T15:35:13.440000 CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-45229,0,0,9c8c70fcda9c99c754f0fdd9cd19b64ab40d1023f96876f950167f9ed6ee6a43,2024-09-26T13:32:55.343000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 @@ -260953,6 +260959,7 @@ CVE-2024-45836,0,0,5a0939e240a8e3b241f5dc3c6e0f8a5a968ea3fe595864ad2efc4f2e304ed CVE-2024-45838,0,0,8cd1c0890890253cac9293a5583574d0d4b04f74be39669148a1beb617db673a,2024-10-07T18:59:40.293000 CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000 CVE-2024-45843,0,0,d277f4e7f1b7f77ab48f44241b10d59e0715a005bfff8db99caa28f9596ebe66,2024-09-26T18:42:26.697000 +CVE-2024-45844,1,1,85265cb3e241038590d9ca7464ae0d11b6162cd3b667ac95825f9d133af999d5,2024-10-16T15:15:16.183000 CVE-2024-45845,0,0,b549a9e321160df47bcb67d5d4737d4567fe304513c57d25b052b060dcd0ae25,2024-09-12T20:15:05.273000 CVE-2024-45846,0,0,782f0b5f63081997ef94c1cb8ba21c320f06f7c0fb7ff9d780e670296be45516,2024-09-16T17:30:06.747000 CVE-2024-45847,0,0,9f95d0a04a61f9456f0fb197ef2c92a68bfb8a1719c90da8845bc4b8201dc12e,2024-09-16T17:31:04.850000 @@ -261060,7 +261067,7 @@ CVE-2024-4621,0,0,2ba6d981e4d5b6f91910837209ceaa779e2d1828d6d78fc3d542c33aa86982 CVE-2024-46215,0,0,d9c9b41b37ebb8d2c46b9303b2f662f08cd28b45185e47d3a9c15d51a3370a31,2024-10-15T21:35:30.590000 CVE-2024-4622,0,0,7ee7f5b0dbbae0efd9526a317b5150a2af537411986feb7d056b697fe5fc8d53,2024-05-15T18:35:11.453000 CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc926,2024-06-20T12:44:01.637000 -CVE-2024-46237,0,0,a0f64eb1e4641e71cda28150c6a7085b4f541a320eaa50e27b069ce565fe1cfc,2024-10-10T12:51:56.987000 +CVE-2024-46237,0,1,de0ce10b6f8ac9cf0e134ed26cc2ff7274ce2ba7f8fed447938607b48113ac11,2024-10-16T15:38:21.773000 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 CVE-2024-46241,0,0,e8f867d722224165a0936937fdbb3a70034985bd08f25a28d6b30ab6a32199ce,2024-09-26T13:32:55.343000 CVE-2024-46256,0,0,3eabf4e0bd1ddec40016e8895217bf93aabad097691dbd82d3a7db1e6662a8b3,2024-10-03T18:35:08.983000 @@ -261473,14 +261480,14 @@ CVE-2024-46977,0,0,5fe07ded9851f376d26307ff56bac27430f6dca48e690a88893ad782618f4 CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3ef1,2024-09-20T12:30:17.483000 CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000 CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000 -CVE-2024-46980,0,0,122e658278b63ef1ec3444bb04e932587df9041b7495084575eec7e02332119d,2024-10-15T12:57:46.880000 +CVE-2024-46980,0,1,73f39d00ab057fbb24f74c2b8e04571da6977cd470824bf7a1b70595b793eec8,2024-10-16T14:05:27.090000 CVE-2024-46982,0,0,3d9f669d24afb928408eff7284c81bba148f4b4b0d8de4608d668ca1c9286073,2024-09-20T12:30:51.220000 CVE-2024-46983,0,0,ec8817c062e2bbc441fd890e19bc6c98486be5ca90653148f7abcab9b4d72f76,2024-09-25T17:46:48.927000 CVE-2024-46984,0,0,8ed08a9f75ebb534fe57273695d27a9994db3769e0e07c54bfc9165453c74828,2024-09-25T17:49:17.007000 CVE-2024-46985,0,0,f289d0c2db76b1e0a673c959417469497f1df2bc55eed06198e333b29817e22e,2024-09-27T16:35:25.473000 CVE-2024-46986,0,0,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000 CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000 -CVE-2024-46988,0,0,fa233f3ce3eb15aa1abd93d32f6cdba9eb32c4ff5e5546b2ce757c26829c6dd6,2024-10-15T12:57:46.880000 +CVE-2024-46988,0,1,e779744a9671f7163b46329d2305c8a1127f2655ca3ac90cf4c0a252af1bcb37,2024-10-16T14:07:32.890000 CVE-2024-46989,0,0,fa29cba3c1dce457e1dbba7936349383199f9bdd1c6535b099705e0bc06fa139,2024-09-20T12:30:17.483000 CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000 CVE-2024-46990,0,0,a651df2006ba8ce24b06699e6e89ccb4decc32abf73ae7975ae4d0581b357bf8,2024-09-20T12:30:17.483000 @@ -261490,12 +261497,12 @@ CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000 CVE-2024-47001,0,0,2bb4bf673c202add583b3cb6aa8d87ad17a722980665125974c3d12c60f8fe21,2024-09-20T12:30:51.220000 CVE-2024-47003,0,0,c6454df65c14575f310d6ef1594423fd9063d7eb945a40e78647d22752216edb,2024-09-26T18:42:29.383000 -CVE-2024-47007,0,1,3966cfd0855356af21029f9e88ce4245313f12b1445c555ff24527e36ea648db,2024-10-16T13:23:03.467000 -CVE-2024-47008,0,1,ac9fc7439ea4c872f1a11d08feaa8243839dfaa7a5b88077656ebe89fc3922b6,2024-10-16T13:24:32.130000 -CVE-2024-47009,0,1,264b3f36a46fb3043a7ff13a0518523aa897b1a061a2770490e43d56fad1b234,2024-10-16T13:26:39.990000 +CVE-2024-47007,0,0,3966cfd0855356af21029f9e88ce4245313f12b1445c555ff24527e36ea648db,2024-10-16T13:23:03.467000 +CVE-2024-47008,0,0,ac9fc7439ea4c872f1a11d08feaa8243839dfaa7a5b88077656ebe89fc3922b6,2024-10-16T13:24:32.130000 +CVE-2024-47009,0,0,264b3f36a46fb3043a7ff13a0518523aa897b1a061a2770490e43d56fad1b234,2024-10-16T13:26:39.990000 CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000 -CVE-2024-47010,0,1,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000 -CVE-2024-47011,0,1,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000 +CVE-2024-47010,0,0,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000 +CVE-2024-47011,0,0,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000 CVE-2024-4702,0,0,bbb2ec3c513c4ef6cbdc2bf640b4bb7115c796c33db7b092e6fb7d12cf64fdd5,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 @@ -261554,9 +261561,10 @@ CVE-2024-47128,0,0,34ea8927e934499e78ad6fe6ea64ad0e07c8dfb2bcd2b9a4925f5334d6b08 CVE-2024-47129,0,0,b38b36d9af9ba9097d5f30d3ac794a3599474bb5946ca986d25e9630ca9b227c,2024-10-07T17:54:22.923000 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-47130,0,0,e7f6fb202a607836b8263c1620a1a5e98a9ca050003113851c771acca23538dd,2024-10-07T17:57:43.347000 -CVE-2024-47134,0,1,c469be51a68158c099c563ecb132d768058c9b0b7de566d173182963980dd322,2024-10-16T13:50:32.607000 +CVE-2024-47134,0,0,c469be51a68158c099c563ecb132d768058c9b0b7de566d173182963980dd322,2024-10-16T13:50:32.607000 CVE-2024-47135,0,0,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000 CVE-2024-47136,0,0,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000 +CVE-2024-47139,1,1,321edaa2f269a742e79ec02d42e4f26470a5154e38d7107865c4b7f5dd50833a,2024-10-16T15:15:16.490000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 @@ -261667,6 +261675,7 @@ CVE-2024-47348,0,0,3bc6c881793e0266cf0fa593a08e5c8f8f52f13453391a5ccac45ed88e737 CVE-2024-47349,0,0,6da76508c4a0edbacdd1aadc3d9c5ffadfd8b03541318b01a097fae87e059c7b,2024-10-07T17:47:48.410000 CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000 CVE-2024-47350,0,0,4ec04dd8de1c81002acaaacdfa3f1b4c07e386a17889b06998ea063c2136e635,2024-10-07T17:47:48.410000 +CVE-2024-47351,1,1,f060fbc8ad3c24da1f6c29363d252408297d10c0c749adcf8695a6c4ac765657,2024-10-16T14:15:05.890000 CVE-2024-47352,0,0,45b79099f1ba5aa681217933df202e8d205195991ef3874185e6485b2240d914,2024-10-07T17:47:48.410000 CVE-2024-47353,0,0,d741f1e1b662f00888a036482f543a291b93f9a45bea0fadab05d49a3f134ce7,2024-10-15T12:57:46.880000 CVE-2024-47354,0,0,6134434fa97da25d9165870f5853ccace7086e06da2c04b706195994fa4c1880,2024-10-15T12:58:51.050000 @@ -261817,6 +261826,7 @@ CVE-2024-47632,0,0,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a CVE-2024-47633,0,0,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000 CVE-2024-47635,0,0,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000 CVE-2024-47636,0,0,300b53ad3b56bdfe242daa94b07eff6e5ccd9aa8581554b844321a4f299321e6,2024-10-15T12:58:51.050000 +CVE-2024-47637,1,1,31cea4f00f94a41da9105bd239ac5a2409aef5b872dba81eab8a020ded248d61,2024-10-16T14:15:06.147000 CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 @@ -261824,18 +261834,20 @@ CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f CVE-2024-47642,0,0,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000 CVE-2024-47643,0,0,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000 CVE-2024-47644,0,0,fd711aaea76127f15b2ba3d3dbc77e4b5102355ce0d5450815f1f781ee51f5f7,2024-10-07T17:47:48.410000 +CVE-2024-47645,1,1,e11269c22b58f0e49604b68cb2e92480f2098ee10a518ea96abe5533d8c63e4d,2024-10-16T14:15:06.407000 CVE-2024-47646,0,0,01dc941ba058056f80ebe31f50a37207cf5e1478b0e71cd2c82bbad9118a33a9,2024-10-07T17:47:48.410000 CVE-2024-47647,0,0,750a75d1d0089daf3b35f7acd85a584959bc0ef829ba0528ba953f2948970aa5,2024-10-07T17:47:48.410000 CVE-2024-47648,0,0,a27f534f62d175d66d367eaa4d0e9a2adc1f079ffc79c13f5a343d0c9d2859de,2024-10-15T12:58:51.050000 +CVE-2024-47649,1,1,5f6632499d58276cd68d37c185422fce86cd837428dcbd5d30137c57ff9668a1,2024-10-16T14:15:06.667000 CVE-2024-4765,0,0,2cc9c7bf1e2c28194496aab966e3be262d91c35cfd4edb32adc2df596a464b78,2024-08-29T21:35:11.807000 CVE-2024-47650,0,0,03cd193463056cd00bb497e04d4746a9d06b43100915cce839c17df72217d8de,2024-10-07T17:47:48.410000 CVE-2024-47651,0,0,2a67e121f3a9ddab317c97af10a93f430699735ffe494d2404661e90ec37663c,2024-10-10T21:01:39.413000 -CVE-2024-47652,0,0,e6119e1b1843bb84938fce78d1c0f256d7208cc39325ce8f9243d6a34e8267fd,2024-10-04T13:50:43.727000 -CVE-2024-47653,0,0,9519cd07a2f606c18fc890059ca49ea1c557a6a482e8ed4df12afa932d2f0ec6,2024-10-04T13:50:43.727000 -CVE-2024-47654,0,0,c376c0b69642d4cefba9f285c5de383315c04ecf04987f787b943fc13c0f404c,2024-10-04T13:50:43.727000 -CVE-2024-47655,0,0,647a49a539bc24fa1b3aa70dda838c3f7f5d2c2c854cdbb2c1938fd32a6635e8,2024-10-04T13:50:43.727000 -CVE-2024-47656,0,0,db5bfd8d38d048ff46b9901dd086743f33565d8d1f1618f761910b78e461cd0e,2024-10-04T13:50:43.727000 -CVE-2024-47657,0,0,2a6ff811e43431f71e52e6f928ff9e6fe306de6e466fa74205b768482aa27683,2024-10-04T13:50:43.727000 +CVE-2024-47652,0,1,83d438833010bdfd0c4d314dc404bcff5e51b56498b2d79ce5b75806533b76b3,2024-10-16T14:12:06.307000 +CVE-2024-47653,0,1,0020e9bfadd3d03959371ec1304cbbcf15de1ec0aa1931833fde3818cdc7c2da,2024-10-16T15:13:52.280000 +CVE-2024-47654,0,1,78d80ab92ea0ad6076e47a7f8ed2f44135bb23a3e7682564585e92d9487a7eee,2024-10-16T15:17:33.227000 +CVE-2024-47655,0,1,41934f94579191292376f845dc30fc7330cbde82071ca41f41ba8eb2594186d2,2024-10-16T15:26:15.350000 +CVE-2024-47656,0,1,4a7b40727fe0bc16fd3cab3d10ee814920e8818b1c83af2c468f34cc9e39f8a6,2024-10-16T15:32:01.460000 +CVE-2024-47657,0,1,708576a218ada67737fc2a655868a1f777fbac283ee172e5336c76140e63933f,2024-10-16T15:44:16.807000 CVE-2024-47658,0,0,7d83d41550ee4896fe2089957fc970e4ffb8e6c30451f535c67b0cffeb69f047,2024-10-10T12:51:56.987000 CVE-2024-47659,0,0,b7c74157edbbfcf6cc191fb9eb6c2e328a941e3c74433eed8f44bf21a8a12312,2024-10-10T12:51:56.987000 CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000 @@ -261975,12 +261987,19 @@ CVE-2024-4800,0,0,46f73cb5132c32f542b67f61b6f2138522f24eb42a7d5cb9e69a7f683ef977 CVE-2024-4801,0,0,2bcdaba0a3afa2888c47ef732ae4862e81c0c79cd78d2076198cb242d0df3f0e,2024-06-04T19:20:50.120000 CVE-2024-4802,0,0,9f23c738b4e7167dada064b214f9ad2d560e5cec48c7eaa4346088c33abc9143,2024-06-04T19:20:50.247000 CVE-2024-48020,0,0,dcbd5af80fa4e0ff77a2481b211c24b4aca48d4b01a6d0de815360ac1c5ff406,2024-10-15T12:57:46.880000 +CVE-2024-48026,1,1,aff958a29e6171af32cdd6a71549064abe7ad7e10171ffca02ef499d30173c1e,2024-10-16T14:15:06.933000 +CVE-2024-48027,1,1,0ee4aeb0880f5e22bb4485f4c000ce7f6693a2798b7474e14e8ee8ba2e2d913d,2024-10-16T14:15:07.183000 +CVE-2024-48028,1,1,ea7e767ea43c8193a541d7722fe83cd6f737ba99060c0e9575254730c1f891ce,2024-10-16T14:15:07.450000 +CVE-2024-48029,1,1,f012d4352ac560edfbe5045d7a105cd11163039ef09233a7e7838a393eced3be,2024-10-16T14:15:07.693000 CVE-2024-4803,0,0,9495051e0864e5e76c8973a987e9e6eb1b1cb49bec9a5ab21c9648610125fd4d,2024-06-04T19:20:50.353000 +CVE-2024-48030,1,1,4980005f33be97d0002bf371cb38d86cd31dcc7c95a226ba73150d22aac0e5d7,2024-10-16T14:15:07.947000 CVE-2024-48033,0,0,8f5c8e0edb7dcfae09a626cf6444750e299103bc74d1c2eb25573eea6cddec47,2024-10-15T12:57:46.880000 +CVE-2024-48034,1,1,0fc85c8fc1f3f45584c1594e520291c2c4f164aab1fa4749b5395b24227f1da2,2024-10-16T14:15:08.200000 +CVE-2024-48035,1,1,62aae9031c38e8e4ca1a25c4648158100e6c2975559289ad3eeb7ce5591b4aab,2024-10-16T14:15:08.463000 CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000 CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000 CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000 -CVE-2024-48042,1,1,7631d4882f2a15f05db90f4f1e3762fc928e54ffca192197efe4aed22818ae38,2024-10-16T13:15:13.973000 +CVE-2024-48042,0,0,7631d4882f2a15f05db90f4f1e3762fc928e54ffca192197efe4aed22818ae38,2024-10-16T13:15:13.973000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 @@ -262008,10 +262027,10 @@ CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 -CVE-2024-48251,0,0,4d098db24396007455b29406aa1659eb8d5f46a48fef3576943743462426dc0d,2024-10-15T12:57:46.880000 -CVE-2024-48253,0,0,3bf19f22b051acf529017405a1e456dc3273dcf3e1fd7bc187ab36f4f4639f3f,2024-10-15T19:35:37.163000 -CVE-2024-48255,0,1,a826b5671f1255534307018f49f7a25dfbafe07430ab4d6dce4993224e178988,2024-10-16T13:35:03.290000 -CVE-2024-48257,0,0,9f5631e693f5ccf56007259ca7fa4278ab31fa9e4d26cb7e4af7e2a3dfb55f8a,2024-10-15T20:35:12.940000 +CVE-2024-48251,0,1,1241421d789f3e7d7cfd73fbb6e06dd13a67ad97d99a17e74d611312281b2050,2024-10-16T14:25:49.957000 +CVE-2024-48253,0,1,4785dec38f248c66fcec1c6a08f99630617849a9c1b186004a9276e2a77e6ad6,2024-10-16T14:27:17.693000 +CVE-2024-48255,0,1,8a37573d206d212733144676c7a13f0e1f809dd54f8b31f30b7cb3b84aec7cc0,2024-10-16T14:26:23.287000 +CVE-2024-48257,0,1,cde7b8837142e8c81fa5cdd04cd1a286ad8050551e4a13ecd4d16d52e71f85ee,2024-10-16T14:24:43.237000 CVE-2024-48259,0,0,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 @@ -262063,6 +262082,7 @@ CVE-2024-48714,0,0,29ad77205ff317d626ff6e6b9ca922cf7757040bc17f4881a3ceeebb790da CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 +CVE-2024-48744,1,1,f045f7626430954295f7ea7c4192943b75793f6bb414fee21414cba7d63eeaae,2024-10-16T15:15:16.850000 CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000 CVE-2024-48768,0,0,91e2c6ddcec0eefa58d2f68380e387364241aaf16f381d6cb6f91314ddf06c84,2024-10-15T21:35:32.950000 @@ -262161,15 +262181,31 @@ CVE-2024-49195,0,0,6d5c146e497ca60621c13ed6c4c51cc55f9cdd2bbce4ce5dca322bb7a23b5 CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c62d,2024-05-17T02:40:42.227000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 +CVE-2024-49216,1,1,f2b0a2efada6a2dd31acf8a41323edc717b9776ed2e56c53d2ff958a44246b85,2024-10-16T14:15:08.707000 +CVE-2024-49218,1,1,afb82d8a4326d533aa44b902bec29dc77125902a918c2206c319eab3eba874fe,2024-10-16T14:15:08.967000 CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000 +CVE-2024-49226,1,1,a8834ced08f60891dd74c1cfcc1d988eb51f941b6ecc817eadba3709a861f257,2024-10-16T14:15:09.280000 +CVE-2024-49227,1,1,fd5645a5892608bcb15932a0536cbd523afef969c18584aaa6aaa66ef4d3e12d,2024-10-16T14:15:09.530000 CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000 CVE-2024-4924,0,0,1be75affb45c8b20da2e31570d5662533bb5af7060cf2ef9bdabbaa6aefcbc3f,2024-06-13T18:36:09.013000 -CVE-2024-49247,1,1,7deb0181f0560e4a78510bb6fdf111e26ea3cdbbb03543e49e7c431a14dd2be2,2024-10-16T13:15:14.277000 +CVE-2024-49242,1,1,c1b391de5e3e55746dd6ce20b4d664a25b3be30bea7111a28232836f89b0d54a,2024-10-16T14:15:09.777000 +CVE-2024-49245,1,1,ca13782adfc8ee159ea667dcc9a8424cd6684d937aa9598585be1ad4b6d4c4e7,2024-10-16T14:15:10.057000 +CVE-2024-49247,0,0,7deb0181f0560e4a78510bb6fdf111e26ea3cdbbb03543e49e7c431a14dd2be2,2024-10-16T13:15:14.277000 CVE-2024-4925,0,0,e685289dc2254f889ad5a234b3fb30d6e7f6b2466e13190ceb3e2217a8a2793e,2024-06-04T19:20:53.933000 -CVE-2024-49257,1,1,7b8ce644c27d0aa540babed15d46feb5e84c9bfe46d4fe270cdbcf62ec75d4ee,2024-10-16T13:15:14.517000 +CVE-2024-49251,1,1,c0fa831ba794f30d8a1399f71d596f0591f14e3e85e6e032376ad0a7d83a7b61,2024-10-16T14:15:10.310000 +CVE-2024-49252,1,1,bd0a1cb3eee79a514239901c3a0d60f6afea80c4f4ce17cd695771b262a7ee98,2024-10-16T14:15:10.557000 +CVE-2024-49253,1,1,876b3503e2feb05a53276143f44b086952d1f839a480c4663d857d1687cb5115,2024-10-16T14:15:10.793000 +CVE-2024-49254,1,1,e766d20ee2d98ade68eb9ad0578a9789812ae4b759ed3610d81a5739cf287349,2024-10-16T14:15:11.040000 +CVE-2024-49257,0,0,7b8ce644c27d0aa540babed15d46feb5e84c9bfe46d4fe270cdbcf62ec75d4ee,2024-10-16T13:15:14.517000 +CVE-2024-49258,1,1,a2de04089f83a423a9b8d41e54579e8d4407c72950fa3ee8c405adf16b424df5,2024-10-16T14:15:11.280000 CVE-2024-4926,0,0,0d237df43556e4b080e4a7390a685a0eb6e73f0f5564912a819a125e3b5027a7,2024-06-04T19:20:54.033000 +CVE-2024-49260,1,1,f121b8b8e1c1a0303616735ddb60ad8ff155c596adcb0fd61e8048042c7b7ff9,2024-10-16T14:15:11.513000 +CVE-2024-49266,1,1,e853193e9a58e05fbf4f66d8d1a1b5f4e5aa990393826629242857774f1c6bcd,2024-10-16T15:15:17.033000 +CVE-2024-49267,1,1,b3a7cbdcb378cdd89097d8e94a18146aaec6f4180d6a73aa217674b6f3e88940,2024-10-16T15:15:17.303000 +CVE-2024-49268,1,1,468d6781808bfdfb9dec740dd52d9082854b6d96e9f828c0f8bb2cb6d4d216b4,2024-10-16T15:15:17.567000 CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b3606,2024-06-12T12:15:09.767000 -CVE-2024-49271,1,1,f2f25c2ecdf36f518f5d394e68c36bc15d53d88c94e48d11eb239381f7117971,2024-10-16T13:15:14.787000 +CVE-2024-49270,1,1,92fcd1dcec1bb4b1ab3df8b2d3dd09ff2803127305df7e41c6f606016759d9b9,2024-10-16T14:15:11.750000 +CVE-2024-49271,0,0,f2f25c2ecdf36f518f5d394e68c36bc15d53d88c94e48d11eb239381f7117971,2024-10-16T13:15:14.787000 CVE-2024-4928,0,0,e26d33912989577395dd3f5446c3b9e0710db7f1a80702fd147e50c8947c1051,2024-06-04T19:20:54.230000 CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000 CVE-2024-4930,0,0,af679b04f9fd8769c21afbd06a19763f2fe78e9326434dadfeea44855b5d14c8,2024-06-04T19:20:54.437000 @@ -262179,11 +262215,11 @@ CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000 CVE-2024-49340,0,0,bbc93ab9c45be01079f3c1d658cdfc2a6eecf00268e25c02a38c47ed2703edf5,2024-10-16T00:15:03.100000 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 -CVE-2024-49382,0,1,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 -CVE-2024-49383,0,1,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 -CVE-2024-49384,0,1,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 -CVE-2024-49387,0,1,e70e4e295fee330a123c323f35cb15d527d316ee3f5221af871424ea3c5d431e,2024-10-16T13:58:39.297000 -CVE-2024-49388,0,1,5d13081edde105848217330e8cc20460dfb42c426e8875787362e8bb17013386,2024-10-16T13:57:58.383000 +CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 +CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 +CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 +CVE-2024-49387,0,0,e70e4e295fee330a123c323f35cb15d527d316ee3f5221af871424ea3c5d431e,2024-10-16T13:58:39.297000 +CVE-2024-49388,0,0,5d13081edde105848217330e8cc20460dfb42c426e8875787362e8bb17013386,2024-10-16T13:57:58.383000 CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150c3,2024-06-11T17:08:33.350000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000 @@ -263446,7 +263482,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6377,0,0,a4383a12ef7c4e9b6235d084a289049b62e13ce9034f0b68805986655c50a719,2024-08-27T08:15:05.537000 CVE-2024-6378,0,0,7454eef210b98e6b1e597d6be8302018d48792f1f9421573a9f7b1dc13ff197f,2024-08-21T15:53:57.750000 CVE-2024-6379,0,0,a28eade3b1a09164fa7466fcbbaf023824917e2e858c95c995a8e2d79a83a15f,2024-08-27T09:15:03.780000 -CVE-2024-6380,1,1,c94834fad8f3c8d49813e9cf97c951a3a6daf5255d367dde62bfaa4fa1e7cc24,2024-10-16T12:15:08.767000 +CVE-2024-6380,0,0,c94834fad8f3c8d49813e9cf97c951a3a6daf5255d367dde62bfaa4fa1e7cc24,2024-10-16T12:15:08.767000 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 @@ -264414,7 +264450,7 @@ CVE-2024-7585,0,0,c8cbc83b6349dead88df56624342a371a1668d621fa6cda31e8fc0e9835fc3 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 -CVE-2024-7591,0,0,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000 +CVE-2024-7591,0,1,9e4daff6a6e3033a83e922c6296ac8a3ae7c3ee72704b1f7c3bf13a80b562fd3,2024-10-16T15:15:17.913000 CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000 CVE-2024-7593,0,0,60b30c808c702e818d231ca6cd3e332309e25b5d629eb181703aa0b1b2d6d1a4,2024-09-25T01:00:03.110000 CVE-2024-7594,0,0,50bb68bb7c7b3b35ea93d7055373890f8c2c41a7f5afce88f9c057abc04ebed3,2024-09-30T12:46:20.237000 @@ -264760,7 +264796,7 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000 CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000 CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000 -CVE-2024-8040,1,1,437a7aef402dde5441276acff2853f73da12ef4afd878651b64021ec437a64c3,2024-10-16T12:15:09.013000 +CVE-2024-8040,0,0,437a7aef402dde5441276acff2853f73da12ef4afd878651b64021ec437a64c3,2024-10-16T12:15:09.013000 CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000 CVE-2024-8043,0,0,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000 @@ -265100,7 +265136,7 @@ CVE-2024-8515,0,0,2860d4fc2403ef731ebb5d2e3d51ef0155fe3387c99bac76ffcaa85980c8d2 CVE-2024-8516,0,0,4c7cc8475226568ec7dcbebdfbb30107ff8998ef4ef82c2cfacac984d895c7fe,2024-10-02T19:22:44.933000 CVE-2024-8517,0,0,ce937d4c0c27f8995dba93692196810f803407b9c7a2ce432d973aed0a5fc274,2024-09-18T18:05:03.553000 CVE-2024-8518,0,0,759da2d37c4aaf02c69f2fbe6a6112ee2eb66d1b3bca228becbb2e86bb579cf2,2024-10-10T12:56:30.817000 -CVE-2024-8519,0,0,b4ee2f063157addc1a528eb0b22a0331a36b83d5d8a4d3e8da4814afae0fabae,2024-10-04T13:50:43.727000 +CVE-2024-8519,0,1,cd9f1eb327d0cbf5b460c1be177f9b56b812e789622a062e52975ca008496237,2024-10-16T14:06:04.263000 CVE-2024-8520,0,0,4bf9c9cd030963a8ce8142c1cbb513efd4813c3e4b2408a924afa68b32dfbdb2,2024-10-08T21:50:30.153000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 CVE-2024-8522,0,0,2ab431c4f2cf5ab967664e41dd1dc524f59071081def8323632354294bee4f38,2024-09-13T16:12:30.497000 @@ -265168,7 +265204,7 @@ CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec066 CVE-2024-8626,0,0,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000 -CVE-2024-8630,0,1,c5e92ea3475e7fdf4ce18793c10b7cc1fb102a32792867098f992a914ab99d4c,2024-10-16T13:15:59.997000 +CVE-2024-8630,0,0,c5e92ea3475e7fdf4ce18793c10b7cc1fb102a32792867098f992a914ab99d4c,2024-10-16T13:15:59.997000 CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000 CVE-2024-8632,0,0,e0cada97c6995cbb67fe42f80a349e37abe4361f782a8365fc38e88552a5da8f,2024-10-04T13:51:25.567000 CVE-2024-8633,0,0,11f9c1ab75a0acad9e38c7131ee0e717752f233463501613a3dd97a61fe47734,2024-10-01T14:17:43.700000 @@ -265336,7 +265372,7 @@ CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8918,0,0,084bd8c5ed92875e6f88d442f38453599e3b598184441c66b1a4885b965a4813,2024-10-16T07:15:16.777000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 -CVE-2024-8921,0,1,fb0eb850a34a1b05c910c2ff54b31084b7d71490e226dede8661082f694dea3c,2024-10-16T11:15:13.080000 +CVE-2024-8921,0,0,fb0eb850a34a1b05c910c2ff54b31084b7d71490e226dede8661082f694dea3c,2024-10-16T11:15:13.080000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 CVE-2024-8925,0,0,573fa9fc5dcadaf344ac622d80d126966b00ab4fb4c5a5f790f844b7bfe8b0ca,2024-10-10T12:57:21.987000 CVE-2024-8926,0,0,d0e916c7cd86cec53049a41ddbf4dec10c1366cdaa0ebe3384f1e3c4ead8cd0d,2024-10-10T12:57:21.987000 @@ -265494,7 +265530,7 @@ CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf CVE-2024-9201,0,0,4cff5c7dc6aa71b16756eea8781184a206d8265972db558aa2b6fb5a1fa84a58,2024-10-10T12:51:56.987000 CVE-2024-9202,0,0,808b8091e3582386849f2f7767feb40805cba585b6581ba135c1d621ab219188,2024-09-30T12:46:20.237000 CVE-2024-9203,0,0,e6eb6874bd83da6550f594261cd60c3d082a0ed5dbc17d4c1b083dd114dee5d8,2024-09-30T12:46:20.237000 -CVE-2024-9204,0,0,c5246701198d6d63430cd35f719d347fee9189ea12aef09e66cf00bd43cb052c,2024-10-04T13:50:43.727000 +CVE-2024-9204,0,1,f5f991f4ad7621e1bd7fe1b28f2260110bc4f49be8b0fb440d3c802fe287a27c,2024-10-16T14:26:41.423000 CVE-2024-9205,0,0,f51eb73f6ff5e878b874b1fc87e2002dcbff618e0eb4a751eb85e6ba7e0830aa,2024-10-15T14:16:53.337000 CVE-2024-9207,0,0,bd62704ef4d107f23b43db57d93a8ad3934422c7bcac5afce9ae8c29eef576cd,2024-10-10T12:56:30.817000 CVE-2024-9209,0,0,02f8d10156b55c480185cf79dd6fdc61c3ca58517fd3619bf848f85895c40b93,2024-10-07T19:20:32.777000 @@ -265509,7 +265545,7 @@ CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409 CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000 CVE-2024-9232,0,0,a07f526496bb68b184ee001c7d6cd9744d3cb563b91260e8d60bd9b70cac4bda,2024-10-15T12:58:51.050000 CVE-2024-9234,0,0,304bee6ceb91eca0cdc00d7cdc49b4c339c82fe3a2287348525c06a570d629da,2024-10-15T12:58:51.050000 -CVE-2024-9237,0,0,0e85c2cf89b7facf78d32fd32a25dffbbf4b2d8fbf5d6b7c796412387e496c24,2024-10-04T13:50:43.727000 +CVE-2024-9237,0,1,fb69e6f6fcfba2cfafb660a24001833586540d01b0ed897e2ee22df678729e15,2024-10-16T15:10:08.390000 CVE-2024-9241,0,0,6c5cc70c23164aeead7a2ffa985d7e69869a7cd0428a8503a9e9f624c0c87b24,2024-10-07T18:51:20.950000 CVE-2024-9242,0,0,2931ce38d642cfa320383051a5a41609f3e037ff0fe51760f16b233825fad051,2024-10-08T16:26:06.147000 CVE-2024-9265,0,0,370ae511e2a3bdf95824ac5c42b3e844c54d5bb7a6631dfac66939ebcd808076,2024-10-07T18:48:15.380000 @@ -265570,6 +265606,7 @@ CVE-2024-9341,0,0,73c457dae504bd6d2ce3664dbe78931543af91dddd466bb5fc955e7dbfca49 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 +CVE-2024-9348,1,1,5fb71692c63f1b1661c33d6e6df3cd8ac90131e823c3fd3f62af15e6f1d7f74e,2024-10-16T15:15:18.100000 CVE-2024-9349,0,0,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000 @@ -265583,7 +265620,7 @@ CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5e CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 -CVE-2024-9381,0,1,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000 +CVE-2024-9381,0,0,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000 CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000 CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 @@ -265711,7 +265748,7 @@ CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b763 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 CVE-2024-9676,0,0,903e6d5f02c4a43f5c3ca99775f28e93c82e9a2cb492044d1a2fbd884a874cfd,2024-10-15T21:15:11.990000 -CVE-2024-9680,0,0,48f354d378a329e6afc954413a712707f008b827be10450a941140c974afcab5,2024-10-16T01:00:01.723000 +CVE-2024-9680,0,1,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9687,0,0,892b3ec492b9f76dc48c1c64fed3d122004a3f16f1ff48bd4dbf12570db9abe9,2024-10-15T12:57:46.880000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 @@ -265724,7 +265761,7 @@ CVE-2024-9780,0,0,25bf552fe0c333aee728201cd43bb68d618a3e48e236e5efa31a0a1b026143 CVE-2024-9781,0,0,05e99923aaee7e014ef4a84addb9f9dd84cfde4cf7dabf943a828b781dac6231,2024-10-10T12:51:56.987000 CVE-2024-9782,0,0,a647756d6fcead0657d56793fff80f8144a3adeb5979df9472867cd15d19cd02,2024-10-10T12:51:56.987000 CVE-2024-9783,0,0,13e7034f9055b0f2c56f936acf9ad88d36eee40b386732a2eb83179a3ce66864,2024-10-10T12:51:56.987000 -CVE-2024-9784,0,0,91e0e46d054da9c3ea59f4b335d0cd5349e4658a9b75e5d0746d094b4b189598,2024-10-10T12:51:56.987000 +CVE-2024-9784,0,1,ee4690bd44afc2da98daa591c06fcd9ef379f757ced30fa65d12d9c28a6966f0,2024-10-16T14:12:35.597000 CVE-2024-9785,0,0,86121f5a6007002fdfbe90d15babdda1c3a19b568f6b456e7ae238fe15dfd86d,2024-10-15T12:58:51.050000 CVE-2024-9786,0,0,13ac90f2d5dc042c6a3455e44cb35465793a3b07925d94064d4dfa4e83b1aaca,2024-10-15T12:58:51.050000 CVE-2024-9787,0,0,36006c5683023b0a550c9d990c27b32cd453733ae048071aa69db8f35e1b00c1,2024-10-15T12:58:51.050000 @@ -265770,6 +265807,7 @@ CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1 CVE-2024-9873,0,0,cd4ff22f11313acb0d82df82e47be4f4940aecb8b45f90ef5f3e186f0e33c740,2024-10-16T06:15:02.527000 CVE-2024-9888,0,0,68fc5031c0a52291fb2b329f8fc062d33bbb29cbbfbe4c31c17b0360603a1eae,2024-10-16T06:15:03.650000 CVE-2024-9891,0,0,4c8a9a58887e98726942bc0a2fd35c0c88241c217c7fd52663f3ef69115d2406,2024-10-16T02:15:08.333000 +CVE-2024-9893,1,1,452eda46766d396fc3b68eee53c0097a02ac3fb6b8dea695992fcb6c22fd6259,2024-10-16T14:15:12.097000 CVE-2024-9894,0,0,14c1a187244ef98f70dad85c66b4e9e50b1523e45b13c684f05d8920a1d43b87,2024-10-15T12:57:46.880000 CVE-2024-9895,0,0,1804aadc601cefc0a637c4245324ad03665b7298686ff057930daf35aa0b9bfa,2024-10-15T12:57:46.880000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 @@ -265777,14 +265815,14 @@ CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d47280 CVE-2024-9905,0,0,86b87924fc77be9b86e28e31f7f260bc02ed1789ea53bacc1dc28ab364f126fe,2024-10-15T12:57:46.880000 CVE-2024-9906,0,0,dfa3e6a99db75a62cc25f201ce729677807202bc4538d3feac90d1059ef62027,2024-10-15T12:57:46.880000 CVE-2024-9907,0,0,b44cf105c165257c7fd640aa1e6812e5903dc63fda09adbe3b2e993ea04b6e4b,2024-10-15T12:57:46.880000 -CVE-2024-9908,0,0,b68e1b95ef607118eec511b4114cddee39b037fb030ffac02f3a00bce7b4c088,2024-10-15T12:57:46.880000 -CVE-2024-9909,0,0,2372d65b015170eafaa7a0ed5b2c38d4bc33393da77b501fa5df2a13282660a6,2024-10-15T12:57:46.880000 -CVE-2024-9910,0,0,415f101bb466d855400f584e05f371df281e2f9c7345072f0a54ecb9e3b9fa6c,2024-10-15T12:57:46.880000 -CVE-2024-9911,0,0,3af4d00be1e1f5f7908ae7a82ba2e26d05aac896ac2389e8206ae45646987323,2024-10-15T12:57:46.880000 -CVE-2024-9912,0,0,e5d1b9034ef482bd7aeacc31dfcdbae660672e6b1aa9266d24664c0cd1a45b67,2024-10-15T12:57:46.880000 -CVE-2024-9913,0,0,4f7c3993b4be2513f92444633ff42f88ccda276e7faec1dd9a75ea5e8d1305be,2024-10-15T12:57:46.880000 -CVE-2024-9914,0,0,5e9c85296147637e52b2a34d3391575c3713d806d9df90f22472b08becee5aff,2024-10-15T12:57:46.880000 -CVE-2024-9915,0,0,92bba9f526742196c3b395391f75dc1c0995fe961c287e13b4bb61f60c0b8ba3,2024-10-15T12:57:46.880000 +CVE-2024-9908,0,1,3dc2f2a1a2a9df1b7f4615b3f8d1a4b8c05a706da9fe87178ee5430f5ee24ca1,2024-10-16T15:31:26.373000 +CVE-2024-9909,0,1,3d8e67302dd14fcf5228851948205f317f8197e33509ec0eaa34c655e748d8d5,2024-10-16T15:30:48.017000 +CVE-2024-9910,0,1,d60cfec9eb79a36caeec5cf320cc02e87d4c95069bde5f8b92a6b8321d46a2ae,2024-10-16T15:32:30.067000 +CVE-2024-9911,0,1,835c631360d814be7ac47da30e6b7c1bd6fe2938f431c89cdcf164112da890c3,2024-10-16T15:32:13.470000 +CVE-2024-9912,0,1,9ac8c5ef0466a38d942136446e49f0c32870b1a6eae165be1890b9559625eac4,2024-10-16T15:31:57.667000 +CVE-2024-9913,0,1,fce2df2eefb158575f38159e6128bd5300167e849870c207c5f7af11ee9e74ca,2024-10-16T15:31:38.627000 +CVE-2024-9914,0,1,68f33f4ea2c2891fcb5aa662c80bc25615bd47e106abcf4fc2d1aeea3903fa4f,2024-10-16T15:27:00.080000 +CVE-2024-9915,0,1,0f63deacddf513b9ec3673a01be4a8d87bc611fa458d7de64bd0d6b49e111fea,2024-10-16T15:26:12.137000 CVE-2024-9916,0,0,23c62cb63dac8fc383abd3409d80c89fb1a17b7905e13a1697a0262e37d3d027,2024-10-15T12:57:46.880000 CVE-2024-9917,0,0,e06c5f2290dde2c480dfd5279bf7af728748ed1cce2dada4dd959acd43d28cbb,2024-10-15T12:57:46.880000 CVE-2024-9918,0,0,9d45e1cb8de1e89780e42f78757cafce4488daed13a10d562b3ce1b45fe7cb66,2024-10-15T12:57:46.880000 @@ -265796,7 +265834,7 @@ CVE-2024-9925,0,0,40ec06885e2cf941cc3fd6c1effc99e4018421341691aa45ec80f48176ade4 CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000 CVE-2024-9937,0,0,fc21cd16c574ce1a245aba103e1615576201cab8b5d108df1842ab1a89488a60,2024-10-16T06:15:04.177000 CVE-2024-9944,0,0,0105315be1482473acf9cccf2807cd53dd651f41a7a3739bca8c3d692de03102,2024-10-15T12:57:46.880000 -CVE-2024-9952,0,0,75bf1164383c64f84aaae3ebb54926536c4d8cc1bc9810fac6b8f11ba1e426eb,2024-10-15T12:57:46.880000 +CVE-2024-9952,0,1,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000 CVE-2024-9953,0,0,d4420057cd6ff540e58057e827a120bd402b45b9e9ab6580a72e462bb02065ee,2024-10-15T15:15:13.660000 CVE-2024-9954,0,0,d1165869fc33e5b3518e409cac338986016cb980d3fb2465c5da782ff3634fbe,2024-10-15T21:15:12.110000 CVE-2024-9955,0,0,d5511da7de211929750402c6d0a55ece05d06d79332a45148ea952fc32f5f61c,2024-10-15T21:15:12.193000 @@ -265818,8 +265856,8 @@ CVE-2024-9971,0,0,0594322115675ee753da27d556fc98ba9a723e7e04d41180f103320a4dd3f2 CVE-2024-9972,0,0,5672d796a3c0672617371b1fdfcdf3d8d1d30983cb269f7a20c96a13095710bc,2024-10-15T12:57:46.880000 CVE-2024-9973,0,0,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000 CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000 -CVE-2024-9975,0,1,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000 -CVE-2024-9976,0,1,5980d080e9ad25dff2e581d3c904125c709818a390af58c76d59996e26d292c8,2024-10-16T13:42:24.153000 +CVE-2024-9975,0,0,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000 +CVE-2024-9976,0,0,5980d080e9ad25dff2e581d3c904125c709818a390af58c76d59996e26d292c8,2024-10-16T13:42:24.153000 CVE-2024-9977,0,0,2ff728332776d36f7a0b4f17f71817f48b8215cf8e3f608a790b17fa094fa3ba,2024-10-15T13:15:11.457000 CVE-2024-9979,0,0,dafd9ca9f773f8e2b76ea816a62af234502d02e9d7ac277bfd64cb30201efc2c,2024-10-15T14:15:05.817000 CVE-2024-9980,0,0,227587e27b79422988a8ba9d0e19869dca70cd6d378d1d6d8beb91efa3b64d47,2024-10-15T12:57:46.880000