From 87c90daf8fa810e174df5eab49c9f6e7ff639581 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 16 Sep 2024 16:03:16 +0000 Subject: [PATCH] Auto-Update: 2024-09-16T16:00:18.117813+00:00 --- CVE-2023/CVE-2023-20xx/CVE-2023-2042.json | 52 +++- CVE-2023/CVE-2023-218xx/CVE-2023-21842.json | 14 +- CVE-2023/CVE-2023-219xx/CVE-2023-21925.json | 14 +- CVE-2023/CVE-2023-219xx/CVE-2023-21964.json | 14 +- CVE-2023/CVE-2023-219xx/CVE-2023-21969.json | 14 +- CVE-2023/CVE-2023-219xx/CVE-2023-21979.json | 14 +- CVE-2023/CVE-2023-219xx/CVE-2023-21980.json | 12 +- CVE-2023/CVE-2023-219xx/CVE-2023-21985.json | 14 +- CVE-2023/CVE-2023-219xx/CVE-2023-21987.json | 14 +- CVE-2023/CVE-2023-219xx/CVE-2023-21990.json | 14 +- CVE-2023/CVE-2023-22xx/CVE-2023-2290.json | 6 +- CVE-2023/CVE-2023-254xx/CVE-2023-25493.json | 6 +- CVE-2023/CVE-2023-29xx/CVE-2023-2992.json | 6 +- CVE-2023/CVE-2023-36xx/CVE-2023-3628.json | 6 +- CVE-2023/CVE-2023-36xx/CVE-2023-3629.json | 6 +- CVE-2023/CVE-2023-39xx/CVE-2023-3961.json | 13 +- CVE-2023/CVE-2023-40xx/CVE-2023-4091.json | 17 +- CVE-2023/CVE-2023-416xx/CVE-2023-41629.json | 14 +- CVE-2023/CVE-2023-426xx/CVE-2023-42669.json | 6 +- CVE-2023/CVE-2023-437xx/CVE-2023-43785.json | 6 +- CVE-2023/CVE-2023-437xx/CVE-2023-43786.json | 14 +- CVE-2023/CVE-2023-437xx/CVE-2023-43787.json | 14 +- CVE-2023/CVE-2023-437xx/CVE-2023-43788.json | 40 +-- CVE-2023/CVE-2023-437xx/CVE-2023-43789.json | 18 +- CVE-2023/CVE-2023-456xx/CVE-2023-45685.json | 24 +- CVE-2023/CVE-2023-45xx/CVE-2023-4527.json | 46 +-- CVE-2023/CVE-2023-461xx/CVE-2023-46147.json | 6 +- CVE-2023/CVE-2023-48xx/CVE-2023-4806.json | 62 +--- CVE-2023/CVE-2023-48xx/CVE-2023-4813.json | 19 +- CVE-2023/CVE-2023-49xx/CVE-2023-4911.json | 125 +------- CVE-2023/CVE-2023-50xx/CVE-2023-5078.json | 16 +- CVE-2023/CVE-2023-50xx/CVE-2023-5080.json | 6 +- CVE-2023/CVE-2023-50xx/CVE-2023-5081.json | 6 +- CVE-2023/CVE-2023-51xx/CVE-2023-5115.json | 12 +- CVE-2023/CVE-2023-52xx/CVE-2023-5236.json | 6 +- CVE-2024/CVE-2024-15xx/CVE-2024-1578.json | 30 +- CVE-2024/CVE-2024-223xx/CVE-2024-22399.json | 4 +- CVE-2024/CVE-2024-272xx/CVE-2024-27257.json | 52 +++- CVE-2024/CVE-2024-297xx/CVE-2024-29779.json | 33 +- CVE-2024/CVE-2024-383xx/CVE-2024-38315.json | 60 ++++ CVE-2024/CVE-2024-395xx/CVE-2024-39574.json | 58 +++- CVE-2024/CVE-2024-395xx/CVE-2024-39580.json | 60 +++- CVE-2024/CVE-2024-395xx/CVE-2024-39581.json | 48 ++- CVE-2024/CVE-2024-395xx/CVE-2024-39582.json | 46 ++- CVE-2024/CVE-2024-395xx/CVE-2024-39583.json | 48 ++- CVE-2024/CVE-2024-396xx/CVE-2024-39613.json | 8 +- CVE-2024/CVE-2024-397xx/CVE-2024-39772.json | 56 ++++ CVE-2024/CVE-2024-417xx/CVE-2024-41728.json | 121 +++++++- CVE-2024/CVE-2024-421xx/CVE-2024-42137.json | 148 ++++++++- CVE-2024/CVE-2024-421xx/CVE-2024-42144.json | 81 ++++- CVE-2024/CVE-2024-424xx/CVE-2024-42425.json | 99 +++++- CVE-2024/CVE-2024-424xx/CVE-2024-42474.json | 76 ++++- CVE-2024/CVE-2024-440xx/CVE-2024-44053.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44054.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44056.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44057.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44058.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44059.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44060.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44062.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44063.json | 8 +- CVE-2024/CVE-2024-440xx/CVE-2024-44092.json | 45 ++- CVE-2024/CVE-2024-440xx/CVE-2024-44093.json | 45 ++- CVE-2024/CVE-2024-440xx/CVE-2024-44094.json | 45 ++- CVE-2024/CVE-2024-440xx/CVE-2024-44095.json | 45 ++- CVE-2024/CVE-2024-440xx/CVE-2024-44096.json | 45 ++- CVE-2024/CVE-2024-441xx/CVE-2024-44112.json | 121 +++++++- CVE-2024/CVE-2024-441xx/CVE-2024-44114.json | 111 ++++++- CVE-2024/CVE-2024-444xx/CVE-2024-44430.json | 45 ++- CVE-2024/CVE-2024-454xx/CVE-2024-45455.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45456.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45457.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45458.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45459.json | 8 +- CVE-2024/CVE-2024-454xx/CVE-2024-45460.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45694.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45695.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45696.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45697.json | 8 +- CVE-2024/CVE-2024-456xx/CVE-2024-45698.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45833.json | 8 +- CVE-2024/CVE-2024-458xx/CVE-2024-45835.json | 56 ++++ CVE-2024/CVE-2024-464xx/CVE-2024-46419.json | 21 ++ CVE-2024/CVE-2024-464xx/CVE-2024-46424.json | 4 +- CVE-2024/CVE-2024-464xx/CVE-2024-46451.json | 4 +- CVE-2024/CVE-2024-469xx/CVE-2024-46918.json | 8 +- CVE-2024/CVE-2024-469xx/CVE-2024-46937.json | 4 +- CVE-2024/CVE-2024-469xx/CVE-2024-46938.json | 8 +- CVE-2024/CVE-2024-469xx/CVE-2024-46942.json | 8 +- CVE-2024/CVE-2024-469xx/CVE-2024-46943.json | 8 +- CVE-2024/CVE-2024-469xx/CVE-2024-46958.json | 8 +- CVE-2024/CVE-2024-469xx/CVE-2024-46970.json | 8 +- CVE-2024/CVE-2024-46xx/CVE-2024-4629.json | 221 +++++++++++++- CVE-2024/CVE-2024-60xx/CVE-2024-6052.json | 6 +- CVE-2024/CVE-2024-64xx/CVE-2024-6401.json | 78 +++++ CVE-2024/CVE-2024-64xx/CVE-2024-6482.json | 8 +- CVE-2024/CVE-2024-70xx/CVE-2024-7098.json | 78 +++++ CVE-2024/CVE-2024-71xx/CVE-2024-7104.json | 78 +++++ CVE-2024/CVE-2024-77xx/CVE-2024-7700.json | 80 ++++- CVE-2024/CVE-2024-87xx/CVE-2024-8776.json | 8 +- CVE-2024/CVE-2024-87xx/CVE-2024-8777.json | 8 +- CVE-2024/CVE-2024-87xx/CVE-2024-8778.json | 8 +- CVE-2024/CVE-2024-87xx/CVE-2024-8779.json | 8 +- CVE-2024/CVE-2024-87xx/CVE-2024-8780.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8862.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8863.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8864.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8865.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8866.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8867.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8868.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8869.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8875.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8876.json | 8 +- CVE-2024/CVE-2024-88xx/CVE-2024-8880.json | 8 +- README.md | 71 ++--- _state.csv | 323 ++++++++++---------- 117 files changed, 2749 insertions(+), 833 deletions(-) create mode 100644 CVE-2024/CVE-2024-383xx/CVE-2024-38315.json create mode 100644 CVE-2024/CVE-2024-397xx/CVE-2024-39772.json create mode 100644 CVE-2024/CVE-2024-458xx/CVE-2024-45835.json create mode 100644 CVE-2024/CVE-2024-464xx/CVE-2024-46419.json create mode 100644 CVE-2024/CVE-2024-64xx/CVE-2024-6401.json create mode 100644 CVE-2024/CVE-2024-70xx/CVE-2024-7098.json create mode 100644 CVE-2024/CVE-2024-71xx/CVE-2024-7104.json diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json index 99332ec68ec..16f684ae300 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2042.json @@ -2,16 +2,60 @@ "id": "CVE-2023-2042", "sourceIdentifier": "cna@vuldb.com", "published": "2023-04-14T10:15:09.837", - "lastModified": "2024-05-17T02:22:36.040", + "lastModified": "2024-09-16T15:15:13.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as problematic, has been found in DataGear up to 4.5.1. Affected by this issue is some unknown functionality of the component JDBC Server Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-225920. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability, which was classified as problematic, has been found in DataGear up to 4.7.0/5.1.0. Affected by this issue is some unknown functionality of the component JDBC Server Handler. The manipulation leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], "cvssMetricV31": [ { "source": "nvd@nist.gov", @@ -132,6 +176,10 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://vuldb.com/?submit.109292", + "source": "cna@vuldb.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21842.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21842.json index 68505fe1ab3..7226c93fb95 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21842.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21842.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21842", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:13.650", - "lastModified": "2023-01-24T19:24:37.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:01.747", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21925.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21925.json index dc05f492582..396cb516770 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21925.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21925.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21925", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:13.510", - "lastModified": "2023-04-20T13:34:35.200", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:02.663", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21964.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21964.json index fb11320012c..8779da155e2 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21964.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21964.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21964", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:16.173", - "lastModified": "2023-04-19T14:30:52.223", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:03.420", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21969.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21969.json index 3452fa0f045..c6c0970bfcb 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21969.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21969.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21969", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:16.547", - "lastModified": "2023-04-19T18:02:35.520", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:04.267", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21979.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21979.json index b16f569ba9c..c4b769da866 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21979.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21979.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21979", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:17.160", - "lastModified": "2023-04-19T18:07:55.163", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:05.713", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21980.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21980.json index f3fb201d210..36057542b1d 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21980.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21980.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21980", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:17.227", - "lastModified": "2023-04-27T15:15:12.407", + "lastModified": "2024-09-16T15:35:06.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21985.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21985.json index 40983ec0ba9..bce16ff6680 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21985.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21985.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21985", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:17.517", - "lastModified": "2023-04-20T15:41:50.613", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:07.530", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21987.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21987.json index 755f4842604..5bf19cb0783 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21987.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21987.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21987", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:17.673", - "lastModified": "2023-04-20T17:29:27.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:08.380", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-219xx/CVE-2023-21990.json b/CVE-2023/CVE-2023-219xx/CVE-2023-21990.json index 3865c337e9b..3b70d213c85 100644 --- a/CVE-2023/CVE-2023-219xx/CVE-2023-21990.json +++ b/CVE-2023/CVE-2023-219xx/CVE-2023-21990.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21990", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-04-18T20:15:17.900", - "lastModified": "2023-04-20T17:39:43.783", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:09.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-22xx/CVE-2023-2290.json b/CVE-2023/CVE-2023-22xx/CVE-2023-2290.json index 3aee6606aff..2654f4fb8ed 100644 --- a/CVE-2023/CVE-2023-22xx/CVE-2023-2290.json +++ b/CVE-2023/CVE-2023-22xx/CVE-2023-2290.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2290", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-06-26T20:15:09.867", - "lastModified": "2023-07-05T17:22:10.923", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:15:13.293", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-254xx/CVE-2023-25493.json b/CVE-2023/CVE-2023-254xx/CVE-2023-25493.json index 2da349de6db..592ad454b51 100644 --- a/CVE-2023/CVE-2023-254xx/CVE-2023-25493.json +++ b/CVE-2023/CVE-2023-254xx/CVE-2023-25493.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25493", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-04-05T21:15:07.607", - "lastModified": "2024-04-08T18:49:25.863", + "lastModified": "2024-09-16T15:15:12.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nA potential vulnerability was reported in the BIOS update tool driver for some Desktop, Smart Edge, Smart Office, and ThinkStation products that could allow a local user with elevated privileges to execute arbitrary code. \n\n" + "value": "A potential vulnerability was reported in the BIOS update tool driver for some Desktop, Smart Edge, Smart Office, and ThinkStation products that could allow a local user with elevated privileges to execute arbitrary code." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-306" } ] } diff --git a/CVE-2023/CVE-2023-29xx/CVE-2023-2992.json b/CVE-2023/CVE-2023-29xx/CVE-2023-2992.json index 8dadcd946f0..ab6334cb0a7 100644 --- a/CVE-2023/CVE-2023-29xx/CVE-2023-2992.json +++ b/CVE-2023/CVE-2023-29xx/CVE-2023-2992.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2992", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-06-26T20:15:09.933", - "lastModified": "2023-07-05T17:27:57.377", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:15:13.580", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-405" } ] } diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3628.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3628.json index 6e62654a059..ee9f86a98b9 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3628.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3628.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3628", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-18T14:15:08.323", - "lastModified": "2024-01-25T14:15:25.900", + "lastModified": "2024-09-16T14:15:11.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -165,10 +165,6 @@ "tags": [ "Issue Tracking" ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240125-0004/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-36xx/CVE-2023-3629.json b/CVE-2023/CVE-2023-36xx/CVE-2023-3629.json index ee31deb74e2..452fea86ef0 100644 --- a/CVE-2023/CVE-2023-36xx/CVE-2023-3629.json +++ b/CVE-2023/CVE-2023-36xx/CVE-2023-3629.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3629", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-18T14:15:08.557", - "lastModified": "2024-01-25T14:15:26.017", + "lastModified": "2024-09-16T14:15:11.800", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -165,10 +165,6 @@ "tags": [ "Issue Tracking" ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240125-0004/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3961.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3961.json index 2fa7186e249..ef39711e3d4 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3961.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3961.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3961", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-03T13:15:08.723", - "lastModified": "2024-01-02T21:15:08.913", + "lastModified": "2024-09-16T15:15:13.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -206,17 +206,6 @@ "Issue Tracking" ] }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231124-0002/", - "source": "secalert@redhat.com" - }, { "url": "https://www.samba.org/samba/security/CVE-2023-3961.html", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4091.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4091.json index fab9718b24f..fcc7473b254 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4091.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4091.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4091", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-03T08:15:08.197", - "lastModified": "2024-04-22T16:15:13.120", + "lastModified": "2024-09-16T15:15:15.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,21 +205,6 @@ "Issue Tracking" ] }, - { - "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html", - "source": "secalert@redhat.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZUMVALLFFDFC53JZMUWA6HPD7HUGAP5I/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231124-0002/", - "source": "secalert@redhat.com" - }, { "url": "https://www.samba.org/samba/security/CVE-2023-4091.html", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-416xx/CVE-2023-41629.json b/CVE-2023/CVE-2023-416xx/CVE-2023-41629.json index bb113febc17..b9bd75c6591 100644 --- a/CVE-2023/CVE-2023-416xx/CVE-2023-41629.json +++ b/CVE-2023/CVE-2023-416xx/CVE-2023-41629.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41629", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-17T22:15:17.057", - "lastModified": "2023-10-23T18:28:03.807", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:10.540", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-34" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-426xx/CVE-2023-42669.json b/CVE-2023/CVE-2023-426xx/CVE-2023-42669.json index 7065b7f584c..2c1779e704c 100644 --- a/CVE-2023/CVE-2023-426xx/CVE-2023-42669.json +++ b/CVE-2023/CVE-2023-426xx/CVE-2023-42669.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42669", "sourceIdentifier": "secalert@redhat.com", "published": "2023-11-06T07:15:09.137", - "lastModified": "2023-11-24T09:15:08.710", + "lastModified": "2024-09-16T15:15:13.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -216,10 +216,6 @@ "Issue Tracking" ] }, - { - "url": "https://security.netapp.com/advisory/ntap-20231124-0002/", - "source": "secalert@redhat.com" - }, { "url": "https://www.samba.org/samba/security/CVE-2023-42669.html", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json index e283799e1e2..096ccc88c27 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43785.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43785", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:21.877", - "lastModified": "2024-05-22T17:16:04.760", + "lastModified": "2024-09-16T15:15:14.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -157,10 +157,6 @@ "Issue Tracking", "Third Party Advisory" ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231103-0006/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json index 320cbda30b5..efb0affc260 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43786.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43786", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:22.023", - "lastModified": "2024-05-22T17:16:04.927", + "lastModified": "2024-09-16T15:15:14.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,10 +135,6 @@ } ], "references": [ - { - "url": "http://www.openwall.com/lists/oss-security/2024/01/24/9", - "source": "secalert@redhat.com" - }, { "url": "https://access.redhat.com/errata/RHSA-2024:2145", "source": "secalert@redhat.com" @@ -161,14 +157,6 @@ "Issue Tracking", "Third Party Advisory" ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/", - "source": "secalert@redhat.com" - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231103-0006/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json index 6ca1825cdce..5beae23e1ee 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43787.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43787", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:22.083", - "lastModified": "2024-05-22T17:16:05.057", + "lastModified": "2024-09-16T15:15:14.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,10 +135,6 @@ } ], "references": [ - { - "url": "http://www.openwall.com/lists/oss-security/2024/01/24/9", - "source": "secalert@redhat.com" - }, { "url": "https://access.redhat.com/errata/RHSA-2024:2145", "source": "secalert@redhat.com" @@ -161,14 +157,6 @@ "Issue Tracking", "Third Party Advisory" ] - }, - { - "url": "https://jfrog.com/blog/xorg-libx11-vulns-cve-2023-43786-cve-2023-43787-part-two/", - "source": "secalert@redhat.com" - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231103-0006/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json index 7bc72e77140..ac8102a602c 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43788.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43788", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-10T13:15:22.137", - "lastModified": "2024-05-22T17:16:05.223", + "lastModified": "2024-09-16T15:15:14.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,44 +175,6 @@ "Issue Tracking", "Third Party Advisory" ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3KFUQT42R7TB4D7RISNSBQFJGLTQGUL/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFAJTBNO3PAIA6EGZR4PN62H6RLKNDTE/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V6FARGWN7VWXXWPXYNEEDJLRR3EWFZ3T/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBCLDYUGLDSVV75ECPIBW7JXOB3747/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json index 94d0a018ed1..0da3bc03aab 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43789.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43789", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-12T12:15:10.710", - "lastModified": "2024-05-22T17:16:05.443", + "lastModified": "2024-09-16T15:15:14.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -165,22 +165,6 @@ "Issue Tracking", "Vendor Advisory" ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/63IBRFLQVZSMOAZBZOBKFWJP26ILRAGQ/", - "source": "secalert@redhat.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I3KFUQT42R7TB4D7RISNSBQFJGLTQGUL/", - "source": "secalert@redhat.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TFAJTBNO3PAIA6EGZR4PN62H6RLKNDTE/", - "source": "secalert@redhat.com" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZECBCLDYUGLDSVV75ECPIBW7JXOB3747/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json b/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json index 06ffa9f4aac..1bc2fca59cf 100644 --- a/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json +++ b/CVE-2023/CVE-2023-456xx/CVE-2023-45685.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45685", "sourceIdentifier": "cve@rapid7.com", "published": "2023-10-16T17:15:09.963", - "lastModified": "2023-10-24T15:10:57.873", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:35:13.577", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 } ] }, diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json index 21ad43ca6e9..cbf6779326e 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4527.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4527", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-18T17:15:55.067", - "lastModified": "2023-12-28T16:23:01.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T14:15:12.243", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -390,13 +390,6 @@ } ], "references": [ - { - "url": "http://www.openwall.com/lists/oss-security/2023/09/25/1", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, { "url": "https://access.redhat.com/errata/RHSA-2023:5453", "source": "secalert@redhat.com", @@ -426,41 +419,6 @@ "Issue Tracking", "Third Party Advisory" ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202310-03", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231116-0012/", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-461xx/CVE-2023-46147.json b/CVE-2023/CVE-2023-461xx/CVE-2023-46147.json index 00286706109..2bdbfdc967e 100644 --- a/CVE-2023/CVE-2023-461xx/CVE-2023-46147.json +++ b/CVE-2023/CVE-2023-461xx/CVE-2023-46147.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46147", "sourceIdentifier": "audit@patchstack.com", "published": "2023-12-20T14:15:20.570", - "lastModified": "2023-12-28T20:04:49.337", + "lastModified": "2024-09-16T14:11:43.620", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:themify:themify_ultra:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:themify:ultra:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "7.3.6", - "matchCriteriaId": "476E8D1A-BD6B-4ED7-80C0-0C89F676F2CD" + "matchCriteriaId": "141F4483-FACB-445C-885E-91D406DBA04E" } ] } diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json index 76f7eba9f05..1713fc4fbd2 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4806.json @@ -2,7 +2,7 @@ "id": "CVE-2023-4806", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-18T17:15:55.813", - "lastModified": "2024-01-25T14:15:26.360", + "lastModified": "2024-09-16T14:15:12.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -259,34 +259,6 @@ } ], "references": [ - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/03/4", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/03/5", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/03/6", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/03/8", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, { "url": "https://access.redhat.com/errata/RHSA-2023:5453", "source": "secalert@redhat.com", @@ -319,38 +291,6 @@ "Issue Tracking", "Third Party Advisory" ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202310-03", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240125-0008/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json b/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json index a174cafc254..593e7d2a585 100644 --- a/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json +++ b/CVE-2023/CVE-2023-48xx/CVE-2023-4813.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4813", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-12T22:15:08.277", - "lastModified": "2024-01-21T01:49:46.697", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T14:15:12.617", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -325,14 +325,6 @@ } ], "references": [ - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/03/8", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, { "url": "https://access.redhat.com/errata/RHSA-2023:5453", "source": "secalert@redhat.com", @@ -369,13 +361,6 @@ "Patch", "Third Party Advisory" ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231110-0003/", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json index 7b7bff12494..74d788209c1 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4911.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4911", "sourceIdentifier": "secalert@redhat.com", "published": "2023-10-03T18:15:10.463", - "lastModified": "2024-02-22T20:18:58.020", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T14:15:12.840", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-11-21", "cisaActionDue": "2023-12-12", @@ -210,83 +210,6 @@ } ], "references": [ - { - "url": "http://packetstormsecurity.com/files/174986/glibc-ld.so-Local-Privilege-Escalation.html", - "source": "secalert@redhat.com", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "http://packetstormsecurity.com/files/176288/Glibc-Tunables-Privilege-Escalation.html", - "source": "secalert@redhat.com", - "tags": [ - "Exploit", - "Third Party Advisory" - ] - }, - { - "url": "http://seclists.org/fulldisclosure/2023/Oct/11", - "source": "secalert@redhat.com", - "tags": [ - "Exploit", - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/03/2", - "source": "secalert@redhat.com", - "tags": [ - "Exploit", - "Mailing List" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/03/3", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Patch" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/05/1", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/13/11", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/14/3", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/14/5", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "http://www.openwall.com/lists/oss-security/2023/10/14/6", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] - }, { "url": "https://access.redhat.com/errata/RHSA-2023:5453", "source": "secalert@redhat.com", @@ -338,50 +261,6 @@ "Third Party Advisory" ] }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/", - "source": "secalert@redhat.com", - "tags": [ - "Exploit", - "Mailing List" - ] - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List" - ] - }, - { - "url": "https://security.gentoo.org/glsa/202310-03", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20231013-0006/", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] - }, - { - "url": "https://www.debian.org/security/2023/dsa-5514", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] - }, { "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5078.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5078.json index e95fc2fb587..18dc0d7be2b 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5078.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5078.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5078", "sourceIdentifier": "psirt@lenovo.com", "published": "2023-11-08T22:15:11.957", - "lastModified": "2023-11-16T18:01:15.060", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:15:15.367", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -59,18 +59,6 @@ } ] }, - "weaknesses": [ - { - "source": "psirt@lenovo.com", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-665" - } - ] - } - ], "configurations": [ { "operator": "AND", diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json index 2e99995b3a2..af50c70e159 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5080.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5080", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.017", - "lastModified": "2024-01-26T16:02:33.997", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:15:15.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-266" } ] } diff --git a/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json b/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json index 2c55face802..df991be3b2a 100644 --- a/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json +++ b/CVE-2023/CVE-2023-50xx/CVE-2023-5081.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5081", "sourceIdentifier": "psirt@lenovo.com", "published": "2024-01-19T20:15:12.230", - "lastModified": "2024-01-26T16:02:59.793", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:15:15.767", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -56,7 +56,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-497" } ] } diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5115.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5115.json index aea541182bd..1b80016a2c0 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5115.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5115.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5115", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-18T14:15:10.500", - "lastModified": "2023-12-29T17:57:50.077", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T15:15:15.890", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -232,14 +232,6 @@ "tags": [ "Issue Tracking" ] - }, - { - "url": "https://lists.debian.org/debian-lts-announce/2023/12/msg00018.html", - "source": "secalert@redhat.com", - "tags": [ - "Mailing List", - "Third Party Advisory" - ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-52xx/CVE-2023-5236.json b/CVE-2023/CVE-2023-52xx/CVE-2023-5236.json index 24c789eb978..7d3d9a832be 100644 --- a/CVE-2023/CVE-2023-52xx/CVE-2023-5236.json +++ b/CVE-2023/CVE-2023-52xx/CVE-2023-5236.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5236", "sourceIdentifier": "secalert@redhat.com", "published": "2023-12-18T14:15:10.917", - "lastModified": "2024-01-25T14:15:26.617", + "lastModified": "2024-09-16T14:15:13.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -150,10 +150,6 @@ "tags": [ "Issue Tracking" ] - }, - { - "url": "https://security.netapp.com/advisory/ntap-20240125-0004/", - "source": "secalert@redhat.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1578.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1578.json index 16d629f675c..e8c535b8a04 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1578.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1578.json @@ -2,13 +2,17 @@ "id": "CVE-2024-1578", "sourceIdentifier": "4586e0a2-224d-4f8a-9cb4-8882b208c0b3", "published": "2024-09-16T07:15:02.030", - "lastModified": "2024-09-16T07:15:02.030", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:35:14.853", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The MiCard PLUS Ci and MiCard PLUS BLE reader products developed by rf IDEAS and rebranded by NT-ware have a firmware fault that may result in characters randomly being dropped from some ID card reads, which would result in the wrong ID card number being assigned during ID card self-registration and might result in failed login attempts for end-users. Random characters being dropped from ID card numbers compromises the uniqueness of ID cards that can, therefore, result in a security issue if the users are using the \u2018ID card self-registration\u2019 function." + }, + { + "lang": "es", + "value": "Los lectores MiCard PLUS Ci y MiCard PLUS BLE desarrollados por rf IDEAS y renombrados por NT-ware tienen un fallo de firmware que puede provocar que se eliminen caracteres de forma aleatoria en algunas lecturas de tarjetas de identificaci\u00f3n, lo que dar\u00eda lugar a que se asignara un n\u00famero de tarjeta de identificaci\u00f3n incorrecto durante el autorregistro de la tarjeta de identificaci\u00f3n y podr\u00eda provocar intentos fallidos de inicio de sesi\u00f3n para los usuarios finales. La eliminaci\u00f3n aleatoria de caracteres de los n\u00fameros de tarjeta de identificaci\u00f3n compromete la unicidad de las tarjetas de identificaci\u00f3n, lo que puede, por lo tanto, generar un problema de seguridad si los usuarios utilizan la funci\u00f3n de \"autorregistro de tarjeta de identificaci\u00f3n\"." } ], "metrics": { @@ -55,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 4.7 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22399.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22399.json index 1bc2201feff..b6d83cfdbf2 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22399.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22399.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22399", "sourceIdentifier": "security@apache.org", "published": "2024-09-16T12:15:02.530", - "lastModified": "2024-09-16T12:15:02.530", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27257.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27257.json index 3c7afc47689..3242bb840a7 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27257.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27257", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-09-10T15:15:15.570", - "lastModified": "2024-09-10T15:50:47.237", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:26:15.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +61,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_grc_platform:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.3", + "versionEndExcluding": "8.3.0.2", + "matchCriteriaId": "D7B42C86-1171-4BF2-9502-0E3573E7A4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0", + "versionEndExcluding": "9.0.0.3", + "matchCriteriaId": "D8FAA3AA-5EB1-470F-A0C1-A6D5F26C22D5" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283966", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7167702", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-297xx/CVE-2024-29779.json b/CVE-2024/CVE-2024-297xx/CVE-2024-29779.json index 852e1f2a1fb..04a96193c9d 100644 --- a/CVE-2024/CVE-2024-297xx/CVE-2024-29779.json +++ b/CVE-2024/CVE-2024-297xx/CVE-2024-29779.json @@ -2,16 +2,43 @@ "id": "CVE-2024-29779", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-09-13T21:15:10.273", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-16T15:35:15.137", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "there is a possible escalation of privilege due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "Existe una posible escalada de privilegios debido a una causa ra\u00edz inusual. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-09-01", diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38315.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38315.json new file mode 100644 index 00000000000..016bdab98cd --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38315.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-38315", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-09-16T15:15:16.087", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Aspera Shares 1.0 through 1.10.0 PL3 does not invalidate session after a password reset which could allow an authenticated user to impersonate another user on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/294742", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7168379", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39574.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39574.json index ff2b7445a6f..b710e528b8d 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39574.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39574.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39574", "sourceIdentifier": "security_alert@emc.com", "published": "2024-09-10T09:15:02.290", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T15:59:10.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security_alert@emc.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:insightiq:5.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "48BEF25F-9AFD-4436-9668-627CD87E14F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000228412/dsa-2024-360-security-update-for-dell-powerscale-insightiq-for-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39580.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39580.json index ef2edefe04e..4c94d8607b5 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39580.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39580", "sourceIdentifier": "security_alert@emc.com", "published": "2024-09-10T09:15:02.740", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T15:40:09.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security_alert@emc.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:insightiq:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "6A736FD4-A93E-4879-859B-7D3FEAF28975" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000228412/dsa-2024-360-security-update-for-dell-powerscale-insightiq-for-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39581.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39581.json index ac66f570ce2..e636fb63566 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39581.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39581", "sourceIdentifier": "security_alert@emc.com", "published": "2024-09-10T09:15:02.993", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T15:50:55.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:insightiq:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "6A736FD4-A93E-4879-859B-7D3FEAF28975" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000228412/dsa-2024-360-security-update-for-dell-powerscale-insightiq-for-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39582.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39582.json index ee277228893..8409c416a74 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39582.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39582", "sourceIdentifier": "security_alert@emc.com", "published": "2024-09-10T09:15:03.243", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T15:36:21.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:insightiq:5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1BCDE7D0-133C-4BDA-AD64-0CF9489A091B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000228412/dsa-2024-360-security-update-for-dell-powerscale-insightiq-for-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-395xx/CVE-2024-39583.json b/CVE-2024/CVE-2024-395xx/CVE-2024-39583.json index 3fe7ba3aabf..98f16dc2d52 100644 --- a/CVE-2024/CVE-2024-395xx/CVE-2024-39583.json +++ b/CVE-2024/CVE-2024-395xx/CVE-2024-39583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39583", "sourceIdentifier": "security_alert@emc.com", "published": "2024-09-10T09:15:03.513", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T15:42:06.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:insightiq:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "6A736FD4-A93E-4879-859B-7D3FEAF28975" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000228412/dsa-2024-360-security-update-for-dell-powerscale-insightiq-for-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39613.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39613.json index aa70ea5503b..5826fa5a518 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39613.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39613.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39613", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-09-16T07:15:02.373", - "lastModified": "2024-09-16T07:15:02.373", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Desktop App versions <=5.8.0 fail to\u00a0specify an absolute path when searching the cmd.exe file, which allows a local attacker who is able to put an cmd.exe file in the Downloads folder of a user's machine to cause remote code execution on that machine." + }, + { + "lang": "es", + "value": "Las versiones de la aplicaci\u00f3n de escritorio Mattermost <=5.8.0 no pueden especificar una ruta absoluta al buscar el archivo cmd.exe, lo que permite que un atacante local que pueda colocar un archivo cmd.exe en la carpeta Descargas de la m\u00e1quina de un usuario provoque la ejecuci\u00f3n remota de c\u00f3digo en esa m\u00e1quina." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39772.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39772.json new file mode 100644 index 00000000000..d5f073fe48c --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39772.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-39772", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2024-09-16T15:15:16.350", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost Desktop App versions <=5.8.0 fail to safeguard screen capture functionality which allows an attacker to silently capture high-quality screenshots via JavaScript APIs." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41728.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41728.json index 55c901b8dd7..6e1f696ff65 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41728.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41728", "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T04:15:04.470", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:14:52.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,107 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:700:*:*:*:*:*:*:*", + "matchCriteriaId": "C5A3C915-0E5F-4B1A-B1EB-5ADEA517F620" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:701:*:*:*:*:*:*:*", + "matchCriteriaId": "98B2522A-B850-4EC2-B2F2-5EBF36801B39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*", + "matchCriteriaId": "706FEB9E-3EE9-405E-A8C9-733DAF68AC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC29738-CF17-4E6B-9C9E-879B17F7E001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*", + "matchCriteriaId": "127E508F-6CC1-41C8-96DF-8D14FFDD4020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*", + "matchCriteriaId": "7777AA80-1608-420E-B7D5-09ABECD51728" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*", + "matchCriteriaId": "0539618A-1C4D-463F-B2BB-DD1C239C23EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*", + "matchCriteriaId": "62828DCD-F80E-4C7C-A988-EFEA06A5223E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*", + "matchCriteriaId": "D9F38585-73AE-4DBB-A978-F0272DF8FB58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*", + "matchCriteriaId": "D416C064-BB8A-4230-A761-84A93E017F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*", + "matchCriteriaId": "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*", + "matchCriteriaId": "72491771-4492-4902-9F0C-CE6A60BAA705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:757:*:*:*:*:*:*:*", + "matchCriteriaId": "421A5354-F764-402B-A3A4-2D746EACEB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:758:*:*:*:*:*:*:*", + "matchCriteriaId": "48DFFD36-0A4A-417F-9BC5-77FD4152B637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:912:*:*:*:*:*:*:*", + "matchCriteriaId": "D2F8173D-96E8-4194-9927-681AFF56B3F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3496410", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42137.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42137.json index 154ddd1d5ff..f9383dad388 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42137.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42137.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42137", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:05.583", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:01:40.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,161 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: Bluetooth: qca: corrija el error de habilitaci\u00f3n de BT nuevamente para QCA6390 despu\u00e9s de un reinicio en caliente. La confirmaci\u00f3n 272970be3dab (\"Bluetooth: hci_qca: corrija el apagado del controlador en un serdev cerrado\") causar\u00e1 el siguiente problema de regresi\u00f3n: BT puede No se habilitar\u00e1 despu\u00e9s de los pasos siguientes: arranque en fr\u00edo -> habilitar BT -> deshabilitar BT -> reinicio en caliente -> falla de habilitaci\u00f3n de BT si la propiedad enable-gpios no est\u00e1 configurada dentro de DT|ACPI para QCA6390. El compromiso es solucionar un problema de use after free dentro de qca_serdev_shutdown() agregando una condici\u00f3n para evitar que el serdev se vac\u00ede o escriba despu\u00e9s de cerrarse, pero tambi\u00e9n introduce este problema de regresi\u00f3n con respecto a los pasos anteriores, ya que el VSC no se env\u00eda para restablecer el controlador durante el reinicio en caliente. . Se solucion\u00f3 enviando el VSC para restablecer el controlador dentro de qca_serdev_shutdown() una vez que BT estuvo habilitado, y el problema de use after free tambi\u00e9n se solucion\u00f3 con este cambio ya que el serdev todav\u00eda est\u00e1 abierto antes de vaciarse o escribirse. Verificado por la computadora port\u00e1til Dell XPS 13 9310 de la m\u00e1quina informada en las siguientes dos confirmaciones del kernel: confirmaci\u00f3n e00fc2700a3f (\"Bluetooth: btusb: soluci\u00f3n de activaci\u00f3n de la implementaci\u00f3n de coredump para QCA\") del \u00e1rbol siguiente de bluetooth. confirme b23d98d46d28 (\"Bluetooth: btusb: soluci\u00f3n que activa la implementaci\u00f3n de coredump para QCA\") del \u00e1rbol principal de Linux." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10.165", + "versionEndExcluding": "5.10.222", + "matchCriteriaId": "CF05EAFA-9345-4303-8E4A-118C81B5FDC8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.15.90", + "versionEndExcluding": "5.15.163", + "matchCriteriaId": "F190A745-DE5B-4FA4-B504-04D029449519" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.8", + "versionEndExcluding": "6.1.98", + "matchCriteriaId": "7D6B9E05-F2EB-4D2B-94B9-4CB17D7D13C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.39", + "matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.9", + "matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", + "matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", + "matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/215a26c2404fa34625c725d446967fa328a703eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4ca6013cd18e58ac1044908c40d4006a92093a11", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/88e72239ead9814b886db54fc4ee39ef3c2b8f26", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/977b9dc65e14fb80de4763d949c7dec2ecb15b9b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e2d8aa4c763593704ac21e7591aed4f13e32f3b5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e6e200b264271f62a3fadb51ada9423015ece37b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42144.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42144.json index 5cb298a9107..ee2910639b8 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42144.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42144.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42144", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:06.157", - "lastModified": "2024-07-30T13:32:45.943", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:12:56.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Thermal/drivers/mediatek/lvts_thermal: Verifique NULL ptr en lvts_data Verifique que lvts_data no sea NULL antes de usarlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.39", + "matchCriteriaId": "AFFE1388-D45B-4287-88F7-BBA975D80E4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.9", + "matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/79ef1a5593fdb8aa4dbccf6085c48f1739338bc9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1191a77351e25ddf091bb1a231cae12ee598b5d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd7ae1cabfedd727be5bee774c87acbc7b10b886", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42425.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42425.json index c343875bf21..a4b0e7df25d 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42425.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42425", "sourceIdentifier": "security_alert@emc.com", "published": "2024-09-10T09:15:03.777", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T15:46:03.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "security_alert@emc.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security_alert@emc.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + }, + { + "source": "security_alert@emc.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:precision_7920_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.1", + "matchCriteriaId": "BC189661-C4D5-4711-B34A-472F81F2A134" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7920:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BCCF11B-05BD-4E70-AD26-6B26A7E701FA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:7920_xl_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.22.1", + "matchCriteriaId": "19274738-5950-4F0C-B721-5668789F5453" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:7920_xl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2BB0803-F5C9-4D65-8462-971BCB19B824" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000227015/dsa-2024-328", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42474.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42474.json index d6d967ce98a..656fb6cf51c 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42474.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42474.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42474", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-12T17:15:17.513", - "lastModified": "2024-08-12T18:57:17.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:30:13.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security-advisories@github.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +83,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:snowflake:streamlit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.37.0", + "matchCriteriaId": "B5071B4F-8442-43A8-9567-C30F381E2C97" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/streamlit/streamlit/commit/3a639859cfdfba2187c81897d44a3e33825eb0a3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/streamlit/streamlit/security/advisories/GHSA-rxff-vr5r-8cj5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json index 4c229a4f06a..d19cfd4e9b7 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44053", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:02.013", - "lastModified": "2024-09-15T09:15:02.013", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Mohammad Arif Opor Ayam allows Reflected XSS.This issue affects Opor Ayam: from n/a through 1.8." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Mohammad Arif Opor Ayam permite XSS reflejado. Este problema afecta a Opor Ayam: desde n/a hasta 1.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44054.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44054.json index f9d02508147..ad6426cd650 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44054.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44054.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44054", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:02.290", - "lastModified": "2024-09-15T09:15:02.290", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Fluida allows Stored XSS.This issue affects Fluida: from n/a through 1.8.8." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CryoutCreations Fluida permite XSS almacenado. Este problema afecta a Fluida: desde n/a hasta 1.8.8." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44056.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44056.json index 91bde5df2fc..0e8915ad981 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44056.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44056.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44056", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:02.800", - "lastModified": "2024-09-15T09:15:02.800", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Mantra allows Stored XSS.This issue affects Mantra: from n/a through 3.3.2." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CryoutCreations Mantra permite XSS almacenado. Este problema afecta a Mantra: desde n/a hasta 3.3.2." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44057.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44057.json index cc634221e9a..626c3a23c08 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44057.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44057.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44057", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:03.270", - "lastModified": "2024-09-15T09:15:03.270", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Nirvana allows Stored XSS.This issue affects Nirvana: from n/a through 1.6.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Nirvana de CryoutCreations permite XSS almacenado. Este problema afecta a Nirvana: desde n/a hasta 1.6.3." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44058.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44058.json index d450eff0cfe..9c16673de8c 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44058.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44058.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44058", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:03.883", - "lastModified": "2024-09-15T09:15:03.883", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CryoutCreations Parabola allows Stored XSS.This issue affects Parabola: from n/a through 2.4.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Parabola de CryoutCreations permite XSS almacenado. Este problema afecta a Parabola: desde n/a hasta 2.4.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json index d1aeb36c5a3..d38edb056ce 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44059", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:04.613", - "lastModified": "2024-09-15T09:15:04.613", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in MediaRon LLC Custom Query Blocks allows Stored XSS.This issue affects Custom Query Blocks: from n/a through 5.3.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en MediaRon LLC Custom Query Blocks permite XSS almacenado. Este problema afecta a Custom Query Blocks: desde n/a hasta 5.3.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json index 6f8822c6e71..1c3912cfd19 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44060", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:11.367", - "lastModified": "2024-09-15T08:15:11.367", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Jennifer Hall Filmix allows Reflected XSS.This issue affects Filmix: from n/a through 1.1." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Jennifer Hall Filmix permite XSS reflejado. Este problema afecta a Filmix: desde n/a hasta 1.1." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json index d170269d9f9..9280e3b5eff 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44062", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:12.710", - "lastModified": "2024-09-15T08:15:12.710", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Hiroaki Miyashita Custom Field Template allows Stored XSS.This issue affects Custom Field Template: from n/a through 2.6.5." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Hiroaki Miyashita Custom Field Template permite XSS almacenado. Este problema afecta a Custom Field Template: desde n/a hasta 2.6.5." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json index 70bda0f4a34..37518199aad 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44063", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:12.940", - "lastModified": "2024-09-15T08:15:12.940", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Happyforms allows Stored XSS.This issue affects Happyforms: from n/a through 1.26.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Happyforms permite XSS almacenado. Este problema afecta a Happyforms: desde n/a hasta 1.26.0." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44092.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44092.json index 2e287f1a807..d8d3a668bd4 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44092.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44092.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44092", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-09-13T21:15:10.560", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-16T15:35:15.640", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In TBD of TBD, there is a possible LCS signing enforcement missing due to test/debugging code left in a production build. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En el futuro pr\u00f3ximo, es posible que falte una implementaci\u00f3n de firma de LCS debido a que se dej\u00f3 c\u00f3digo de prueba o depuraci\u00f3n en una compilaci\u00f3n de producci\u00f3n. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-09-01", diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44093.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44093.json index 8b361db9461..9fd4709e0ea 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44093.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44093.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44093", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-09-13T21:15:10.613", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-16T15:35:16.687", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ppmp_unprotect_buf of drm/code/drm_fw.c, there is a possible memory corruption due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En ppmp_unprotect_buf de drm/code/drm_fw.c, existe una posible corrupci\u00f3n de memoria debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-09-01", diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44094.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44094.json index 895a2894ace..1f4c8c6e677 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44094.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44094.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44094", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-09-13T21:15:10.667", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-16T15:35:17.793", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ppmp_protect_mfcfw_buf of code/drm_fw.c, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En ppmp_protect_mfcfw_buf de code/drm_fw.c, existe una posible corrupci\u00f3n de memoria debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-09-01", diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44095.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44095.json index e676150fa9c..c2d8d7d4bc2 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44095.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44095.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44095", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-09-13T21:15:10.720", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-16T15:35:18.860", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ppmp_protect_mfcfw_buf of code/drm_fw.c, there is a possible corrupt memory due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En ppmp_protect_mfcfw_buf de code/drm_fw.c, existe una posible memoria da\u00f1ada debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-09-01", diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44096.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44096.json index 3ece57ff718..bc3233982a3 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44096.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44096.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44096", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-09-13T21:15:10.777", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-16T15:35:19.900", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "there is a possible arbitrary read due to an insecure default value. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "Existe la posibilidad de una lectura arbitraria debido a un valor predeterminado inseguro. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local, con privilegios de ejecuci\u00f3n de System necesarios. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-453" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-09-01", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44112.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44112.json index 5b890605f93..eabe4c59704 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44112.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44112", "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T04:15:04.710", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:19:24.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,107 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:600:*:*:*:*:*:*:*", + "matchCriteriaId": "8E4FDD2B-B5BA-45E3-9E3C-1DE16EE7F8A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:602:*:*:*:*:*:*:*", + "matchCriteriaId": "E37B0E5D-5F45-4325-BCBE-14868058C02E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:603:*:*:*:*:*:*:*", + "matchCriteriaId": "E2D57ACB-6555-4BC1-BDA4-C1AEE627FDBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:604:*:*:*:*:*:*:*", + "matchCriteriaId": "E8AC6142-D03B-4437-907D-F80C2FD6C18C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:605:*:*:*:*:*:*:*", + "matchCriteriaId": "796F8470-CA51-42C4-B03A-97A02617E6D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:606:*:*:*:*:*:*:*", + "matchCriteriaId": "48701B07-F944-4A55-B43F-8827DD0F3F4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:617:*:*:*:*:*:*:*", + "matchCriteriaId": "7B575B79-8F75-4B9F-9379-BBDB126D139F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:618:*:*:*:*:*:*:*", + "matchCriteriaId": "77D5E396-0DA6-49A5-A66B-1A4A3D14C646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:800:*:*:*:*:*:*:*", + "matchCriteriaId": "90F7113F-DA15-4F74-BD77-39D8A9FC9E7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:802:*:*:*:*:*:*:*", + "matchCriteriaId": "5FF8F332-0BCC-4DCA-B7ED-15936FE73DC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:803:*:*:*:*:*:*:*", + "matchCriteriaId": "AACBC4D0-3EC8-4F1E-BBCA-60F736CA4D41" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:804:*:*:*:*:*:*:*", + "matchCriteriaId": "4A6D519D-D774-43E2-A4D0-B41443B6C8E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:805:*:*:*:*:*:*:*", + "matchCriteriaId": "593CF420-1660-43E1-BCBC-DBE877784A85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:806:*:*:*:*:*:*:*", + "matchCriteriaId": "83271FF6-2026-4735-9BD8-E5D328CB6753" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:oil_\\%\\/_gas:807:*:*:*:*:*:*:*", + "matchCriteriaId": "FF3686DE-F526-473D-A8D2-02F94FE0D385" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3505293", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44114.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44114.json index 37eeb154247..cddf905547a 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44114.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44114.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44114", "sourceIdentifier": "cna@sap.com", "published": "2024-09-10T03:15:03.077", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:09:10.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,97 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:702:*:*:*:*:*:*:*", + "matchCriteriaId": "706FEB9E-3EE9-405E-A8C9-733DAF68AC6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:731:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC29738-CF17-4E6B-9C9E-879B17F7E001" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:740:*:*:*:*:*:*:*", + "matchCriteriaId": "127E508F-6CC1-41C8-96DF-8D14FFDD4020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:750:*:*:*:*:*:*:*", + "matchCriteriaId": "7777AA80-1608-420E-B7D5-09ABECD51728" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:751:*:*:*:*:*:*:*", + "matchCriteriaId": "0539618A-1C4D-463F-B2BB-DD1C239C23EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:752:*:*:*:*:*:*:*", + "matchCriteriaId": "62828DCD-F80E-4C7C-A988-EFEA06A5223E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:753:*:*:*:*:*:*:*", + "matchCriteriaId": "D9F38585-73AE-4DBB-A978-F0272DF8FB58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:754:*:*:*:*:*:*:*", + "matchCriteriaId": "D416C064-BB8A-4230-A761-84A93E017F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:755:*:*:*:*:*:*:*", + "matchCriteriaId": "6B8D3EA0-28E6-4333-8C67-B9D3775EB9BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:756:*:*:*:*:*:*:*", + "matchCriteriaId": "72491771-4492-4902-9F0C-CE6A60BAA705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:757:*:*:*:*:*:*:*", + "matchCriteriaId": "421A5354-F764-402B-A3A4-2D746EACEB46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:758:*:*:*:*:*:*:*", + "matchCriteriaId": "48DFFD36-0A4A-417F-9BC5-77FD4152B637" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_application_server_abap:912:*:*:*:*:*:*:*", + "matchCriteriaId": "D2F8173D-96E8-4194-9927-681AFF56B3F0" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3507252", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44430.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44430.json index fbf067348da..64bb94a2ab5 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44430.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44430.json @@ -2,16 +2,55 @@ "id": "CVE-2024-44430", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-13T20:15:02.940", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-16T15:35:20.943", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in Best Free Law Office Management Software-v1.0 allows an attacker to execute arbitrary code and obtain sensitive information via a crafted payload to the kortex_lite/control/register_case.php interface" + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en Best Free Law Office Management Software-v1.0 permite a un atacante ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s de un payload manipulado para la interfaz kortex_lite/control/register_case.php" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://blog.csdn.net/samwbs/article/details/140954482", diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json index 4e354782965..a62298aaab5 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45455.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45455", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.150", - "lastModified": "2024-09-15T08:15:13.150", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JoomUnited WP Meta SEO allows Stored XSS.This issue affects WP Meta SEO: from n/a through 4.5.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en JoomUnited WP Meta SEO permite XSS almacenado. Este problema afecta a WP Meta SEO: desde n/a hasta 4.5.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json index 9979fd004ef..973bb0c3428 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45456.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45456", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.350", - "lastModified": "2024-09-15T08:15:13.350", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in JoomUnited WP Meta SEO allows Stored XSS.This issue affects WP Meta SEO: from n/a through 4.5.13." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en JoomUnited WP Meta SEO permite XSS almacenado. Este problema afecta a WP Meta SEO: desde n/a hasta 4.5.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json index c3c1d70b4b3..e797c70552d 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45457", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.547", - "lastModified": "2024-09-15T08:15:13.547", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Spiffy Plugins Spiffy Calendar allows Stored XSS.This issue affects Spiffy Calendar: from n/a through 4.9.13." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Spiffy Plugins Spiffy Calendar permite XSS almacenado. Este problema afecta a Spiffy Calendar: desde n/a hasta 4.9.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json index b589c5006ce..a2707c7f21c 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45458.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45458", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.763", - "lastModified": "2024-09-15T08:15:13.763", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Spiffy Plugins Spiffy Calendar allows Reflected XSS.This issue affects Spiffy Calendar: from n/a through 4.9.13." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Spiffy Plugins Spiffy Calendar permite XSS reflejado. Este problema afecta a Spiffy Calendar: desde n/a hasta 4.9.13." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json index 6fe7bc799ce..bca6fceddc4 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45459", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.963", - "lastModified": "2024-09-15T08:15:13.963", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in PickPlugins Product Slider for WooCommerce allows Reflected XSS.This issue affects Product Slider for WooCommerce: from n/a through 1.13.50." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en PickPlugins Product Slider para WooCommerce permite XSS reflejado. Este problema afecta a Product Slider para WooCommerce: desde n/a hasta 1.13.50." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json index 6fa08edf648..461212a7306 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45460", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:14.173", - "lastModified": "2024-09-15T08:15:14.173", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Manu225 Flipping Cards allows Stored XSS.This issue affects Flipping Cards: from n/a through 1.30." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Manu225 Flipping Cards permite XSS almacenado. Este problema afecta a Flipping Cards: desde n/a hasta 1.30." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45694.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45694.json index b7e651e1c55..b39767c08ce 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45694.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45694.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45694", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:02.610", - "lastModified": "2024-09-16T07:15:02.610", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device." + }, + { + "lang": "es", + "value": "El servicio web de ciertos modelos de enrutadores inal\u00e1mbricos D-Link contiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila, que permite a atacantes remotos no autenticados explotar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45695.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45695.json index 6e3dc7e39c0..a02f62f76c7 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45695.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45695.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45695", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:02.840", - "lastModified": "2024-09-16T07:15:02.840", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The web service of certain models of D-Link wireless routers contains a Stack-based Buffer Overflow vulnerability, which allows unauthenticated remote attackers to exploit this vulnerability to execute arbitrary code on the device." + }, + { + "lang": "es", + "value": "El servicio web de ciertos modelos de enrutadores inal\u00e1mbricos D-Link contiene una vulnerabilidad de desbordamiento de b\u00fafer basada en pila, que permite a atacantes remotos no autenticados explotar esta vulnerabilidad para ejecutar c\u00f3digo arbitrario en el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json index b18b3886c31..c1dacb6d336 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45696", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:03.037", - "lastModified": "2024-09-16T07:15:03.037", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain models of D-Link wireless routers contain hidden functionality. By sending specific packets to the web service, the attacker can forcibly enable the telnet service and log in using hard-coded credentials. The telnet service enabled through this method can only be accessed from within the same local network as the device." + }, + { + "lang": "es", + "value": "Algunos modelos de enrutadores inal\u00e1mbricos D-Link contienen funciones ocultas. Al enviar paquetes espec\u00edficos al servicio web, el atacante puede habilitar por la fuerza el servicio Telnet e iniciar sesi\u00f3n con credenciales codificadas. Solo se puede acceder al servicio Telnet habilitado mediante este m\u00e9todo desde la misma red local que el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json index 7bebb879a82..005ec5a227e 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45697", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:03.233", - "lastModified": "2024-09-16T07:15:03.233", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain models of D-Link wireless routers have a hidden functionality where the telnet service is enabled when the WAN port is plugged in. Unauthorized remote attackers can log in and execute OS commands using hard-coded credentials." + }, + { + "lang": "es", + "value": "Ciertos modelos de enrutadores inal\u00e1mbricos D-Link tienen una funcionalidad oculta donde el servicio telnet se habilita cuando el puerto WAN est\u00e1 conectado. Atacantes remotos no autorizados pueden iniciar sesi\u00f3n y ejecutar comandos del sistema operativo utilizando credenciales codificadas." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json index 72d4cbafa77..8aea9ca1f01 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45698", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:03.450", - "lastModified": "2024-09-16T07:15:03.450", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain models of D-Link wireless routers do not properly validate user input in the telnet service, allowing unauthenticated remote attackers to use hard-coded credentials to log into telnet and inject arbitrary OS commands, which can then be executed on the device." + }, + { + "lang": "es", + "value": "Ciertos modelos de enrutadores inal\u00e1mbricos D-Link no validan correctamente la entrada del usuario en el servicio telnet, lo que permite que atacantes remotos no autenticados utilicen credenciales codificadas para iniciar sesi\u00f3n en telnet e inyectar comandos arbitrarios del sistema operativo, que luego pueden ejecutarse en el dispositivo." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45833.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45833.json index 51be2d7f639..5bc9d8d6cd3 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45833.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45833.json @@ -2,13 +2,17 @@ "id": "CVE-2024-45833", "sourceIdentifier": "responsibledisclosure@mattermost.com", "published": "2024-09-16T07:15:03.663", - "lastModified": "2024-09-16T07:15:03.663", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Mattermost Mobile Apps versions <=2.18.0 fail to disable autocomplete during login while typing the password and visible password is selected, which allows the\u00a0password to get saved in the dictionary when the user has Swiftkey as the default keyboard, the masking is off and the password contains a special character.." + }, + { + "lang": "es", + "value": "Las versiones <=2.18.0 de Mattermost Mobile Apps no pueden deshabilitar el autocompletado durante el inicio de sesi\u00f3n al escribir la contrase\u00f1a y se selecciona la contrase\u00f1a visible, lo que permite que la contrase\u00f1a se guarde en el diccionario cuando el usuario tiene Swiftkey como teclado predeterminado, el enmascaramiento est\u00e1 desactivado y la contrase\u00f1a contiene un car\u00e1cter especial." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45835.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45835.json new file mode 100644 index 00000000000..1dca13b27cb --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45835.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45835", + "sourceIdentifier": "responsibledisclosure@mattermost.com", + "published": "2024-09-16T15:15:16.803", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mattermost Desktop App versions <=5.8.0 fail to sufficiently configure Electron Fuses which allows an attacker to gather Chromium cookies or abuse other misconfigurations via remote/local access." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "responsibledisclosure@mattermost.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://mattermost.com/security-updates", + "source": "responsibledisclosure@mattermost.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46419.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46419.json new file mode 100644 index 00000000000..e08b2cfb1ea --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46419.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46419", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-16T14:15:13.337", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWizardCfg function via the ssid5g parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setWizardCfg.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46424.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46424.json index c21de683b9d..ead21f8337f 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46424.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46424.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46424", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T13:15:10.760", - "lastModified": "2024-09-16T13:15:10.760", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46451.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46451.json index b9c65604993..14ddf50f13a 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46451.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46451.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46451", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T13:15:10.847", - "lastModified": "2024-09-16T13:15:10.847", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46918.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46918.json index 4205f1fc3ed..4fefad556ec 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46918.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46918.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46918", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-15T20:15:02.390", - "lastModified": "2024-09-15T20:15:02.390", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "app/Controller/UserLoginProfilesController.php in MISP before 2.4.198 does not prevent an org admin from viewing sensitive login fields of another org admin in the same org." + }, + { + "lang": "es", + "value": "app/Controller/UserLoginProfilesController.php en MISP anterior a 2.4.198 no impide que un administrador de organizaci\u00f3n vea campos de inicio de sesi\u00f3n confidenciales de otro administrador de organizaci\u00f3n en la misma organizaci\u00f3n." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46937.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46937.json index 0f83f76a7de..ea6377abdf0 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46937.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46937.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46937", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T13:15:10.917", - "lastModified": "2024-09-16T13:15:10.917", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46938.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46938.json index c296dac81cc..f1fedbdfffb 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46938.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46938.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46938", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-15T22:15:09.830", - "lastModified": "2024-09-15T22:15:09.830", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en Sitecore Experience Platform (XP), Experience Manager (XM) y Experience Commerce (XC) desde la versi\u00f3n inicial 8.0 hasta la versi\u00f3n inicial 10.4. Un atacante no autenticado puede leer archivos arbitrarios." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46942.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46942.json index f838725ce78..dba91735c8f 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46942.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46942.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46942", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-15T23:15:11.033", - "lastModified": "2024-09-15T23:15:11.033", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In OpenDaylight Model-Driven Service Abstraction Layer (MD-SAL) through 13.0.1, a controller with a follower role can configure flow entries in an OpenDaylight clustering deployment." + }, + { + "lang": "es", + "value": "En OpenDaylight Model-Driven Service Abstraction Layer (MD-SAL) hasta la versi\u00f3n 13.0.1, un controlador con un rol de seguidor puede configurar entradas de flujo en una implementaci\u00f3n de agrupamiento de OpenDaylight." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46943.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46943.json index 485a331c4ac..b3d2bb5bd1b 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46943.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46943.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46943", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-15T23:15:11.100", - "lastModified": "2024-09-15T23:15:11.100", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in OpenDaylight Authentication, Authorization and Accounting (AAA) through 0.19.3. A rogue controller can join a cluster to impersonate an offline peer, even if this rogue controller does not possess the complete cluster configuration information." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en OpenDaylight Authentication, Authorization and Accounting (AAA) hasta la versi\u00f3n 0.19.3. Un controlador no autorizado puede unirse a un cl\u00faster para hacerse pasar por un par sin conexi\u00f3n, incluso si este controlador no autorizado no posee la informaci\u00f3n completa de configuraci\u00f3n del cl\u00faster." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46958.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46958.json index ae4595e5449..57c8551b7c5 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46958.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46958.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46958", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-16T02:15:01.803", - "lastModified": "2024-09-16T02:15:01.803", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Nextcloud Desktop Client 3.13.1 through 3.13.3 on Linux, synchronized files (between the server and client) may become world writable or world readable. This is fixed in 3.13.4." + }, + { + "lang": "es", + "value": "En Nextcloud Desktop Client 3.13.1 a 3.13.3 en Linux, los archivos sincronizados (entre el servidor y el cliente) pueden volverse legibles o modificables por todos. Esto se solucion\u00f3 en 3.13.4." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46970.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46970.json index 20758006f53..f3153906c77 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46970.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46970.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46970", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-09-16T11:15:13.540", - "lastModified": "2024-09-16T11:15:13.540", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains IntelliJ IDEA before 2024.1 hTML injection via the project name was possible" + }, + { + "lang": "es", + "value": "En JetBrains IntelliJ IDEA antes de 2024.1 era posible la inyecci\u00f3n de HTML a trav\u00e9s del nombre del proyecto" } ], "metrics": { diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json index 8bbaf40ecd0..5713b94d1fb 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4629.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4629", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-03T20:15:09.003", - "lastModified": "2024-09-09T19:15:13.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T15:51:43.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -51,42 +71,221 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.0.3", + "matchCriteriaId": "EEB94F86-A977-493B-9F12-6991F84F955C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:build_of_keycloak:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.0", + "versionEndExcluding": "22.012", + "matchCriteriaId": "395F9BD6-C79B-442A-AA00-F96CA978B910" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*", + "matchCriteriaId": "341E6313-20D5-44CB-9719-B20585DC5AD6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.6", + "versionEndExcluding": "7.6.10", + "matchCriteriaId": "92BC930F-97E8-4FA9-80C5-3A8DB327990B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "EA983F8C-3A06-450A-AEFF-9429DE9A3454" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "40449571-22F8-44FA-B57B-B43F71AB25E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "B02036DD-4489-480B-B7D4-4EB08952377B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E78C55-45B6-4E01-9773-D3468F8EA9C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "30E2CF79-2D56-48AB-952E-5DDAFE471073" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "54E24055-813B-4E6D-94B7-FAD5F78B8537" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "CC262C4C-7B6A-4117-A50F-1FF69296DDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "E58526FB-522F-4AAC-B03C-9CAB443D0CFF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:6493", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6494", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6495", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6497", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6499", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6500", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6501", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-4629", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2276761", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json index 92a5fe0d8d9..beca8e06014 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6052.json @@ -2,13 +2,13 @@ "id": "CVE-2024-6052", "sourceIdentifier": "security@checkmk.com", "published": "2024-07-03T15:15:06.223", - "lastModified": "2024-08-27T17:56:02.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-16T14:15:13.410", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Stored XSS in Checkmk before versions 2.3.0p10, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements" + "value": "Stored XSS in Checkmk before versions 2.3.0p8, 2.2.0p29, 2.1.0p45, and 2.0.0 (EOL) allows users to execute arbitrary scripts by injecting HTML elements" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6401.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6401.json new file mode 100644 index 00000000000..48e84110d7f --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6401.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-6401", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-09-16T15:15:17.073", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SFS Consulting InsureE GL allows SQL Injection.This issue affects InsureE GL: before 4.6.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1475", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6482.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6482.json index 3f353f800f1..be92dbe8c1f 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6482.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6482.json @@ -2,13 +2,17 @@ "id": "CVE-2024-6482", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-14T13:15:10.343", - "lastModified": "2024-09-14T13:15:10.343", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Login with phone number plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.7.49. This is due to a lack of validation and missing capability check on user-supplied data in the 'lwp_update_password_action' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their role to any other role, including Administrator. The vulnerability was partially patched in version 1.7.40. The login with phone number pro plugin was required to exploit the vulnerability in versions 1.7.40 - 1.7.49." + }, + { + "lang": "es", + "value": "El complemento Login with phone number para WordPress es vulnerable a la escalada de privilegios en todas las versiones hasta la 1.7.49 incluida. Esto se debe a la falta de validaci\u00f3n y a la falta de comprobaci\u00f3n de la capacidad de los datos suministrados por el usuario en la funci\u00f3n 'lwp_update_password_action'. Esto permite que los atacantes autenticados, con acceso de nivel de suscriptor o superior, actualicen su rol a cualquier otro rol, incluido el de administrador. La vulnerabilidad fue parcialmente corregida en la versi\u00f3n 1.7.40. El complemento Login with phone number pro era necesario para explotar la vulnerabilidad en las versiones 1.7.40 - 1.7.49." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7098.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7098.json new file mode 100644 index 00000000000..b8527c0264e --- /dev/null +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7098.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7098", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-09-16T15:15:17.223", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Restriction of XML External Entity Reference vulnerability in SFS Consulting ww.Winsure allows XML Injection.This issue affects ww.Winsure: before 4.6.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1475", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7104.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7104.json new file mode 100644 index 00000000000..743119d681e --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7104.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7104", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-09-16T15:15:17.380", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in SFS Consulting ww.Winsure allows Code Injection.This issue affects ww.Winsure: before 4.6.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1475", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json index 1ef0ac67f4e..4fb7e54ac48 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7700", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-12T17:15:18.607", - "lastModified": "2024-08-12T18:57:17.383", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-16T14:20:21.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -51,14 +71,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:theforeman:foreman:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD7E727C-BF9F-4A86-BCBE-1CE6E1108181" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:theforeman:foreman:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD7E727C-BF9F-4A86-BCBE-1CE6E1108181" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "848C92A9-0677-442B-8D52-A448F2019903" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-7700", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory", + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304090", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8776.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8776.json index d8cfa729ad6..0851ab36c3e 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8776.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8776.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8776", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T06:15:11.023", - "lastModified": "2024-09-16T06:15:11.023", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SmartRobot from INTUMIT does not properly validate a specific page parameter, allowing unautheticated remote attackers to inject JavaScript code to the parameter for Reflected Cross-site Scripting attacks." + }, + { + "lang": "es", + "value": "SmartRobot de INTUMIT no valida correctamente un par\u00e1metro de p\u00e1gina espec\u00edfico, lo que permite que atacantes remotos no autenticados inyecten c\u00f3digo JavaScript en el par\u00e1metro para ataques de Cross-site Scripting Reflejado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8777.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8777.json index 0b6953f335a..b4883e2606a 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8777.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8777.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8777", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T06:15:11.483", - "lastModified": "2024-09-16T06:15:11.483", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OMFLOW from The SYSCOM Group has an information leakage vulnerability, allowing unauthorized remote attackers to read arbitrary system configurations. If LDAP authentication is enabled, attackers can obtain plaintext credentials." + }, + { + "lang": "es", + "value": "OMFLOW de The SYSCOM Group tiene una vulnerabilidad de fuga de informaci\u00f3n que permite a atacantes remotos no autorizados leer configuraciones arbitrarias del sistema. Si la autenticaci\u00f3n LDAP est\u00e1 habilitada, los atacantes pueden obtener credenciales en texto simple." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8778.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8778.json index 8cc971b99c7..b75de942548 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8778.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8778.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8778", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T06:15:11.777", - "lastModified": "2024-09-16T06:15:11.777", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OMFLOW from The SYSCOM Group does not properly validate user input of the download functionality, allowing remote attackers with regular privileges to read arbitrary system files." + }, + { + "lang": "es", + "value": "OMFLOW de The SYSCOM Group no valida correctamente la entrada del usuario en la funcionalidad de descarga, lo que permite a atacantes remotos con privilegios regulares leer archivos de sistema arbitrarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8779.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8779.json index 737a6b4fac8..5a742686e92 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8779.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8779.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8779", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T06:15:12.063", - "lastModified": "2024-09-16T06:15:12.063", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OMFLOW from The SYSCOM Group does not properly restrict access to the system settings modification functionality, allowing remote attackers with regular privileges to update system settings or create accounts with administrator privileges, thereby gaining control of the server." + }, + { + "lang": "es", + "value": "OMFLOW de The SYSCOM Group no restringe adecuadamente el acceso a la funcionalidad de modificaci\u00f3n de la configuraci\u00f3n del sistema, lo que permite a atacantes remotos con privilegios regulares actualizar la configuraci\u00f3n del sistema o crear cuentas con privilegios de administrador, obteniendo as\u00ed el control del servidor." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8780.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8780.json index 46e3c939541..99475064657 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8780.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8780.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8780", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T06:15:12.360", - "lastModified": "2024-09-16T06:15:12.360", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OMFLOW from The SYSCOM Group does not properly restrict the query range of its data query functionality, allowing remote attackers with regular privileges to obtain accounts and password hashes of other users." + }, + { + "lang": "es", + "value": "OMFLOW de The SYSCOM Group no restringe adecuadamente el rango de consulta de su funcionalidad de consulta de datos, lo que permite a atacantes remotos con privilegios regulares obtener cuentas y hashes de contrase\u00f1as de otros usuarios." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8862.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8862.json index 099e98745dd..146f3024e1c 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8862.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8862.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8862", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-14T20:15:11.633", - "lastModified": "2024-09-14T20:15:11.633", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in h2oai h2o-3 3.46.0.4. This issue affects the function getConnectionSafe of the file /dtale/chart-data/1 of the component JDBC Connection Handler. The manipulation of the argument query leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como cr\u00edtica, en h2oai h2o-3 3.46.0.4. Este problema afecta a la funci\u00f3n getConnectionSafe del archivo /dtale/chart-data/1 del componente JDBC Connection Handler. La manipulaci\u00f3n de la consulta de argumentos provoca la deserializaci\u00f3n. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8863.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8863.json index d3744952569..1fc891581d8 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8863.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8863.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8863", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-14T23:15:11.967", - "lastModified": "2024-09-14T23:15:11.967", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in aimhubio aim up to 3.24. Affected is the function dangerouslySetInnerHTML of the file textbox.tsx of the component Text Explorer. The manipulation of the argument query leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en aimhubio aim hasta la versi\u00f3n 3.24. La funci\u00f3n dangerouslySetInnerHTML del archivo textbox.tsx del componente Text Explorer est\u00e1 afectada. La manipulaci\u00f3n de la consulta de argumentos provoca Cross-site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8864.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8864.json index e448aa8133c..806aed5ca83 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8864.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8864.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8864", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T01:15:10.153", - "lastModified": "2024-09-15T01:15:10.153", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in composiohq composio up to 0.5.6 and classified as critical. Affected by this vulnerability is the function Calculator of the file python/composio/tools/local/mathematical/actions/calculator.py. The manipulation leads to code injection. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en composiohq composio hasta la versi\u00f3n 0.5.6 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n Calculator del archivo python/composio/tools/local/mathematical/actions/calculator.py. La manipulaci\u00f3n conduce a la inyecci\u00f3n de c\u00f3digo. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8865.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8865.json index c16c2804f2b..b3f171fe14a 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8865.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8865.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8865", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T01:15:10.423", - "lastModified": "2024-09-15T01:15:10.423", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in composiohq composio up to 0.5.8 and classified as problematic. Affected by this issue is the function path of the file composio\\server\\api.py. The manipulation of the argument file leads to path traversal. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en composiohq composio hasta la versi\u00f3n 0.5.8 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta la ruta de funci\u00f3n del archivo composio\\server\\api.py. La manipulaci\u00f3n del archivo de argumentos provoca path traversal. La vulnerabilidad se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8866.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8866.json index 5225850886d..0d25f3cf0cd 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8866.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8866.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8866", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T02:15:01.900", - "lastModified": "2024-09-15T02:15:01.900", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in AutoCMS 5.4. It has been classified as problematic. This affects an unknown part of the file /admin/robot.php. The manipulation of the argument sidebar leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en AutoCMS 5.4. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo /admin/robot.php. La manipulaci\u00f3n de la barra lateral de argumentos provoca ataques de Cross-site Scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8867.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8867.json index ed4da3cbdfe..aaacc07e377 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8867.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8867.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8867", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T03:15:01.840", - "lastModified": "2024-09-15T03:15:01.840", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Perfex CRM 3.1.6. It has been declared as problematic. This vulnerability affects unknown code of the file application/controllers/Clients.php of the component Parameter Handler. The manipulation of the argument message leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en Perfex CRM 3.1.6. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo application/controllers/Clients.php del componente Parameter Handler. La manipulaci\u00f3n del argumento message provoca ataques de Cross-site Scripting. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8868.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8868.json index 0fa3c01f323..5205798f1ea 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8868.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8868.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8868", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T03:15:02.153", - "lastModified": "2024-09-15T03:15:02.153", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Crud Operation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file savedata.php. The manipulation of the argument sname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Crud Operation System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo savedata.php. La manipulaci\u00f3n del argumento sname provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8869.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8869.json index abe874fa288..5581a377435 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8869.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8869.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8869", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T11:15:13.323", - "lastModified": "2024-09-15T11:15:13.323", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in TOTOLINK A720R 4.1.5. Affected is the function exportOvpn. The manipulation leads to os command injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en TOTOLINK A720R 4.1.5. La funci\u00f3n exportOvpn est\u00e1 afectada. La manipulaci\u00f3n conduce a la inyecci\u00f3n de comandos del sistema operativo. Es posible lanzar el ataque de forma remota. La complejidad del ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8875.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8875.json index 13b9592a45a..3f3ecc09545 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8875.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8875.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8875", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T22:15:09.887", - "lastModified": "2024-09-15T22:15:09.887", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in vedees wcms up to 0.3.2. Affected by this vulnerability is an unknown functionality of the file /wex/finder.php. The manipulation of the argument p leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en vedees wcms hasta la versi\u00f3n 0.3.2. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /wex/finder.php. La manipulaci\u00f3n del argumento p conduce a un path traversal. El ataque se puede ejecutar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8876.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8876.json index a7b827ce2da..ec63d395636 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8876.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8876.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8876", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-15T22:15:10.137", - "lastModified": "2024-09-15T22:15:10.137", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in xiaohe4966 TpMeCMS up to 1.3.3.1. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.3.2 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en xiaohe4966 TpMeCMS hasta la versi\u00f3n 1.3.3.1. Este problema afecta a algunas funciones desconocidas del archivo /index/ajax/lang. La manipulaci\u00f3n del argumento lang provoca un path traversal. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 1.3.3.2 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8880.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8880.json index 5493208b3e9..d1f880fa070 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8880.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8880.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8880", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-16T01:15:10.503", - "lastModified": "2024-09-16T01:15:10.503", - "vulnStatus": "Received", + "lastModified": "2024-09-16T15:30:28.733", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in playSMS 1.4.4/1.4.5/1.4.6/1.4.7. Affected is an unknown function of the file /playsms/index.php?app=main&inc=core_auth&route=forgot&op=forgot of the component Template Handler. The manipulation of the argument username/email/captcha leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. The project maintainer was informed early about the issue. Investigation shows that playSMS up to 1.4.3 contained a fix but later versions re-introduced the flaw. As long as the latest version of the playsms/tpl package is used, the software is not affected. Version >=1.4.4 shall fix this issue for sure." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en playSMS 1.4.4/1.4.5/1.4.6/1.4.7. Se ve afectada una funci\u00f3n desconocida del archivo /playsms/index.php?app=main&inc=core_auth&route=forgot&op=forgot del componente Template Handler. La manipulaci\u00f3n del argumento username/email/captcha provoca la inyecci\u00f3n de c\u00f3digo. Es posible lanzar el ataque de forma remota. La complejidad de un ataque es bastante alta. Se dice que la explotabilidad es dif\u00edcil. El exploit se ha divulgado al p\u00fablico y puede usarse. Se recomienda actualizar el componente afectado. El responsable del proyecto fue informado con antelaci\u00f3n sobre el problema. La investigaci\u00f3n muestra que playSMS hasta la versi\u00f3n 1.4.3 conten\u00eda una soluci\u00f3n, pero las versiones posteriores volvieron a introducir la falla. Mientras se utilice la \u00faltima versi\u00f3n del paquete playsms/tpl, el software no se ve afectado. La versi\u00f3n >=1.4.4 solucionar\u00e1 este problema con seguridad." } ], "metrics": { diff --git a/README.md b/README.md index 22c81fa2bc1..26733057745 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-16T14:00:25.327862+00:00 +2024-09-16T16:00:18.117813+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-16T13:54:41.923000+00:00 +2024-09-16T15:59:10.653000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262928 +262935 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `7` -- [CVE-2024-22399](CVE-2024/CVE-2024-223xx/CVE-2024-22399.json) (`2024-09-16T12:15:02.530`) -- [CVE-2024-46424](CVE-2024/CVE-2024-464xx/CVE-2024-46424.json) (`2024-09-16T13:15:10.760`) -- [CVE-2024-46451](CVE-2024/CVE-2024-464xx/CVE-2024-46451.json) (`2024-09-16T13:15:10.847`) -- [CVE-2024-46937](CVE-2024/CVE-2024-469xx/CVE-2024-46937.json) (`2024-09-16T13:15:10.917`) +- [CVE-2024-38315](CVE-2024/CVE-2024-383xx/CVE-2024-38315.json) (`2024-09-16T15:15:16.087`) +- [CVE-2024-39772](CVE-2024/CVE-2024-397xx/CVE-2024-39772.json) (`2024-09-16T15:15:16.350`) +- [CVE-2024-45835](CVE-2024/CVE-2024-458xx/CVE-2024-45835.json) (`2024-09-16T15:15:16.803`) +- [CVE-2024-46419](CVE-2024/CVE-2024-464xx/CVE-2024-46419.json) (`2024-09-16T14:15:13.337`) +- [CVE-2024-6401](CVE-2024/CVE-2024-64xx/CVE-2024-6401.json) (`2024-09-16T15:15:17.073`) +- [CVE-2024-7098](CVE-2024/CVE-2024-70xx/CVE-2024-7098.json) (`2024-09-16T15:15:17.223`) +- [CVE-2024-7104](CVE-2024/CVE-2024-71xx/CVE-2024-7104.json) (`2024-09-16T15:15:17.380`) ### CVEs modified in the last Commit -Recently modified CVEs: `50` +Recently modified CVEs: `108` -- [CVE-2024-39379](CVE-2024/CVE-2024-393xx/CVE-2024-39379.json) (`2024-09-16T12:15:02.870`) -- [CVE-2024-39384](CVE-2024/CVE-2024-393xx/CVE-2024-39384.json) (`2024-09-16T13:01:07.037`) -- [CVE-2024-39385](CVE-2024/CVE-2024-393xx/CVE-2024-39385.json) (`2024-09-16T13:12:45.600`) -- [CVE-2024-39406](CVE-2024/CVE-2024-394xx/CVE-2024-39406.json) (`2024-09-16T12:15:03.080`) -- [CVE-2024-39408](CVE-2024/CVE-2024-394xx/CVE-2024-39408.json) (`2024-09-16T13:15:09.133`) -- [CVE-2024-39409](CVE-2024/CVE-2024-394xx/CVE-2024-39409.json) (`2024-09-16T13:15:09.387`) -- [CVE-2024-39410](CVE-2024/CVE-2024-394xx/CVE-2024-39410.json) (`2024-09-16T13:15:09.557`) -- [CVE-2024-39412](CVE-2024/CVE-2024-394xx/CVE-2024-39412.json) (`2024-09-16T13:15:09.840`) -- [CVE-2024-39420](CVE-2024/CVE-2024-394xx/CVE-2024-39420.json) (`2024-09-16T13:15:09.977`) -- [CVE-2024-40478](CVE-2024/CVE-2024-404xx/CVE-2024-40478.json) (`2024-09-16T13:46:40.287`) -- [CVE-2024-41839](CVE-2024/CVE-2024-418xx/CVE-2024-41839.json) (`2024-09-16T13:15:10.250`) -- [CVE-2024-41857](CVE-2024/CVE-2024-418xx/CVE-2024-41857.json) (`2024-09-16T13:18:35.007`) -- [CVE-2024-41867](CVE-2024/CVE-2024-418xx/CVE-2024-41867.json) (`2024-09-16T13:15:10.550`) -- [CVE-2024-42122](CVE-2024/CVE-2024-421xx/CVE-2024-42122.json) (`2024-09-16T13:49:27.837`) -- [CVE-2024-42131](CVE-2024/CVE-2024-421xx/CVE-2024-42131.json) (`2024-09-16T13:52:37.707`) -- [CVE-2024-42136](CVE-2024/CVE-2024-421xx/CVE-2024-42136.json) (`2024-09-16T13:54:41.923`) -- [CVE-2024-44798](CVE-2024/CVE-2024-447xx/CVE-2024-44798.json) (`2024-09-16T13:19:38.393`) -- [CVE-2024-44996](CVE-2024/CVE-2024-449xx/CVE-2024-44996.json) (`2024-09-16T12:21:47.370`) -- [CVE-2024-45203](CVE-2024/CVE-2024-452xx/CVE-2024-45203.json) (`2024-09-16T13:27:19.190`) -- [CVE-2024-5988](CVE-2024/CVE-2024-59xx/CVE-2024-5988.json) (`2024-09-16T12:07:20.767`) -- [CVE-2024-5989](CVE-2024/CVE-2024-59xx/CVE-2024-5989.json) (`2024-09-16T12:08:03.447`) -- [CVE-2024-6083](CVE-2024/CVE-2024-60xx/CVE-2024-6083.json) (`2024-09-16T13:21:53.467`) -- [CVE-2024-8190](CVE-2024/CVE-2024-81xx/CVE-2024-8190.json) (`2024-09-16T13:44:18.173`) -- [CVE-2024-8568](CVE-2024/CVE-2024-85xx/CVE-2024-8568.json) (`2024-09-16T13:22:31.087`) -- [CVE-2024-8586](CVE-2024/CVE-2024-85xx/CVE-2024-8586.json) (`2024-09-16T13:28:03.400`) +- [CVE-2024-46937](CVE-2024/CVE-2024-469xx/CVE-2024-46937.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-46938](CVE-2024/CVE-2024-469xx/CVE-2024-46938.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-46942](CVE-2024/CVE-2024-469xx/CVE-2024-46942.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-46943](CVE-2024/CVE-2024-469xx/CVE-2024-46943.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-46958](CVE-2024/CVE-2024-469xx/CVE-2024-46958.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-46970](CVE-2024/CVE-2024-469xx/CVE-2024-46970.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-6052](CVE-2024/CVE-2024-60xx/CVE-2024-6052.json) (`2024-09-16T14:15:13.410`) +- [CVE-2024-6482](CVE-2024/CVE-2024-64xx/CVE-2024-6482.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-7700](CVE-2024/CVE-2024-77xx/CVE-2024-7700.json) (`2024-09-16T14:20:21.087`) +- [CVE-2024-8776](CVE-2024/CVE-2024-87xx/CVE-2024-8776.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8777](CVE-2024/CVE-2024-87xx/CVE-2024-8777.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8778](CVE-2024/CVE-2024-87xx/CVE-2024-8778.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8779](CVE-2024/CVE-2024-87xx/CVE-2024-8779.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8780](CVE-2024/CVE-2024-87xx/CVE-2024-8780.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8862](CVE-2024/CVE-2024-88xx/CVE-2024-8862.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8863](CVE-2024/CVE-2024-88xx/CVE-2024-8863.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8864](CVE-2024/CVE-2024-88xx/CVE-2024-8864.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8865](CVE-2024/CVE-2024-88xx/CVE-2024-8865.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8866](CVE-2024/CVE-2024-88xx/CVE-2024-8866.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8867](CVE-2024/CVE-2024-88xx/CVE-2024-8867.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8868](CVE-2024/CVE-2024-88xx/CVE-2024-8868.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8869](CVE-2024/CVE-2024-88xx/CVE-2024-8869.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8875](CVE-2024/CVE-2024-88xx/CVE-2024-8875.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8876](CVE-2024/CVE-2024-88xx/CVE-2024-8876.json) (`2024-09-16T15:30:28.733`) +- [CVE-2024-8880](CVE-2024/CVE-2024-88xx/CVE-2024-8880.json) (`2024-09-16T15:30:28.733`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a0a39d44b7d..86186a33557 100644 --- a/_state.csv +++ b/_state.csv @@ -190541,7 +190541,7 @@ CVE-2022-21266,0,0,753151acd4774ecb48373a9775e6cd3188dfba7b4be399de2484e866292e0 CVE-2022-21267,0,0,9a4554da67b7e98459acb9300c3817d2633f958f2bf511036540b29d1a4838b9,2022-01-22T02:04:10.347000 CVE-2022-21268,0,0,521b01ddc811aeb81da6614510a0bd929b3f9a1ca85ee8f6a6c978ddefc27158,2022-01-22T02:05:25.687000 CVE-2022-21269,0,0,44b218cc300f1a70b300145a21bb8694436cb02c37fb20df76d42e367241127e,2022-01-22T02:14:42.817000 -CVE-2022-2127,0,1,d6f122f203ea87f4aef2e6871124f51b79136b087c850c25eb7338176be6479f,2024-09-16T13:15:04.270000 +CVE-2022-2127,0,0,d6f122f203ea87f4aef2e6871124f51b79136b087c850c25eb7338176be6479f,2024-09-16T13:15:04.270000 CVE-2022-21270,0,0,59f7cb516f5a4f8922a533972a7a7c04b3ac3f4267fc5cc109b6b2479b70dda2,2023-11-07T03:43:29.010000 CVE-2022-21271,0,0,e749498bc779955d1d3d2b42cce5a5b1c48d79b78fac6c729259bdd454cd52fe,2022-10-27T22:56:16.353000 CVE-2022-21272,0,0,3432b060d982111113a0081e1a2569f2030400de3c6b1998a80cdb5708295961,2022-01-22T02:23:38.097000 @@ -214768,7 +214768,7 @@ CVE-2023-2038,0,0,7e728049ad40bfa96bc872d7ef62f9d9bd1d308aaabdcedbf51f541bf1b9d3 CVE-2023-2039,0,0,5c7c40277c4ad9f9102a7835786ded077ba9c1b4eba23cccb2f1e95e27431027,2024-05-17T02:22:35.717000 CVE-2023-2040,0,0,79c7c4f985a75379fbc5dc2bd40beb0c1b5defca7da2e311f818c3285b8956da,2024-05-17T02:22:35.820000 CVE-2023-2041,0,0,d1e7906fa5f41bc8bfb0f3d1f875b6afea94dc271de069591560749a3bdf2c1d,2024-05-17T02:22:35.917000 -CVE-2023-2042,0,0,ab2280e25171684ba1e5e73fb2a33f1abfa6b884ecd5fb4c4c7577168cb34016,2024-05-17T02:22:36.040000 +CVE-2023-2042,0,1,300efa272629834ca13d234fa1e2025afbd837bca069476fe2f1322952e9a664,2024-09-16T15:15:13.047000 CVE-2023-2043,0,0,e404d875e8b41eb5c8edfa8258ffb63a20ca7a4bc3ebd370418a982c7cb14ff6,2024-05-17T02:22:36.160000 CVE-2023-2044,0,0,9b0a55aa0fe2fee0f09712ad9257032a53ea81c42f4c349129665f5dcbbf289f,2024-05-17T02:22:36.377000 CVE-2023-2045,0,0,cad6f451adb6669e9af7461707c005e53209002e331af432ab39d83b0b9ec32b,2023-05-31T16:49:23.883000 @@ -216102,7 +216102,7 @@ CVE-2023-21839,0,0,c3c6f685ab9058d67d7f1748080e6d7c2e899f09d30fec08f886f8a7f25e0 CVE-2023-2184,0,0,1073eb25861fcee57eb9fac43c386305d0fea38d5bbd20991cb618999c7578bc,2023-11-07T04:12:07.433000 CVE-2023-21840,0,0,6fd2b5ade9915fd79466730f7996b782a086bd5ce24bdf4d9c33766ab641879a,2023-01-24T19:25:26.767000 CVE-2023-21841,0,0,7871c4c6e0e2479b4338f1bc0ff32a5860cb0e8d156d49513c0c7d26141f6005,2023-01-24T19:24:57.487000 -CVE-2023-21842,0,0,d7f7f70dc45addaf307b253c7e87d2b3e5bd2bdf6b8e4de78dfcc394b6aba914,2023-01-24T19:24:37.147000 +CVE-2023-21842,0,1,391bb9f002cb6b5d931ac9bb49f3e1a9154cb046cec2fd31f052e175f33a6e7f,2024-09-16T15:35:01.747000 CVE-2023-21843,0,0,7c41561558d0b43c7d33ec2e625aca73c7a6388ee738c89efe8757f3387ab4b0,2024-01-17T15:15:10.240000 CVE-2023-21844,0,0,229cdea1a68aee8ac38ccf2877871f1211db914cf8ac43876ae19fe082aed880,2023-01-24T19:20:53.153000 CVE-2023-21845,0,0,5026ccbb5a1a1ecfe077b4b9021a619b14867db27a1bb6481a079f5044072fdb,2023-01-24T19:20:22.343000 @@ -216189,7 +216189,7 @@ CVE-2023-21921,0,0,b82c51654a078f371bfa406f4e809d9cf78f325b185e7e3ee676fc5f73dca CVE-2023-21922,0,0,0a521b9f0825b2751db710e9c8944149f1b70e5d709e817341f74144926ba3d6,2023-04-20T13:06:12.510000 CVE-2023-21923,0,0,6fb43aa67c09950c11de1c3381cd0446e2a1c3d43d4639dc9c74ebbd3f779996,2023-04-20T13:18:39.557000 CVE-2023-21924,0,0,38cc12e7687aae4488a317e4910e4f9dfccfa9b65884eaa3ed1a90566a9da925,2023-04-20T13:24:14.850000 -CVE-2023-21925,0,0,67856cd8d48fd76ebe740fb2eb2755b1342b8e2fad5a71ab6f444a8f59db1278,2023-04-20T13:34:35.200000 +CVE-2023-21925,0,1,ef8292ae040059d01939ba7489f08df24756139a31681f68b9b307e48db48f62,2024-09-16T15:35:02.663000 CVE-2023-21926,0,0,4679fd59f714bca0e6d1afae3dd418ebffcbb49371ec787f3ecf9bc7bd3a59aa,2023-04-20T13:41:11.283000 CVE-2023-21927,0,0,5800d23ecca587910ee9cbef5ec5a285faf7b0c4ac006c0bb0ee9e5f05d798c7,2023-04-20T13:45:25.693000 CVE-2023-21928,0,0,732c13d376a9352e2d537cf35bf36143b4b5831237e8376b5683fbd18cfcb97b,2023-04-20T13:54:03.407000 @@ -216229,12 +216229,12 @@ CVE-2023-21960,0,0,e1d0dd4fa527fc02beacc92f6d2db848bde048d9a61afab8dea3817331ee2 CVE-2023-21961,0,0,83f8e370e5365e79b457b67a74794568daf4df6e905a3f1896f73412568ffe80,2023-07-27T17:38:20.417000 CVE-2023-21962,0,0,9cdbc251a75c0c2fd497b69125e1a120182c2ab56bfae6c0827018a04248807c,2023-10-30T19:54:33.063000 CVE-2023-21963,0,0,8c5ca3775f993898e512a90a0e9874e43409458b44391864ddafc96b8e5c6e1f,2023-04-27T15:15:11.860000 -CVE-2023-21964,0,0,69858c826a5d93f35b75398352770ceab6c0b9b861acab8369a57cc1fa68fd84,2023-04-19T14:30:52.223000 +CVE-2023-21964,0,1,39151b691d8a90ad52c0322c131c677d2c2f36b89f9e9647e5c78b0401371291,2024-09-16T15:35:03.420000 CVE-2023-21965,0,0,0f66a30309c51ed93d8b92dc1d3a6cb6d4759ea7d6b0505a15c81a45a259c5d6,2023-04-19T14:31:05.280000 CVE-2023-21966,0,0,54961bfd7ef05b7f5e8b5cf5018e5155e416d21b9c36cc42ca320b8957e13382,2023-04-27T15:15:11.927000 CVE-2023-21967,0,0,15c2ff01a1b5fb0b6c69c169874c7fe0e53271bebad41d4a8908a804d5a1f2f6,2024-06-21T19:15:25.483000 CVE-2023-21968,0,0,0f6d4d77f541ef2ffc07c82126a50a8b0548e7e9f3c8cfae60b5daf17c66475b,2024-06-21T19:15:25.613000 -CVE-2023-21969,0,0,daaba62020c7840e333d0d49662f5f0ed3f39b839f86ad04f7a67a3b5901cf0f,2023-04-19T18:02:35.520000 +CVE-2023-21969,0,1,a690111869ed3fdf7eee59499d053424ad95e3190464e784ee6174052c9bb54c,2024-09-16T15:35:04.267000 CVE-2023-2197,0,0,62fb3c1310e206d803b37540180d49392910ad7d4e52f94aa55c27abd45b8aa1,2023-06-09T08:15:10.823000 CVE-2023-21970,0,0,146e3830f716ab1124dece2e10ab99984088ae8b6ab7f475bb423afd25b4c510,2023-04-19T17:57:54.667000 CVE-2023-21971,0,0,a3ea5b8fd0e466beec31d7428ea3efc86187f88231397fa7766cf8010c0d513b,2023-07-21T19:21:47.270000 @@ -216245,20 +216245,20 @@ CVE-2023-21975,0,0,d6c72ac0d510c1b0d3d21e4739bdfde65c7d6c3152b2a9b150fc477d6a72e CVE-2023-21976,0,0,b2b6e8e484278944ff216009a2821c6c3b6c98bd5a1bf6c4a95977c493e488bf,2023-04-27T15:15:12.270000 CVE-2023-21977,0,0,6df4e27762c85ede63ba5d5731a1a691de9e47bfc19ff1a5a5ee15d833e3554b,2023-04-27T15:15:12.337000 CVE-2023-21978,0,0,b595e7b00166c950d1270d70aafdcb0ccb0f3d6b1b2e1822b79f13bb36bfa3bb,2023-04-19T18:20:59.833000 -CVE-2023-21979,0,0,712c0615b83fb899e0099d39a0ef27230990814baf7097fc6fb170abd7bf35ea,2023-04-19T18:07:55.163000 +CVE-2023-21979,0,1,e744730a006a9928f310c3566a9d8a9d8c72f667c0d7cdf9ff873f6d5fcff8f1,2024-09-16T15:35:05.713000 CVE-2023-2198,0,0,6bb856f70b702bf595fe5c34fb0ccf02a12ae799c9d43b2cb95d9e152b44bb26,2023-06-14T01:49:49.157000 -CVE-2023-21980,0,0,2a92bccbee8063e13875600e190d7274f67ca711dcf0f83ce77f02b6da0163c9,2023-04-27T15:15:12.407000 +CVE-2023-21980,0,1,58eef6988f10c7da5806591904f5b6d5038bbb5cd72cd52360d1b857deb80d51,2024-09-16T15:35:06.437000 CVE-2023-21981,0,0,b5ea353876717929e9355eae5e889ad5d7ba3c60c65a816a429e60b6bb72ef77,2023-04-19T18:05:50.897000 CVE-2023-21982,0,0,24e800050b5d8254eb3002ac1fc6abe6d7b5f5085a50090712466f54fd35b5d2,2023-04-27T15:15:12.503000 CVE-2023-21983,0,0,790c093aab9c54f9bc3b0dd863c863736c634a18e7590839fe0b448e24853031,2023-07-27T17:38:49.340000 CVE-2023-21984,0,0,f906cb1cae5c505766bc1a7077f03874e0e2d5391a7066332805350bf6a24e03,2023-04-20T15:40:35.437000 -CVE-2023-21985,0,0,35013b911cc519919b1647fbe93a1dab144e481760a35faef72e641c4e2e0285,2023-04-20T15:41:50.613000 +CVE-2023-21985,0,1,c7b3b93dc092014d448893c84e62bc0389889f8ece8bef68e8cc85f7e927daa1,2024-09-16T15:35:07.530000 CVE-2023-21986,0,0,4ce707102125005db9dc70cdbabae62106f1bf65cb42baddd68a9694881feba1,2023-04-20T15:49:28.813000 -CVE-2023-21987,0,0,0290eec76a9a4edb0a8330c10be038cf5219997006e7acb92f1f340eea436dea,2023-04-20T17:29:27.427000 +CVE-2023-21987,0,1,1770a161e7a479e248c5cd287292cb5fdf63d7c2d727b0ef0653e9c3128889bf,2024-09-16T15:35:08.380000 CVE-2023-21988,0,0,40c0c76df0d7eb057fd34e686ea56c85a38ce8e1213adf7bb89fac805ade648c,2023-04-20T17:33:42.887000 CVE-2023-21989,0,0,70f6cd0d3c1c98e5ca3b512bf542bf9506845f4413941394e77a2ecf0f7a1929,2023-04-19T20:21:06.917000 CVE-2023-2199,0,0,e42950c0a5685e4d2fca214913590352e139c9d90739e94066da390f93cf77cc,2023-06-14T01:57:17.037000 -CVE-2023-21990,0,0,1e28d367aaee25705bf0585512c2cad2108b3eae75300cb23db622847ae9e4ac,2023-04-20T17:39:43.783000 +CVE-2023-21990,0,1,ba80b80a1a07a7801fb9c5262e71427cf780f7e332a03029643b381036d613fc,2024-09-16T15:35:09.307000 CVE-2023-21991,0,0,96d561e0fedf3d76d45a1d8576a93336fdb1d9f76a0018e5d2b1cff3c49cc20d,2023-04-19T21:01:40.363000 CVE-2023-21992,0,0,061db027c0b49584814102f531a2ccc98db3f3d9bf038462a6c3bdb13dfd9bd4,2023-04-19T20:09:39.760000 CVE-2023-21993,0,0,86f11cb33f1eeaa916faedbc34bd75db81f1e407658f20f4e7ade8138cfd2cf6,2023-04-19T19:44:57.897000 @@ -217035,7 +217035,7 @@ CVE-2023-22895,0,0,d0cde9f0b90030f91c2a0dda22869477b307cd03bf00c7f7efe4b38f4f698 CVE-2023-22897,0,0,a2c3b3391ef88f83b82826234dae9e3c49ada5d3b2160817db1288f101e0c2e0,2023-04-21T18:10:37.540000 CVE-2023-22898,0,0,3f8161fe5b23f5e7cde2051118fb69e9d7c5b07a4b1253ba08b4f6745e8d52d5,2023-01-13T15:58:58.583000 CVE-2023-22899,0,0,4aa4e76a47206b89ca20e3f6f459d4b98c7b88541e694056e02db91a04ea0123,2023-01-30T16:24:43.787000 -CVE-2023-2290,0,0,7fcd77d0709b241177d6f1147cfac72dcba8af182e7da6e785ee96349000824c,2023-07-05T17:22:10.923000 +CVE-2023-2290,0,1,656af79c3f767cb7981915f206bb873908da7d62150fa521e2e34c9802b0d51c,2024-09-16T15:15:13.293000 CVE-2023-22900,0,0,e5c176afe3b8ebe8da8a72097c6a165bea4a40be5f41f3246edd012da5fe8056,2023-02-07T15:05:09.273000 CVE-2023-22901,0,0,72133cdb413be6740d9ac4aaa9cdca9aba75b80f26f4a5bd035ac026331252c5,2023-05-05T20:55:52.987000 CVE-2023-22902,0,0,a03b0d34035fc52344c405ae6e986b56dc1b6f4feb333e71828dfe30f0b2b8f6,2023-03-31T00:27:21.097000 @@ -219000,7 +219000,7 @@ CVE-2023-2549,0,0,eb8fe9d13b54e3e4a2b3c6da6f8214be67bede54a20d8362ccc5ceb5d8fe8d CVE-2023-25490,0,0,2cd929b26c9e123ef748e15431319bdd221fc1e40c9f05b89a0d73867614cbbe,2023-04-28T02:59:52.610000 CVE-2023-25491,0,0,580669a8eff60e35ee382ff4ccf7c7eae9225f51b09078915fcbcc23eccd0ab9,2023-05-10T02:24:21.523000 CVE-2023-25492,0,0,f450003f37c32f9fb9816047716dd6000b2a2e7dae5b211b908c1ba9be69eb86,2023-05-10T13:37:50.410000 -CVE-2023-25493,0,0,6397aad9078c2b7fe4e76dec42ebaf6337042ad28dcf6efabca8556b1ba89fd9,2024-04-08T18:49:25.863000 +CVE-2023-25493,0,1,5ab9b6907e5c4e3b8f9a9520c0a4328c187f39b7d93af5ef2d7d3d7efca8cbee,2024-09-16T15:15:12.860000 CVE-2023-25494,0,0,5e29cde983cdad430a42b5421aeff438fef3bbb5761b1b35116617aa778848ff,2024-04-08T18:49:25.863000 CVE-2023-25495,0,0,360066740a805c31f1c43cf1b492fc908cdf02477872e059026a85fd88ce69fa,2023-05-09T20:36:34.067000 CVE-2023-25496,0,0,b17e5b7a377567a8acfe9f191c724b0feda474d0089c2e1dd0b49038ea2f9400,2023-05-08T18:09:48.533000 @@ -222609,7 +222609,7 @@ CVE-2023-29916,0,0,73c9cb19f42f99f7cd1f5b0808f117ab63bcb926e50e2ccae83b2c59e82e3 CVE-2023-29917,0,0,9b4d76e1720def20bdf093867218f6768032b09fab3bae426672450688bdcdd2,2023-11-07T04:11:37.657000 CVE-2023-29918,0,0,e0dc22986f1fc5e9af2724854d6e0b945140f90398bcf84a055f53269135a8cc,2023-05-09T19:27:09.447000 CVE-2023-29919,0,0,cd673720fdf366bc4613e56084b305a485b2384cac7e2aeb58fd79e8a494121b,2023-05-30T18:35:16.013000 -CVE-2023-2992,0,0,e70c8f762b86441e8c9e75ee6179b8c22598a57b89414ef75e838ffa3dc1de2d,2023-07-05T17:27:57.377000 +CVE-2023-2992,0,1,048144de9a7ec2366b57b51285712df6035dee9df49e5e7a27ccd0356a916c80,2024-09-16T15:15:13.580000 CVE-2023-29921,0,0,d14aa2de5e10b016eab0b9e2e145c6eb352f50b4dc6954a38f66430d3433eff8,2023-05-01T13:49:18.663000 CVE-2023-29922,0,0,bf07c7ccafa48f351ad25bce19fd932a2c9c4024c430d6eb80a386a4af3cd8ab,2023-04-28T18:23:17.443000 CVE-2023-29923,0,0,b33b23e61e562dc83c6e5f1776c1773a4cd87c91904480151748ca1d7d3db30e,2023-04-28T01:31:14.110000 @@ -225329,7 +225329,7 @@ CVE-2023-33461,0,0,0de3f4305f427b4ff32b903080fb5c836a3af93f2489c41c6aae59dfd6589 CVE-2023-33466,0,0,25da7ec5f821757081edf53c63649e6eda046cc60994bb8cbca9396d6ade9066,2023-09-12T11:15:07.650000 CVE-2023-33468,0,0,44c774863a2d55e63b1845bf55de3fe4506ca7c2a56eeb4bf92cb746976655cf,2023-08-16T18:03:44.977000 CVE-2023-33469,0,0,9dfbe3344d4b40c67ae0a1b0ae4fa865b29407207caaece6d4bed88b6c198b8f,2023-08-17T01:40:13.813000 -CVE-2023-3347,0,1,3fd9151d476078e653a42d2b9a1d6a14241e18d5cb22f2096b264fc568cc0686,2024-09-16T13:15:05.877000 +CVE-2023-3347,0,0,3fd9151d476078e653a42d2b9a1d6a14241e18d5cb22f2096b264fc568cc0686,2024-09-16T13:15:05.877000 CVE-2023-33472,0,0,a88e714c00c91b119d1197c1ae4473f07845779cdc1bb465822d892cbf9eac1b,2024-01-22T19:21:10.370000 CVE-2023-33476,0,0,4a297145be72f944481cc47e9f376d2cf456cf13a342260740e97ecbfcefc9c3,2023-11-25T11:15:16.937000 CVE-2023-33477,0,0,6db6ebce2662ad326ee213faec74c36ba5dbdc9868890686df97f67004511859,2023-06-13T19:14:00.687000 @@ -226360,9 +226360,9 @@ CVE-2023-34960,0,0,50e7d34151989bc2fed6942340c0c6a8ed7b748fca80f7c8954924d89a9b8 CVE-2023-34961,0,0,cf78e1d661f4da7ec294f5ad1e878e2af45e46103cdbcabf68badfe02c1502a8,2023-06-15T18:57:30.313000 CVE-2023-34962,0,0,af634868fa0054f2b7c45c13462d01abdaf327d9c48e86310a5f366a8816cef4,2023-06-15T18:59:24.027000 CVE-2023-34965,0,0,d85b9c37e2f9457d4eb477b5a252039dfcd7c6ab7df67904bd6c23d6018002fa,2023-06-23T18:14:58.423000 -CVE-2023-34966,0,1,e75a448d8c9fbf6c3347ce32800fe0287eb15d0c2764bf0acdf69025b4f72033,2024-09-16T13:15:04.757000 -CVE-2023-34967,0,1,20789ddbd16a5c66b434fe47b18c7a83f5f97a7fa1510768acd3053a2dc98058,2024-09-16T13:15:04.940000 -CVE-2023-34968,0,1,8abd1ee45940772a2d510b51e6176f151b97123623b47480c095875ee099852f,2024-09-16T13:15:05.127000 +CVE-2023-34966,0,0,e75a448d8c9fbf6c3347ce32800fe0287eb15d0c2764bf0acdf69025b4f72033,2024-09-16T13:15:04.757000 +CVE-2023-34967,0,0,20789ddbd16a5c66b434fe47b18c7a83f5f97a7fa1510768acd3053a2dc98058,2024-09-16T13:15:04.940000 +CVE-2023-34968,0,0,8abd1ee45940772a2d510b51e6176f151b97123623b47480c095875ee099852f,2024-09-16T13:15:05.127000 CVE-2023-34969,0,0,20f3b57435e16371f80459f3c182a2bb410744533b482b94d4ff3198fb3f72ab,2023-12-27T16:36:58.353000 CVE-2023-3497,0,0,4d047266b8d04b5eb358e7cea115fd0dab7c7524efcd458770d1e7272757dc4b,2023-07-29T01:15:09.270000 CVE-2023-34970,0,0,0cf20f552104745cd280f12f0fd3bfe8bacaaf04a1a90475f6f521b43ad00ab6,2023-10-05T16:59:07.947000 @@ -226827,7 +226827,7 @@ CVE-2023-35755,0,0,e1f17c748909f4d01d764fd7885f04db141c0fcf4a2980f003d3efccef1d8 CVE-2023-35756,0,0,4f68e862c118fc2cbc87ac3f51430f658fe10075e742a61844b05bd60a924e3e,2024-05-03T12:50:12.213000 CVE-2023-35757,0,0,0e8463fc2c81bc4580cb4e502ef99de97d681981a85a135f7fe4d04c1930a4c6,2024-05-08T13:15:00.690000 CVE-2023-35759,0,0,fa203c42b6b48021e6e150911dd3b26101ac7cf6f6ca08d43fe51256742e16fe,2024-02-05T17:15:08.490000 -CVE-2023-3576,0,1,267e9ee7d065cd5eddbc2f91d5bcdedfb06936864c6b93500e7620103f7bf36f,2024-09-16T13:15:06.033000 +CVE-2023-3576,0,0,267e9ee7d065cd5eddbc2f91d5bcdedfb06936864c6b93500e7620103f7bf36f,2024-09-16T13:15:06.033000 CVE-2023-35762,0,0,381848968217a298c613610e76a7efe58c3e68544c5fddd3446e0f5c4456f0d3,2023-11-29T20:52:44.790000 CVE-2023-35763,0,0,a1dde759b107bbb45fb117f852bced52176d7c1f1847cf500e4e2553b06e017b,2023-11-07T04:15:57.230000 CVE-2023-35764,0,0,4273457863900c89f2f64f75a391c06d862e4dd907c30b5ae17770d0f4c54015,2024-08-12T21:35:01.167000 @@ -227212,13 +227212,13 @@ CVE-2023-36271,0,0,003efbeef2bd5a83160f4c75c748ebebf68aae3263994871e0ae346b564ea CVE-2023-36272,0,0,b40f5b0a455b9096df3ff383271d067f7a04c5792cad2e87f448c1960a80da86,2023-06-27T12:18:19.927000 CVE-2023-36273,0,0,862b00fa51e6f8f234d86825426ea6dc4831ed884e5f0942c6527d81dbd77a8a,2023-06-27T12:42:21.960000 CVE-2023-36274,0,0,0f2d05843a8f7063cc1bdd13b623a0e15f80cafab11dd19ff804b8beaacaa01d,2023-06-27T12:41:05.803000 -CVE-2023-3628,0,0,c7bfb7cb9d56e80c5ab255f471a750ee7d0667303380725a781236c7ddfd7b77,2024-01-25T14:15:25.900000 +CVE-2023-3628,0,1,92b3fb7cbec239c0b5b2cddfe0679b5d5a416e4b1488bcc89010bb714faecb81,2024-09-16T14:15:11.667000 CVE-2023-36281,0,0,92e2a71324520ff3c0f998e5455fc16ff2513d1e8dbd2ebef76926ff8327fe8c,2023-11-29T01:15:07.283000 CVE-2023-36284,0,0,c75831a07c181634ec17ed63af6f8bff4c2e6d5d361f74cb14494efba21ab22e,2023-06-30T07:58:35.530000 CVE-2023-36287,0,0,f49b835bac714b26ae9739952b8e59ac5c026e80ab82e3ceb7e4b67b223474b5,2023-06-29T20:41:22.900000 CVE-2023-36288,0,0,f4afcb6dbfa0585fbaee1ec4fbf9659d3e3df42df99d9bfd68c8b5a595635978,2023-06-29T20:40:42.003000 CVE-2023-36289,0,0,4edfe4a036acafc88c1fc1338efecbec9a4c169f817d0109bd333fc8ab2a2710,2023-06-29T20:39:34.890000 -CVE-2023-3629,0,0,a19f88ceb053372d47355ff5ecbf2596f744f6a2b2040334de1633b8d1f80136,2024-01-25T14:15:26.017000 +CVE-2023-3629,0,1,00c85cbb6cd46f48e189272632374bbb06f239f7f51e264dedfe3163e1e03064,2024-09-16T14:15:11.800000 CVE-2023-36291,0,0,5c26244b7098f0efc628283fbafb66e9bfd699c8df57aaf7e3d1411e11c15803,2023-07-10T13:28:09.077000 CVE-2023-36293,0,0,3d024bd7f2116eca4ae31263dd837c1bc92b8c6535f3b9fb9b9075bea09befe8,2023-07-18T16:23:02.337000 CVE-2023-36298,0,0,d7397c6d783c81c33e649b9ca7bd37f777ffa7e9dd955c1f2cfb3d58365a1738,2023-08-07T13:06:21.343000 @@ -228745,8 +228745,8 @@ CVE-2023-38197,0,0,93e9b21d96cef7b071fa0630850b9280527ecfc7665ffdaf5c1a114441ea2 CVE-2023-38198,0,0,ef85054fa8438ac052ba4f57fa357877b346d9da7c1f0a600daa0dbd6e8d65a0,2023-07-25T14:30:35.337000 CVE-2023-38199,0,0,de8ccef5dc614aba2379b7e9c3a48813e945a782bdba9395d21885285c35e7bf,2023-09-05T04:15:09.017000 CVE-2023-3820,0,0,50a7cdeb81a8ee17bfc09e7fd0923a7a55a57c37361f22e37bdf60ce60965064,2023-07-26T21:27:15.650000 -CVE-2023-38200,0,1,a1a48a8357049f6c308d1c79204c5214153214eeaf6dc6efdd29c2fcf9e2c08e,2024-09-16T13:15:05.323000 -CVE-2023-38201,0,1,c929e20502e10588d518086e5c155a2b49164e6cc15c831bec1c45db06883015,2024-09-16T13:15:05.490000 +CVE-2023-38200,0,0,a1a48a8357049f6c308d1c79204c5214153214eeaf6dc6efdd29c2fcf9e2c08e,2024-09-16T13:15:05.323000 +CVE-2023-38201,0,0,c929e20502e10588d518086e5c155a2b49164e6cc15c831bec1c45db06883015,2024-09-16T13:15:05.490000 CVE-2023-38203,0,0,b74b23ca3de9b9e3c7fbaec82dca0baf7c3b28a210109e3f8f7f3f68094d621c,2024-01-09T02:00:01.953000 CVE-2023-38204,0,0,1b9057188dc96038578312ac4a2f54877c38eefabf94e2f1a26a83795739f145,2023-09-19T02:02:14.353000 CVE-2023-38205,0,0,186ff5ebb8104f34170642ad74e77a081bb898ced8c47a0e3d92d16ef71e456d,2023-09-19T17:27:19.593000 @@ -229091,7 +229091,7 @@ CVE-2023-38555,0,0,5b74747fe3727ccf961aab652679ef490622540e87fb7b472b076670dbe2d CVE-2023-38556,0,0,85fa50566d5acf7641189355376a40d5864d78c82226360b990675aa12d2ad6a,2023-08-07T19:24:44.253000 CVE-2023-38557,0,0,410e81bb58e4789d07210170f7473db90e4a56e817e8d747b0cc6f31df1024dc,2023-09-21T16:12:01.620000 CVE-2023-38558,0,0,41531cacb1de233098d32b79fd9efecebdba07a9595f0a633638e81ec8b2ca7b,2023-09-20T14:03:07.620000 -CVE-2023-38559,0,1,f4de074d6255bba1adaf1a2af72abedea97811f23e11ff71de6632665bc659e7,2024-09-16T13:15:05.667000 +CVE-2023-38559,0,0,f4de074d6255bba1adaf1a2af72abedea97811f23e11ff71de6632665bc659e7,2024-09-16T13:15:05.667000 CVE-2023-3856,0,0,31b604aceaf14703f21a8b47a664ff4f650adc31c83b4a1251209c844c970874,2024-05-17T02:27:54.067000 CVE-2023-38560,0,0,247e24b5ab5349d123f13aa4bc5ee89bef8684469506b9c7e635be9f6283daaa,2023-11-07T04:17:21.293000 CVE-2023-38561,0,0,c8e08cb46ebd1aa35ebd189dc0663df0fa88b7acddaf3601d5cae603037f46b4,2024-02-14T15:01:46.050000 @@ -229422,7 +229422,7 @@ CVE-2023-38976,0,0,7b4f7f60ffa8b42cadee7781bac6b79d99dd0e5e9b8ce8797caf39e7d40fa CVE-2023-3898,0,0,6cb64d638c498ae1066713b7c771ca086f38841a510c9b464ec96021b75707d3,2023-08-10T17:50:03.287000 CVE-2023-38988,0,0,6860d49e6f63057c1ac1d67ba4ffb1ee7d300f99992cd187515bad60fa9550da,2023-08-03T18:54:14.513000 CVE-2023-38989,0,0,ec9c3da43c933c24858a3ac341778f223e6ab4c72987571b94d0138cb0deea19,2023-08-04T03:51:49.137000 -CVE-2023-3899,0,1,a976c1d3d7813d7f4be239e73f5f3c10c08f195015181e1b2884f72649e85770,2024-09-16T13:15:06.240000 +CVE-2023-3899,0,0,a976c1d3d7813d7f4be239e73f5f3c10c08f195015181e1b2884f72649e85770,2024-09-16T13:15:06.240000 CVE-2023-38990,0,0,e9c43d19db4bb487825afac8d3fe0a213c0a61444534f94592b6955bfb54a034,2023-08-05T03:54:40.437000 CVE-2023-38991,0,0,863a43b6a5a25d59c8375b383640cc261e064acc28ce236760da1e5107fb6f53,2023-08-08T18:58:00.460000 CVE-2023-38992,0,0,6a3338539e7bb7c15c7dc0e243b9b9ad7e9e9c5472b9d9b59e02ea092d4f9f17,2023-08-03T18:10:52.757000 @@ -229925,7 +229925,7 @@ CVE-2023-3959,0,0,1c8cb0b9580f83318b0c36d8bc8f73fb342f7d0f0a71af399cdaffe0ab2960 CVE-2023-39598,0,0,472be8949d4750c193fc0e79e3373ee8040069ae06201b9dbce78c66cf7f4d8a,2023-11-07T04:17:33.097000 CVE-2023-39599,0,0,d846bb2751315746765d628aac10470828469ee3fe731d77fb8a34e1cea0bd8c,2023-08-28T19:08:09.323000 CVE-2023-39600,0,0,7f58febe003b75ab66793e4055525f6c3c139aad235a05622e6f81527de7c5e2,2023-11-07T04:17:34.073000 -CVE-2023-3961,0,0,8adad5e4aba008673ee9cb1d6fb309f177c2159716a2ef5a19818c1dc3ffe8d1,2024-01-02T21:15:08.913000 +CVE-2023-3961,0,1,be23e3c16893a801a6ab6c45e2e6d132defd0ff7f91b69b63ffb8890731fc5d1,2024-09-16T15:15:13.740000 CVE-2023-39610,0,0,f78535f5afdb22878bde7c5fe99916229dcd67d74476db2653bcc6d597b73daf,2023-11-08T18:23:17.877000 CVE-2023-39611,0,0,19ef7e8cc0a1f18826bd49833b4aed748726e99d4e58d24e64b9a58ee73f7afa,2024-02-09T18:21:06.240000 CVE-2023-39612,0,0,0ca8fa961044b2665db20cf0c5f406f93f28cc39663e162df3a367e8875344ab,2023-09-20T13:16:36.457000 @@ -230936,7 +230936,7 @@ CVE-2023-40900,0,0,1e2acba55de3e856017524a98af88a64c0cf5d21386675095b5794e852625 CVE-2023-40901,0,0,06dd7ab96188714df584aa39652edd3d34e5c433e95f8d9d9b855617ea4b4da4,2023-08-30T22:15:09.383000 CVE-2023-40902,0,0,3254ca3e7ac14ccbcab957ed7f545ca72502a5c4a02dac4088f9850a0b8d7a68,2023-08-30T13:49:58.793000 CVE-2023-40904,0,0,d7f7cfc5c1b0ed2a281bd8e676970f859a99063ccdfc5cc04d60786ac7909c92,2023-08-30T13:50:43.357000 -CVE-2023-4091,0,0,f5ce911bad6bf32cad8dcba47295aabcfd60f6ffc814733bc691ef553c532b01,2024-04-22T16:15:13.120000 +CVE-2023-4091,0,1,275b33b4fddb46deb9151eb35901fb683d99f1f7f7cd497ae93d7bd100a2d75f,2024-09-16T15:15:15.190000 CVE-2023-40915,0,0,924135b83c37dfb32e8e4a8213481ae4ff212f967d627d3fbc626bff3fc542fd,2023-08-29T16:11:13.697000 CVE-2023-40918,0,0,fc090dba4a7f04d782d401de76c13cc5fa72b866aa75e7bf2cda17b838246fd5,2023-09-08T14:26:06.590000 CVE-2023-4092,0,0,5f31fed2eab5b0f348baf91fdb36ca5a5c02cd3313e242f154778e0217ad366a,2023-09-21T13:13:44.877000 @@ -231369,7 +231369,7 @@ CVE-2023-41450,0,0,34d50a65b46e799820f380c8a0e0b7ea91ac8eb9b3ec1fb417d85b9b739c2 CVE-2023-41451,0,0,90a7738d9d319653b5eb91b78821fef606e037dccb36b1d85cb749b0a4edcd94,2023-09-28T21:43:38.937000 CVE-2023-41452,0,0,57ee026df418130fe209cd4c34958e75209c07072ad93096c43ecd3dbd91bd1e,2023-09-28T21:47:51.073000 CVE-2023-41453,0,0,08c0354bc9a3fdb9b55b526114c6d2b65111c4bfb1e4e57c061e580b2e7f8bcf,2023-09-28T19:15:34.223000 -CVE-2023-4147,0,1,ab9be32ec451567f1a9025dabc55268497f1ae4f2457d9204a4ae67975128be2,2024-09-16T13:15:07.240000 +CVE-2023-4147,0,0,ab9be32ec451567f1a9025dabc55268497f1ae4f2457d9204a4ae67975128be2,2024-09-16T13:15:07.240000 CVE-2023-41474,0,0,146129e61eba6ce72d529040280fdedb09627804965a1d99c28fc1496cb617a1,2024-01-31T18:54:51.777000 CVE-2023-4148,0,0,a2d62bbfdd9e06123bf616c73cae78de0ae54604969c45bdb7cf00245b0d44c8,2023-11-07T04:22:11.273000 CVE-2023-41484,0,0,0bd96297a07db1f2ef23283f5bfcf20ef37bfa8a237e63f6e51d087958784217,2023-09-22T02:09:42.600000 @@ -231438,7 +231438,7 @@ CVE-2023-41623,0,0,ea29559c422c117084ae2d2f796e71ed9fbe2542670d9b3f29d0a9e1f3143 CVE-2023-41626,0,0,6537ad03f828deb9a3c3780bd05e1a7d5f2105684aa5d481a5b71610a2976b2e,2023-09-19T15:11:54.677000 CVE-2023-41627,0,0,3f3eba6b6543618239642ee7bce2c5f1973ac03c46ae8e360d2839366de85b34,2023-12-14T08:15:40.697000 CVE-2023-41628,0,0,45a3674142cec25064ea57b0fffd89528613cd0a7f1bf17540a2d196d1920df3,2023-09-07T18:07:52.357000 -CVE-2023-41629,0,0,e9f972b4140d4dd046b4dc3bfa78f1b97e9058090788b6ff79c30087490ed060,2023-10-23T18:28:03.807000 +CVE-2023-41629,0,1,cd92d25f553296fcedf4b59ba3d4d97f87abff47600260a54918bbb47e1afe82,2024-09-16T15:35:10.540000 CVE-2023-4163,0,0,43e338e0bf79d4878330be49b3d2775f4c161030eeb5922409f5f81f2f8f1416,2023-11-30T22:15:09.203000 CVE-2023-41630,0,0,0382df2d9ff93aed50c798190d6f2eda6846eec1156a2fab4c95d620e931c9ed,2023-10-23T18:27:07.343000 CVE-2023-41631,0,0,f0721e557cda174f789e53a59728016d02efb8d28f520b1464d29bc49223827b,2023-10-23T18:26:25.733000 @@ -232192,7 +232192,7 @@ CVE-2023-42665,0,0,ac4ccacd7822c4c3b294a20315585c0819327c5044918b2c5b28e3a5361fa CVE-2023-42666,0,0,57fab42bb96d68c8e217cb2afc0110385b7603940944cbd619cfc5e9f14e779c,2023-10-25T19:55:05.943000 CVE-2023-42667,0,0,30cb419317c489d29cdc7ba3766bcede8467aad9df4fd74972ad7344fc9f8aa2,2024-08-14T17:49:14.177000 CVE-2023-42668,0,0,47abc2bf2bbb0b20ca7097710f76725a48997bdca84169b316c67577af357579,2024-05-17T18:36:05.263000 -CVE-2023-42669,0,0,5e25140861ecd2766a2344072e79b8970669543b582a8ed53e780eb4b3068cac,2023-11-24T09:15:08.710000 +CVE-2023-42669,0,1,125656ff5427e56fd0e71917cb9f82b665ffbd52efff30980ac5cd11be28e989,2024-09-16T15:15:13.973000 CVE-2023-42670,0,0,120e0e5af287d7c4702966e62fad7f8cff9f8e3b855da304ddac137859f58a90,2023-11-24T09:15:08.830000 CVE-2023-42671,0,0,72c2e9da700cc2d03817ed0002c8fe2eeb95d9f20a6125d48e866c6a2d9aeab6,2023-12-06T22:09:53.053000 CVE-2023-42672,0,0,8d8965b504889acdb0bce563bddd751c36d54504830008bbac9caa6bc3cac006,2023-12-06T22:09:42.317000 @@ -232286,7 +232286,7 @@ CVE-2023-42752,0,0,22977535c377988fcec2e0db6fce559af749489e4cbaf81f8d598df1eb50f CVE-2023-42753,0,0,fdef6b4e6e00e576a776ced60bff1da73f2c1de9e8ff8543d560d2d931c65aa4,2024-09-13T19:15:15.143000 CVE-2023-42754,0,0,51c5dfa0ab73784fd921f92fed3626ee318007c3c8ffe63efcedede944c4226d,2024-09-13T19:15:15.473000 CVE-2023-42755,0,0,4e1d57d99583b1633ac52105d5aa05edba3a9b9a435f3b1f32232d72ee520c1f,2024-09-13T19:15:15.620000 -CVE-2023-42756,0,1,8bca0547c5c71329ae74fc216494c3b935babffb1d80b31f0201b320d98bb2d8,2024-09-16T13:15:06.640000 +CVE-2023-42756,0,0,8bca0547c5c71329ae74fc216494c3b935babffb1d80b31f0201b320d98bb2d8,2024-09-16T13:15:06.640000 CVE-2023-42757,0,0,53f895ca4b2413554de30c5001e6737fc08818e69f276382dbe276da25387997,2024-07-03T01:41:30.683000 CVE-2023-4276,0,0,c946dcf653c02d28c8b48cb5d585a9c55257de192fa39f2f1cadf751f6862f19,2023-11-07T04:22:23.843000 CVE-2023-42765,0,0,d3d64a39ab45304ea904af85d89b92f9adbba47d39160e37d7185ccf8cd78275,2024-02-12T16:44:16.617000 @@ -232968,11 +232968,11 @@ CVE-2023-4378,0,0,8e1646b45fc708ee13f60c976f845a9aec3ca6271d929107a61d1e29691c6d CVE-2023-43782,0,0,e5cfe4daa552d31955e2a127809e8f30f403e44f8c6c1f94e9db4376e05bcba2,2023-10-26T17:59:42.910000 CVE-2023-43783,0,0,6170070a1c2dfeadc54ab13478a454c49e31e9d44e98e1ae3922e7657839eff2,2023-10-26T17:59:35.273000 CVE-2023-43784,0,0,c7a232d1b364c23f6f1a5ce0ede2b4fc06d36c1ccb41222d8f3f12fa9cc0d35a,2024-08-02T20:15:58.957000 -CVE-2023-43785,0,0,ec54a728d7294ab682725467be0874dbfe45d229f8bdd3bba63e0e6525a723b4,2024-05-22T17:16:04.760000 -CVE-2023-43786,0,0,33a2c1d957b4f2540927ef8d439d81ae7e9457f3e0c8032d6019ad43b798fd33,2024-05-22T17:16:04.927000 -CVE-2023-43787,0,0,2736292fcbce759afed5b2e2a06dd58f7f3660e98881e20c1598f46dd86cc5b7,2024-05-22T17:16:05.057000 -CVE-2023-43788,0,0,01d798013648db4b667fb28bf273bbe12d286f6b1033b78688d5f0c5dc153332,2024-05-22T17:16:05.223000 -CVE-2023-43789,0,0,3613493e941e63af8d005946c9ac29b0133e8cbe138bcfa9907c2543bbaaad0c,2024-05-22T17:16:05.443000 +CVE-2023-43785,0,1,a9ea5e235fc9a62e60034274eb4237bb4d6034aaf9cf3bdf95da561f02479545,2024-09-16T15:15:14.147000 +CVE-2023-43786,0,1,2a2e3c9546b288978c8d7774d6605dc89ffd1e033d4ec9c3c15c0686662cb8f8,2024-09-16T15:15:14.303000 +CVE-2023-43787,0,1,52f9f95d0633ae88de01662e2fd5a28d2f55be3b34383b3fe859c92aa426bbb3,2024-09-16T15:15:14.430000 +CVE-2023-43788,0,1,5ec2285156c8f0123279915f055cbcbb0fe2f8347685d5ec43db143e190296f8,2024-09-16T15:15:14.557000 +CVE-2023-43789,0,1,bbd30452d0bf4647ca2d85f1512eb09a2b0206d8b2df290bf400ed7ef99850be,2024-09-16T15:15:14.720000 CVE-2023-4379,0,0,582e80efa97f731f78b37677ce18aef26b9917f04e2bb9485fe57164511e9b6c,2023-11-16T19:24:36.240000 CVE-2023-43790,0,0,efbcd3d638a62c407a14fed578049b4bb82c5267f56644de6e489c1788d97db2,2024-04-15T19:12:25.887000 CVE-2023-43791,0,0,beffcea09f00042cdbb2a514d52a9e94a79e2fbb2156a6dc1f29ab10b57eeec6,2023-11-18T00:55:15.610000 @@ -233893,7 +233893,7 @@ CVE-2023-4526,0,0,fb4879b7650aa0cd1e6afd9fe07638a982da206f1e0194e931f7254a2d4a5a CVE-2023-45267,0,0,445f5c3e2fb7d8dbf42934776555983dae8db5fe21c29acf1a80bc754b4389ca,2023-10-19T14:36:45.957000 CVE-2023-45268,0,0,ad7eba31dd30beef2a61939665932452de51b810cae9c46e2cb99bc862e3773a,2023-10-18T20:09:14.263000 CVE-2023-45269,0,0,942ae46d354fc8ba5ce144d9d950538b406caa60ce52fb6de00b1cb6009ed3e2,2024-02-15T21:47:21.370000 -CVE-2023-4527,0,0,b59060ea1fc4c4851a34d49a0305976a2a360addce57cb1dda8a562c030cea2e,2023-12-28T16:23:01.123000 +CVE-2023-4527,0,1,015e3c8be263251bce20126536eeb2e1a9dcc66b6623602ac443326608d32515,2024-09-16T14:15:12.243000 CVE-2023-45270,0,0,60dc80c089228a8b4705cc271843d005bc54b5e924ae0de80a3e7fc6978bd774,2023-10-18T19:40:53.753000 CVE-2023-45273,0,0,3e312c56d73de36ff103270162c6603e6ff0147e0b936669f6430707b782d3cf,2023-10-18T22:45:44.830000 CVE-2023-45274,0,0,9e6ba49146fe162d5a5fec842512dfd31d4230a4f9958bcd6a78e4518551b94d,2023-10-18T22:50:01.177000 @@ -234160,7 +234160,7 @@ CVE-2023-45681,0,0,da10d4410ebd709139fcf7847466cc9b4c442d8e31bdf75ced9fd53caec7b CVE-2023-45682,0,0,d690c4fdfa89a2e751440b7f9d1fe1dbcdc61edfd6d66f3f3d99cd043b138ffc,2023-10-26T22:45:57.160000 CVE-2023-45683,0,0,5408f9701e16c567adf5437fb79633e33f622c2aedf7b6f14901f07dad46c6a5,2023-10-20T12:16:16.443000 CVE-2023-45684,0,0,23e47c08e50ca8a06ef69282ddec60cafb4f7312f45547443ed9054193ee7541,2023-11-20T16:36:42.880000 -CVE-2023-45685,0,0,c08e0c8e2d4701bb6c390cbd4bf130b3ca9d9401cd51170e8a77d229381f0f4e,2023-10-24T15:10:57.873000 +CVE-2023-45685,0,1,3e5ef41277cafc12dce780ac6f4ed6167b3fa1776a0255b673ee04f502f488ac,2024-09-16T15:35:13.577000 CVE-2023-45686,0,0,6b33c6071d94d9e8b066a6db5b30d57f074bf2eb2d293e76fa16f3397f8b53ca,2023-10-24T15:47:56.750000 CVE-2023-45687,0,0,3dfb015d38c2cbc11cc321c68b6d86f040de28818ff3ee37de4be2ba106ac92d,2023-10-24T15:58:30.740000 CVE-2023-45688,0,0,53e3fed42941d057509cc6f45ec34e3ea0ac43c0b88374a47ddfc8ca7523e074,2023-10-24T16:02:30.307000 @@ -234504,9 +234504,9 @@ CVE-2023-46142,0,0,3fb6a0861e35fc09ecd0298ad20e5d7a8d5b6455fb61a2037ae1846cac22d CVE-2023-46143,0,0,e3bc6bf1bb4c8c0f9d3ac70e1c134375256c14ec8394d0b3c4d1d049a67021ad,2023-12-21T17:15:46.577000 CVE-2023-46144,0,0,3282ce1c9478d9758af9f76cb4e41d53fa70db52bbadc33760bdc9a464fbec5b,2023-12-21T17:16:11.880000 CVE-2023-46145,0,0,349c8808057410d251a89302413901d028ae7fdfdc2fab73cab5d33fd808c463,2024-05-17T18:36:05.263000 -CVE-2023-46146,0,1,674968e0b09709c1de659f46455142d49d86eaca8817754c044e40c734f63cb6,2024-09-16T13:40:24.777000 -CVE-2023-46147,0,0,adf1b90240c365239e0d74bb3859de2075d45bd2082f60acc86fc39dec609816,2023-12-28T20:04:49.337000 -CVE-2023-46148,0,1,9bf3fcd47bcc8018a9c1f7948a87dfd5462370201ec373c9040cedb944d2662a,2024-09-16T13:39:49.807000 +CVE-2023-46146,0,0,674968e0b09709c1de659f46455142d49d86eaca8817754c044e40c734f63cb6,2024-09-16T13:40:24.777000 +CVE-2023-46147,0,1,b82be5e5d045675023a8fc4f0aac846ce0e3426dc9461912b9f889c9950e280c,2024-09-16T14:11:43.620000 +CVE-2023-46148,0,0,9bf3fcd47bcc8018a9c1f7948a87dfd5462370201ec373c9040cedb944d2662a,2024-09-16T13:39:49.807000 CVE-2023-46149,0,0,3ea8aa587373a4370ffe6a17a9695029b950cdc772eec5fb15d692937fc545e0,2023-12-28T13:44:32.593000 CVE-2023-4615,0,0,cce88ca43c3bf2e90c110ee0ceced76eb1449f266f6f989c5a673e12188ed957,2023-09-08T14:14:45.633000 CVE-2023-46150,0,0,24b6cfa0fa017814cee898808d57e55bfb0b56cc0b4b2034380458dbb8bb6a4f,2023-11-01T17:34:25.380000 @@ -235829,7 +235829,7 @@ CVE-2023-48054,0,0,12620e1b4db7763e3da8696511c7c7e82e9b979089e3eabc8b343308cc2f0 CVE-2023-48055,0,0,cc9dcb360f502f61075ff20bdfefe47ca6c0d0de5f56b135a3b6569c143e732a,2023-11-22T18:24:27.087000 CVE-2023-48056,0,0,fe6114272a3c54e063b5388803e03861eade9425a11a38623d660b07560034ba,2023-11-22T18:24:16.740000 CVE-2023-48058,0,0,66a3f1c862eb603d80fc54e7a1e65fd7bae1169a45a4ed88a0a8ad90c45dfdf8,2024-09-03T19:35:06.833000 -CVE-2023-4806,0,0,2685e58a5764c5bf1daaca3b07c5ebfffafb62401c0066519d32269bcd1cae48,2024-01-25T14:15:26.360000 +CVE-2023-4806,0,1,169c709c7fcce2a813cb83fb6cce3554d64b2c509e52376f27f98faea6ca74b4,2024-09-16T14:15:12.460000 CVE-2023-48060,0,0,fea1d282cced2562e6c31897934f5482f80df5de60fcee98c3efce46bed4f5cd,2024-09-03T19:35:07.643000 CVE-2023-48063,0,0,ea9189f47de248a9b67965af3b522898bbda97ce156221191808cdec464e23d4,2023-11-16T17:35:21.507000 CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09c13,2023-11-16T17:35:37.623000 @@ -235866,7 +235866,7 @@ CVE-2023-48126,0,0,e2b7ffa93043f668ea6fa72c22c0d0bc5af3237373db0412a2934afe676da CVE-2023-48127,0,0,03652ce141961eeb1f38d87703d2353e4c04e568761d2425b0d101640aa1c3c9,2024-08-27T16:35:02.480000 CVE-2023-48128,0,0,3486511bc881101feb6722e4f06b94e77581a3c23eeec58635d0e7ab55ad6ea3,2024-01-29T22:58:33.717000 CVE-2023-48129,0,0,25e7ef256d120b221e541b49e58e27cf776efaab036d84b5c7226691b00b8eaa,2024-01-29T22:59:32.340000 -CVE-2023-4813,0,0,a3129b3c7c051a7be512cd888ca923b35f285314ef7523597960184a4b4b1ad6,2024-01-21T01:49:46.697000 +CVE-2023-4813,0,1,c965bcbaf6ce91d593b651fa97af492ff83f09fe710d2a895ebaa0c0b9d2e015,2024-09-16T14:15:12.617000 CVE-2023-48130,0,0,3a7cea12be0217caa610aee5571822c9a47a0ea78361a089d7938d5b336e2d3a,2024-09-04T20:35:11.623000 CVE-2023-48131,0,0,6e6dee847f5b90b5e011dd4b85a4c595c2a4ee398fe4e127259d902589ad5cfe,2024-01-29T22:58:51.857000 CVE-2023-48132,0,0,9d36d2fb43937019f2e81da34fbf38ff1231a1583afbd7ea9536ff61388bad5b,2024-01-29T22:58:57.930000 @@ -236461,10 +236461,10 @@ CVE-2023-48754,0,0,614d4cdc37c0b2375a29c7af81051a6cf9c3b28389871956e1843d10badfd CVE-2023-48755,0,0,3d71fe9f3b24d529c3f220cad4414c1068434aa0e77e34817a1fe25e9c541812,2023-12-20T21:09:32.063000 CVE-2023-48756,0,0,7f27ff81a11a1aaf081b2a2c709c5cbdcc34a02567bbee61c06ca3c945b74c19,2023-12-18T19:06:14.257000 CVE-2023-48757,0,0,56fdb394c3235b720057647cf37ac09e9261e0b0ae801569247138671fc1be1a,2024-05-17T18:36:05.263000 -CVE-2023-48759,0,1,3f80e547d08e681a92bc3f658b9714a5b770ba9224e1a519cf7c51401af5e48b,2024-09-16T13:25:15.550000 +CVE-2023-48759,0,0,3f80e547d08e681a92bc3f658b9714a5b770ba9224e1a519cf7c51401af5e48b,2024-09-16T13:25:15.550000 CVE-2023-4876,0,0,3b97a842654f5bd1e35e919b3186c1e81e22f9937052ea4ff82c3765d820ed69,2023-09-13T13:36:42.887000 -CVE-2023-48760,0,1,1d8579ae05e2232ddb597b5a6e7a051b4b4cafee4b030a2a5eb4605dcf0c2c51,2024-09-16T13:26:13.570000 -CVE-2023-48761,0,1,91316ae0fb08b49a0b2551ee5295fe5c18df501e28e951bb5347525b8eecba40,2024-09-16T13:27:20.777000 +CVE-2023-48760,0,0,1d8579ae05e2232ddb597b5a6e7a051b4b4cafee4b030a2a5eb4605dcf0c2c51,2024-09-16T13:26:13.570000 +CVE-2023-48761,0,0,91316ae0fb08b49a0b2551ee5295fe5c18df501e28e951bb5347525b8eecba40,2024-09-16T13:27:20.777000 CVE-2023-48762,0,0,c556b68fe8ab2310589e48858d1e8c8ec3e860850db88920bebbae9829320811,2023-12-20T04:17:13.577000 CVE-2023-48763,0,0,2eaa6ccefeda47c42af21fd2245b4a8ea60aedac1d3dbd4a3e87235ba6050cd3,2024-04-24T17:16:50.397000 CVE-2023-48764,0,0,32c7260fd7d6515dfdec515e45e192898c95929a26d209476885b4530c8ee324,2023-12-28T17:25:33.493000 @@ -236673,7 +236673,7 @@ CVE-2023-49106,0,0,be3dd7a31243d9847a16f30451a0c0d97588194e905d505516b262307d9c7 CVE-2023-49107,0,0,414e9e4e5481a415ded57ebbdce7a43314c61c3119e242e07c949c0d2ccb68fe,2024-01-23T14:04:46.917000 CVE-2023-49108,0,0,338c98ee8de740dfeb456a5c35f6776a68096757d990d79e74c5c440e81b0c06,2023-12-07T17:52:39.950000 CVE-2023-49109,0,0,32922b053acd78f29e519fdfd1f7d4bc485fb78331af0d70603fb5a2ab603ae5,2024-08-26T18:35:02.470000 -CVE-2023-4911,0,0,eda037b56a7f5dbd7982e54bff14ef5e3d309b05bc6fc049ad5a29ae08dac357,2024-02-22T20:18:58.020000 +CVE-2023-4911,0,1,ab6511f507e1877306d09e963b50fc8718dd3cd005b204a0de1935269ad88ae7,2024-09-16T14:15:12.840000 CVE-2023-49110,0,0,8b58334ac02dd5b7b1ae35b2a658333276b33522d3c8b5bb0fe8859f970db620,2024-07-03T01:42:26.413000 CVE-2023-49111,0,0,df0dafd2b2920c0c1ef482d192465048000f9bae0650aaf5841143aa649b80f8,2024-07-03T01:42:26.627000 CVE-2023-49112,0,0,fa413702068a86fc4c7e36ae8fc0a181d36075b881dffad29e8ffcbd503a5335,2024-07-03T01:42:26.830000 @@ -237724,14 +237724,14 @@ CVE-2023-50776,0,0,2cbab7c41bcae1a8cc99272ed9841983a3d524d64b2cbb90ad188cbbdb6c7 CVE-2023-50777,0,0,df0d9de6b8a0baaf3efff27900ebb62bf75a216074a2617fe71f734fe044ca65,2023-12-18T19:10:49.673000 CVE-2023-50778,0,0,4c2b380d1452ab879c0bb2f5c89c5ce489b1f3e5d975b71bfe4549f784edbd60,2023-12-18T19:10:26.547000 CVE-2023-50779,0,0,a0c5abaaea21dffc7e5a857a3cc8d6fdf18a54e29bad4eca92e474cb6a42116d,2023-12-18T19:09:28.547000 -CVE-2023-5078,0,0,df1630d406513e5e98f689a68136c5e13ac7072ff4d1809632880572b8c33161,2023-11-16T18:01:15.060000 +CVE-2023-5078,0,1,44af65139afdd3e9781ce81372f6fd64997c761012986369ca4fdcdd6cdd5a3c,2024-09-16T15:15:15.367000 CVE-2023-50781,0,0,4cd11cbf33226a1d3a67a681c39cb955b0d7b7bd73503eb21db0ba61d3e9a3f9,2024-02-26T16:27:47.760000 CVE-2023-50782,0,0,75e4b5549217f027f3387947d4db2096cb79eedec4a878f9b0a87ffba322d82a,2024-09-05T16:43:20.083000 CVE-2023-50783,0,0,6b32c482163913116bd4c154365475f6fbb1c73c4268388823017e442458c167,2023-12-28T13:45:11.130000 CVE-2023-50784,0,0,310bd016f72a55e87952759915b2328751f88f7e5a355286cf6eeaceebb855b6,2023-12-26T03:15:08.927000 CVE-2023-50785,0,0,95069a7af58cd3ada76ed23cb42a6b26c34f9d8527e1cd720c0edc9a0997e9b2,2024-01-31T19:16:46.520000 CVE-2023-5079,0,0,bfc2ec8a0b13f58240a31ff53e9efdd5860ac1c14419b874e37b25eb37d0f7b8,2023-11-22T18:45:31.787000 -CVE-2023-5080,0,0,98d9a817114cc7a62b26d1a43eef57cee1b492543d590f0466e7704969183256,2024-01-26T16:02:33.997000 +CVE-2023-5080,0,1,e74b710ac5ce55c8b64e5a605db4534fb958b292680076cb58f4eecbcfdcbd8a,2024-09-16T15:15:15.590000 CVE-2023-50803,0,0,39b8457e6689f19cf0cfb42bf6f8f9bc85c44a7256b507e6e2e5e4502e82fde8,2024-06-25T21:15:51.453000 CVE-2023-50804,0,0,39f75e54eac34ee2309659a8b63ea3ce44f3663e0d436459f4acb23eb679f665,2024-06-27T16:42:15.310000 CVE-2023-50805,0,0,6a1b68eb1c84b0e9c0411e8c2b1c211a94333de961886c775bd464a3e1dc9ade,2024-07-11T13:06:13.187000 @@ -237739,7 +237739,7 @@ CVE-2023-50806,0,0,b76f16dc23feb49e04f1b42035094c51dba4a883093ee0167c8a3ca387a72 CVE-2023-50807,0,0,49d7ddd672f2ace5a4bacad8e9a69ecb67c1f752bb20673689176d58cf559602,2024-07-11T15:05:15.990000 CVE-2023-50808,0,0,f28b2b346351a49c0ccf1d31776f56e7dc93352b8a5ef0a215db353f8073b16d,2024-08-19T15:35:01.787000 CVE-2023-50809,0,0,7719a810705ea5c5a85faa78514d3a43be3a8cdc8a452351afdb2453caacced0,2024-08-13T14:35:00.967000 -CVE-2023-5081,0,0,7787e17d39eb5438b4b32a6bbefdad7b23a6aea7d5f6a904017d2dc838411573,2024-01-26T16:02:59.793000 +CVE-2023-5081,0,1,0e732bce81b0acde4513851a952ca536476787a34e895e3dce2d7f429b7ac3bd,2024-09-16T15:15:15.767000 CVE-2023-50810,0,0,ee660c82097e8ab9c992185745b4404dffd149b82690962a0ed8a0cb829c0aef,2024-08-23T15:35:03.107000 CVE-2023-50811,0,0,094c840cf26fbf426edc4fdb20f1490465693445542cafd34c1943f1940efb84,2024-04-29T19:52:21.503000 CVE-2023-5082,0,0,f1b6df4433c50955b466bebd7c4d10790a8c0df9b9f9b615c6456254fa1fb163,2023-11-14T15:33:18.273000 @@ -237984,7 +237984,7 @@ CVE-2023-51142,0,0,3cc421719bb627f399e2e569c0e2f084a8d2b6a78a2b82bf6a4efa03230e2 CVE-2023-51146,0,0,665d49e788e0dece9a1ced017989b7a5e3600cd53a97e4d88ddab1a009ccef0c,2024-08-20T16:35:04.123000 CVE-2023-51147,0,0,75e5ad9e43cde03291b18d115e151db0aadaa5d5d0263e6c24a28fb6db5ae3b5,2024-08-05T21:35:01.980000 CVE-2023-51148,0,0,bce6f23f629ff4a4d092df77207bd3625ab8bab51457c9d3b72eb9275af90b21,2024-08-03T19:35:01.547000 -CVE-2023-5115,0,0,c0121f25bade5239df897b5d8e787895035682216994a4f90b5bbc1d3e3a5b5b,2023-12-29T17:57:50.077000 +CVE-2023-5115,0,1,14c531f4587abd09fae2cb04ef8d601a42e68cf9b74459554a2ea4cdee69467d,2024-09-16T15:15:15.890000 CVE-2023-51154,0,0,733ec9b18ea85f01f34e9765897ada4e832b65ac33fdca877dda8af7f30fd092,2024-01-10T15:58:18.733000 CVE-2023-5116,0,0,591765d4d588c72144ede930c6a51f214c6b6a2dea94dcfbd541442fb6e59c4b,2023-11-07T04:23:28.397000 CVE-2023-5118,0,0,d240cca45e4e2f327ad2cb7dc08143e95ad38b48016fa92edb8ad9cf216f86ce,2024-01-18T16:01:37.653000 @@ -238820,7 +238820,7 @@ CVE-2023-52356,0,0,7de388c25e62f14be0b715aca16140998082d80749fa915a4b20ec0e8f20e CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9b50,2024-02-20T19:50:53.960000 CVE-2023-52358,0,0,0a9b9b1ce599c5b6e28af28108c550a9307f5fa18440515cf987b65d0e1a3c4d,2024-02-20T19:50:53.960000 CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000 -CVE-2023-5236,0,0,61f284a28b459b95f041f3e6b117d89c47706bfb9d23e8a0259457bbdaa561ab,2024-01-25T14:15:26.617000 +CVE-2023-5236,0,1,fb6c3d46b555cdb6e2e8cfed896e892086c77c4bb29daa7e1e3231fc7a825bf9,2024-09-16T14:15:13.093000 CVE-2023-52360,0,0,ecfeb27a76b3cb4fc769668e2502fbe290543c70b0ad7217d769381a048f79b6,2024-08-01T13:45:37.677000 CVE-2023-52361,0,0,092ab8720c04450fa7a554161bf44d8a64b8cb41e66ca97a56cfbb8a97e57137,2024-02-20T19:50:53.960000 CVE-2023-52362,0,0,48363a3dccb5503f32f25858c79d36206031408e3ccfff77dfec2ad330802a48,2024-08-29T20:35:47.270000 @@ -240046,7 +240046,7 @@ CVE-2023-5977,0,0,4f2206e2eaf1f5fb6eec8067344b53abbfad8cfe8403df3537e0415740cec3 CVE-2023-5978,0,0,f408ac44ee354621216f90f423d38c2c659d3ea5a53c9d5f9e74f1e2e716c95e,2023-12-14T10:15:08.727000 CVE-2023-5979,0,0,276fad04b5259c4f4586562a88d13821aa63af57a15977d1125f945b1ccbf798,2023-12-08T14:20:45.807000 CVE-2023-5980,0,0,f09a305b17ba2313c538eefe0561ffa620cbee16eb9b5c9d3913b696e4720b5c,2024-01-02T20:45:48.277000 -CVE-2023-5981,0,1,78e33f4b8c0edd8ae7e7187ce3119e6fbd1037fb3854ef36ea36b61355633853,2024-09-16T13:15:07.813000 +CVE-2023-5981,0,0,78e33f4b8c0edd8ae7e7187ce3119e6fbd1037fb3854ef36ea36b61355633853,2024-09-16T13:15:07.813000 CVE-2023-5982,0,0,cb35b7bddfe50fe1b299befc567ac19093e5db6dc3f3cc21a409dbf8cd0e5a17,2023-11-15T15:37:28.153000 CVE-2023-5983,0,0,3924fb95341be31a1540cdf30f4f9eae80393248ee37ded1be30e0ec60782b22,2024-08-26T14:15:07.593000 CVE-2023-5984,0,0,60e45e796d62f3504f0a18b0567334ea0b7891c7f3d75b9a2af98a59c227b140,2023-12-14T05:15:14 @@ -241635,7 +241635,7 @@ CVE-2024-0549,0,0,1393f5b8cdc9e327fa6862e01e6396727ca7a0ac5b934bf16bb8c3e769c529 CVE-2024-0550,0,0,abc3547a7838ac73f19a1ebe9a4aa732476b85bf08336b5b46a7a52c09f46cf3,2024-02-28T14:06:45.783000 CVE-2024-0551,0,0,3bcd8ed6668581b560d620774527cfe0f50a7507d208b9889bb8c1c79dda71a1,2024-02-27T14:19:41.650000 CVE-2024-0552,0,0,71e8fa37268dd5cfa7c962f598a1d1195c1e35bb353493449feb13346a0b6d6e,2024-01-23T19:34:05.483000 -CVE-2024-0553,0,1,f5aaab005c6250bd9169db9bffc1b34f92e8a0059e5e79538fe2daa4eac29ff7,2024-09-16T13:15:08.327000 +CVE-2024-0553,0,0,f5aaab005c6250bd9169db9bffc1b34f92e8a0059e5e79538fe2daa4eac29ff7,2024-09-16T13:15:08.327000 CVE-2024-0554,0,0,be16417315b7a311600e94ec0549779d6adfd1584a8e8952a259fb4e0980804f,2024-01-23T19:37:17.313000 CVE-2024-0555,0,0,c8aacb2fdd19da501c6c82ff909d2c5a12900f2d0093adb7af16737ce17fb806,2024-01-23T19:57:48.237000 CVE-2024-0556,0,0,3fa34f60dae8364b706de7dc9e47c9ebf00f13a031fee30b193fa3a78664a286,2024-01-23T19:44:47.387000 @@ -241649,7 +241649,7 @@ CVE-2024-0563,0,0,9ec355fcf8c2bfde63e8cd3b32f6b09899d66d999623867d4585cdbccddf2e CVE-2024-0564,0,0,9f4cf532f2df225cad861ce2ec08ab9ceb4e29633d51c64f31796eb4bcd7e01c,2024-02-08T16:36:48.837000 CVE-2024-0565,0,0,ca58e43bc8d960bbfb34d32be78694d44cad238c92c5ee98dbd6b9bf2c483600,2024-09-14T00:15:15.387000 CVE-2024-0566,0,0,170da13f521bcbc97fa1d9a0d35b966ca3768bc35f96776689c0b15c2a399254,2024-02-12T17:31:21.670000 -CVE-2024-0567,0,1,2f4df701f3416c48266db1bb8a27d322f4c7f91f5c54f623275f8e06a0796629,2024-09-16T13:15:08.680000 +CVE-2024-0567,0,0,2f4df701f3416c48266db1bb8a27d322f4c7f91f5c54f623275f8e06a0796629,2024-09-16T13:15:08.680000 CVE-2024-0568,0,0,33eac886ba5b69f80ae385e0dcdb88a2caf2e7add15dda3f9f1cb918faf651d0,2024-02-14T18:04:50.373000 CVE-2024-0569,0,0,a95accd00cf0ee074f6751dcd8e432a7e91c717e436d391ea5221ea3ce82042e,2024-06-18T13:21:16.393000 CVE-2024-0570,0,0,5b3b3864dfe61724c9374954c01de1e56a444e4219e92c2a04dbcce5169d914d,2024-06-18T13:21:42.383000 @@ -242599,7 +242599,7 @@ CVE-2024-1574,0,0,72feffe42c72d6830d032663fa96f8a42adaa592b8140c7ff86296f6edebc0 CVE-2024-1575,0,0,72640f5ac75448b4b5509a8cb432003a1dfdf54ba22e8912d56e4943fbc2b8dd,2024-07-24T12:55:13.223000 CVE-2024-1576,0,0,5444101344581d3589e93ce2d526b43d94d0797d9cd912b65660866715706816,2024-08-14T13:55:57.477000 CVE-2024-1577,0,0,7287d7da4767d738b846ccf37b2518c0176c0362f66596066c97cf866de98fa1,2024-08-14T13:56:31.627000 -CVE-2024-1578,0,0,41acc17f54465500428fda92da499f67614fb08d6afc42d5646b8f65b625f197,2024-09-16T07:15:02.030000 +CVE-2024-1578,0,1,f604547740c32337d2378275a5347ef1939f5c4a24bcf2b01dc5ce3c9a80771a,2024-09-16T15:35:14.853000 CVE-2024-1579,0,0,b6d8173dad7692a86ca6531cf14391459a611253254c72b5260cedefe5ac123a,2024-04-30T13:11:16.690000 CVE-2024-1580,0,0,07aeb5360f5558bb119a373ba7800ece8f428995a9df074cddda9448e0dd7d45,2024-03-27T18:15:09.063000 CVE-2024-1582,0,0,ed01326ea86a5aee79953e4017f8aa9f576ef158252fee7ae361d02c65156e29,2024-03-13T12:33:51.697000 @@ -244748,7 +244748,7 @@ CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961f CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000 CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000 CVE-2024-22398,0,0,ba44b0d25e7b758fa53c63cdc26c43f1429982b9cc2c5eed3635a95b6d6d99db,2024-08-08T22:35:01.020000 -CVE-2024-22399,1,1,93fce0d6a8e6effca30c0f1f2a075f2ea2cf4196e07062785200a5a05c825ea7,2024-09-16T12:15:02.530000 +CVE-2024-22399,0,1,08d40df4965cfed337618ac0056b3ea2c5a55c7ac8520d7c9359fa8b4d32293b,2024-09-16T15:30:28.733000 CVE-2024-22400,0,0,a82e5833eed07db4e1d5b948553237fd45742883181539baca74084d8a75ef26,2024-01-26T20:55:37.543000 CVE-2024-22401,0,0,d5240a6aa4666ee81a03ffa69aad185ad0ebf9697996427b5aa87a5ad00f95f1,2024-01-26T14:42:35.147000 CVE-2024-22402,0,0,86847dbd3139546d75935634479a7b84727e69a7a4ecf53533475274b18a3d48,2024-01-26T14:11:30.677000 @@ -248137,7 +248137,7 @@ CVE-2024-27247,0,0,c68b98a47507a62cf1fddd5d92d1e3599a3dae9836f9e1673dea5313964a3 CVE-2024-2725,0,0,4b109228f09a586dab91b667f3a16d225e84b90e57a03d6425e2c43a43711564,2024-03-22T15:34:43.663000 CVE-2024-27254,0,0,eaa78de626e7bc9892d9bd1a4aa44647e13738f964703ed91ff89367d49eda4f,2024-06-10T17:16:22.873000 CVE-2024-27255,0,0,1c110eb7d9ab046aa4890f29967f590ea7f23942ac21f596c2e113d0e316c046,2024-03-04T13:58:23.447000 -CVE-2024-27257,0,0,1f70c6711c76368c9a8fa6d98732dbbd19008628f2ae925cba4d41bfefe18cae,2024-09-10T15:50:47.237000 +CVE-2024-27257,0,1,feaf02094e0d907319b15eb7816cb8ea29ee5412c83592df02ebd7bf2b4c1945,2024-09-16T14:26:15.400000 CVE-2024-2726,0,0,72988f9ad68bbbf63dda740202678870f683cc61908e4f60fba7dfbe58dffd21,2024-03-22T15:34:43.663000 CVE-2024-27260,0,0,f122b75dc7c284609059d79b31ed18883cf9cf95a5516e6a4f3964931201ea16,2024-05-17T18:36:31.297000 CVE-2024-27261,0,0,87b5e9d2f195775295533a95bd370dfad0b5646f877a2530f26fd9575376c86d,2024-04-15T13:15:51.577000 @@ -249737,7 +249737,7 @@ CVE-2024-29775,0,0,e71d66d272a6d26e80362dbdb9af6235acda0d39f3a6b37aba8c69e9af5bf CVE-2024-29776,0,0,32825ed25a2d650dd42584222e0638bd8f965c3a91944aae493726e87e659414,2024-03-27T15:49:41.437000 CVE-2024-29777,0,0,b90d6ddd06a6d45d8ebcb085842a03022398724face786368969ac161c066456,2024-03-27T15:49:41.437000 CVE-2024-29778,0,0,7078d531588620b0c0a9a375e79820625449ca74fed04f4f1c661ccf6ea1bfeb,2024-07-11T14:29:52.413000 -CVE-2024-29779,0,0,f5227d998844037844916a6ac44a9281ea3dcf7b5956e92cc50ca7ba7e753e9b,2024-09-14T11:47:14.677000 +CVE-2024-29779,0,1,4c1b947e087d2bfe7f90a814aa2f5028f3b36ea8eca2f971fc5b96f35026d965,2024-09-16T15:35:15.137000 CVE-2024-2978,0,0,7f9e4cf850606f033429bd0d0b10fbeb2aa4b11a60414c584eac7aedb50872cd,2024-05-17T02:38:40.007000 CVE-2024-29780,0,0,ff87a8b15c39bcf6bb6551c6c4365634fc9c65ec4425784140a90dbc2abce6ed,2024-07-11T14:32:47.390000 CVE-2024-29781,0,0,ff5beeb8ee192a6bb8813a4b8a1a288ee1e9e654d7b3f181160e6cf4a1c38eb9,2024-08-19T14:35:05.933000 @@ -252936,7 +252936,7 @@ CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf73 CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000 CVE-2024-34130,0,0,29b15cda4f7383fc7738011069e5f5981ecee8f8ebe6f1acd48c5ae17439fbe8,2024-08-07T15:15:55.287000 CVE-2024-34133,0,0,1d0cb4674576130d312c8e4227b24a269014ebdd373db1a448b4c534b54b4ab3,2024-08-15T16:48:11.847000 -CVE-2024-34134,0,1,c00e14ff09a1a532234a22030df39434e186d5f6f93a662354b78a0c0f900c7a,2024-09-16T12:15:02.657000 +CVE-2024-34134,0,0,c00e14ff09a1a532234a22030df39434e186d5f6f93a662354b78a0c0f900c7a,2024-09-16T12:15:02.657000 CVE-2024-34135,0,0,d677722ae5b9b5415d9ec8d0b13b26302b2ca55ae3189dba56599a49d49f7bbe,2024-08-15T16:47:32.560000 CVE-2024-34136,0,0,6e1f4b7666847fc28ff3a6dfc546463d7583d6608cabb72e416825ad66567975,2024-08-15T16:42:26.677000 CVE-2024-34137,0,0,df06b600a47c44c9e7b304361dc32b85bdc1c4709323c9b327f9ff904d3d89b9,2024-08-15T16:42:15.847000 @@ -255126,7 +255126,7 @@ CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddf CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000 CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000 CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 -CVE-2024-37288,0,1,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000 +CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000 CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000 CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000 CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000 @@ -255844,6 +255844,7 @@ CVE-2024-38306,0,0,302c251894cd8175c95dcaa248535d0e8a6962400e46ca01099390440f888 CVE-2024-3831,0,0,50e818929dc56e84afc0dd8fe8fae7a8b323529f272034386ddae5543191124f,2024-05-14T16:11:39.510000 CVE-2024-38312,0,0,1eb38797c2d82d591d8abe57f1d4573a3412cb86f39c7ea700474f2d0b5ea92a,2024-08-07T17:47:36.897000 CVE-2024-38313,0,0,6104dc2b29b4c8ac118d88c83436ea8db6780255231d99b7909daa998f4d9c3c,2024-09-12T17:48:33.947000 +CVE-2024-38315,1,1,fbe5834e16b9434953513d8741c917f002ca22b4a4d71fbfe5af2db4cd1d4fda,2024-09-16T15:30:28.733000 CVE-2024-38319,0,0,baca4c6dd463198ff6e83e4d1d026e029418f6c2a504c13c76e1be823b804509,2024-06-24T12:57:36.513000 CVE-2024-3832,0,0,9a695728462575e75497ca13bb41d4307d467f786773e32ceb92b024954b50b9,2024-08-14T20:35:21.240000 CVE-2024-38321,0,0,2710f443b4070c40eb4ddb90b32a5c6553d12d8c8899edd19abf3192e0c71b2d,2024-09-06T14:50:53.583000 @@ -256111,9 +256112,9 @@ CVE-2024-38635,0,0,82c05d5461024536a7eca544742658a15aca67670d5473d3ab28fcdf85287 CVE-2024-38636,0,0,39fe2743512ad3bce5f80041cae8719a346f16bdf419751542e29e8318105523,2024-06-21T11:22:01.687000 CVE-2024-38637,0,0,73dfe838ab3a4a3bdef26c72205f7e2908e62b38c42443b0d3887f952bc61af5,2024-07-15T07:15:14.093000 CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c40c,2024-08-12T17:35:09.733000 -CVE-2024-38640,0,1,f894436174ccc1cc2e08bbc67fcba0414dc6b13ebdf107dda01c02078b396724,2024-09-16T12:27:22.747000 -CVE-2024-38641,0,1,8a7b88c9ff752db6c85379c2610078ab5ea82aa0cd968ba97ac893cb265a7390,2024-09-16T12:35:23.713000 -CVE-2024-38642,0,1,f8d0ecee472de6a33388f4e82db0802ffe48c291af3b4f5b7db26d6f668db8b3,2024-09-16T12:33:13.277000 +CVE-2024-38640,0,0,f894436174ccc1cc2e08bbc67fcba0414dc6b13ebdf107dda01c02078b396724,2024-09-16T12:27:22.747000 +CVE-2024-38641,0,0,8a7b88c9ff752db6c85379c2610078ab5ea82aa0cd968ba97ac893cb265a7390,2024-09-16T12:35:23.713000 +CVE-2024-38642,0,0,f8d0ecee472de6a33388f4e82db0802ffe48c291af3b4f5b7db26d6f668db8b3,2024-09-16T12:33:13.277000 CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000 CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000 CVE-2024-38651,0,0,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000 @@ -256488,14 +256489,14 @@ CVE-2024-39375,0,0,63cd2388720af3df4268f688ad707fe003b641c7c19fcda0eb4bc47c67645 CVE-2024-39376,0,0,c5700ded29923bb8323d7f97de6c0ff12124e48d1fd05b5e64b815253ca12a53,2024-06-27T17:11:52.390000 CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000 CVE-2024-39378,0,0,3b61d992513510d880f3841406cf286a1cca8ad174b6153ccc78fa173926cd3a,2024-09-11T16:26:11.920000 -CVE-2024-39379,0,1,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000 +CVE-2024-39379,0,0,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000 CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000 CVE-2024-39380,0,0,1910572fe42c7147873be8861011fe1658b3f4e08e9e17ecea7358ec80d109ff,2024-09-13T16:55:04.930000 CVE-2024-39381,0,0,c446a0a3cf348c0d4a05fe80309ddc5c180ba4a1c6f9ab0dd7c079d8ea253d78,2024-09-13T16:54:39.217000 CVE-2024-39382,0,0,57bb6f41c6b41dc159da36294ebbfbc63b1c8a8affc6c123c8c58660d2dd02ed,2024-09-13T16:54:20.397000 CVE-2024-39383,0,0,b6e4f5fe53d1ceea626b9028f302c2f5678be6f17f3d7aec3036ac534781eb21,2024-08-20T19:26:34.947000 -CVE-2024-39384,0,1,126aaf90b35785ffe9d5053a21f7e6ace1cdd40b8114bcfd84638ff5759b9423,2024-09-16T13:01:07.037000 -CVE-2024-39385,0,1,39ef5ae4eac69cb9c2fc0d6a7fa2ae80b0d018bd3aaa2cde0bee65aa023a5db9,2024-09-16T13:12:45.600000 +CVE-2024-39384,0,0,126aaf90b35785ffe9d5053a21f7e6ace1cdd40b8114bcfd84638ff5759b9423,2024-09-16T13:01:07.037000 +CVE-2024-39385,0,0,39ef5ae4eac69cb9c2fc0d6a7fa2ae80b0d018bd3aaa2cde0bee65aa023a5db9,2024-09-16T13:12:45.600000 CVE-2024-39386,0,0,b798786f71e8e8f0735f5ce39eeb2c50d842aae88e8a43200f637f6dd2b6b086,2024-08-19T18:53:49.387000 CVE-2024-39387,0,0,89b66bc618bdec29880956f86ab320532050f7e569b27da862dd99b48956ab03,2024-08-19T18:53:28.930000 CVE-2024-39388,0,0,8d23a39b2d5c7f24e6d2ce074d1291f49a0b80796f8d0f1605cbbd1187360b13,2024-08-19T16:23:28.353000 @@ -256518,14 +256519,14 @@ CVE-2024-39402,0,0,8f9792ca39ac0f5735d2d339471513a0d0066ed8186936bed3b6cb6fc80ab CVE-2024-39403,0,0,07e4d8e2e8e77f045e47a14368527780bd5cf232eacf57cf163f25b08d6cbab6,2024-08-14T14:45:31.187000 CVE-2024-39404,0,0,0a57924699a1991f76f1f50910f14cbebc966dfeaddc9ac00c410fa553a973bd,2024-08-14T14:44:35.470000 CVE-2024-39405,0,0,eca7af29b059ce089e741bc6a4c7a853c086cfad9296c28a6d43dd725f7e44bb,2024-08-14T14:44:17.217000 -CVE-2024-39406,0,1,25d04b0f853cf383417a927f1df57bb53469f9bc9deb7d3dea31cd7c4b9bef49,2024-09-16T12:15:03.080000 +CVE-2024-39406,0,0,25d04b0f853cf383417a927f1df57bb53469f9bc9deb7d3dea31cd7c4b9bef49,2024-09-16T12:15:03.080000 CVE-2024-39407,0,0,a04cbb78d44437ccd0b191c3d3b80ebe08944fb4ba6ecee4b56aa111da23fcee,2024-08-14T14:42:50.467000 -CVE-2024-39408,0,1,78ac02ebc7a31d73c30bb0b0fdb3565c4c03fb335f3337c1996a68797a39d9bb,2024-09-16T13:15:09.133000 -CVE-2024-39409,0,1,c94c20a181dda97d1ec8c605dd5d9d484beb306fe41b366d7c33da38095ea491,2024-09-16T13:15:09.387000 +CVE-2024-39408,0,0,78ac02ebc7a31d73c30bb0b0fdb3565c4c03fb335f3337c1996a68797a39d9bb,2024-09-16T13:15:09.133000 +CVE-2024-39409,0,0,c94c20a181dda97d1ec8c605dd5d9d484beb306fe41b366d7c33da38095ea491,2024-09-16T13:15:09.387000 CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000 -CVE-2024-39410,0,1,80d8ff5a50f6536ea45b9c6d8909a33772be394437655373822bc6801ca5774a,2024-09-16T13:15:09.557000 +CVE-2024-39410,0,0,80d8ff5a50f6536ea45b9c6d8909a33772be394437655373822bc6801ca5774a,2024-09-16T13:15:09.557000 CVE-2024-39411,0,0,1272b538409151f4f62bcba24a09806ce4b7e124f6e1ad5512b378725548cd2c,2024-08-14T14:40:55.510000 -CVE-2024-39412,0,1,2d8f844692ee592a9c89a505d8cfc64b3d2eefd95e162394536ffc1d73e487cd,2024-09-16T13:15:09.840000 +CVE-2024-39412,0,0,2d8f844692ee592a9c89a505d8cfc64b3d2eefd95e162394536ffc1d73e487cd,2024-09-16T13:15:09.840000 CVE-2024-39413,0,0,4a894151c2ac93955d773bf053f53d0a6272124b1d199025eed7c821185013ca,2024-08-14T14:39:39.737000 CVE-2024-39414,0,0,a4bb8c6b936f8f3de2a8e0d95754370d5eb00e62f1de95bf54a93c835f112913,2024-08-14T14:39:26.427000 CVE-2024-39415,0,0,894bb113716af642843f4f18ce95fb8548231a5b76d859c1eef366fbd2f5e3ce,2024-08-14T14:34:26.620000 @@ -256534,7 +256535,7 @@ CVE-2024-39417,0,0,0219fe7231643f85bd1a095fa4e5b3701dd95a7c34961f2e44e04d860e06e CVE-2024-39418,0,0,820594d43ba6e648c74185b3a3f3884cde9c1939f1e21dddbdc9b976f0550b97,2024-08-14T14:32:59.893000 CVE-2024-39419,0,0,91ffb997b311a697ccfc1be20f20cf74e921e2bccb596cd4c51ef6ce14f52e39,2024-08-14T14:25:31.337000 CVE-2024-3942,0,0,b71832d6733f7f5db02eb3f159a58495ac978b495e9bfda57b6845f95312f30a,2024-05-02T18:00:37.360000 -CVE-2024-39420,0,1,8a25c10f0043ed9ed91c80d0ca709c9afad136cf979fa98089f62d0910fe0ed1,2024-09-16T13:15:09.977000 +CVE-2024-39420,0,0,8a25c10f0043ed9ed91c80d0ca709c9afad136cf979fa98089f62d0910fe0ed1,2024-09-16T13:15:09.977000 CVE-2024-39422,0,0,5735bb4ff902bfe6b8a2987e99f52b473438750762eed69fca82d27ac307a139,2024-08-15T17:25:54.750000 CVE-2024-39423,0,0,8c72be80e3c85b684216aef96277fce75a9c2e2c566be73887f1212d11fae6b3,2024-08-15T17:25:41.800000 CVE-2024-39424,0,0,243efb9cc10bea0f29adc08971658a5e72c18bfec9a9b14b5a01df0b19c33e3f,2024-08-15T17:25:25.787000 @@ -256661,15 +256662,15 @@ CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd780649 CVE-2024-39570,0,0,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000 CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000 CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 -CVE-2024-39574,0,0,f795c611cc118fd4b844eaeeeb795d2ae3b397ed83d654055edbdca76dc0f09c,2024-09-10T12:09:50.377000 +CVE-2024-39574,0,1,19f7903aaa2fe3131935c172a6b15d77efbdb8c9899ed2e523d65e46645a7e43,2024-09-16T15:59:10.653000 CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000 CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000 CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000 -CVE-2024-39580,0,0,ae4cd07094b623eea0d43ba757b49f8eac81ccdc10484485725f10f1b9ce7dfc,2024-09-10T12:09:50.377000 -CVE-2024-39581,0,0,801af33f80ea73de0deafa7dd8ce063a0820901ccd8af334693f2ad612025044,2024-09-10T12:09:50.377000 -CVE-2024-39582,0,0,08ad90bb9b8e60330c82d4ee67888c5bcdb9cb7aa0728d9a0f7e079afef49d35,2024-09-10T12:09:50.377000 -CVE-2024-39583,0,0,d75c2053ec62b4e453a7cdf6554ab944e3f66be8813eab5a73cf029735dc9e5c,2024-09-10T12:09:50.377000 +CVE-2024-39580,0,1,3a3548e89acfdfb59c26c6451960d5791647e6f0711487a6792c5f2fbc5bdd53,2024-09-16T15:40:09.917000 +CVE-2024-39581,0,1,e0b9f8246a21400d39920715ae2d95b0c92d2befc3db3be9ad23cce1f18d6254,2024-09-16T15:50:55.350000 +CVE-2024-39582,0,1,6ec9b04450f9c5ce2a1563682764e2f7b34da0f9eb482017ce73088ac186fffd,2024-09-16T15:36:21.687000 +CVE-2024-39583,0,1,ac1320c69e7204d43ee10370ec071062ec88b9a1106bd39584f09ed060befd2b,2024-09-16T15:42:06.347000 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-39585,0,0,b902de62fb3f03de7ed29a5c10576c38ffe9767468ccb9e16f5c76e9c96e90c6,2024-09-13T20:24:35.763000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 @@ -256687,7 +256688,7 @@ CVE-2024-39601,0,0,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227 CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000 CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000 CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000 -CVE-2024-39613,0,0,586a4f6207a3fc12e3c2dfc47196d4c836944fd488dd2b21263cd72f158b2e0d,2024-09-16T07:15:02.373000 +CVE-2024-39613,0,1,b28f65118c4f5c5a1e58558bf5d119efc666ea0ee80f5869de256fe7a0ee7864,2024-09-16T15:30:28.733000 CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000 CVE-2024-39619,0,0,eba9a3263593a35724815600925b04c780a0fc23aea386d231775aed259a1e52,2024-08-02T12:59:43.990000 CVE-2024-3962,0,0,48687fe56cf9bd40f5a5971493143104fa6812806c2dc18cc2c914079c1544b9,2024-04-26T12:58:17.720000 @@ -256807,6 +256808,7 @@ CVE-2024-39751,0,0,a868bf4be3dd2b51f3b58089c18a834cccac125c90e59de11837fcfc432cb CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 CVE-2024-39771,0,0,faa19d65d11d5ab35c787297e9dac2f6d0b4df9b76c817e52e3ba933bc52cd6c,2024-09-12T21:34:24.920000 +CVE-2024-39772,1,1,02d156036336a91eeb4845467c1d67f2067f5062a624288dda02f5e60bf49b2a,2024-09-16T15:30:28.733000 CVE-2024-39775,0,0,38d0674c9656bd629cbe7ad5efc56bfa5445e8de675b2da1d7eafe79340daf3e,2024-09-04T16:34:51.113000 CVE-2024-39776,0,0,9c4ea23eb963afd9b9a23bf337def84731bbccbeb1c318157bb55e94bef2bfc0,2024-09-04T18:25:51.920000 CVE-2024-39777,0,0,4bc122687c91590f9c335b41e6e79e33e521fd532335f92edd7cb7db8b08fa07,2024-08-23T14:36:48.817000 @@ -257036,7 +257038,7 @@ CVE-2024-40474,0,0,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829 CVE-2024-40475,0,0,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000 CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000 CVE-2024-40477,0,0,6cb0cc10c37b24482c4bb193827b5d7d3a2113c4464b073473336af2956aa387,2024-08-13T01:13:46.877000 -CVE-2024-40478,0,1,54a453f97c6355966feebeaf1afb013583b5f0faef22df3e230ba2cd8c227fd7,2024-09-16T13:46:40.287000 +CVE-2024-40478,0,0,54a453f97c6355966feebeaf1afb013583b5f0faef22df3e230ba2cd8c227fd7,2024-09-16T13:46:40.287000 CVE-2024-40479,0,0,c5bec1df57db16e609d1623e6517bb40c5b937de6b2390aae79ad47c0b80430a,2024-08-13T01:13:47.860000 CVE-2024-40480,0,0,e7a951452f0ffeb9495f3973bc193ff807eb0f9c1dd8fd2ead8c62923fcd7549,2024-08-21T21:35:08.270000 CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000 @@ -257773,7 +257775,7 @@ CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000 CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000 -CVE-2024-41728,0,0,185e9f29f7f5a8662a758ed0bb52ffd8e1266559c38aa089849a8e7d86169629,2024-09-10T12:09:50.377000 +CVE-2024-41728,0,1,99c94826375f1fb80dce15bbcf8a28085193444f8aab436fe5d670c8781915eb,2024-09-16T14:14:52.840000 CVE-2024-41729,0,0,d9349e4b0c516aa096dba9dc989576fef69f0da894dceaf82929700fdd5be9c4,2024-09-10T12:09:50.377000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 CVE-2024-41730,0,0,296c1e90a2febb31a4577a14bd16083e2ebbad70f0cade6d819cb4026c6b3f0e,2024-09-12T13:56:51.237000 @@ -257828,7 +257830,7 @@ CVE-2024-41833,0,0,85fc1d4f81094922dce51fd479c7b435396bc7c4f95057b5b31db4afd23d3 CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb8d6,2024-08-15T17:13:25.090000 CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 -CVE-2024-41839,0,1,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000 +CVE-2024-41839,0,0,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000 CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000 CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000 @@ -257846,7 +257848,7 @@ CVE-2024-41852,0,0,b9853968fe67e2c5233e8ca2738b3048de51d482a522c2258b22dc0aff703 CVE-2024-41853,0,0,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a000e,2024-08-19T18:42:21.327000 CVE-2024-41854,0,0,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000 CVE-2024-41856,0,0,3ada3c844b80f59e9ae3d36b6d9ea2fc582aae7cd70642ad9bb38d1ef0f68cd7,2024-09-13T09:15:08.907000 -CVE-2024-41857,0,1,18eb26e544512ac7a85d3a84aabcc5c6bdc719da2402fd3705a1c91e30e01499,2024-09-16T13:18:35.007000 +CVE-2024-41857,0,0,18eb26e544512ac7a85d3a84aabcc5c6bdc719da2402fd3705a1c91e30e01499,2024-09-16T13:18:35.007000 CVE-2024-41858,0,0,fc4155e173605a091bf114883179b8d0604e870052e7a0c7c1f11f2b340c3a75,2024-08-14T13:00:37.107000 CVE-2024-41859,0,0,53bf4aeb143d9af2209be69a1a50fd4315b77e19bdf2dd5873464dd453800711,2024-09-13T16:53:51.707000 CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000 @@ -257857,7 +257859,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 -CVE-2024-41867,0,1,0b44a5cfeee3dcc50283505e9313394317205be34bd484508e6768cab06aa764,2024-09-16T13:15:10.550000 +CVE-2024-41867,0,0,0b44a5cfeee3dcc50283505e9313394317205be34bd484508e6768cab06aa764,2024-09-16T13:15:10.550000 CVE-2024-41868,0,0,9ed35570b699495dabec3e139e5a3960675f66b313ebafc76293b6d08d7965ae,2024-09-11T16:26:11.920000 CVE-2024-41869,0,0,2f407549a1d394a9da8aa6ea98d54c4d268ef6c6e721f436fdcf391b141a4e5a,2024-09-13T14:06:04.777000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 @@ -258053,7 +258055,7 @@ CVE-2024-42119,0,0,3b09a70cb81c3688ecf4ef2c0b41ada572909d540512a1efd4ff9fade8603 CVE-2024-4212,0,0,5766e7a6d4fbc74d070c835b010281385271ca336cbd1f30b8212e7da6caf8b5,2024-07-24T20:24:31.537000 CVE-2024-42120,0,0,692318adb3e3bc8ee3327c58f85ce2f0a478d2c89b683bc854fcb9227f9c337f,2024-07-30T13:32:45.943000 CVE-2024-42121,0,0,c5e25bbf3c91bf25bcaa878ff72039e7afac3b1d4b647d19649fd2a0460d64a7,2024-07-30T13:32:45.943000 -CVE-2024-42122,0,1,f1aff74be0c8f2add47447c4fc3e19fab36b7330d7c3102774809c41ed96d349,2024-09-16T13:49:27.837000 +CVE-2024-42122,0,0,f1aff74be0c8f2add47447c4fc3e19fab36b7330d7c3102774809c41ed96d349,2024-09-16T13:49:27.837000 CVE-2024-42123,0,0,b9b512a4ac6ec22c9bc1d525d88b6db6a1f01966b278ee4c7ad03b69a5e85a9c,2024-08-23T14:13:05.580000 CVE-2024-42124,0,0,fac73a1c1853cbd61b92ef3a19f9f7f6792c7fb13275a38cdccfee119802151b,2024-07-30T13:32:45.943000 CVE-2024-42125,0,0,623dede6e7a867ee2a4793db37771abbdecba1b4f67d59179866a3aa7e89529c,2024-07-30T13:32:45.943000 @@ -258063,13 +258065,13 @@ CVE-2024-42128,0,0,b8155b78412ff52ea13f2f9c045e69435a1427918f79cc2d9ffa4f93326cb CVE-2024-42129,0,0,46d5c1746954fb4a02665ba978862f55732f5e2a31e0452c7452c5970d864bc8,2024-07-30T13:32:45.943000 CVE-2024-4213,0,0,4af0c7bd943d1e93f39eb470b6c791f96149e0a985dfe97529e29ee085d7cdf1,2024-05-14T16:11:39.510000 CVE-2024-42130,0,0,c0bf8d6705687d288b22cfe1365e7dce03a7394108689b183e481d0372b856b1,2024-07-30T13:32:45.943000 -CVE-2024-42131,0,1,1fc726640575e0811e1b3c041d4cb29883ebb3d10c99e884209ec11d92467b7b,2024-09-16T13:52:37.707000 +CVE-2024-42131,0,0,1fc726640575e0811e1b3c041d4cb29883ebb3d10c99e884209ec11d92467b7b,2024-09-16T13:52:37.707000 CVE-2024-42132,0,0,2f4d4ac80a7ca69cb3eacfe6d114a16e8e41ad14f4a3bea559c41eac32d31205,2024-07-30T13:32:45.943000 CVE-2024-42133,0,0,774a28cde62878f7ee006cd2f913f8ca89836e6fe0716586b68a30db7f392c96,2024-07-30T13:32:45.943000 CVE-2024-42134,0,0,b964a563fe31ebeed4bd473713e48eeb088a769f2eb83d9ee50ca797235dadc8,2024-07-30T13:32:45.943000 CVE-2024-42135,0,0,95535ff1104be73e170d22a3b1160f93b97e02e7d284b345a7500b690d2a22b4,2024-07-30T13:32:45.943000 -CVE-2024-42136,0,1,f68874d27ec595bdafb89782162fb7e74f20ba1d0a36e1946b5c43cc39f8ab55,2024-09-16T13:54:41.923000 -CVE-2024-42137,0,0,3c90bc025787395b043ed09b34a54ce76c5d6cccd91ce31c0b66777180d70155,2024-07-30T13:32:45.943000 +CVE-2024-42136,0,0,f68874d27ec595bdafb89782162fb7e74f20ba1d0a36e1946b5c43cc39f8ab55,2024-09-16T13:54:41.923000 +CVE-2024-42137,0,1,d9dc53e4e48574f6bb649e181d8cce0d3a34c8911251e0990a394e9026271d92,2024-09-16T14:01:40.513000 CVE-2024-42138,0,0,66bd3f3c0b6409d31b381c30c4907ff7a898b21b08eef89ddd720c05b185a24c,2024-07-30T13:32:45.943000 CVE-2024-42139,0,0,3bd10747b9eb55753638e6583d2c7f6f99447a69b235be4a494e06bae42b0e90,2024-07-30T13:32:45.943000 CVE-2024-4214,0,0,6dc95cb08891bc473beaea6b69701e404acb0b7494c8f630888ffa867e36a2c9,2024-05-17T18:35:35.070000 @@ -258077,7 +258079,7 @@ CVE-2024-42140,0,0,01bd7b3e10b61d76ef609a83e68164ffee7900b194476a019947f3ff57644 CVE-2024-42141,0,0,db183b6c33e94886efc2c75f26bcbef46be70e3efb08ba3376b4b377f728d920,2024-07-30T13:32:45.943000 CVE-2024-42142,0,0,ac8a77e5f376a6960fcc1efb160dcd9b39865732a8e7c6e5248ae7e8814cf081,2024-07-30T13:32:45.943000 CVE-2024-42143,0,0,b791ee8584aad3fab0f6133b2c42055a932f86f21da9efd809060c7844d97c38,2024-08-22T00:15:06.020000 -CVE-2024-42144,0,0,55106b8fef6d768a6ed75bbd805eb9ea037684fd5e26d7ccd42602752abb01fc,2024-07-30T13:32:45.943000 +CVE-2024-42144,0,1,fdef4917faac4f0584df9375a1dd443052864c30de1a0df62c280c4f870fc119,2024-09-16T14:12:56.537000 CVE-2024-42145,0,0,a448e3c1383099fefdc00f942a6c3fb1a7a8eacac6267abd9d8600f8c195e000,2024-07-30T13:32:45.943000 CVE-2024-42146,0,0,5965ab1472d6386a707c678e04edf7b1fc9b55dd002222344e4b70614b23a1bb,2024-07-30T13:32:45.943000 CVE-2024-42147,0,0,e2fd4695f400d20f040989dbb1fd9b7b08c61afb65d2c6bfd95fc31d8cbb9fd3,2024-07-30T13:32:45.943000 @@ -258287,7 +258289,7 @@ CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-42423,0,0,9be689ed95046788e4eb99dbddb3b526d12d6f7f55f4a05e862251171d393e0c,2024-09-10T15:50:47.237000 CVE-2024-42424,0,0,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000 -CVE-2024-42425,0,0,1d46ccb82d399bedf93cec847f919ac9e9a888e62b5b8964a023fad0d35c288f,2024-09-10T12:09:50.377000 +CVE-2024-42425,0,1,6aa2353bd532f46d0a2e205868494bbec291e24ba1bbc1fc9f37a272eab1bd0b,2024-09-16T15:46:03.110000 CVE-2024-42427,0,0,797fec3f43dde9bef9764402c828d38ab5282805ee2c08e5a3c6c940ac6a4735,2024-09-10T12:09:50.377000 CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000 CVE-2024-42434,0,0,e55ec0343b5bf13510bf079266ea96be4a27a72a2b479971039dc705ceccc43c,2024-09-04T21:35:50.963000 @@ -258319,7 +258321,7 @@ CVE-2024-42470,0,0,2551589b1228b4a193f06647a431e38919ef03a66b4d8da3d720aed70dc94 CVE-2024-42471,0,0,6f780d29fd10d2cfd52fece487eaa99e86e081a58f146bb8fc344f7c7f56f9f6,2024-09-03T12:59:02.453000 CVE-2024-42472,0,0,7ab57564efdc72933310d3a5f9856c0205ef1bb0a8b6f4b7c4270b076011eb97,2024-08-19T13:00:23.117000 CVE-2024-42473,0,0,4c7c671ee00009c6a5c03d538a956eb7febcd1530231ce4a9c79893c5aea342c,2024-08-12T13:41:36.517000 -CVE-2024-42474,0,0,8bdabf0a099aefc7c5946b1cf60e652841fbf036714db582cc2880ddd6217050,2024-08-12T18:57:17.383000 +CVE-2024-42474,0,1,48f6cde78461c6ba9ace4e05f6633b0cf67ce0623fdc49b099c25bbc541fd023,2024-09-16T14:30:13.683000 CVE-2024-42475,0,0,0bea3f4f89f8bc03bac4d639b5f5fdd2b60e43250279ee60d6b04aa71867108c,2024-08-19T13:00:23.117000 CVE-2024-42476,0,0,f1465443e6b3e51dab23ffd8341536a4d0a88fd0eab640af90824ca752825643,2024-08-19T13:00:23.117000 CVE-2024-42477,0,0,fcae5018af2bef05676d648639d61eec426950973c911608bb1d16f397cf37dd,2024-08-15T14:02:23.130000 @@ -259113,16 +259115,16 @@ CVE-2024-4401,0,0,48f8e641129f81284635fb93c6fe88c5c5fc547b585fa75e650b46a3bc3c0b CVE-2024-4403,0,0,07b387e13ed3d47c920433d5f499100d4d5e53ffefe1712d98753a4da5408fe2,2024-06-10T18:06:22.600000 CVE-2024-4404,0,0,3ae3ea086edb9bd484931090d5df4b9ee138a4bfd155faf3c535f115da6a15de,2024-06-17T12:42:04.623000 CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000 -CVE-2024-44053,0,0,5e074093c8a83d5b8131bc3d4f2079a0f8e3b0989e822366d3e11964243746e7,2024-09-15T09:15:02.013000 -CVE-2024-44054,0,0,5b33cacdf53e2936c71fb462e9af31b57726285303037a6f5e1c3ebffe1f54c2,2024-09-15T09:15:02.290000 -CVE-2024-44056,0,0,36802a51a1f141563f7ae2ec10595be0015cdd15e5bba88bceddaf65752682ba,2024-09-15T09:15:02.800000 -CVE-2024-44057,0,0,857b861e7d299092a8eee5852b3c381c958661ccc50f472ae205e3d0045f6273,2024-09-15T09:15:03.270000 -CVE-2024-44058,0,0,431ed220de913710e4f04a7c10d35ccbeceaf08dbac3a3de71029ec7f9f9f3d5,2024-09-15T09:15:03.883000 -CVE-2024-44059,0,0,71f7db7650b1dc6a337bbf53f26c4bad6ea712583035cade612aa7600468f790,2024-09-15T09:15:04.613000 +CVE-2024-44053,0,1,83d8923ba60cf9279e6750cc431daaab1e1e350d146e3f688dad663630566e4b,2024-09-16T15:30:28.733000 +CVE-2024-44054,0,1,aac6ee4842c7130587f73f4ed7c6e96f84a7c00d827a149adaa8654efd7c1333,2024-09-16T15:30:28.733000 +CVE-2024-44056,0,1,c99585cd0dcda5c81c68a8c27fe2576a5ab4d77342f1c34b32b44751c11dcc8b,2024-09-16T15:30:28.733000 +CVE-2024-44057,0,1,775a389657d70a0c74eebdbd9e867c020ef98ff62ba53a65d8d1505d919efc47,2024-09-16T15:30:28.733000 +CVE-2024-44058,0,1,7bc40a58c7e5b85b3546c550977b986b287ab259ed2d2a0f82947ed3d1198ce8,2024-09-16T15:30:28.733000 +CVE-2024-44059,0,1,e50caa564eb7444d516ed124abb6d0fea18607494c8e74465e2dd01a1df7712d,2024-09-16T15:30:28.733000 CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000 -CVE-2024-44060,0,0,7b8ed16da225ee3029be54091c9ae12a145fad43d62c91fa6f35db279aa36327,2024-09-15T08:15:11.367000 -CVE-2024-44062,0,0,1644938a0273933f0faedd2cf5d72e06b6802cec154810df682c483da3d0df3c,2024-09-15T08:15:12.710000 -CVE-2024-44063,0,0,345a218a7ef7a40ba13b180d84bc880cce7e5c93decfb3e39bbb7c8786febf07,2024-09-15T08:15:12.940000 +CVE-2024-44060,0,1,ea289f0bdc9789c9ec67d1508aa08afeb9f803f52099e34e6af184526da44eb7,2024-09-16T15:30:28.733000 +CVE-2024-44062,0,1,14538aba5f6d0cee1fffe23d891617a033aae9a8c2411d6855777f0a1a7aba3c,2024-09-16T15:30:28.733000 +CVE-2024-44063,0,1,d642b3fb89950affe44ef0b88153cbec24d22c27c53a8da8ab9d205a291c0668,2024-09-16T15:30:28.733000 CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000 CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000 CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000 @@ -259134,11 +259136,11 @@ CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed01193 CVE-2024-44085,0,0,388300037fdfaaf78c002cc7963ec532b366316a773d7512847e1899154e3e1a,2024-09-10T15:35:08.883000 CVE-2024-44087,0,0,9347ed429cee1548d21348e65950e40f41756fec3dfb3e096ea0331b40b59ec8,2024-09-10T12:09:50.377000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 -CVE-2024-44092,0,0,abefe3ecb298b06cec705419c0fee8dfd469d0a21e14809dc10a94b310792b04,2024-09-14T11:47:14.677000 -CVE-2024-44093,0,0,25be191e038a6782f0b89b45906180a95b54605ef88dae93bfde18c5c71dc7c3,2024-09-14T11:47:14.677000 -CVE-2024-44094,0,0,e79d3b91a6f420132409abe12aa77e89aa9139d1ff8858ba112d7e7aa15a343f,2024-09-14T11:47:14.677000 -CVE-2024-44095,0,0,cd23c253808827c72b1a57c5bc8c03fc6d593b4c32f6a0dd2c722f414ccd703c,2024-09-14T11:47:14.677000 -CVE-2024-44096,0,0,7d1787538655fdd97755e42d682814bd89946eeb76c951eb9b33fc718952753e,2024-09-14T11:47:14.677000 +CVE-2024-44092,0,1,09fca4cb757bfcf8d25ba68ef5c55519657e7dae25eff34e82f0da68c5f3634d,2024-09-16T15:35:15.640000 +CVE-2024-44093,0,1,1eb27dd8570fc8457dab38189c5948287c3634f51f2b35629ccf5d15db192cae,2024-09-16T15:35:16.687000 +CVE-2024-44094,0,1,c4cb7bbc844fdad82794fe52790a9896424e19492dbfa6eac7e907f6559bbbf0,2024-09-16T15:35:17.793000 +CVE-2024-44095,0,1,ba86be719c7dc6c01e18c3eaee3ff265693c0288b6f73044e8116b3b1f8df619,2024-09-16T15:35:18.860000 +CVE-2024-44096,0,1,270173b3b4b9d141dedee3cc137073b4e1d207a3857785ad64fc358ab1be42b4,2024-09-16T15:35:19.900000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-44103,0,0,403f28363473fe16513a32f4bbf3e3e9147062f1518a63808c0d4d4119c7e973,2024-09-11T16:26:11.920000 CVE-2024-44104,0,0,e8fd670a684426b8559a3a5d3eab3a06a900216e6d9ef789bdb8ae5bbf1f43cd,2024-09-11T16:26:11.920000 @@ -259146,9 +259148,9 @@ CVE-2024-44105,0,0,732efd8b7b918ab23d0e2a071a94c93fdba681f2365382a534af5bafc6e77 CVE-2024-44106,0,0,3c50b4b5c0e6d1f0435f895c3826f50e9a92d18d859ecefef1e7c93db6dccb98,2024-09-11T16:26:11.920000 CVE-2024-44107,0,0,644000594cec0b1adbbf9e9faad5bbcf891d9610a285582e61915e4d6806c350,2024-09-11T16:26:11.920000 CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000 -CVE-2024-44112,0,0,f15a10602e0c0c796fffe027dd145f48e9b1463e749de2890053833fdaac729c,2024-09-10T12:09:50.377000 +CVE-2024-44112,0,1,0b8bf5761fae1061c83dd7332f5b3027481f791877934ad1d55322c5110d025b,2024-09-16T14:19:24.917000 CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000 -CVE-2024-44114,0,0,876cd3b85f1015c3fe2832f6bca2c8bd3ee022a7c32d51da3fd12e97313a1eec,2024-09-10T12:09:50.377000 +CVE-2024-44114,0,1,e71ec68d461cf2cf2e20a4b8b8ef302465dd6c421d7e2af13fcf9594cce3daf1,2024-09-16T14:09:10.170000 CVE-2024-44115,0,0,2a30ea5add688d45659eca100982c864d46c6ddd00dc5e9bc49831df26f18590,2024-09-10T12:09:50.377000 CVE-2024-44116,0,0,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea479,2024-09-10T12:09:50.377000 CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000 @@ -259200,7 +259202,7 @@ CVE-2024-44410,0,0,6c57a9bf372d97a29932dc411b42421130ab7221dd0f704bdc840e2d9eac4 CVE-2024-44411,0,0,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000 -CVE-2024-44430,0,0,e9e87a445c7552f27b2d83fb7769e9fda6ddfc643fb0090e0996b479bf37ad56,2024-09-14T11:47:14.677000 +CVE-2024-44430,0,1,8dbed207b30dda337ab5a47dac910dd3a5a0d86355eb69a9a4785128c125676c,2024-09-16T15:35:20.943000 CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000 CVE-2024-4445,0,0,bc137eb49d08335d8d2b32a3f413016c50b301d09f6a742095c80df385aba82a,2024-05-14T19:17:55.627000 CVE-2024-44459,0,0,646e015846a31dd77dd1ad9e5c770b3f779de913d0dc0cf137943e30d1b641ad,2024-09-12T21:34:55.633000 @@ -259284,7 +259286,7 @@ CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239 CVE-2024-44795,0,0,2459dd83721718e1502976fd61ac15b289981ba6005e92e7c41d33d2e6b740f8,2024-09-05T18:26:41.490000 CVE-2024-44796,0,0,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d3eb,2024-09-06T23:35:04.340000 CVE-2024-44797,0,0,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000 -CVE-2024-44798,0,1,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000 +CVE-2024-44798,0,0,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000 CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000 CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000 CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000 @@ -259400,7 +259402,7 @@ CVE-2024-44992,0,0,97ef2dd55e50d283d25cb375a53b1b9e4ced48005c60f251c68cb5bcbe063 CVE-2024-44993,0,0,83c20e8055b5f920fb8768cd48edd51dee49d28189ff000654e3b9aceca5b744,2024-09-06T16:28:49.180000 CVE-2024-44994,0,0,077657e93a1c5153a567e0a622109d3f9d5a912137e3785d416b4a628cffcce8,2024-09-05T12:53:21.110000 CVE-2024-44995,0,0,197459857248206995b34d4054170be94eac94a6c36641a79619b26d39e0858c,2024-09-15T18:15:34.540000 -CVE-2024-44996,0,1,e18967c4ab698ef45683375a8ae0d2c16fa28828098e111c232677530888b1a3,2024-09-16T12:21:47.370000 +CVE-2024-44996,0,0,e18967c4ab698ef45683375a8ae0d2c16fa28828098e111c232677530888b1a3,2024-09-16T12:21:47.370000 CVE-2024-44997,0,0,e3f86ed864785c36fda99f43974c4da9bece309546ba3123a45070f74f032602,2024-09-06T16:28:25.183000 CVE-2024-44998,0,0,40b25cb37bb885401e69911af67b231d0343f60d965743732a0c70cf3b146611,2024-09-06T16:28:16 CVE-2024-44999,0,0,e380bf728dfa26ece10d7874c8b05bc3764e80af89ddf0e41877fbdc49e455a1,2024-09-06T16:27:51.890000 @@ -259526,7 +259528,7 @@ CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96 CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 -CVE-2024-45203,0,1,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000 +CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 @@ -259632,13 +259634,13 @@ CVE-2024-45448,0,0,baaac6177753b9ef1526bea7e39de3dc043a4ca1913a07543e6e5e11685c2 CVE-2024-45449,0,0,16fcc8f3add1fcba18b36fc04f0c4a19c97d176cb514abd9722e7bafd45dc227,2024-09-06T14:38:08.067000 CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000 CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000 -CVE-2024-45455,0,0,b4cf4fde6876b53f4e7fab33b129eab1ab20c61d4bbe2f8cdba2416abce11d35,2024-09-15T08:15:13.150000 -CVE-2024-45456,0,0,081c1a09c229ea27d066d82a17ffbfa6a4152d86ca7e79f1bf4c1f8f6c724fce,2024-09-15T08:15:13.350000 -CVE-2024-45457,0,0,ca78a7432951c5dc247ffc0d181692d008e90d64444293988a110264323b267f,2024-09-15T08:15:13.547000 -CVE-2024-45458,0,0,6d88def5c36012ecdf6b48989da8064b23c7d4b35513c96f45ebc7124752eb2c,2024-09-15T08:15:13.763000 -CVE-2024-45459,0,0,ca234fa487f89818483abf850b9dabb20e2d2562a2007dcbb1b042aafb9ffa04,2024-09-15T08:15:13.963000 +CVE-2024-45455,0,1,2252ed0190aceaaf231db9e13c20002f9f0347dbc9cd3d6637ac9295250f3d43,2024-09-16T15:30:28.733000 +CVE-2024-45456,0,1,f24597a7e3d48154883583103775982966f08c6eeafb8e5ace41268c1fcf3230,2024-09-16T15:30:28.733000 +CVE-2024-45457,0,1,56f051ff4ecd4b6bed95d9151f6e0b39eb3d323739c8a3289fa8218221d2fc6c,2024-09-16T15:30:28.733000 +CVE-2024-45458,0,1,40cddece72fc94745b6e482a4da9ccb4b2ab5ddfcc0bf5466a7b36c8f5eb9014,2024-09-16T15:30:28.733000 +CVE-2024-45459,0,1,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000 CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 -CVE-2024-45460,0,0,87156fe69c7ba5be2401d5a4a8dca1dc6bd17b02e5e00b518fd9dc1bd705e762,2024-09-15T08:15:14.173000 +CVE-2024-45460,0,1,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000 CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000 CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000 CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 @@ -259700,11 +259702,11 @@ CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000 CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000 -CVE-2024-45694,0,0,fdf50bedf85dfd7c329e2113e0eab2dc3479f8d144604d4e96a7faa3724b1872,2024-09-16T07:15:02.610000 -CVE-2024-45695,0,0,b6ea8aa477990f51cfee04e0c410cb4d2d2e5ace1ac5ab660419ac599b610896,2024-09-16T07:15:02.840000 -CVE-2024-45696,0,0,cc27c7e8125105554d04b64c6be484f3f8a43094ec08a3df7149d321b92c8ac9,2024-09-16T07:15:03.037000 -CVE-2024-45697,0,0,d1e3c92c2f47124484eb2542eeea7fbe5c15f6bb15de522b223afe26b16f6da1,2024-09-16T07:15:03.233000 -CVE-2024-45698,0,0,020730ad5b70d3f39fc1879453bd3344bdde9181949defe10caf57e7824e8948,2024-09-16T07:15:03.450000 +CVE-2024-45694,0,1,9f63c955d9eee17cfd885195e14116e36025ed1f0991533969507e0e3d5313d4,2024-09-16T15:30:28.733000 +CVE-2024-45695,0,1,0fed936d57bad0d3608cf8910a4738d455159426e77f4777679ccbdfeb3fe9c7,2024-09-16T15:30:28.733000 +CVE-2024-45696,0,1,b551b9e5a33d60ee884b352cc58e0de6e4358b9a2aa8ac71cf9d81795dbc0d1d,2024-09-16T15:30:28.733000 +CVE-2024-45697,0,1,b061a52d423d0f158415b239b7e20000a7f8fedec2e7f4abb8775b53aaeae721,2024-09-16T15:30:28.733000 +CVE-2024-45698,0,1,a981e18179a6b778934544cccfd9a0e75be9eb8d89acdc683c6a6d70ffb7ea78,2024-09-16T15:30:28.733000 CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 @@ -259730,7 +259732,8 @@ CVE-2024-45824,0,0,10e16d904d2154d7119c6df05a22810044cd3b50093fd71dfd8bbe566411a CVE-2024-45825,0,0,81d9bafced86b66b9863b3089f947fa7d29945bdd853fc6cf1fa25af5ba141fd,2024-09-12T18:14:03.913000 CVE-2024-45826,0,0,2e4e2e814a3243265b525b00673b6c60dcd0fbc595ddf4750ccbec98256c5a1a,2024-09-12T18:14:03.913000 CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000 -CVE-2024-45833,0,0,58f426f87615b2d0bffb5b167f02de2928af1eda1d8e3d045d5c863111af38e6,2024-09-16T07:15:03.663000 +CVE-2024-45833,0,1,3e753f3ed5f0d6412e89cc3a7021289c2d56c7eb3087ae5d082e252871f67c3d,2024-09-16T15:30:28.733000 +CVE-2024-45835,1,1,de2ba4efd362dbe01c60364a7d5a320b3f0cc454b0be7f97455e74667e287668,2024-09-16T15:30:28.733000 CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000 CVE-2024-45845,0,0,b549a9e321160df47bcb67d5d4737d4567fe304513c57d25b052b060dcd0ae25,2024-09-12T20:15:05.273000 CVE-2024-45846,0,0,0c9236fda473a888e684bb4963bb6a42bcdd45891a616de6896a1cfa53bbd8e0,2024-09-12T18:14:03.913000 @@ -259791,7 +259794,7 @@ CVE-2024-4623,0,0,c53a127683caa8cc49c11a88cc217ef787af901116f1ba89c4741730eb1cc9 CVE-2024-4624,0,0,8d5df292e17ba086eddadcbafacc529f2ebc3c5e49d7b6ea9488db217d327898,2024-05-14T19:17:55.627000 CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000 CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000 -CVE-2024-4629,0,0,2b60dd01cb9808bc30568cc7bd7fed85c03b82d3742fd80a9e7b4546151ed50d,2024-09-09T19:15:13.760000 +CVE-2024-4629,0,1,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 @@ -259803,12 +259806,13 @@ CVE-2024-4638,0,0,a819fdfba96fa18a2f7909a394b6447b878ef2488f2357c7db7b0cfcaa9db7 CVE-2024-4639,0,0,94440a0f589feefd6793182562f7b7ad1826370c3af8edc8bb387cc054e89035,2024-06-25T12:24:17.873000 CVE-2024-4640,0,0,ede9dd193cee950797dd9845264350c5c8b26092d45c659f033f0e3467a4741b,2024-06-25T12:24:17.873000 CVE-2024-4641,0,0,26f5ee90dac1a00dab85ac22bc0a097907866fe1e7f2d9d37bb83633d14c8f26,2024-06-25T12:24:17.873000 +CVE-2024-46419,1,1,888794ee904f3104412c9bf1fee2e43ca00ae79544289ac516ae3894f55cb6f4,2024-09-16T15:30:28.733000 CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000 -CVE-2024-46424,1,1,907ef71c5244e7673fae5edc0d546987dcfb708da5efe075f853d18a45970811,2024-09-16T13:15:10.760000 +CVE-2024-46424,0,1,b98e4602856445464a618cda42c4f847ed436b2d3db357fb81fd34ea757eeb61,2024-09-16T15:30:28.733000 CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000 CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000 CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000 -CVE-2024-46451,1,1,69fcf155081fec84c2cb791f98ea5b6a7a26f93aa2823ae554f1daf912c3b8d1,2024-09-16T13:15:10.847000 +CVE-2024-46451,0,1,9ecd061d3d61bdc87954d994b4cb4f0fc51482e1aacc7f20cdb642dbaf669442,2024-09-16T15:30:28.733000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000 @@ -259891,17 +259895,17 @@ CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c8910 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 -CVE-2024-46918,0,0,c81638d5ca63c19490f644512349dd49baf06add9619db431c68631e601d23e2,2024-09-15T20:15:02.390000 +CVE-2024-46918,0,1,b58cecdfc136d32dc060d03236fc5b3dc1aea0c287dc327557974ff37e1cc2ee,2024-09-16T15:30:28.733000 CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000 -CVE-2024-46937,1,1,f786d5e6cfd5a802574fdc6689e931ed489fd73bd9627aef4e1a74ed889f1ecb,2024-09-16T13:15:10.917000 -CVE-2024-46938,0,0,a5c9e90ab7d92d7718c097193345a29e65c16e9e9d7ee02386aee1371e9ab85a,2024-09-15T22:15:09.830000 -CVE-2024-46942,0,0,6b93d00b6dfeb694fcbe84011b71090f470c3492de64daa71f84a4174e08c3a6,2024-09-15T23:15:11.033000 -CVE-2024-46943,0,0,6c5e76688d51eaeb0396635653b39855a3726df8877ff6ebb136df51868058d7,2024-09-15T23:15:11.100000 +CVE-2024-46937,0,1,58a14fd7bc28ddfb9593cc06cfc9cd5a1b99f501227233054c62c9639e59cb02,2024-09-16T15:30:28.733000 +CVE-2024-46938,0,1,f95ae44ad47f484888d90ee488e8dd7c21e9b843dd62419e672aefebb7e3d0b8,2024-09-16T15:30:28.733000 +CVE-2024-46942,0,1,ada259456d1e859d4f8a5da3e6e05773a9856271ebf7fa3ffae8d46281fd1efb,2024-09-16T15:30:28.733000 +CVE-2024-46943,0,1,d149935960433b690f6217da0e9b6b30830bdc7f802ad3c5ef042a3ba76d7519,2024-09-16T15:30:28.733000 CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000 -CVE-2024-46958,0,0,5bb8b70f9a3b2dac1a28577291e993242e94ab2fc386c8a78850212ad85cb736,2024-09-16T02:15:01.803000 +CVE-2024-46958,0,1,55b6c34933d7f404734afe78f6fca5f500d88d2d153f0079c17dd51e529b774d,2024-09-16T15:30:28.733000 CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000 CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000 -CVE-2024-46970,0,0,2a93e963cca84374e55ab3a313f44cb6c17fec19660891300ea157f8ba006f3c,2024-09-16T11:15:13.540000 +CVE-2024-46970,0,1,850e1f9bd88ec99bda9e7fcbc1327358ebf0bb50f2ce23e44dc920d53302143a,2024-09-16T15:30:28.733000 CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000 CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000 CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000 @@ -261026,8 +261030,8 @@ CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018 CVE-2024-5984,0,0,89f42ffe1afdcb4773f46da639d99adec4fd2f40289999f555344358fcd06ab2,2024-07-24T02:37:30.717000 CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000 CVE-2024-5987,0,0,80b95041335e9c6c0cba79b97b2237a77b412b6b9e4ce7d678d97adc1c3af521,2024-08-29T13:25:27.537000 -CVE-2024-5988,0,1,7d5e21f2246cb887caea04ab5932ae9084dbb2197bf94e4f89acc00a5f33cee9,2024-09-16T12:07:20.767000 -CVE-2024-5989,0,1,dfd3cc5d0cecb773f338d5d550b90f0da986feaa9901700c9172dabb85cfbdc0,2024-09-16T12:08:03.447000 +CVE-2024-5988,0,0,7d5e21f2246cb887caea04ab5932ae9084dbb2197bf94e4f89acc00a5f33cee9,2024-09-16T12:07:20.767000 +CVE-2024-5989,0,0,dfd3cc5d0cecb773f338d5d550b90f0da986feaa9901700c9172dabb85cfbdc0,2024-09-16T12:08:03.447000 CVE-2024-5990,0,0,74b820888dc43d4b3514a3bc2da36badf33f6d5fcb5914b2d81537c9a36b892f,2024-09-16T11:58:38.363000 CVE-2024-5991,0,0,fe91480125318e1887501309371643eaea8c60c621bd042cca787c9779dab434,2024-09-06T22:51:41.470000 CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000 @@ -261079,7 +261083,7 @@ CVE-2024-6046,0,0,7dad2a883b5a6da9c2e106a85fbceea037db3e317153d640ef723443f1cc06 CVE-2024-6047,0,0,85682382a3873811b400f354140b032b3237064163e98177d5be59d88a26c9c1,2024-08-01T22:15:39.020000 CVE-2024-6048,0,0,c67416098261daba4fbb7cd933140c3939f890be764cfd8ea2022f29e8208654,2024-06-17T12:42:04.623000 CVE-2024-6050,0,0,977e3c1d954bb2d407afb4f807be75a02157bd9cd72111a32e132ff13e7f9262,2024-08-15T17:21:21.920000 -CVE-2024-6052,0,0,38b34f27bf68c4c46450287788affa9aba60ae6b039318e5898c7b1f92d4d920,2024-08-27T17:56:02.507000 +CVE-2024-6052,0,1,32d564c18d4d17b199f574c28ffe31c1fb3d7a1b6f6859f56e252f37a5a22c28,2024-09-16T14:15:13.410000 CVE-2024-6053,0,0,226eb004e7bfd929ad1fc5388c461b150fc9ef16d91859acf68ef89f963d1b16,2024-08-29T13:25:27.537000 CVE-2024-6054,0,0,dbd3e49036b5938301871d5a6c67ee17ba89370e3288082b00ca89a51a1f06ed,2024-06-28T13:11:58.810000 CVE-2024-6055,0,0,69ea90ebaa7aa8fe33baa786beceb3ec128eecc80f960a60b64b4cba1327c031,2024-06-20T12:44:22.977000 @@ -261108,7 +261112,7 @@ CVE-2024-6078,0,0,a48aa92a89b3d2f828f8a341ad2ce6a914a21f3587846f530cf16dc8ed30ed CVE-2024-6079,0,0,a625435aeb66a78a45b154461c249f77137a161767aad8b8e49464f09120384a,2024-08-14T02:07:05.410000 CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000 CVE-2024-6082,0,0,013046d87182f03b6cbc3b5958c2d5ce3b9ca55b4984041383e50b43bd3564b5,2024-09-13T18:29:30.637000 -CVE-2024-6083,0,1,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5c9,2024-09-16T13:21:53.467000 +CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5c9,2024-09-16T13:21:53.467000 CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000 CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000 CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000 @@ -261383,6 +261387,7 @@ CVE-2024-6395,0,0,1966cf71699330f1b667831d53a0cb914c964c7509fe8ae4316297f8fa4eb9 CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000 CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000 CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000 +CVE-2024-6401,1,1,fa456b2019a7777fd8925c5cdb042b2ab101578127039e040c74673bdb8b6a4f,2024-09-16T15:30:28.733000 CVE-2024-6402,0,0,2dbb843b8ac3a7858f42e0a7205d0fe42cc4e1a6d0db6e5033a007b00a2a1ef3,2024-08-30T21:08:54.327000 CVE-2024-6403,0,0,9d6874f85ed8785db48c417cc57cf1b425db80cf3f43ac931de3a37049d75945,2024-08-30T21:08:04.557000 CVE-2024-6405,0,0,2f2aaf52bab49b757e1ad90b974deb9c303ecc0ebed2850b0a99dd7bdb5e4a9a,2024-08-20T14:00:07.663000 @@ -261442,7 +261447,7 @@ CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e258 CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000 CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000 CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000 -CVE-2024-6482,0,0,7d896b5aeb6a93873005c39543329631917bac06a8791a54c6832ab9fe4d1ee8,2024-09-14T13:15:10.343000 +CVE-2024-6482,0,1,02a5c72338d7b593c96688068ac62e9297d5755ba7bd2dc725e5fe26827953d3,2024-09-16T15:30:28.733000 CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000 CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000 CVE-2024-6487,0,0,ade8feb977b02299075dd869ca65fb48f198290ee8a478009ada36ae91b54213,2024-08-01T14:00:24 @@ -261888,8 +261893,10 @@ CVE-2024-7091,0,0,068f40b9775b7a1af5c1f8fd253806f6c329a370c68d78b52ba455d7a8a573 CVE-2024-7092,0,0,e9e7e1c22eeddb38238cff178e26d1e84cd16a1ecd7c31190a29d77a32325d08,2024-08-13T12:58:25.437000 CVE-2024-7093,0,0,2af97c55d7ffe283d233de8149da5391663d6c7f2b6f21acff51e16815034b7f,2024-08-02T12:59:43.990000 CVE-2024-7094,0,0,d8ce6991dc787cf1fc8f383d7f348b0cc8c833a282f09c60355b50a58a302aa6,2024-08-13T12:58:25.437000 +CVE-2024-7098,1,1,a93526b59e48f1c9d7d00b400dbe445ffea55329b618e01f5b4252f1c31b6823,2024-09-16T15:30:28.733000 CVE-2024-7100,0,0,dcfec02e0ae4a6f64f97ae0297c66dfbc0aebe11e663bfc596e9b5b147ad741e,2024-07-30T13:32:45.943000 CVE-2024-7101,0,0,5454c1208509de59c11b3527ed3914e0b9b453785a2425c8a2e412da33d0d539,2024-07-26T12:38:41.683000 +CVE-2024-7104,1,1,c3157591d418ca3708a69a7dda65c912659e14b02d0f241d2ff0e596546ebc54,2024-09-16T15:30:28.733000 CVE-2024-7105,0,0,46f1c8544843abdf42260f92967cf768f61b8f943bd2d80ab65735c61cbf36f4,2024-09-11T14:15:33.063000 CVE-2024-7106,0,0,ff3ffd817a427576052bad31a6af61e50bfb0473d392446ac87a1106350f920d,2024-08-13T14:15:31.030000 CVE-2024-7110,0,0,a4d256798386bbcae63cc631884c30e79e65250cc4557b1041a9bd821ab24cc0,2024-09-11T16:52:37.847000 @@ -262342,7 +262349,7 @@ CVE-2024-7694,0,0,915a620e49de11e538187b87ae1859b4dd8b81a9c117898d10d07c783b69fb CVE-2024-7697,0,0,56fc87c2b950fc0d4b7d08c76bcec1377c688ea98c921a8e581bb6c082412bb3,2024-09-06T18:04:28.030000 CVE-2024-7698,0,0,f3712135d1df79d7e27fa4c4c6104096ee019b8d2b0cd61845488f2835ff9eeb,2024-09-10T12:09:50.377000 CVE-2024-7699,0,0,72b06587f38ad074e1e172a76007dca55e0aae951fcc370c220f50ce7ab480fe,2024-09-10T12:09:50.377000 -CVE-2024-7700,0,0,3e081f65a743f7c2243d16cda14609415c7128fbdf01790b4350a9589b48c796,2024-08-12T18:57:17.383000 +CVE-2024-7700,0,1,35ccbcc6c9987f858b077e015d668845c4772768b7fa013291f6195b76e0abe5,2024-09-16T14:20:21.087000 CVE-2024-7702,0,0,35104b2d835bcff771d3508b754ac4f00b960fb6fd0cdfa84ab47a794def21ca,2024-08-26T18:15:46.870000 CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000 CVE-2024-7704,0,0,e58413fccd16c05c85207978d3387c57f50b93fb7a427c48c6f401c695307c8f,2024-08-13T12:58:25.437000 @@ -262647,7 +262654,7 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000 -CVE-2024-8190,0,1,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000 +CVE-2024-8190,0,0,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000 CVE-2024-8191,0,0,af2edabb2340196237a0a5f2ba571c0c8b12c14869cbef7778e55b204fc2e4fe,2024-09-12T21:50:39.507000 CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000 CVE-2024-8194,0,0,0e377807b4cb936d43f2e66a722c2d573026df321eb087fd34789423400e78c7,2024-08-30T16:34:53.210000 @@ -262832,7 +262839,7 @@ CVE-2024-8564,0,0,2112c36914e39f842fdc3749656e81cb1e01d81d9daf6872738042abc963e7 CVE-2024-8565,0,0,923e87f30584d77b1eb045cc17fb206bfc48a80ad2f8f1ccf84c8acb9bd2c037,2024-09-10T15:40:31.103000 CVE-2024-8566,0,0,b697d2f2d8dab369399702d62c565693e4b82d2b91e05adb154f01cb1c8382ab,2024-09-10T15:42:03.630000 CVE-2024-8567,0,0,49659b49a666f0018bb5744af39b0142ede6c7f436b35449bf81fb3596426b7c,2024-09-10T15:44:31.283000 -CVE-2024-8568,0,1,b74d62474c16c5c803159e182361ae52db782b717cfac5a6615da66c435f9a25,2024-09-16T13:22:31.087000 +CVE-2024-8568,0,0,b74d62474c16c5c803159e182361ae52db782b717cfac5a6615da66c435f9a25,2024-09-16T13:22:31.087000 CVE-2024-8569,0,0,aaed184af7e4134cfe1a8ea6b899c2f66a4c7610f73679d8a682587becf0ed8f,2024-09-10T15:45:24.237000 CVE-2024-8570,0,0,bc68640c6c75a567a3dc53e9637ef970c70443205716d3966201c32a94304c8e,2024-09-11T16:07:35.400000 CVE-2024-8571,0,0,5cce23306b6ec0516f16b428475d85317f6d2cd8394be676570b33092f0a1f8e,2024-09-11T16:05:34.220000 @@ -262849,7 +262856,7 @@ CVE-2024-8582,0,0,929f6a4eccde08c2101d65daf5f8492ec1f09acd5b572ce0e385ece7e31d53 CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a570641936171,2024-09-10T15:49:29.103000 CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000 CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000 -CVE-2024-8586,0,1,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000 +CVE-2024-8586,0,0,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000 CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000 CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000 CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000 @@ -262907,23 +262914,23 @@ CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f99 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000 CVE-2024-8775,0,0,fcca86ce876772170d6581789978acb0ae0c53951dd659594245568535621773,2024-09-14T11:47:14.677000 -CVE-2024-8776,0,0,966243269f514f524d6e549fdfd92cb9bf1a46f93b92c5d8a6a9d2c7f1bbf5b1,2024-09-16T06:15:11.023000 -CVE-2024-8777,0,0,e50c6747b0717e48b8e9692b1702d7664b40d78334641c89f8f0096e17245e29,2024-09-16T06:15:11.483000 -CVE-2024-8778,0,0,1cb41ce51822048acf844b823ca3bbf0714a24a1232f49d8107341030497d9d2,2024-09-16T06:15:11.777000 -CVE-2024-8779,0,0,958f3bbe0cdc9617d0656aebe8d2b94df0b5200e604d190d7a910ffee391f6b5,2024-09-16T06:15:12.063000 -CVE-2024-8780,0,0,997ccb5bcbcfc88c57934de10c1c9f2fc891ad2481d539c008c777cab674e53e,2024-09-16T06:15:12.360000 +CVE-2024-8776,0,1,d6542dd836edb3a7b0373fa55ea55b6588d00dc2d460f1bba77ff0b778a4f882,2024-09-16T15:30:28.733000 +CVE-2024-8777,0,1,34a835ea08030c4a5a9203e5f6cc8fd8352bd723c399e4db5ce1a16dac92eb5c,2024-09-16T15:30:28.733000 +CVE-2024-8778,0,1,0d58fd097d2cc28bd3d4b4c7283e1fcc9fa1000d69632e9ebf04ab6745434089,2024-09-16T15:30:28.733000 +CVE-2024-8779,0,1,868876da06c1dd99fb3835e6ef3142324b5ca75e548cc9725cabfeb220061d7a,2024-09-16T15:30:28.733000 +CVE-2024-8780,0,1,bd4bd08e2eb72cc17a88ed55f562faebe92fedded2e0fdee3ed50b9263d53a31,2024-09-16T15:30:28.733000 CVE-2024-8782,0,0,07c3a16b8681c9ebf93d105d5b076fbef190c05e8d1e936ffaeb395d86382ca2,2024-09-14T11:47:14.677000 CVE-2024-8783,0,0,289128ea1a51112e2b32da270994bcc7b30231f341b1d787ba1fce34d4218f29,2024-09-14T11:47:14.677000 CVE-2024-8784,0,0,598c58979dfe2b73f976c6898315c02c460b4985a94e2fab78e11f95eb647e6e,2024-09-14T11:47:14.677000 CVE-2024-8797,0,0,b7273f8d72c4c7b82a815cc8357933cfcef5a0b838634eab59479c200615300b,2024-09-14T11:47:14.677000 -CVE-2024-8862,0,0,ec2b207d96c7760f5e1e7153b1b5c7effc37c64513a38b1cbd5a5ea70ece382f,2024-09-14T20:15:11.633000 -CVE-2024-8863,0,0,9f3f56473b876f05177eae6c3b009fe96b9edd6d27c3210bc8a6603ae1c78f86,2024-09-14T23:15:11.967000 -CVE-2024-8864,0,0,5eeeeeb9301601019e9ecb754cc0a968b222f29465c0230ea52287773b3fe009,2024-09-15T01:15:10.153000 -CVE-2024-8865,0,0,a39e4f34a05995643d58a4005fb4dc7690ae0140dbe8fa6fe9528f952dddbf70,2024-09-15T01:15:10.423000 -CVE-2024-8866,0,0,31ba295c4f71cde54a98742cdc5d78078f4e8b948563abaa4e1dbb696b00e6f1,2024-09-15T02:15:01.900000 -CVE-2024-8867,0,0,dd10831ef551fea3afb47529263b42e62dd84766cc54a4058c7ce2170e3f8ac1,2024-09-15T03:15:01.840000 -CVE-2024-8868,0,0,4c0844b52c07af19f806d758bc94eea8b81aa10285bf079a34c6dd0100e86840,2024-09-15T03:15:02.153000 -CVE-2024-8869,0,0,aa2af33ef0f85ca181820a682c28077f17b530186dae9e309043b826e1006c37,2024-09-15T11:15:13.323000 -CVE-2024-8875,0,0,937273052af9299e71e0685f90ca034fa7f2bd3ffa6091954cfb7a5dfe7f4026,2024-09-15T22:15:09.887000 -CVE-2024-8876,0,0,d3897a0bd9305e7aad53374b9f2867f9079d8de81ad1c651393ba929b723325f,2024-09-15T22:15:10.137000 -CVE-2024-8880,0,0,782096ab277276fb13986f51774bd3d399c3e53220651fdda32cd67f07a2a71a,2024-09-16T01:15:10.503000 +CVE-2024-8862,0,1,3c0cefe3796a3067716726cae64fd2b6a2a71c4947999e21da2abde8a533c886,2024-09-16T15:30:28.733000 +CVE-2024-8863,0,1,c201c0a73f6e94fc800a591d431c13570689b06531fa3fd890390312a87785df,2024-09-16T15:30:28.733000 +CVE-2024-8864,0,1,44121fc67747be3835c4f597f1f416667419c9bdc21c7772fc8a02aa6a906135,2024-09-16T15:30:28.733000 +CVE-2024-8865,0,1,1b0154eb993ea167a22ba73abc235af9a65fc83c52aac058affe1358173d513d,2024-09-16T15:30:28.733000 +CVE-2024-8866,0,1,eaddfbefdd90610cf150ca40e2fecbee5010de57b40eb286c446312e3747c6a2,2024-09-16T15:30:28.733000 +CVE-2024-8867,0,1,ce24b6e2d09b7ded6d312118bc520255f3c107c10ae78413bc9a97c58dc5cd42,2024-09-16T15:30:28.733000 +CVE-2024-8868,0,1,4007678350a6f1bd18717e80a81147df35dda0e2e687ffd64752d434dc187da1,2024-09-16T15:30:28.733000 +CVE-2024-8869,0,1,b189f35b5a28c07852ca6d00280a8a46d906bab51b4d56357a90dd535f0651a1,2024-09-16T15:30:28.733000 +CVE-2024-8875,0,1,0e9f0f93ae52ceba12c10384b7bbc3067de71e5c05493a69fd2a253e00e4d595,2024-09-16T15:30:28.733000 +CVE-2024-8876,0,1,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000 +CVE-2024-8880,0,1,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000