From 90a87313ca3af84593d95550b513f5925bc2b371 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Sat, 21 Sep 2024 12:03:16 +0000 Subject: [PATCH] Auto-Update: 2024-09-21T12:00:17.145294+00:00 --- CVE-2022/CVE-2022-383xx/CVE-2022-38382.json | 6 +-- CVE-2022/CVE-2022-387xx/CVE-2022-38710.json | 6 +-- CVE-2022/CVE-2022-439xx/CVE-2022-43915.json | 6 +-- CVE-2023/CVE-2023-477xx/CVE-2023-47728.json | 46 ++++++++++----------- CVE-2024/CVE-2024-250xx/CVE-2024-25023.json | 16 +++---- CVE-2024/CVE-2024-250xx/CVE-2024-25024.json | 16 +++---- CVE-2024/CVE-2024-287xx/CVE-2024-28799.json | 4 +- CVE-2024/CVE-2024-318xx/CVE-2024-31882.json | 6 +-- CVE-2024/CVE-2024-351xx/CVE-2024-35133.json | 6 +-- CVE-2024/CVE-2024-351xx/CVE-2024-35136.json | 6 +-- CVE-2024/CVE-2024-370xx/CVE-2024-37068.json | 6 +-- CVE-2024/CVE-2024-397xx/CVE-2024-39733.json | 16 +++---- CVE-2024/CVE-2024-423xx/CVE-2024-42323.json | 37 +++++++++++++++++ README.md | 25 +++++++---- _state.csv | 29 ++++++------- 15 files changed, 140 insertions(+), 91 deletions(-) create mode 100644 CVE-2024/CVE-2024-423xx/CVE-2024-42323.json diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json index 1aac814c929..47740f84ed7 100644 --- a/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json +++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json @@ -2,13 +2,13 @@ "id": "CVE-2022-38382", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-13T02:15:04.730", - "lastModified": "2024-09-12T15:37:51.147", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:02.680", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 does not invalidate session after logout which could allow another user to obtain sensitive information. IBM X-Force ID: 233672." + "value": "IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 does not invalidate session after logout which could allow another authenticated user to obtain sensitive information. IBM X-Force ID: 233672." }, { "lang": "es", diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json index dc636bdaf37..6fb428bc5c7 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38710.json @@ -2,13 +2,13 @@ "id": "CVE-2022-38710", "sourceIdentifier": "psirt@us.ibm.com", "published": "2022-11-03T20:15:29.553", - "lastModified": "2024-07-03T01:38:43.047", + "lastModified": "2024-09-21T10:15:03.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Robotic Process Automation 21.0.1 and 21.0.2 could disclose sensitive version information that could aid in further attacks against the system. IBM X-Force ID: 234292.\n\n" + "value": "IBM Robotic Process Automation 21.0.1 and 21.0.2 could disclose sensitive version to an unauthorized control sphere information that could aid in further attacks against the system. IBM X-Force ID: 234292." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-319" + "value": "CWE-497" } ] }, diff --git a/CVE-2022/CVE-2022-439xx/CVE-2022-43915.json b/CVE-2022/CVE-2022-439xx/CVE-2022-43915.json index 7a93c4142ea..66f2b067829 100644 --- a/CVE-2022/CVE-2022-439xx/CVE-2022-43915.json +++ b/CVE-2022/CVE-2022-439xx/CVE-2022-43915.json @@ -2,13 +2,13 @@ "id": "CVE-2022-43915", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-24T12:15:04.080", - "lastModified": "2024-08-27T15:30:57.437", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:04.170", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM App Connect Enterprise Certified Container 5.0, 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, and 12.1 does not limit calls to unshare in running Pods. This can allow a user with access to execute commands in a running Pod to elevate their user privileges." + "value": "IBM App Connect Enterprise Certified Container 5.0, 7.1, 7.2, 8.0, 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, and 12.1 does not limit calls to unshare in running Pods. This can allow a user with privileged access to execute commands in a running Pod to elevate their user privileges." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json b/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json index e55991a10a4..bbdd411fefd 100644 --- a/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json +++ b/CVE-2023/CVE-2023-477xx/CVE-2023-47728.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47728", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-16T20:15:09.780", - "lastModified": "2024-08-28T21:40:55.593", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:04.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,26 +56,6 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 - }, - { - "source": "psirt@us.ibm.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "HIGH", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.9, - "baseSeverity": "MEDIUM" - }, - "exploitabilityScore": 1.2, - "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json index 047f83e8252..7f1063008f7 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25023", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-10T01:15:09.633", - "lastModified": "2024-09-19T21:14:27.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:04.760", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,23 +38,23 @@ "impactScore": 3.6 }, { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.2, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json index 1d82c629637..21d02589c37 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25024", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-15T03:15:04.353", - "lastModified": "2024-08-28T21:53:10.720", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:05.000", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,23 +38,23 @@ "impactScore": 3.6 }, { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.2, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28799.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28799.json index cec754dae8a..4f85d085b04 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28799.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28799.json @@ -2,13 +2,13 @@ "id": "CVE-2024-28799", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-14T16:15:11.220", - "lastModified": "2024-09-15T11:15:12.100", + "lastModified": "2024-09-21T10:15:05.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly to a local user during back-end commands which may result in the unexpected disclosure of this information under certain conditions. IBM X-Force ID: 287173." + "value": "IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 displays sensitive data improperly to a local privileged user, in non default configurations, during back-end commands which may result in the unexpected disclosure of this information. IBM X-Force ID: 287173." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-318xx/CVE-2024-31882.json b/CVE-2024/CVE-2024-318xx/CVE-2024-31882.json index 8669c327a57..bb86bc46c6c 100644 --- a/CVE-2024/CVE-2024-318xx/CVE-2024-31882.json +++ b/CVE-2024/CVE-2024-318xx/CVE-2024-31882.json @@ -2,13 +2,13 @@ "id": "CVE-2024-31882", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-14T18:15:10.647", - "lastModified": "2024-08-23T19:14:36.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:05.403", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 is vulnerable to a denial of service, under specific configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user. IBM X-Force ID: 287614." + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.1 and 11.5 is vulnerable to a denial of service, under specific non default configurations, as the server may crash when using a specially crafted SQL statement by an authenticated user. IBM X-Force ID: 287614." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json index 681c154179d..8c864c8708b 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json @@ -2,13 +2,13 @@ "id": "CVE-2024-35133", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-29T17:15:07.250", - "lastModified": "2024-09-06T22:55:33.543", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:05.527", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim." + "value": "IBM Security Verify Access 10.0.0 through 10.0.8 OIDC Provider could allow a remote authenticated attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35136.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35136.json index 1d5e607f33e..ce0450bd8b5 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35136.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35136.json @@ -2,13 +2,13 @@ "id": "CVE-2024-35136", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-14T18:15:11.723", - "lastModified": "2024-08-23T19:08:06.993", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:05.673", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) federated server 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query under certain conditions. IBM X-Force ID: 291307." + "value": "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) federated server 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query under certain non default conditions. IBM X-Force ID: 291307." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37068.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37068.json index cb196765190..2973541b5a7 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37068.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37068.json @@ -2,13 +2,13 @@ "id": "CVE-2024-37068", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-09-07T14:15:02.123", - "lastModified": "2024-09-13T21:04:25.540", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:05.793", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + "value": "IBM Maximo Application Suite - Manage Component 8.10, 8.11, and 9.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information using man in the middle techniques." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json index 33b3b323d2c..0266df86f0f 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39733.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39733", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-14T13:15:21.490", - "lastModified": "2024-09-18T12:58:54.443", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-21T10:15:05.920", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", "cvssData": { "version": "3.1", @@ -38,23 +38,23 @@ "impactScore": 3.6 }, { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.2, + "baseScore": 5.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.5, + "exploitabilityScore": 1.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42323.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42323.json new file mode 100644 index 00000000000..98e2e26b3da --- /dev/null +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42323.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-42323", + "sourceIdentifier": "security@apache.org", + "published": "2024-09-21T10:15:06.160", + "lastModified": "2024-09-21T10:15:06.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SnakeYaml Deser Load Malicious xml rce vulnerability in Apache HertzBeat (incubating).\u00a0\n\nThis vulnerability can only be exploited by authorized attackers.\nThis issue affects Apache HertzBeat (incubating): before 1.6.0.\n\nUsers are recommended to upgrade to version 1.6.0, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://lists.apache.org/thread/dwpwm572sbwon1mknlwhkpbom2y7skbx", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/r0c4tost4bllqc1n9q6rmzs1slgsq63t", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 18dbf3478bd..50be8680e83 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-21T10:00:17.307669+00:00 +2024-09-21T12:00:17.145294+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-21T09:15:04.660000+00:00 +2024-09-21T10:15:06.160000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,32 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -263524 +263525 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2024-8680](CVE-2024/CVE-2024-86xx/CVE-2024-8680.json) (`2024-09-21T09:15:02.590`) -- [CVE-2024-9048](CVE-2024/CVE-2024-90xx/CVE-2024-9048.json) (`2024-09-21T09:15:04.660`) +- [CVE-2024-42323](CVE-2024/CVE-2024-423xx/CVE-2024-42323.json) (`2024-09-21T10:15:06.160`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `12` +- [CVE-2022-38382](CVE-2022/CVE-2022-383xx/CVE-2022-38382.json) (`2024-09-21T10:15:02.680`) +- [CVE-2022-38710](CVE-2022/CVE-2022-387xx/CVE-2022-38710.json) (`2024-09-21T10:15:03.890`) +- [CVE-2022-43915](CVE-2022/CVE-2022-439xx/CVE-2022-43915.json) (`2024-09-21T10:15:04.170`) +- [CVE-2023-47728](CVE-2023/CVE-2023-477xx/CVE-2023-47728.json) (`2024-09-21T10:15:04.360`) +- [CVE-2024-25023](CVE-2024/CVE-2024-250xx/CVE-2024-25023.json) (`2024-09-21T10:15:04.760`) +- [CVE-2024-25024](CVE-2024/CVE-2024-250xx/CVE-2024-25024.json) (`2024-09-21T10:15:05.000`) +- [CVE-2024-28799](CVE-2024/CVE-2024-287xx/CVE-2024-28799.json) (`2024-09-21T10:15:05.253`) +- [CVE-2024-31882](CVE-2024/CVE-2024-318xx/CVE-2024-31882.json) (`2024-09-21T10:15:05.403`) +- [CVE-2024-35133](CVE-2024/CVE-2024-351xx/CVE-2024-35133.json) (`2024-09-21T10:15:05.527`) +- [CVE-2024-35136](CVE-2024/CVE-2024-351xx/CVE-2024-35136.json) (`2024-09-21T10:15:05.673`) +- [CVE-2024-37068](CVE-2024/CVE-2024-370xx/CVE-2024-37068.json) (`2024-09-21T10:15:05.793`) +- [CVE-2024-39733](CVE-2024/CVE-2024-397xx/CVE-2024-39733.json) (`2024-09-21T10:15:05.920`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b3a4d528f70..9e568381466 100644 --- a/_state.csv +++ b/_state.csv @@ -204779,7 +204779,7 @@ CVE-2022-38379,0,0,9eb70de0c72565c49201ab1fc48e6de31cbb23bd0ef17c431d4cd96f5e78e CVE-2022-3838,0,0,b6c87f6371b3c42529104fa7683905834b7f4d26db23a4d8470e1e7da69bdcdb,2023-11-07T03:51:51.887000 CVE-2022-38380,0,0,bd883f9c774317159de2534f7103c0f6276317266728ea8b96d8dc126654e307,2022-11-04T14:56:46.817000 CVE-2022-38381,0,0,33ab62a56155391eb2d41b3ba9666f38dda60cd0a3cd9ef1e728baa24c1b8bac,2022-11-04T15:03:40.800000 -CVE-2022-38382,0,0,3caf80f95152461b2bbfefb30d37536b3ea8031842563d7040c007dde28ad6c6,2024-09-12T15:37:51.147000 +CVE-2022-38382,0,1,c1ba1defda25def8dcca3059dfe0b7714d9dc2a3a6e4dc12c78ddb9c68d6314f,2024-09-21T10:15:02.680000 CVE-2022-38383,0,0,c6f707ee147e1c14c9059720db840b81389d2405c75180fb0f2c0e4d4d08569f,2024-08-01T17:57:30.093000 CVE-2022-38385,0,0,e5ce73aa67e344471446b9267cebeab2bedbacce8ae377f39c844e85d6dedb4e,2023-11-07T03:50:07.243000 CVE-2022-38386,0,0,cd5b6a6598df693531015e8583f683aad3b24e500fbcaa6ba22ce0152abd819c,2024-05-01T19:50:25.633000 @@ -205038,7 +205038,7 @@ CVE-2022-38705,0,0,e290d8ccd75e4ce3425a2955c1fc95068eac8afcbdd67fa9f71d4c95a97c7 CVE-2022-38707,0,0,f44b08c3f791cc73f43d462351051a336d23c8ac063ffefa60c4257fc33035ec,2023-05-11T14:17:11.117000 CVE-2022-38708,0,0,781d609c9b3dc891552143ee435ef3e063fbe0b877a671a9cf817c94de5c1f86,2023-11-07T03:50:11.823000 CVE-2022-38709,0,0,7f3077c38854304042150d1d1a1c927d058013bb127b4d8270511cb4e453573a,2022-10-14T20:30:32.833000 -CVE-2022-38710,0,0,830e0e94583ffcb8159f179750666649292743dd25ba595d9d9d7fd875daf9ad,2024-07-03T01:38:43.047000 +CVE-2022-38710,0,1,76541b99bab0b9f82be0ed5eea11d8d59857d4fa70130aa00483a9682faa2549,2024-09-21T10:15:03.890000 CVE-2022-38712,0,0,efacb8e6b7af22915dcaad88def28008695f8ac120f0459e05383852abad5aa2,2022-11-04T15:16:45.807000 CVE-2022-38714,0,0,27bd414725ad6fc233b7ee5aa2c379b0d8e16a41b3f7f586519226d662a14b8e,2024-02-12T20:39:15.693000 CVE-2022-38715,0,0,560f03ba50c9656a0b9b0e7f82b2ddc7a737af875f6c233628cc6ad5be254d04,2023-02-02T17:22:07.650000 @@ -209052,7 +209052,7 @@ CVE-2022-43909,0,0,fb5ee18fcc4a7c8f963a93a6115537cf0182728f4dba8a3bd049fa37f66ac CVE-2022-4391,0,0,62af724c682887c395cfbebb77b0771d3fa68dcabe6409c889204ad1fbd972b2,2023-11-07T03:57:43.970000 CVE-2022-43910,0,0,7268ce6dc82f1278149e45c0b95732486f595712c6fa46116abdc68639690719,2023-07-27T23:43:13.553000 CVE-2022-43914,0,0,6c5d00c75cae4288b9b3f94ea7847750a80fcdaddd67481674372df2bd89e663,2023-11-07T03:54:07.493000 -CVE-2022-43915,0,0,5bf05b68f88d28cb31b7ff740af9d56051297de0c351e6e73ab3ac7b1b28e0d1,2024-08-27T15:30:57.437000 +CVE-2022-43915,0,1,35e3d3f793fc7bbc427859f037d7ae171c88b5796551b7c087c572a1de7c88d7,2024-09-21T10:15:04.170000 CVE-2022-43917,0,0,38b0633885bd70099b602418a9f6cf51c4440b53dd83d61edf447fd9b1fdb596,2023-11-07T03:54:07.590000 CVE-2022-43919,0,0,3aa92fee108b80de2c2a30af75bd50fa8417c3cffedb4ff0feec49c8f960e3aa,2023-05-11T14:37:10.943000 CVE-2022-4392,0,0,17a907c07ebc32b0db3d26366226f2dfba20e071f735780a12875674771c495b,2023-11-07T03:57:44.170000 @@ -235700,7 +235700,7 @@ CVE-2023-4772,0,0,a5b93b502ddd01f9ee27674c836bf711ac9d02f44090fbc833b759d04d7de8 CVE-2023-47722,0,0,4f8feb65ac7241c12bbfc6f420a659b6dc9261f80cca7593f7d59fc3078ebf18,2023-12-12T21:04:18.177000 CVE-2023-47726,0,0,ceb40283504932a4e91f9e28d60424f146c7ffbecdb57c926139775e8d80827a,2024-06-20T12:44:01.637000 CVE-2023-47727,0,0,1611cf4537a23d5fbfc3a2499faf292e60ac118492bebcff86e1854dfc9ea8f7,2024-05-02T18:00:37.360000 -CVE-2023-47728,0,0,9d9b004fcde3982f43b196d097d8f47dbe8e79b165e63e4e225567a4a70b10dd,2024-08-28T21:40:55.593000 +CVE-2023-47728,0,1,fb0ca70663c598859e2ef1f188dcd44cca4a7dcf5679a483d56909a5ec19794a,2024-09-21T10:15:04.360000 CVE-2023-4773,0,0,01f0d277e96ad9628dd6920885ad7b499f840100cbeefdbe3a242a19aa900bdd,2023-11-07T04:22:57.903000 CVE-2023-47731,0,0,bdb6aabed94397db2521c199a558a02d451711e75ae9322b4498e9bbac095b67,2024-04-24T13:39:42.883000 CVE-2023-4774,0,0,18865190999a54b58dcf753cd88068601ff8cb29b163a504c848eb5e82d8b2e4,2023-11-07T04:22:58.080000 @@ -246429,8 +246429,8 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 CVE-2024-2502,0,0,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000 CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000 -CVE-2024-25023,0,0,bfa23d4bb52946f389f1743b48c3dffc3c3bbcf6f5e8a57fb029d24dc49627fc,2024-09-19T21:14:27.027000 -CVE-2024-25024,0,0,c5213c97e29706cc8502e6ba764e983599ae5293cf5cf0bdf7f7d6886ba77ef4,2024-08-28T21:53:10.720000 +CVE-2024-25023,0,1,fc27f892e9b9f8b0dcc06c73130838c8d932f593668ebe29c73cf641f9d3b8b1,2024-09-21T10:15:04.760000 +CVE-2024-25024,0,1,292b2d39946afd1b9ad5ee06a8815eeb2737c523e74309496dbedf42f7d2468d,2024-09-21T10:15:05 CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000 CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000 CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac1996360e7,2024-04-08T18:48:40.217000 @@ -249196,7 +249196,7 @@ CVE-2024-28795,0,0,f736e56121f9e7ebf2951b32e296586930b34c2b92901741a56f804684721 CVE-2024-28796,0,0,9309b95ff28ad61ded45c96b0ce61eb28e84237793000fa8c06bf713a7309924,2024-07-18T12:28:43.707000 CVE-2024-28797,0,0,215c6e5211c115cb8a1dd99529c7ef7d500087d4643915a223453edd582d1174,2024-07-31T18:57:00.313000 CVE-2024-28798,0,0,a6356458c4f4311bbbb434bcb07b82d4a8232904c746806c3a615b0a524813c1,2024-07-31T19:33:56.337000 -CVE-2024-28799,0,0,36781abb27cfb24d367f0586559a4c30be05c5758b22ce701324d1887d1daa0d,2024-09-15T11:15:12.100000 +CVE-2024-28799,0,1,7b5116d22118620746e99fb01d2c120abfeb878a1b857004ae9b1cd3fd81fff2,2024-09-21T10:15:05.253000 CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9d1,2024-07-12T16:55:30.137000 CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000 CVE-2024-28805,0,0,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000 @@ -251404,7 +251404,7 @@ CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aac CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000 CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000 -CVE-2024-31882,0,0,3e0d9ced93e42e37fcc08208206ff9f2abae85ed035a9771f9ae622204f0ac3c,2024-08-23T19:14:36.737000 +CVE-2024-31882,0,1,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000 CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000 CVE-2024-31887,0,0,ca1dcd6dc6fe353a02ec0a4cea716a53938c4b835e7c6779724d1f7fe8375c4c,2024-04-17T12:48:07.510000 CVE-2024-31889,0,0,551bcd3e36a73e2bb38d2c501766c5b52ca7977e525b06f960ceabe308a1516f,2024-05-31T19:14:47.793000 @@ -253684,8 +253684,8 @@ CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff1 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000 CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000 -CVE-2024-35133,0,0,94682ccdd5820af4bb9202a3fe7f8708ae8d6add58e631948e27e68678fff48d,2024-09-06T22:55:33.543000 -CVE-2024-35136,0,0,3020783d3d271d3fdae4d9e8c7d963280063bef97bcec52f880461e4f52c833a,2024-08-23T19:08:06.993000 +CVE-2024-35133,0,1,c8154f3557382524eedad42ad525489bdd0f4bf2957d22573cfc5269103c39da,2024-09-21T10:15:05.527000 +CVE-2024-35136,0,1,c5ca85768c4d7b88b94cf881b933d0474747d2a0748873dbd5cbbe5fbbdae759,2024-09-21T10:15:05.673000 CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000 CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000 CVE-2024-3514,0,0,3ed2667128afb9e047ea43d977eb1ed71e90bed358f504ad5e2322f1a22b1903,2024-04-24T17:15:47.423000 @@ -255072,7 +255072,7 @@ CVE-2024-37063,0,0,80954941ce1b7f85a9ddba2aa731f5591bda02de0a05b724cd044a2e0e2bf CVE-2024-37064,0,0,4c38fa1163e0fea8ab5ca1b8c699de3b9ac20f20b6e58d0f246dcde7abe2ce8c,2024-06-04T16:57:41.053000 CVE-2024-37065,0,0,98a759a5df37913375764d521d81dec2811436d61b541015e740c355e39d43cd,2024-06-04T16:57:41.053000 CVE-2024-37066,0,0,846c6cc9851f92e172f698dfdac0216349fea638c25d55cdb5de9d8c7c3efe87,2024-08-22T18:22:47.927000 -CVE-2024-37068,0,0,cd07d9fd2aa2c894282bbf6f9985379c29b348a4aa6149d57300d3d56a3f45ff,2024-09-13T21:04:25.540000 +CVE-2024-37068,0,1,d7c80e72e84fe439390c5dc5236cbdfa1776725285ce9a32b68bb48c69e65bcf,2024-09-21T10:15:05.793000 CVE-2024-3707,0,0,6bfaa46ff6eb40f5f2f9b2ce66b762ad7c8a8dd85b0bee59ae4503c9e3de8bec,2024-07-05T13:15:10.997000 CVE-2024-37077,0,0,8fcdf66f20c5ba98bcddae8e640f815c022983b880bcdb02c54e27e3790be6a9,2024-09-09T12:21:53.383000 CVE-2024-37078,0,0,009c869d231f8709f73a489f7029f4a82b9aafc8e4c52e039b4b2d9718fdb586,2024-07-05T08:15:03.130000 @@ -256913,7 +256913,7 @@ CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8b CVE-2024-3973,0,0,1e562721e06ec34010a875bed42bd8dd124b3449743c9a2acf9ba1a2336534dd,2024-08-07T15:17:46.717000 CVE-2024-39731,0,0,c40a1cc2736941ff41add0bac4c7466a6002e20eb34fe013d62480f37fe396c0,2024-07-16T14:06:47.770000 CVE-2024-39732,0,0,8ea97fd17c61f37a8333891b7edb20fba042c9e2cac01d62941a0e110ddba9d1,2024-09-18T13:15:43.340000 -CVE-2024-39733,0,0,0761ce381c5a20791f07f4304b91cdf945f2d5d1c31c66a42a779a4779e6bc65,2024-09-18T12:58:54.443000 +CVE-2024-39733,0,1,6189767c8c4d4b3c431dda742c826542c47c38b7994f58204a2f81450386cd79,2024-09-21T10:15:05.920000 CVE-2024-39734,0,0,e021854f1cdfb0b85486aad5062a131ec2d83a1ec5fa9e9ef1b76d4b101d8ea7,2024-09-18T12:50:03.010000 CVE-2024-39735,0,0,25c4700e5686784f1bacb463cbc1bfea2333262768bcbfd7f1058bbfa2b5bfbe,2024-07-16T14:03:08.760000 CVE-2024-39736,0,0,e875a1eaa42e3e08553dcba301576aa5ccba6e7eed2edb259f47a997db75bc6e,2024-07-16T14:02:29.583000 @@ -258379,6 +258379,7 @@ CVE-2024-4232,0,0,d86181ca34c980ccca9d603012d25d1fd9d02a5c899c7483f16d67878d5494 CVE-2024-42320,0,0,3bb9745120c3e683aefbafbca3ae9140002adac221663a12333f744da45f1bbd,2024-08-19T12:59:59.177000 CVE-2024-42321,0,0,1716db5db6c984bf2ebbd691b80440a9181fa253c6bc8c5d00954d830484e312,2024-08-19T12:59:59.177000 CVE-2024-42322,0,0,2accb2a45b605eba549de2a0c83236102f9dab689f1b61dc800f0c45a0f92db4,2024-08-19T12:59:59.177000 +CVE-2024-42323,1,1,b5b089f88d1b65d30d6d48973a878a292c7179a3a9666adbd6cebd8462e794a1,2024-09-21T10:15:06.160000 CVE-2024-4233,0,0,e3336c43dd885f8db6271cd8e49f7796169d1b724e733d53d39e8dcd56cab238,2024-05-08T17:05:24.083000 CVE-2024-42334,0,0,bde83a8b3e1fda08d590302dc4b567a00367ef315528bceb61555d7d23e4876c,2024-09-08T12:15:09.880000 CVE-2024-42335,0,0,2b9b97973dd654c6eb68cc221bad7788b92938b457385b73625ca969f07db996,2024-08-21T13:49:19.863000 @@ -263410,7 +263411,7 @@ CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000 CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000 CVE-2024-8669,0,0,4012df98e02ac5b9e6718466b80370dcc6e97ff4393f6afedefd27e9f80bb4ac,2024-09-14T11:47:14.677000 -CVE-2024-8680,1,1,b331324c2577289b77cd963c7051c5c6908a6bc3843fbe5a7cad425c09bae8a9,2024-09-21T09:15:02.590000 +CVE-2024-8680,0,0,b331324c2577289b77cd963c7051c5c6908a6bc3843fbe5a7cad425c09bae8a9,2024-09-21T09:15:02.590000 CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000 CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000 CVE-2024-8688,0,0,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000 @@ -263522,4 +263523,4 @@ CVE-2024-9039,0,0,087cac0290e47165349fcc9b25a216fd7a16ea1bb358d6d78a77dd7b638c92 CVE-2024-9040,0,0,b2e6ba9f70727fa0a7ad666e492a886dd19e8c26da377d2d82938ce54a27f8e4,2024-09-20T17:15:15.240000 CVE-2024-9041,0,0,9b2bb47050dcdd44edd27fd4fde021bb936ec7198fce2f08f9ad2c86bf8bcde4,2024-09-20T17:15:15.507000 CVE-2024-9043,0,0,8dd475426653f7d07aa5f325730a5d6c66debac84ef1209cdf6fa14cde3c264c,2024-09-20T12:30:17.483000 -CVE-2024-9048,1,1,913e9b0e4b91d6981c8b5bd62134205df1942a32410b4410b939157a5d95c26c,2024-09-21T09:15:04.660000 +CVE-2024-9048,0,0,913e9b0e4b91d6981c8b5bd62134205df1942a32410b4410b939157a5d95c26c,2024-09-21T09:15:04.660000