Auto-Update: 2024-09-25T18:00:19.666232+00:00

This commit is contained in:
cad-safe-bot 2024-09-25 18:03:19 +00:00
parent 6501b02c7f
commit 91889eda7f
91 changed files with 3931 additions and 448 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2007-2534",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-05-09T00:19:00.000",
"lastModified": "2024-08-07T14:15:22.890",
"lastModified": "2024-09-25T16:35:02.057",
"vulnStatus": "Modified",
"cveTags": [
{
@ -23,6 +23,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -59,6 +81,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0969",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-06-21T20:15:09.660",
"lastModified": "2023-06-28T14:59:30.573",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:06.440",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -72,11 +72,11 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-125"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0970",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-06-21T20:15:09.843",
"lastModified": "2023-06-28T16:05:03.873",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:06.567",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -72,7 +72,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-125"
},
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-0972",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-06-21T20:15:10.023",
"lastModified": "2023-06-28T16:15:36.920",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:06.663",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -72,11 +72,11 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-120"
"value": "CWE-787"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2023-25189",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T16:15:06.827",
"lastModified": "2024-09-25T16:15:06.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "BTS is affected by information disclosure vulnerability where mobile network operator personnel connected over BTS Web Element Manager, regardless of the access privileges, having a possibility to read BTS service operation details performed by Nokia Care service personnel via SSH."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25189/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-2683",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-06-15T20:15:09.260",
"lastModified": "2023-07-05T13:13:07.587",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T17:15:13.520",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nA memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.\n\n"
"value": "A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error."
}
],
"metrics": {
@ -72,7 +72,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-401"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-27584",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-19T23:15:11.233",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:28:33.473",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +81,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:d7y:dragonfly:*:*:*:*:*:go:*:*",
"versionEndExcluding": "2.0.9",
"matchCriteriaId": "E4C68635-55DA-41B8-B69C-B50946D419CA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dragonflyoss/Dragonfly2/releases/tag/v2.0.9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/dragonflyoss/Dragonfly2/security/advisories/GHSA-hpc8-7wpm-889w",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29492",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-11T05:15:07.393",
"lastModified": "2023-04-18T02:16:54.183",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:35:03.390",
"vulnStatus": "Modified",
"cveTags": [],
"cisaExploitAdd": "2023-04-13",
"cisaActionDue": "2023-05-04",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3024",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-09-29T17:15:47.043",
"lastModified": "2023-10-06T13:22:29.397",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:07.607",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-3110",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-06-21T20:15:10.263",
"lastModified": "2023-06-28T15:59:59.863",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:07.760",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -72,11 +72,11 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-120"
"value": "CWE-787"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-3487",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-10-20T15:15:11.967",
"lastModified": "2023-10-27T18:50:10.740",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:07.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nAn integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.\n\n"
"value": "An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots."
},
{
"lang": "es",
@ -78,10 +78,6 @@
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-787"

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38346",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T19:15:09.593",
"lastModified": "2023-09-26T14:58:24.360",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:35:04.973",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,6 +69,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4020",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-12-15T21:15:08.560",
"lastModified": "2023-12-19T20:37:21.960",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:08.653",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,11 @@
"description": [
{
"lang": "en",
"value": "CWE-20"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-4041",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-08-23T05:15:47.990",
"lastModified": "2023-08-29T14:40:53.097",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T17:15:14.643",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules) allows Code Injection, Authentication Bypass.This issue affects \"Standalone\" and \"Application\" versions of Gecko Bootloader.\n\n"
"value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules) allows Code Injection, Authentication Bypass.This issue affects \"Standalone\" and \"Application\" versions of Gecko Bootloader."
}
],
"metrics": {
@ -84,11 +84,11 @@
},
{
"lang": "en",
"value": "CWE-494"
"value": "CWE-787"
},
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-913"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-41095",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-10-26T14:15:08.637",
"lastModified": "2023-11-07T20:35:26.983",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T17:15:14.257",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Encryption of Security Keys vulnerability in Silicon Labs OpenThread SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash.\nThis issue affects Silicon Labs OpenThread SDK: 2.3.1 and earlier.\n\n"
"value": "Missing Encryption of Security Keys vulnerability in Silicon Labs OpenThread SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash.\nThis issue affects Silicon Labs OpenThread SDK: 2.3.1 and earlier."
},
{
"lang": "es",
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-311"
"value": "CWE-312"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-41096",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-10-26T14:15:08.720",
"lastModified": "2023-11-08T01:48:37.717",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T17:15:14.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules)\n allows potential modification or extraction of network credentials stored in flash.\n\n\nThis issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier.\n\n"
"value": "Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules)\n allows potential modification or extraction of network credentials stored in flash.\n\n\nThis issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier."
},
{
"lang": "es",
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-311"
"value": "CWE-312"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-41097",
"sourceIdentifier": "product-security@silabs.com",
"published": "2023-12-21T21:15:08.020",
"lastModified": "2024-01-03T17:22:03.797",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T17:15:14.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0.\n\n"
"value": "An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0."
},
{
"lang": "es",
@ -80,7 +80,7 @@
},
{
"lang": "en",
"value": "CWE-385"
"value": "CWE-327"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4280",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-01-02T17:15:09.520",
"lastModified": "2024-01-09T16:51:14.477",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:08.820",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -78,10 +78,6 @@
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-787"

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-43762",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T05:15:09.530",
"lastModified": "2023-10-13T16:15:12.030",
"lastModified": "2024-09-25T16:35:08.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-43765",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-09-22T05:15:09.793",
"lastModified": "2023-09-26T14:52:04.797",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T17:35:09.517",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-51393",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-23T20:15:51.687",
"lastModified": "2024-02-26T13:42:22.567",
"lastModified": "2024-09-25T16:15:09.297",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nDue to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network."
"value": "Due to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network."
},
{
"lang": "es",
@ -44,10 +44,6 @@
"source": "product-security@silabs.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-770"

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-51395",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-03-07T05:15:53.373",
"lastModified": "2024-03-07T13:52:27.110",
"lastModified": "2024-09-25T16:15:09.650",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "\nThe vulnerability described by CVE-2023-0972 has been additionally discovered in Silicon Labs Z-Wave end devices. This vulnerability may allow an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.\n\n"
"value": "The vulnerability described by CVE-2023-0972 has been additionally discovered in Silicon Labs Z-Wave end devices. This vulnerability may allow an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution."
},
{
"lang": "es",
@ -46,11 +46,11 @@
"description": [
{
"lang": "en",
"value": "CWE-119"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-120"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6387",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-02T16:15:53.337",
"lastModified": "2024-02-10T04:10:48.473",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T17:15:14.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,11 @@
"description": [
{
"lang": "en",
"value": "CWE-131"
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6874",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-05T18:15:51.877",
"lastModified": "2024-02-10T04:08:53.127",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-25T16:15:09.773",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-754"
"value": "CWE-312"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0240",
"sourceIdentifier": "product-security@silabs.com",
"published": "2024-02-15T21:15:08.673",
"lastModified": "2024-02-16T13:38:00.047",
"lastModified": "2024-09-25T17:15:14.890",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-401"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20350",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:15.000",
"lastModified": "2024-09-25T17:15:15.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance.\r\n\r\nThis vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-20381",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-11T17:15:12.403",
"lastModified": "2024-09-12T12:35:54.013",
"lastModified": "2024-09-25T17:15:15.240",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the JSON-RPC API feature in ConfD that is used by the web-based management interfaces of Cisco Crosswork Network Services Orchestrator (NSO), Cisco Optical Site Manager, and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.\r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system."
"value": "A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device. \r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system."
},
{
"lang": "es",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20414",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:15.413",
"lastModified": "2024-09-25T17:15:15.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system through the web UI.\r\n\r This vulnerability is due to incorrectly accepting configuration changes through the HTTP GET method. An attacker could exploit this vulnerability by persuading a currently authenticated administrator to follow a crafted link. A successful exploit could allow the attacker to change the configuration of the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-HfwnRgk",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20433",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:15.677",
"lastModified": "2024-09-25T17:15:15.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rsvp-dos-OypvgVZf",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20434",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.090",
"lastModified": "2024-09-25T17:15:16.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the control plane of an affected device.\r\n\r This vulnerability is due to improper handling of frames with VLAN tag information. An attacker could exploit this vulnerability by sending crafted frames to an affected device. A successful exploit could allow the attacker to render the control plane of the affected device unresponsive. The device would not be accessible through the console or CLI, and it would not respond to ping requests, SNMP requests, or requests from other control plane protocols. Traffic that is traversing the device through the data plane is not affected. A reload of the device is required to restore control plane services."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vlan-dos-27Pur5RT",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20436",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.400",
"lastModified": "2024-09-25T17:15:16.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-httpsrvr-dos-yOZThut",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20437",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.630",
"lastModified": "2024-09-25T17:15:16.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack and execute commands on the CLI of an affected device.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-csrf-ycUYxkKO",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20455",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:16.827",
"lastModified": "2024-09-25T17:15:16.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-371"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20464",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.043",
"lastModified": "2024-09-25T17:15:17.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient validation of received IPv4 PIMv2 packets. An attacker could exploit this vulnerability by sending a crafted PIMv2 packet to a PIM-enabled interface on an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.\r\n\r Note: This vulnerability can be exploited with either an IPv4 multicast or unicast packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pim-APbVfySJ",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20465",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.220",
"lastModified": "2024-09-25T17:15:17.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-repacl-9eXgnBpD",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20467",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.393",
"lastModified": "2024-09-25T17:15:17.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the implementation of the IPv4 fragmentation reassembly code in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper management of resources during fragment reassembly. An attacker could exploit this vulnerability by sending specific sizes of fragmented packets to an affected device or through a Virtual Fragmentation Reassembly (VFR)-enabled interface on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: This vulnerability affects Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers if they are running Cisco IOS XE Software Release 17.12.1 or 17.12.1a."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-399"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpp-vfr-dos-nhHKGgO",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20475",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.587",
"lastModified": "2024-09-25T17:15:17.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-zQ4KPvYd",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20480",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:17.787",
"lastModified": "2024-09-25T17:15:17.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the DHCP Snooping feature of Cisco IOS XE Software on Software-Defined Access (SD-Access) fabric edge nodes could allow an unauthenticated, remote attacker to cause high CPU utilization on an affected device, resulting in a denial of service (DoS) condition that requires a manual reload to recover. \r\n\r This vulnerability is due to improper handling of IPv4 DHCP packets. An attacker could exploit this vulnerability by sending certain IPv4 DHCP packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition that requires a manual reload to recover."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-783"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-MBcbG9k",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20496",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:18.020",
"lastModified": "2024-09-25T17:15:18.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.\r\n\r\nThis vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20508",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:18.267",
"lastModified": "2024-09-25T17:15:18.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cisco UTD Snort IPS Engine to be dropped."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-20510",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-09-25T17:15:18.470",
"lastModified": "2024-09-25T17:15:18.470",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Central Web Authentication (CWA) feature of Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent attacker to bypass the pre-authentication access control list (ACL), which could allow access to network resources before user authentication.\r\n\r This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server. An attacker could exploit this vulnerability by connecting to a wireless network that is configured for CWA and sending traffic through an affected device that should be denied by the configured ACL before user authentication. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device before the user authentication is completed, allowing the attacker to access trusted networks that the device might be protecting."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-cwa-acl-nPSbHSnA",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22296",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-10T08:15:48.017",
"lastModified": "2024-06-10T12:40:41.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T16:36:14.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code4recovery:12_step_meeting_list:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.14.29",
"matchCriteriaId": "A21AF535-0BBB-4715-9DD3-4EBF2AD25B79"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/12-step-meeting-list/wordpress-12-step-meeting-list-plugin-3-14-26-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30128",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-09-25T15:15:13.717",
"lastModified": "2024-09-25T15:15:13.717",
"lastModified": "2024-09-25T16:35:10.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -35,6 +35,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-441"
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0115504",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3183",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-06-12T09:15:18.683",
"lastModified": "2024-09-16T20:15:46.490",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T16:29:45.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -51,54 +71,153 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7883DE07-470D-4160-9767-4F831B75B9A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4D5F4FA7-E5C5-4C23-BDA8-36A36972E4F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5CA4F12A-5BC5-4D75-8F20-80D8BB2C5BF2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*",
"matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BF14A415-15BD-4A6C-87CF-675E09390474"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C237415F-33FE-4686-9B19-A0916BF75D2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E881C927-DF96-4D2E-9887-FF12E456B1FB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB096D5D-E8F6-4164-8B76-0217B7151D30"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:3754",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3755",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3756",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3757",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3758",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3759",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3760",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3761",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:3775",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-3183",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270685",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://www.freeipa.org/release-notes/4-12-1.html",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34057",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T19:15:40.777",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:08:16.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,144 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trianglemicroworks:iec_61850_source_code_library:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.2.0",
"matchCriteriaId": "C3253ACC-02E5-4AFD-AAA0-2F47E5AD3D26"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:sicam_a8000_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "05.30",
"matchCriteriaId": "6EA612FA-5E60-4278-A7A3-9C28E5857AD8"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:sicam_a8000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF612C4-56F9-4946-86E5-6D7C309E195F"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:sicam_scc_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0",
"matchCriteriaId": "1760C8BA-E26C-48BD-8733-801C5245B1D0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:sicam_scc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "26100EEE-4859-41BD-83A8-F2D57FC3F5C1"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:siemens:sicam_egs_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "05.30",
"matchCriteriaId": "7D8AAD69-99AA-48C7-AD40-431FC65085AC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:siemens:sicam_egs:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B926004A-C343-4C15-9AF4-32C1B4EEEEB2"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sicam_s8000:*:*:*:*:*:*:*:*",
"versionEndExcluding": "05.30",
"matchCriteriaId": "48484B01-98F1-41CB-876D-5DE76E65E7B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:siemens:sitipe_at:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A83D1DC-FCF0-4E05-BF26-CFDFAC4A2513"
}
]
}
]
}
],
"references": [
{
"url": "https://trianglemicroworks.com/products/source-code-libraries/iec-61850-scl-pages/what%27s-new",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-16",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40761",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-25T08:15:04.437",
"lastModified": "2024-09-25T08:15:04.437",
"lastModified": "2024-09-25T16:35:10.803",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Vulnerabilidad de fuerza de cifrado inadecuada en Apache Answer. Este problema afecta a Apache Answer: hasta la versi\u00f3n 1.3.5. El uso del valor MD5 del correo electr\u00f3nico de un usuario para acceder a Gravatar es inseguro y puede provocar la filtraci\u00f3n del correo electr\u00f3nico del usuario. La recomendaci\u00f3n oficial es utilizar SHA256 en su lugar. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.4.0, que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40838",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-09-17T00:15:48.853",
"lastModified": "2024-09-20T12:31:20.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T16:46:24.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,68 @@
"value": "Se solucion\u00f3 un problema de privacidad moviendo los datos confidenciales a una ubicaci\u00f3n protegida. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a las notificaciones del dispositivo del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.0",
"matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-41445",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T17:15:18.740",
"lastModified": "2024-09-25T17:15:18.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Library MDF (mdflib) v2.1 is vulnerable to a heap-based buffer overread via a crafted mdf4 file is parsed using the ReadData function"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/g0ku704/vulnerabilities/tree/main/CVE-2024-41445",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-41708",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T17:15:18.823",
"lastModified": "2024-09-25T17:15:18.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in AdaCore ada_web_services 20.0 allows an attacker to escalate privileges and steal sessions via the Random_String() function in the src/core/aws-utils.adb module."
}
],
"metrics": {},
"references": [
{
"url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0040-v2.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/AdaCore/aws",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43994",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-09-18T00:15:08.720",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:09:09.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cryoutcreations:kahuna:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.7.0",
"matchCriteriaId": "CA53EA10-DD54-4C24-960B-586519A86C69"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/kahuna/wordpress-kahuna-theme-1-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44678",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T17:15:18.990",
"lastModified": "2024-09-25T17:15:18.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gigastone TR1 Travel Router R101 v1.0.2 is vulnerable to Command Injection. This allows an authenticated attacker to execute arbitrary commands on the device by sending a crafted HTTP request to the ssid parameter in the request."
}
],
"metrics": {},
"references": [
{
"url": "https://www.bridewell.com/insights/blogs/detail/cve-2024-44678-identified-vulnerability-in-gigastone-wi-fi-range-extenders",
"source": "cve@mitre.org"
},
{
"url": "https://www.newegg.com/gigastone-tr1/p/0E6-008K-00004",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44825",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T16:15:10.187",
"lastModified": "2024-09-25T16:15:10.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal vulnerability in Centro de Tecnologia da Informaco Renato Archer InVesalius3 v3.1.99995 allows attackers to write arbitrary files unto the system via a crafted .inv3 file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/invesalius/invesalius3",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/partywavesec/invesalius3_vulnerabilities/tree/main/CVE-2024-44825",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45311",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-02T18:15:37.373",
"lastModified": "2024-09-03T12:59:02.453",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T17:03:36.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-670"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:quinn_project:quinn:*:*:*:*:*:rust:*:*",
"versionStartIncluding": "0.11.0",
"versionEndExcluding": "0.11.4",
"matchCriteriaId": "4C67B1D7-FE4B-4EE4-95F0-D8EA749AA4CF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/quinn-rs/quinn/blob/bb02a12a8435a7732a1d762783eeacbb7e50418e/quinn-proto/src/endpoint.rs#L213",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/quinn-rs/quinn/commit/e01609ccd8738bd438d86fa7185a0f85598cb58f",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/quinn-rs/quinn/security/advisories/GHSA-vr26-jcq5-fjj8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45410",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-19T23:15:11.480",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:39:08.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -55,18 +85,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.11.9",
"matchCriteriaId": "D8862E39-A57C-4CD5-A289-A853D9402298"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.1.3",
"matchCriteriaId": "31D16308-8F47-4EAC-B102-1FDEA4B3F9F1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/traefik/traefik/releases/tag/v2.11.9",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/traefik/traefik/releases/tag/v3.1.3",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/traefik/traefik/security/advisories/GHSA-62c8-mh53-4cqv",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45752",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T16:15:04.910",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T16:54:27.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.5
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pixlone:logiops:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.3.4",
"matchCriteriaId": "A61D6CCE-2D44-4329-907E-CA1E689FCCFF"
}
]
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=1226598",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/PixlOne/logiops/releases",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45807",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-20T00:15:02.520",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T17:12:38.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.31.0",
"versionEndExcluding": "1.31.2",
"matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-qc52-r4x5-9w37",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45808",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-20T00:15:02.733",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T17:18:38.823",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.28.7",
"matchCriteriaId": "C5E423BE-4022-47AB-A5D4-B218627517DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.29.0",
"versionEndExcluding": "1.29.9",
"matchCriteriaId": "E442EF13-A99D-42B9-BC76-AC398C32D132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.30.0",
"versionEndExcluding": "1.30.6",
"matchCriteriaId": "D9685C62-CFE4-43C5-B0C2-1C6722FB4F64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.31.0",
"versionEndExcluding": "1.31.2",
"matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46086",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-18T16:15:06.160",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:08:41.937",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1B03397C-68B4-4C54-B001-8B5BC5FE427A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PG2Stom/cms/tree/main/12/readme.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46382",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T13:15:04.007",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T16:56:09.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linlinjava:litemall:1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBF7CF8-8C16-4129-AF35-F29414CD08EF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/linlinjava/litemall/issues/552",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46394",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-19T14:15:17.373",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T16:55:15.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1B03397C-68B4-4C54-B001-8B5BC5FE427A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/fffccx1/cms/tree/main/14/readme.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46461",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T15:15:14.567",
"lastModified": "2024-09-25T15:15:14.567",
"lastModified": "2024-09-25T16:35:11.207",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.videolan.org/security/sb-vlc3021.html",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46485",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T16:15:10.480",
"lastModified": "2024-09-25T16:15:10.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "dingfanzu CMS 1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/doAdminAction.php?act=addCate"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/kikaku-ship/cms/tree/main/1/readme.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46600",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-25T16:15:10.707",
"lastModified": "2024-09-25T16:15:10.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "dingfanzu CMS 1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/doAdminAction.php?act=delCate&id=31"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/loading15678/cms/tree/main/3/readme.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46983",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-19T23:15:11.920",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:46:48.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:antfin:sofa-hessian:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.5",
"matchCriteriaId": "40BEC4BD-1D1B-4904-9DF2-4F7E9EFD3A05"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sofastack/sofa-hessian/security/advisories/GHSA-c459-2m73-67hj",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46984",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-19T23:15:12.107",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:49:17.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,30 +71,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gematik:reference_validator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.1",
"matchCriteriaId": "AEEBDA61-217C-44BD-973D-A118D24213AE"
}
]
}
]
}
],
"references": [
{
"url": "https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#transformerfactory",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
]
},
{
"url": "https://github.com/gematik/app-referencevalidator/releases/tag/2.5.1",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/gematik/app-referencevalidator/security/advisories/GHSA-68j8-fp38-p48q",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://owasp.org/www-community/attacks/Server_Side_Request_Forgery",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
]
},
{
"url": "https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
]
},
{
"url": "https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)#",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Technical Description"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47060",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-20T00:15:03.767",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T16:43:47.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,84 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.54.10",
"matchCriteriaId": "B57963B2-68B5-4E7C-97B7-64304BB64F6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.55.0",
"versionEndExcluding": "2.55.8",
"matchCriteriaId": "BD559AF6-7A21-405F-A421-B801F37B9B3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.56.0",
"versionEndExcluding": "2.56.6",
"matchCriteriaId": "04A51D71-DC37-4443-AFD4-5C1DACBD9026"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.57.0",
"versionEndExcluding": "2.57.5",
"matchCriteriaId": "3A379F08-C3D5-4C5F-8799-AC2E9097A655"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.58.0",
"versionEndExcluding": "2.58.5",
"matchCriteriaId": "095B9185-EB6C-4601-95AC-C1F8CE4CF757"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.59.0",
"versionEndExcluding": "2.59.3",
"matchCriteriaId": "790DC952-225B-4AAA-873C-EACDE249982B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.60.0",
"versionEndExcluding": "2.60.2",
"matchCriteriaId": "89E084F5-D132-4244-8E7C-4E26E033A636"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:2.61.0:*:*:*:*:*:*:*",
"matchCriteriaId": "ED36FAD4-DAB7-41FE-8C14-119B24E2CCCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zitadel:zitadel:2.62.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15D8180-D356-4933-8390-19B2DCE2D89F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-jj94-6f5c-65r8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-47078",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-25T16:15:10.907",
"lastModified": "2024-09-25T16:15:10.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Meshtastic is an open source, off-grid, decentralized, mesh network. Meshtastic uses MQTT to communicate over an internet connection to a shared or private MQTT Server. Nodes can communicate directly via an internet connection or proxied through a connected phone (i.e., via bluetooth). Prior to version 2.5.1, multiple weaknesses in the MQTT implementation allow for authentication and authorization bypasses resulting in unauthorized control of MQTT-connected nodes. Version 2.5.1 contains a patch."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/meshtastic/firmware/security/advisories/GHSA-vqcq-wjwx-7252",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6061",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T20:15:14.850",
"lastModified": "2024-06-20T12:44:22.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T16:16:22.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,30 +140,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/gpac/gpac/issues/2871",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/user-attachments/files/15801058/poc1.zip",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.268789",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268789",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.356308",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6062",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T20:15:15.170",
"lastModified": "2024-06-20T12:44:22.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T16:13:02.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,30 +140,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/gpac/gpac/issues/2872",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/user-attachments/files/15801126/poc2.zip",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.268790",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268790",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.356314",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6063",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-17T21:15:51.443",
"lastModified": "2024-06-20T12:44:22.977",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T16:01:30.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,30 +140,66 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*",
"matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/gpac/gpac/issues/2873",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/user-attachments/files/15801157/poc.zip",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.268791",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268791",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.356315",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-7207",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-19T23:15:12.337",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:51:34.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,18 +81,82 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.28.7",
"matchCriteriaId": "C5E423BE-4022-47AB-A5D4-B218627517DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.29.0",
"versionEndExcluding": "1.29.9",
"matchCriteriaId": "E442EF13-A99D-42B9-BC76-AC398C32D132"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.30.0",
"versionEndExcluding": "1.30.6",
"matchCriteriaId": "D9685C62-CFE4-43C5-B0C2-1C6722FB4F64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.31.0",
"versionEndExcluding": "1.31.2",
"matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7207",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300352",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-7386",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-25T03:15:03.040",
"lastModified": "2024-09-25T03:15:03.040",
"lastModified": "2024-09-25T17:15:19.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Premium Packages \u2013 Sell Digital Products Securely plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.1. This is due to missing nonce validation on the wpdmpp_async_request() function. This makes it possible for unauthenticated attackers to perform actions such as initiating refunds via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link."
"value": "The Premium Packages \u2013 Sell Digital Products Securely plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.1. This is due to missing nonce validation on the addRefund() function. This makes it possible for unauthenticated attackers to perform actions such as initiating refunds via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Premium Packages \u2013 Sell Digital Products Securely para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 5.9.1 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en la funci\u00f3n wpdmpp_async_request(). Esto permite que atacantes no autenticados realicen acciones como iniciar reembolsos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio o al gerente de la tienda para que realice una acci\u00f3n como hacer clic en un enlace."
}
],
"metrics": {
@ -49,7 +53,7 @@
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wpdm-premium-packages/trunk/wpdm-premium-packages.php?rev=3102989#L1148",
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3156970%40wpdm-premium-packages&new=3156970%40wpdm-premium-packages&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7409",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-05T14:15:35.813",
"lastModified": "2024-09-25T05:15:10.570",
"lastModified": "2024-09-25T17:15:19.213",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -56,6 +56,10 @@
"url": "https://access.redhat.com/errata/RHSA-2024:6811",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6818",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6964",
"source": "secalert@redhat.com"

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-7421",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-09-25T16:15:11.187",
"lastModified": "2024-09-25T16:15:11.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information exposure in Devolutions Remote Desktop Manager 2024.2.20.0 and earlier on Windows allows local attackers with access to system logs to obtain session credentials via passwords included in command-line arguments when launching WinSCP sessions"
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@devolutions.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://devolutions.net/security/advisories/DEVO-2024-0014",
"source": "security@devolutions.net"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-7625",
"sourceIdentifier": "security@hashicorp.com",
"published": "2024-08-15T00:15:13.127",
"lastModified": "2024-08-15T13:01:10.150",
"lastModified": "2024-09-25T16:15:11.307",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.16.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability."
"value": "In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.6.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8354",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-19T11:15:10.440",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T16:58:59.537",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
@ -51,14 +71,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-8354",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313497",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-8661",
"sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de",
"published": "2024-09-16T18:15:54.583",
"lastModified": "2024-09-20T12:31:20.110",
"lastModified": "2024-09-25T16:15:11.420",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.18 are vulnerable to Stored XSS in the \"Next&Previous Nav\" block. A rogue administrator could add a malicious payload by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N \u00a0Since the \"Next&Previous Nav\" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users.\u00a0Thanks, Chu Quoc Khanh for reporting."
"value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in the \"Next&Previous Nav\" block. A rogue administrator could add a malicious payload by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N \u00a0Since the \"Next&Previous Nav\" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users.\u00a0Thanks, Chu Quoc Khanh for reporting."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8853",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-09-20T08:15:11.493",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:49:25.653",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -41,8 +41,18 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,18 +61,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:medialibs:webo-facto:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.41",
"matchCriteriaId": "950849A5-AADE-4DB0-98D0-27F7001051BA"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/webo-facto-connector/tags/1.40/WeboFacto/Sso.php#L78",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3153062/webo-facto-connector",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c1280ceb-9ce8-47fc-8fd3-6af80015dea9?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8883",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-09-19T16:15:06.403",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:17:35.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
@ -51,54 +71,158 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*",
"matchCriteriaId": "1830E455-7E11-4264-862D-05971A42D4A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "EA983F8C-3A06-450A-AEFF-9429DE9A3454"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "40449571-22F8-44FA-B57B-B43F71AB25E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "01B0F191-ADDB-4AAE-A5C5-5CC16909E64A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FD75BCB4-F0E1-4C05-A2D7-001503C805C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B02036DD-4489-480B-B7D4-4EB08952377B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C7E78C55-45B6-4E01-9773-D3468F8EA9C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "30E2CF79-2D56-48AB-952E-5DDAFE471073"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "54E24055-813B-4E6D-94B7-FAD5F78B8537"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*",
"matchCriteriaId": "341E6313-20D5-44CB-9719-B20585DC5AD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "2DEC61BC-E699-456E-99B6-C049F2A5F23F"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:6878",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6879",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6880",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6882",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6886",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6887",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6888",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6889",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6890",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-8883",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Product"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8975",
"sourceIdentifier": "security@grafana.com",
"published": "2024-09-25T17:15:19.360",
"lastModified": "2024-09-25T17:15:19.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unquoted Search Path or Element vulnerability in Grafana Alloy on Windows allows Privilege Escalation from Local User to SYSTEM\nThis issue affects Alloy: before 1.3.3, from 1.4.0-rc.0 through 1.4.0-rc.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@grafana.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@grafana.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://github.com/grafana/alloy/releases/tag/v1.4.0",
"source": "security@grafana.com"
},
{
"url": "https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996/",
"source": "security@grafana.com"
},
{
"url": "https://grafana.com/security/security-advisories/cve-2024-8975/",
"source": "security@grafana.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-8996",
"sourceIdentifier": "security@grafana.com",
"published": "2024-09-25T17:15:19.567",
"lastModified": "2024-09-25T17:15:19.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unquoted Search Path or Element vulnerability in Grafana Agent (Flow mode) on Windows allows Privilege Escalation from Local User to SYSTEM\nThis issue affects Agent Flow: before 0.43.2"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@grafana.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@grafana.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-428"
}
]
}
],
"references": [
{
"url": "https://github.com/grafana/agent/releases/tag/v0.43.2",
"source": "security@grafana.com"
},
{
"url": "https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996/",
"source": "security@grafana.com"
},
{
"url": "https://grafana.com/security/security-advisories/cve-2024-8996/",
"source": "security@grafana.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9003",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-19T21:15:16.143",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-25T17:18:44.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +150,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jflow_project:jflow:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6962B89B-25B5-4A11-A9C3-002C07491F62"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sweatxi/BugHub/blob/main/Jinan%20Gallop%20JFlow%20CMS%20port%20is%20not%20authorized%20to%20cause%20the%20leakage%20of%20database%20attachment%20information.pdf",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.278153",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.278153",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.406225",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9009",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-20T00:15:03.997",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T17:46:59.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ZTurNA/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.278165",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.278165",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.410183",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9011",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-20T01:15:10.550",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T17:48:14.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ppp-src/a/issues/14",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.278166",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.278166",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.410396",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-9031",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-20T12:15:06.073",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T16:52:25.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in CodeCanyon CRMGo SaaS up to 7.2. This issue affects some unknown processing of the file /project/task/{task_id}/show. The manipulation of the argument comment leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en CodeCanyon CRMGo SaaS hasta la versi\u00f3n 7.2. Este problema afecta a algunos procesos desconocidos del archivo /project/task/{task_id}/show. La manipulaci\u00f3n del argumento comment provoca cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:workdo:crmgo_saas:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2",
"matchCriteriaId": "F7AA0E2C-521E-45AB-9EA1-2FAD8F40F1E1"
}
]
}
]
}
],
"references": [
{
"url": "https://bytium.com/stored-xss-vulnerabilities-in-crmgo-sass-version-7-2/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.278201",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.278201",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.410565",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-9043",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-20T11:15:13.280",
"lastModified": "2024-09-20T12:30:17.483",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-25T17:54:05.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges."
},
{
"lang": "es",
"value": "Secure Email Gateway de Cellopoint tiene una vulnerabilidad de desbordamiento de b\u00fafer en el proceso de autenticaci\u00f3n. Los atacantes remotos no autenticados pueden enviar paquetes manipulados para bloquear el proceso, eludiendo as\u00ed la autenticaci\u00f3n y obteniendo privilegios de administrador del sistema."
}
],
"metrics": {
@ -37,8 +41,18 @@
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -47,14 +61,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cellopoint:secure_email_gateway:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.2.1",
"versionEndIncluding": "4.5.0",
"matchCriteriaId": "1B586F4B-F5B1-49C1-9ACD-1B4B1F6EB6D2"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8103-b0568-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8102-b94a9-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-9120",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-25T01:15:48.720",
"lastModified": "2024-09-25T01:15:48.720",
"lastModified": "2024-09-25T17:35:12.403",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in Dawn in Google Chrome on Windows prior to 129.0.6668.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "Use after free de Dawn en Google Chrome en Windows antes de la versi\u00f3n 129.0.6668.70 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +49,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-9121",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-25T01:15:48.797",
"lastModified": "2024-09-25T01:15:48.797",
"lastModified": "2024-09-25T17:35:13.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Inappropriate implementation in V8 in Google Chrome prior to 129.0.6668.70 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "Una implementaci\u00f3n inadecuada en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.70 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites establecidos a trav\u00e9s de una p\u00e1gina HTML manipulada espec\u00edficamente. (Gravedad de seguridad de Chromium: alta)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-9122",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-09-25T01:15:48.837",
"lastModified": "2024-09-25T01:15:48.837",
"lastModified": "2024-09-25T17:35:15.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 129.0.6668.70 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)"
},
{
"lang": "es",
"value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.70 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada espec\u00edficamente. (Gravedad de seguridad de Chromium: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
@ -22,6 +49,16 @@
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-25T16:00:26.886560+00:00
2024-09-25T18:00:19.666232+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-25T15:55:09.027000+00:00
2024-09-25T17:54:05.297000+00:00
```
### Last Data Feed Release
@ -33,57 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
263750
263776
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `26`
- [CVE-2024-22892](CVE-2024/CVE-2024-228xx/CVE-2024-22892.json) (`2024-09-25T15:15:13.430`)
- [CVE-2024-22893](CVE-2024/CVE-2024-228xx/CVE-2024-22893.json) (`2024-09-25T15:15:13.520`)
- [CVE-2024-30128](CVE-2024/CVE-2024-301xx/CVE-2024-30128.json) (`2024-09-25T15:15:13.717`)
- [CVE-2024-43237](CVE-2024/CVE-2024-432xx/CVE-2024-43237.json) (`2024-09-25T15:15:14.000`)
- [CVE-2024-43959](CVE-2024/CVE-2024-439xx/CVE-2024-43959.json) (`2024-09-25T15:15:14.187`)
- [CVE-2024-43990](CVE-2024/CVE-2024-439xx/CVE-2024-43990.json) (`2024-09-25T15:15:14.370`)
- [CVE-2024-45613](CVE-2024/CVE-2024-456xx/CVE-2024-45613.json) (`2024-09-25T14:15:05.303`)
- [CVE-2024-46461](CVE-2024/CVE-2024-464xx/CVE-2024-46461.json) (`2024-09-25T15:15:14.567`)
- [CVE-2024-6512](CVE-2024/CVE-2024-65xx/CVE-2024-6512.json) (`2024-09-25T14:15:05.560`)
- [CVE-2024-7575](CVE-2024/CVE-2024-75xx/CVE-2024-7575.json) (`2024-09-25T14:15:05.750`)
- [CVE-2024-7576](CVE-2024/CVE-2024-75xx/CVE-2024-7576.json) (`2024-09-25T14:15:05.970`)
- [CVE-2024-7679](CVE-2024/CVE-2024-76xx/CVE-2024-7679.json) (`2024-09-25T14:15:06.180`)
- [CVE-2024-8316](CVE-2024/CVE-2024-83xx/CVE-2024-8316.json) (`2024-09-25T14:15:06.550`)
- [CVE-2024-20350](CVE-2024/CVE-2024-203xx/CVE-2024-20350.json) (`2024-09-25T17:15:15.000`)
- [CVE-2024-20414](CVE-2024/CVE-2024-204xx/CVE-2024-20414.json) (`2024-09-25T17:15:15.413`)
- [CVE-2024-20433](CVE-2024/CVE-2024-204xx/CVE-2024-20433.json) (`2024-09-25T17:15:15.677`)
- [CVE-2024-20434](CVE-2024/CVE-2024-204xx/CVE-2024-20434.json) (`2024-09-25T17:15:16.090`)
- [CVE-2024-20436](CVE-2024/CVE-2024-204xx/CVE-2024-20436.json) (`2024-09-25T17:15:16.400`)
- [CVE-2024-20437](CVE-2024/CVE-2024-204xx/CVE-2024-20437.json) (`2024-09-25T17:15:16.630`)
- [CVE-2024-20455](CVE-2024/CVE-2024-204xx/CVE-2024-20455.json) (`2024-09-25T17:15:16.827`)
- [CVE-2024-20464](CVE-2024/CVE-2024-204xx/CVE-2024-20464.json) (`2024-09-25T17:15:17.043`)
- [CVE-2024-20465](CVE-2024/CVE-2024-204xx/CVE-2024-20465.json) (`2024-09-25T17:15:17.220`)
- [CVE-2024-20467](CVE-2024/CVE-2024-204xx/CVE-2024-20467.json) (`2024-09-25T17:15:17.393`)
- [CVE-2024-20475](CVE-2024/CVE-2024-204xx/CVE-2024-20475.json) (`2024-09-25T17:15:17.587`)
- [CVE-2024-20480](CVE-2024/CVE-2024-204xx/CVE-2024-20480.json) (`2024-09-25T17:15:17.787`)
- [CVE-2024-20496](CVE-2024/CVE-2024-204xx/CVE-2024-20496.json) (`2024-09-25T17:15:18.020`)
- [CVE-2024-20508](CVE-2024/CVE-2024-205xx/CVE-2024-20508.json) (`2024-09-25T17:15:18.267`)
- [CVE-2024-20510](CVE-2024/CVE-2024-205xx/CVE-2024-20510.json) (`2024-09-25T17:15:18.470`)
- [CVE-2024-41445](CVE-2024/CVE-2024-414xx/CVE-2024-41445.json) (`2024-09-25T17:15:18.740`)
- [CVE-2024-41708](CVE-2024/CVE-2024-417xx/CVE-2024-41708.json) (`2024-09-25T17:15:18.823`)
- [CVE-2024-44678](CVE-2024/CVE-2024-446xx/CVE-2024-44678.json) (`2024-09-25T17:15:18.990`)
- [CVE-2024-44825](CVE-2024/CVE-2024-448xx/CVE-2024-44825.json) (`2024-09-25T16:15:10.187`)
- [CVE-2024-46485](CVE-2024/CVE-2024-464xx/CVE-2024-46485.json) (`2024-09-25T16:15:10.480`)
- [CVE-2024-46600](CVE-2024/CVE-2024-466xx/CVE-2024-46600.json) (`2024-09-25T16:15:10.707`)
- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-09-25T16:15:10.907`)
- [CVE-2024-7421](CVE-2024/CVE-2024-74xx/CVE-2024-7421.json) (`2024-09-25T16:15:11.187`)
- [CVE-2024-8975](CVE-2024/CVE-2024-89xx/CVE-2024-8975.json) (`2024-09-25T17:15:19.360`)
- [CVE-2024-8996](CVE-2024/CVE-2024-89xx/CVE-2024-8996.json) (`2024-09-25T17:15:19.567`)
### CVEs modified in the last Commit
Recently modified CVEs: `60`
Recently modified CVEs: `63`
- [CVE-2024-42224](CVE-2024/CVE-2024-422xx/CVE-2024-42224.json) (`2024-09-25T15:55:09.027`)
- [CVE-2024-43970](CVE-2024/CVE-2024-439xx/CVE-2024-43970.json) (`2024-09-25T14:18:53.297`)
- [CVE-2024-43971](CVE-2024/CVE-2024-439xx/CVE-2024-43971.json) (`2024-09-25T14:18:13.137`)
- [CVE-2024-43972](CVE-2024/CVE-2024-439xx/CVE-2024-43972.json) (`2024-09-25T14:16:18.150`)
- [CVE-2024-43975](CVE-2024/CVE-2024-439xx/CVE-2024-43975.json) (`2024-09-25T14:13:32.910`)
- [CVE-2024-43983](CVE-2024/CVE-2024-439xx/CVE-2024-43983.json) (`2024-09-25T14:11:22.450`)
- [CVE-2024-43987](CVE-2024/CVE-2024-439xx/CVE-2024-43987.json) (`2024-09-25T14:08:22.987`)
- [CVE-2024-43999](CVE-2024/CVE-2024-439xx/CVE-2024-43999.json) (`2024-09-25T15:15:43.683`)
- [CVE-2024-44005](CVE-2024/CVE-2024-440xx/CVE-2024-44005.json) (`2024-09-25T15:25:30.083`)
- [CVE-2024-44124](CVE-2024/CVE-2024-441xx/CVE-2024-44124.json) (`2024-09-25T15:14:13.593`)
- [CVE-2024-44623](CVE-2024/CVE-2024-446xx/CVE-2024-44623.json) (`2024-09-25T14:53:20.253`)
- [CVE-2024-45452](CVE-2024/CVE-2024-454xx/CVE-2024-45452.json) (`2024-09-25T14:19:17.113`)
- [CVE-2024-47220](CVE-2024/CVE-2024-472xx/CVE-2024-47220.json) (`2024-09-25T15:15:14.653`)
- [CVE-2024-5301](CVE-2024/CVE-2024-53xx/CVE-2024-5301.json) (`2024-09-25T15:18:18.097`)
- [CVE-2024-5302](CVE-2024/CVE-2024-53xx/CVE-2024-5302.json) (`2024-09-25T15:22:17.627`)
- [CVE-2024-5303](CVE-2024/CVE-2024-53xx/CVE-2024-5303.json) (`2024-09-25T15:24:18.680`)
- [CVE-2024-6064](CVE-2024/CVE-2024-60xx/CVE-2024-6064.json) (`2024-09-25T15:08:46.537`)
- [CVE-2024-6147](CVE-2024/CVE-2024-61xx/CVE-2024-6147.json) (`2024-09-25T15:29:33.477`)
- [CVE-2024-6153](CVE-2024/CVE-2024-61xx/CVE-2024-6153.json) (`2024-09-25T14:44:14.567`)
- [CVE-2024-6154](CVE-2024/CVE-2024-61xx/CVE-2024-6154.json) (`2024-09-25T14:40:26.970`)
- [CVE-2024-6845](CVE-2024/CVE-2024-68xx/CVE-2024-6845.json) (`2024-09-25T14:35:07.500`)
- [CVE-2024-7878](CVE-2024/CVE-2024-78xx/CVE-2024-7878.json) (`2024-09-25T14:35:08.010`)
- [CVE-2024-7892](CVE-2024/CVE-2024-78xx/CVE-2024-7892.json) (`2024-09-25T14:35:08.167`)
- [CVE-2024-8175](CVE-2024/CVE-2024-81xx/CVE-2024-8175.json) (`2024-09-25T14:15:06.400`)
- [CVE-2024-8364](CVE-2024/CVE-2024-83xx/CVE-2024-8364.json) (`2024-09-25T15:08:08.503`)
- [CVE-2024-46382](CVE-2024/CVE-2024-463xx/CVE-2024-46382.json) (`2024-09-25T16:56:09.927`)
- [CVE-2024-46394](CVE-2024/CVE-2024-463xx/CVE-2024-46394.json) (`2024-09-25T16:55:15.023`)
- [CVE-2024-46461](CVE-2024/CVE-2024-464xx/CVE-2024-46461.json) (`2024-09-25T16:35:11.207`)
- [CVE-2024-46983](CVE-2024/CVE-2024-469xx/CVE-2024-46983.json) (`2024-09-25T17:46:48.927`)
- [CVE-2024-46984](CVE-2024/CVE-2024-469xx/CVE-2024-46984.json) (`2024-09-25T17:49:17.007`)
- [CVE-2024-47060](CVE-2024/CVE-2024-470xx/CVE-2024-47060.json) (`2024-09-25T16:43:47.267`)
- [CVE-2024-6061](CVE-2024/CVE-2024-60xx/CVE-2024-6061.json) (`2024-09-25T16:16:22.767`)
- [CVE-2024-6062](CVE-2024/CVE-2024-60xx/CVE-2024-6062.json) (`2024-09-25T16:13:02.947`)
- [CVE-2024-6063](CVE-2024/CVE-2024-60xx/CVE-2024-6063.json) (`2024-09-25T16:01:30.283`)
- [CVE-2024-7207](CVE-2024/CVE-2024-72xx/CVE-2024-7207.json) (`2024-09-25T17:51:34.800`)
- [CVE-2024-7386](CVE-2024/CVE-2024-73xx/CVE-2024-7386.json) (`2024-09-25T17:15:19.110`)
- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-09-25T17:15:19.213`)
- [CVE-2024-7625](CVE-2024/CVE-2024-76xx/CVE-2024-7625.json) (`2024-09-25T16:15:11.307`)
- [CVE-2024-8354](CVE-2024/CVE-2024-83xx/CVE-2024-8354.json) (`2024-09-25T16:58:59.537`)
- [CVE-2024-8661](CVE-2024/CVE-2024-86xx/CVE-2024-8661.json) (`2024-09-25T16:15:11.420`)
- [CVE-2024-8853](CVE-2024/CVE-2024-88xx/CVE-2024-8853.json) (`2024-09-25T17:49:25.653`)
- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-09-25T17:17:35.637`)
- [CVE-2024-9003](CVE-2024/CVE-2024-90xx/CVE-2024-9003.json) (`2024-09-25T17:18:44.523`)
- [CVE-2024-9009](CVE-2024/CVE-2024-90xx/CVE-2024-9009.json) (`2024-09-25T17:46:59.077`)
- [CVE-2024-9011](CVE-2024/CVE-2024-90xx/CVE-2024-9011.json) (`2024-09-25T17:48:14.820`)
- [CVE-2024-9031](CVE-2024/CVE-2024-90xx/CVE-2024-9031.json) (`2024-09-25T16:52:25.327`)
- [CVE-2024-9043](CVE-2024/CVE-2024-90xx/CVE-2024-9043.json) (`2024-09-25T17:54:05.297`)
- [CVE-2024-9120](CVE-2024/CVE-2024-91xx/CVE-2024-9120.json) (`2024-09-25T17:35:12.403`)
- [CVE-2024-9121](CVE-2024/CVE-2024-91xx/CVE-2024-9121.json) (`2024-09-25T17:35:13.613`)
- [CVE-2024-9122](CVE-2024/CVE-2024-91xx/CVE-2024-9122.json) (`2024-09-25T17:35:15.597`)
## Download and Usage

View File

@ -25430,7 +25430,7 @@ CVE-2007-2530,0,0,27fc9612c9ef7bab2c461f4deaef10f8d613ed2e3612de59f03a3a832d1696
CVE-2007-2531,0,0,fc6c7e03f835ecd8f7e1aa0bbb94000901e70d2d2de7cd2cc522f47225e50b07,2017-10-11T01:32:15.847000
CVE-2007-2532,0,0,a3f74747fb0fd0e9932e279b29324a59a4a1948ef61dbe4bde4b65e155e2ba9c,2018-10-16T16:44:25.273000
CVE-2007-2533,0,0,35dacb57c46cfcc497677ea34ca5a5283edfc6bc21e54343e462c2f9f8cb0c63,2017-07-29T01:31:32.033000
CVE-2007-2534,0,0,20797b037ff2d5eb07f1b82fd8ac4c744a31821e862747f23d6c60a1672d37df,2024-08-07T14:15:22.890000
CVE-2007-2534,0,1,03b678b360dfe3ee149acd823e6b2984a71d4619a1218834e1983f141979a7cd,2024-09-25T16:35:02.057000
CVE-2007-2535,0,0,3d3f6a3777ad8e2e82443a4af059d57801b151d3e087be973ba2b70ba747302c,2018-10-16T16:44:25.963000
CVE-2007-2536,0,0,14dfba36b9340d37bfe74040e0d90eefd212d0fff611be2d31e9b59e98c903f4,2018-10-16T16:44:26.900000
CVE-2007-2537,0,0,6c61cb6b95ef930e39145c72352e80d02222e248be973bb1a9da334a59ceea81,2018-10-16T16:44:27.617000
@ -65478,8 +65478,8 @@ CVE-2014-10008,0,0,c9839b42466df6beb62d1b1e45c36224bda5f6d1ad22c43d836c3d23656d4
CVE-2014-10009,0,0,df296901c13fe6baff7d5ac20357c2eef6ecf7f3d71325bb64d51a88d8548002,2017-09-08T01:29:02.917000
CVE-2014-10010,0,0,6d9a81d47c969b3ea791d6753382dd65d7c2a93676798dda7f32f07b0c98d2a8,2017-09-08T01:29:02.963000
CVE-2014-10011,0,0,092ee8c8c8a45c1155c1b71aed77e090fe2cea3f82188e10cd61e6d7d7895e81,2017-09-08T01:29:03.010000
CVE-2014-10012,0,1,daaf8c969b9f4ebaf47fca9d506670973bd23dbf2e51d7a2b0942b97123277ec,2024-09-25T14:33:47.597000
CVE-2014-10013,0,1,baf4579213fbe6c83dffa430a45ecb4104282f326ed9edc70c88f069430960bb,2024-09-25T14:33:47.597000
CVE-2014-10012,0,0,daaf8c969b9f4ebaf47fca9d506670973bd23dbf2e51d7a2b0942b97123277ec,2024-09-25T14:33:47.597000
CVE-2014-10013,0,0,baf4579213fbe6c83dffa430a45ecb4104282f326ed9edc70c88f069430960bb,2024-09-25T14:33:47.597000
CVE-2014-10014,0,0,305132c6d7e4206ba7c86202f4d8962c03eede73f05aae003b37d8624f37ec52,2017-09-08T01:29:03.217000
CVE-2014-10015,0,0,8bdaa58d6e6d04c6a3a852aeb6795ecd8f6bedd5de4ec2648b0a7afed602d848,2015-01-14T00:20:07.893000
CVE-2014-10016,0,0,7482aabf75f9d7ccfa9665d6dc9ff1ecb0553351c5f6ecc3fd28bb637df16ff3,2017-09-08T01:29:03.277000
@ -153831,7 +153831,7 @@ CVE-2020-24074,0,0,59fdc34b4f7dd03fb4891733b958226ee9c62d0393073e6dadd8229420004
CVE-2020-24075,0,0,a4e1c0929a794592036d4f4f55f2018c473c4420020ce6d38d3ff859bb8f2b54,2023-08-16T15:38:26.680000
CVE-2020-24085,0,0,36dc9ecfad21733adba79f670b8a0c7f72d1bc23a9ed5c08a1249114aa915aee,2021-01-30T01:52:56.210000
CVE-2020-24088,0,0,5daaaa8199391d28694f1b5e660719fee34f66a68451cf84904db2a0d6ae742c,2023-09-13T15:03:46.090000
CVE-2020-24089,0,1,282b4d81fac57266234ac87556408f747c8f5763ce7f614722ab28a41c09cd0a,2024-09-25T15:35:01.817000
CVE-2020-24089,0,0,282b4d81fac57266234ac87556408f747c8f5763ce7f614722ab28a41c09cd0a,2024-09-25T15:35:01.817000
CVE-2020-24102,0,0,d3877bead379765bc8bffb763a2d8dd99333c47ae5cb0b72e7c15b6d60e1c603,2024-08-01T13:42:06.163000
CVE-2020-24104,0,0,fbb4efcf58d1f727ffff0ae67b74aa346d7d8b26414283515bb2ec728cd84fb4,2020-08-31T16:29:12.210000
CVE-2020-24113,0,0,a33d0a4b1ae816dfcdb9871437627d7bc94b10a4e745b33597c039104d4ac8f1,2023-08-28T20:09:43.660000
@ -190734,7 +190734,7 @@ CVE-2022-21441,0,0,bc2ca46e6b7937a154c140b4a5ab92f0fe51eb40dd60d8e39ccd8ee9b50cd
CVE-2022-21442,0,0,257f19bcc8308bc457fa0199ecf1803ecbe3efe979daa70e98bbbd82ecfc0db4,2022-04-28T13:28:05.600000
CVE-2022-21443,0,0,0a55afeb6e47955f04f9d4642999e8ade129ce15078f095634d2e8d92fadc82e,2024-06-21T19:15:22.373000
CVE-2022-21444,0,0,5186be85aad1c4d733889f4a1f5150301ec25d3c487f0e278a98712336303143,2022-05-10T17:46:03.480000
CVE-2022-21445,0,1,1d4294dbd66c8e237cc0614165de3c6698917adb7a62a99d78c027fed19f825a,2024-09-25T15:14:05.637000
CVE-2022-21445,0,0,1d4294dbd66c8e237cc0614165de3c6698917adb7a62a99d78c027fed19f825a,2024-09-25T15:14:05.637000
CVE-2022-21446,0,0,6df2d5472ab8a30f78a13d35e05951c925360ed3964b8391492edcb6d5f83424,2022-04-28T13:42:16.247000
CVE-2022-21447,0,0,f80ea28619779d9bdde592cde6cc89b379fc127f0863353efe45deee94a406c5,2022-05-02T12:43:42.497000
CVE-2022-21448,0,0,93c9b9807154fbdebfb139861e1ac56e4abb764f7d6b8097c300b3d4c3ddacdd,2022-05-02T12:53:57.220000
@ -200169,7 +200169,7 @@ CVE-2022-32534,0,0,49082fcd77bc9ed33ce1ca5189b1d0fff5c5b4fc85b523f95d21dad8c0624
CVE-2022-32535,0,0,c23527abbc835749505ee2ce59cc5365f156b2932be4767c37f320c75fe6f7ea,2022-07-01T13:57:39.323000
CVE-2022-32536,0,0,7cf13b78624f79eae1ae83be4b8da553ca755efbcb608aac7283ac023a1cef99,2022-07-01T13:56:45.913000
CVE-2022-32537,0,0,bc4d027c93a618d2581c415009b913d71d9a1e29481c76d490ed8c1944dcac0a,2023-11-07T03:47:51.340000
CVE-2022-3254,0,1,9dff466e43c2e9ed9ef88d50e2ab6441513af00d720a4c72cb80cf541b81175a,2024-09-25T14:33:47.597000
CVE-2022-3254,0,0,9dff466e43c2e9ed9ef88d50e2ab6441513af00d720a4c72cb80cf541b81175a,2024-09-25T14:33:47.597000
CVE-2022-32540,0,0,fd7100497f3d3aa8a4681d2cd3bf4b490bda3e818a2bf43c35f604d14b207914,2022-10-04T14:38:17.087000
CVE-2022-32543,0,0,afe29426622bdb7e68cda90003e7668fad2ff96f469836d522dfffd3aa158d9f,2023-06-29T14:55:58.867000
CVE-2022-32544,0,0,4d9e4c16a6d076dc02fc77f9d1610ed7b6413cdf8bc1bd1e43ca35c4bb81c866,2023-08-08T14:22:24.967000
@ -213515,10 +213515,10 @@ CVE-2023-0965,0,0,f364c07d7f21f2f13d7f65238cb1ab921dd4751f28ac310c9cd79b0b72a23d
CVE-2023-0966,0,0,ff724625f2c4e32e0158333eea2b32d9f1a9b03d6965b4045cdeccc269f65973,2024-09-07T12:56:42.300000
CVE-2023-0967,0,0,32992b9773623ae1c67a0f75211aca2f84f7fc06c270510c579b6ee175bb9ae8,2023-04-17T17:03:08.577000
CVE-2023-0968,0,0,95b0762f374679c0942698e686febcb31a83eacf7a4dfe16c37d1d71500ebc4f,2023-11-07T04:02:03.980000
CVE-2023-0969,0,0,b67f6afa39fcaca23cd4c00a353d5c1bc0f825a6706fa07ca5f610d2efc71b89,2023-06-28T14:59:30.573000
CVE-2023-0970,0,0,2d362919f6c88e7b11acad34cae9c095387eacfcb2c59c5b5958ba4fc0711d12,2023-06-28T16:05:03.873000
CVE-2023-0969,0,1,53f811df46d4459a3e48a262078a5d43a264922b54dbc03a90b194ae71a024a5,2024-09-25T16:15:06.440000
CVE-2023-0970,0,1,f747e3e636628f0354bd3e65bfda63dc0e744c4c96d16a00cf4b0ba4cea468db,2024-09-25T16:15:06.567000
CVE-2023-0971,0,0,99558240d427b189796a3bddc0c8f3692956c3fa55e1ed8ff636f00dcdf7acdf,2023-06-28T16:10:43.917000
CVE-2023-0972,0,0,6354a52938e3e14c2dde0882a762a082145dcb9b29b7f861529430c91bf281af,2023-06-28T16:15:36.920000
CVE-2023-0972,0,1,d0b2b25e0a2f8add4d1141b54103ab37fb60eff064595e1927041740e47ca91d,2024-09-25T16:15:06.663000
CVE-2023-0973,0,0,2ae6508976684d5694e7c37733743e9656bed6b11e24aeac1658f73c6b31bcc7,2023-11-07T04:02:04.333000
CVE-2023-0975,0,0,f4e4c201aa7b5b4d85cf487eb41a658d8e5e408adcd4b74bf689cf72a5ab65ff,2023-11-07T04:02:04.430000
CVE-2023-0976,0,0,5a5fa5d0bedb7eaf47f5985d12ddd7809516e859e2b99ee4db53273cc573cfea,2023-06-13T18:56:11.973000
@ -218847,6 +218847,7 @@ CVE-2023-25185,0,0,1135c662e57f51c34416e024b4987aa850e5741deacd604b74a870538bfd2
CVE-2023-25186,0,0,84fdf198fca54d82274bf23f7a19407034d6d7950ada02a9b488f31cf7adb57c,2023-07-05T15:48:07.843000
CVE-2023-25187,0,0,e89bd4fa4c1c86879c04daf0b42f122bc213686f65f5bd42b68cf2726238ff4f,2023-06-29T19:17:48.053000
CVE-2023-25188,0,0,99a89a05ad15ad65c3e7bcd487b49199dddb071e95c006fb1db1eae71d2117f6,2023-06-30T16:10:18.383000
CVE-2023-25189,1,1,48a0d8067c195d69cf3da3653891774985076f0ee2333ba9aa58d2640bc2742b,2024-09-25T16:15:06.827000
CVE-2023-2519,0,0,8cda41d4e7e8d661e9517bd8596373028e42458752588636e6f9350df8a49a49,2024-05-17T02:23:01.927000
CVE-2023-25191,0,0,85db906bc04b5d6fc3bb6f91c549d5e5b7ee59e11d5b5bb8995020c923f11762,2023-02-24T17:51:34.277000
CVE-2023-25192,0,0,408ab00a0fee17449a1dde61e3baf17726d13732731f80e617385e1174ac9859,2023-02-24T18:02:49.487000
@ -220113,7 +220114,7 @@ CVE-2023-26820,0,0,c35296228f204f05ef326974bb41babe92f7a96d45ad8db8c99c4cd83574f
CVE-2023-26822,0,0,1a194fba67bf8f5ecce1f29303689f8b649cbe8b4ea3451f63d3ab21eea61e2f,2023-04-07T18:45:24.683000
CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000
CVE-2023-26829,0,0,dc1f38e668dc3f89258923e8d76e5f56ba587ffd1793a405c23f4d98f8713562,2023-04-07T17:49:46.897000
CVE-2023-2683,0,0,7a7def7870164485bb345ec384e77204c7d8a0c7f19ef2cbe3c4915c87e0c351,2023-07-05T13:13:07.587000
CVE-2023-2683,0,1,6adc6983e719aef1953b63413e431c1382298d549f7aae82cb0472c8776058c0,2024-09-25T17:15:13.520000
CVE-2023-26830,0,0,9293332e8b49602f252fb9d156aa97f3c80a14c512337cfabc9ec4202356dd45,2023-04-07T17:53:39.373000
CVE-2023-26839,0,0,ca5dfa748f3f05fd0da1bf81d6270601ab25a538422c5c701e24edf2c50309f7,2023-04-28T02:57:16.577000
CVE-2023-2684,0,0,db03b8836c0b86ce9d768cc6105efbaffdf887852957cef92162ca127c8e4f4e,2023-11-07T04:13:08.130000
@ -220685,7 +220686,7 @@ CVE-2023-27580,0,0,49adfe72e2abd2b9132f8e9f105c54c3095346080a8c8fdc9db68f8615c86
CVE-2023-27581,0,0,3be21d9e38984ab40cfdf16e35bd0ec94bf38f82166aa990fa09b019ce7d31db,2023-03-17T16:05:39.477000
CVE-2023-27582,0,0,1a1817c890efe2e9cb7f9b5758e04dfd44298e130771f54319db300ecaa127b3,2023-03-17T16:20:47.580000
CVE-2023-27583,0,0,485632ece7b84277edc8c6c8e35a35af799ce3f1829dea2d8e24153e4ca28fa0,2023-11-07T04:10:00.917000
CVE-2023-27584,0,0,167ce088bd8f9c80da4e6d625fe319f047d2a9162f0ce98f9401931fcf08cdbd,2024-09-20T12:30:17.483000
CVE-2023-27584,0,1,0d1bdda5bc7c29760463b4c8c6012f87b707998aafeaeb5bf167be344b292673,2024-09-25T17:28:33.473000
CVE-2023-27585,0,0,0445bd17c5084701b2dbcf65f77e303187fa2b90831341ed725bac756a8cffd0,2023-08-30T01:15:37.417000
CVE-2023-27586,0,0,72de1619c31b9c2ff4ad09f40e3b9c53d6bc1c9f49761fe93846248e8881b816,2023-03-23T18:23:58.923000
CVE-2023-27587,0,0,ff84401de0a75d958d75bc60aaf34fc3791f8b67e0e2909ed4ac19eca27c4613,2023-03-17T16:26:13.203000
@ -222393,7 +222394,7 @@ CVE-2023-29487,0,0,00f0215644182ce533f7be2f31ee60331b6b2d670b25cebe99fccf5d24f06
CVE-2023-29489,0,0,eeb44832099785d7672fc44fccff777478ebffcce86e943bc666648f94e128cc,2023-05-05T18:12:20.760000
CVE-2023-2949,0,0,3eb161c032c6dec305ddf5dbcd36990b595d88b2b919aff79d7a4f970d6f18ad,2023-06-01T03:51:11.007000
CVE-2023-29491,0,0,55ea1830228950a279eed0bbf0476eadd4c3d7fe358ad1881edead01d4efe705,2024-01-31T03:15:07.860000
CVE-2023-29492,0,0,b195e26cbfb0451de7df344cfaffc51284718b8452a79cc20350ff44bf78271f,2023-04-18T02:16:54.183000
CVE-2023-29492,0,1,70e0ed7b29ef52d97d8e72fdeaf049b8151cceced6b95f2e8dd41db754a3218b,2024-09-25T16:35:03.390000
CVE-2023-29494,0,0,471ba052844f3c21aa20101a87ec812294ba4bf6d13f0e66db2344226c2ced42,2023-11-07T04:11:19.913000
CVE-2023-29495,0,0,856c0b36503e9c48d9c2a0c2c48c36020c7bde67dd0c0d2ef3043353163fc65d,2024-01-30T15:18:07.920000
CVE-2023-29497,0,0,f48f7a47b2ff6bd230ce340dbe0eab6f75349f5cc601bdc5df7e638138ea9db8,2023-10-05T13:33:08.890000
@ -222787,7 +222788,7 @@ CVE-2023-30223,0,0,e3aaa3a915e76588dcbcd0a115df5f367f43c60c48751a13cfff84871436f
CVE-2023-30226,0,0,b0df8ea2c9895183517578551da63c583b445efacab6de1c9b873ebcaa46e148,2023-07-18T20:32:10.273000
CVE-2023-3023,0,0,d12785a583e2f3f2929a4f39e70f5ad2afc3ceb960acbddd96bc0e8ce16c2249,2023-11-07T04:17:47.303000
CVE-2023-30237,0,0,d641746a1923466abb27aaed0db09e261de62698f0743788d56f032e6464a28b,2023-05-16T15:12:00.423000
CVE-2023-3024,0,0,b456a8d8c7db0ed45664bb62864ab33ca1fd9d4f988685dacda20a024f987411,2023-10-06T13:22:29.397000
CVE-2023-3024,0,1,04399d95dee8c8bfffc2e5f8e6aed99675c1c0351cfc18d4bed71245d26fe105,2024-09-25T16:15:07.607000
CVE-2023-30242,0,0,d77da56c0f096ef62f932e920adf166cc26912cae32c98ade9bc341a29833075,2023-05-11T15:10:27.660000
CVE-2023-30243,0,0,ee801e891564b70fc3a9d642f985f24382494cdfeaaabbc8015230509b4bcc63,2023-05-11T14:27:54
CVE-2023-30245,0,0,91ba5bff6e9cfdc87b7a3b340228f7b251da33d1979c50f43f94245b2e82d66b,2023-05-24T17:09:02.543000
@ -223496,7 +223497,7 @@ CVE-2023-31095,0,0,98e0f47eba8da250ce26faae77d30e0457e0c45653a31789fae2ad954aab3
CVE-2023-31096,0,0,a698767f9322d993190762ac896ddab6d6251e7fd40e72d56e0e836c0e80b816,2023-10-18T20:27:16.947000
CVE-2023-31098,0,0,7762b7eafd22172ea8485d8980463d4841a6c3b6a880a4a18cc3ad17d161a68c,2023-05-31T13:55:07.513000
CVE-2023-31099,0,0,316dca47a441bcbff49b7c01682f0edc834d3579c34610a0d65d4f7cacad7083,2023-05-10T03:53:41.293000
CVE-2023-3110,0,0,cb45d3e424e5f4d9ba44917b64a5258a7d77c882331cea6e65d589e098116cad,2023-06-28T15:59:59.863000
CVE-2023-3110,0,1,b29dcd6052905acdf5c62021f47c31535233f1a817dcc0ff8104fbe3e3af0bcc,2024-09-25T16:15:07.760000
CVE-2023-31100,0,0,52728b9e8ab26aa70b0ab55039f170907999be466f5e8b560dabc4fb805a29bd,2024-02-01T02:30:22.687000
CVE-2023-31101,0,0,77f4e544f11b5e739b1479f6e19b6ccd2456975f67b8561aaa2c58229b75968c,2023-05-27T02:26:38.467000
CVE-2023-31102,0,0,5080e71e8f917eeae0dd70983299a81d3f1547c01aad2307d315c1afe001c7a1,2024-09-06T14:35:01.717000
@ -226355,7 +226356,7 @@ CVE-2023-34865,0,0,1b36d74bd7693679d2f94ff1e9fb2488fe2b5cced51b28d04dd34209170ce
CVE-2023-34867,0,0,f056fcac036e312217370b8455714a327494e08f4bbfd8fe2b1911cfe3d7b2ed,2023-06-23T18:46:59.963000
CVE-2023-34868,0,0,58b71d1b502c9c6ee43947f61f2f5d7875e5e2d61cd2f3f3320aa3c9e0ec4dea,2023-06-23T18:34:10.497000
CVE-2023-34869,0,0,8bb225a426cfc8ddd2a25878c0522550b2b532884374456e012b0d892be82fa1,2023-11-07T04:15:47.680000
CVE-2023-3487,0,0,2fb9c705ca5893e1b59ee711f338cd42541dcf394108567502bc70a6a95857aa,2023-10-27T18:50:10.740000
CVE-2023-3487,0,1,95caefd0b868babb07f36055e4d235376d51e5914475500a79298bae605b7cf5,2024-09-25T16:15:07.870000
CVE-2023-34872,0,0,8405661666f10931e63f987f8b84bd138c74889a0c89b5fad76396479a42dd8d,2023-12-06T03:15:07.057000
CVE-2023-34878,0,0,1590924f136c24f4935a016e801f63a0247f36726e2be418973057b73731eb61,2023-06-22T17:12:17.883000
CVE-2023-3488,0,0,a70591268fa234c71dbf0f2e10e35a45b583dbcb37cfa3629a3b44a1aae47ba4,2023-08-03T17:10:17.167000
@ -227993,7 +227994,7 @@ CVE-2023-3726,0,0,ac750baaeff2ed8dad84b40df631d00ba8ce0ef4cbd1cbbd2025aab71f295e
CVE-2023-37260,0,0,9591f29f2336c88423330f41871bd7bd98ea2f435e69f4e8a0163bb034d3ac2f,2023-07-13T19:25:56.337000
CVE-2023-37261,0,0,c15061219f2054586e998e8e4191db1232262de421297ca29f05c987298cc1ac,2023-07-18T18:12:11.467000
CVE-2023-37262,0,0,d0455064d20e123f0efdfc579aca1bed0d88c3dfbf5f4865e75fc0095d4745d9,2023-07-18T18:12:57.687000
CVE-2023-37263,0,1,23af5506fb46073bfd90bf07738035dd86dce7d0db119ec5eff286db7e24445c,2024-09-25T15:35:06.763000
CVE-2023-37263,0,0,23af5506fb46073bfd90bf07738035dd86dce7d0db119ec5eff286db7e24445c,2024-09-25T15:35:06.763000
CVE-2023-37264,0,0,2d98c554455d093e3319d84a2315bcc53035940b0f3139573004068fd205692a,2023-07-18T17:55:49.017000
CVE-2023-37265,0,0,95fd52ebc6ae133f92282bc8388d2b5ded8f235541e60455426da249c877067e,2023-07-31T13:05:33.253000
CVE-2023-37266,0,0,5be0af2b81f1d9b932768440d1721bcb9eff8cc22db486b542279ff33d6e17e9,2023-07-31T13:05:29.030000
@ -228915,7 +228916,7 @@ CVE-2023-38337,0,0,f4c79ade4dd8bc46340daddde44bf3d0768b2f1f21fc874630a9ca34158f8
CVE-2023-3834,0,0,79f59e2e98a9edb2bce976eba92b3e888a255a070425958fd0ee797e6d1975cb,2024-05-17T02:27:51.830000
CVE-2023-38343,0,0,7dd61897313bfa7b6e7a7ec4a51761b31a68820901a904dce649cfbeee64cb1c,2023-09-25T17:09:47.507000
CVE-2023-38344,0,0,6aa70b970a3560f3e6a03901004163337d6930ed6731eb0600cd3abdbbdb7b70,2024-09-25T01:35:51.997000
CVE-2023-38346,0,0,5b6af5a91418cfb0ebf972e7838f5c580de478b91b4c9de27f24859c48d2011d,2023-09-26T14:58:24.360000
CVE-2023-38346,0,1,1157d09e3bce05cb2db63d02f84211a617d750569840f9ffcad9d6bb70270d36,2024-09-25T16:35:04.973000
CVE-2023-38347,0,0,151b29b38988e431ab4b94fc3c03ddfb9ecb32265637f0e94b050567feb248ac,2023-08-11T17:22:46.230000
CVE-2023-38348,0,0,00d9736c3f3f606a3cddbf908203dfcc82d9e4509f9f78f1010036a59ba7a297,2023-08-11T17:50:10
CVE-2023-38349,0,0,bbf302608fbbb3e008be10cb1392e9d7d836667c3108321534aef5bf623f5a43,2023-07-26T21:39:44.207000
@ -229377,7 +229378,7 @@ CVE-2023-38882,0,0,ec5ea47603a3086e4c462ba386dc895b14ddd5086093287271e85209edeb5
CVE-2023-38883,0,0,cd3140914d8c0ffbddee1828a1208821a650be5b41e85c41ea10c0430b03dc40,2023-11-30T14:21:33.187000
CVE-2023-38884,0,0,b5da0fb4dc777fd8639d5172b4dd9aea4eb0ed10d64ef9ac2f442f4a7ce780e9,2023-11-30T14:22:37.007000
CVE-2023-38885,0,0,67e051d301210858c0625bde39e7896fe7b2dbfbfe47cef5c5337fab13eb282e,2023-11-30T14:23:35.557000
CVE-2023-38886,0,1,94472bd9e9147d61ca51246df24167cb9efca241b8d0378ba7368418ce654f8d,2024-09-25T15:35:07.707000
CVE-2023-38886,0,0,94472bd9e9147d61ca51246df24167cb9efca241b8d0378ba7368418ce654f8d,2024-09-25T15:35:07.707000
CVE-2023-38887,0,0,ef6a800e913218682570d1543412894773e7fd59652e5edddda59874ebf59aa3,2024-09-25T01:35:53.460000
CVE-2023-38888,0,0,58087cc61e3ca9f72ca37b211c6f2b3cf8a5b8d6853a9a2b39aabbeb170b1082,2023-09-22T01:37:33.650000
CVE-2023-38889,0,0,a0fef916a432e79e5bd8ea399af336a0c2bb6f7f29a61b363335de74959388c0,2023-08-25T12:58:20.617000
@ -229494,7 +229495,7 @@ CVE-2023-39041,0,0,4d2d80ed29ee24b6cf6a78aa3d12d1c146d9a3291971e1efcab61cd8aac90
CVE-2023-39042,0,0,a7a48f880646aadc134f0732e1d990e50286c7395769d5435f8dbb80591cc8d2,2024-09-05T16:35:08.263000
CVE-2023-39043,0,0,ba87098ff2bd45dc807c6b3c45c4d66fca97b5b793c3dc3373facd890703338e,2023-09-22T13:22:19.643000
CVE-2023-39044,0,0,50243e0bac844c04b7b4f63fd226a1af22956f7d9c562fd19fa07b15eb962106,2023-09-25T16:36:04.260000
CVE-2023-39045,0,1,6d884e440d5100507ad947ab48028b0d01e64df7c86eeb963e462356814b2c26,2024-09-25T15:35:08.613000
CVE-2023-39045,0,0,6d884e440d5100507ad947ab48028b0d01e64df7c86eeb963e462356814b2c26,2024-09-25T15:35:08.613000
CVE-2023-39046,0,0,143f854cafec6743bb41bfbb8e25ead3a2d45ac15cdc3b4a97748ef03fb13246,2023-09-20T20:49:29.943000
CVE-2023-39047,0,0,330bee41b764040dd805e09cfff457ad69307d4794890a3decee0e8a8207a24f,2024-09-05T16:35:09.043000
CVE-2023-39048,0,0,e78542bc4874a647db5adf59501a708f98fb1b693a6bb7216920949ea0533622,2024-09-05T16:35:09.877000
@ -230009,7 +230010,7 @@ CVE-2023-39673,0,0,1383a722f73fa45ec1f409f9bced11a36c7bbb97d093acfe8f3c7683f293c
CVE-2023-39674,0,0,3960c98ff7a06cfa573d9f681ebf121310862d3c5cae123e3ff9f469bbeca873,2023-08-25T14:51:47.643000
CVE-2023-39675,0,0,a2fd8b9d51e0e1e0080a91cc68dd1c3065ba8ba51b711ea573cc7f02e58c64f0,2023-09-22T18:43:26.797000
CVE-2023-39676,0,0,c58b61d951aa8285e7616075d06acc199f6ffa44476dc59aacf6aefafb0e14ef,2023-09-12T12:59:31.113000
CVE-2023-39677,0,1,7689b7378372a2a1e5764de709118ccf2d4a6367a98fb1ed33264ffc1139f47b,2024-09-25T15:35:09.437000
CVE-2023-39677,0,0,7689b7378372a2a1e5764de709118ccf2d4a6367a98fb1ed33264ffc1139f47b,2024-09-25T15:35:09.437000
CVE-2023-39678,0,0,5768a64945dc98c32f9397bc6565496b6289700b44c9156333712cee617624c9,2023-09-01T14:56:42.557000
CVE-2023-39680,0,0,0f1d0edcc59b98882ba5ae1194c193c2446d562066de2b63c33cb78785d6f847,2023-10-26T17:36:04
CVE-2023-39681,0,0,d99ea53c9c5dbc568c58a90c53b41291d128837a76f3340d451cf74637118d0e,2023-09-08T14:16:00.450000
@ -230383,7 +230384,7 @@ CVE-2023-40196,0,0,2c18fe72af7f16859ec0cfc77337e1278666df8b18f95112ec6873d072e66
CVE-2023-40197,0,0,15252a01276b2d00f5439d7894bb462e7fe26d00e74d17d4bf9043503a6b0780,2023-09-08T06:47:28.880000
CVE-2023-40198,0,0,74b320a927aea88cf5ec2943cdb22c19c4a5d4d886ee632f85c4702faf94fe13,2023-10-06T15:38:45.037000
CVE-2023-40199,0,0,f93b388db4620ad54edde6a3f0cba8ccd74e37ca52541e78a5f985a62fb1579f,2023-10-06T16:24:47.113000
CVE-2023-4020,0,0,1d3ff3e39f14f94f4ccc0dd207c83b597df26f7b367f63f5982a02ac1d47fd2a,2023-12-19T20:37:21.960000
CVE-2023-4020,0,1,36992084f5a38a92e5b114219426fff08b7f54e861ab9bb7b79847873dba4042,2024-09-25T16:15:08.653000
CVE-2023-40201,0,0,96c0bda11c7d8aafed97c93fbf9d7174002c633560e878a0bea50678c7041f1d,2023-10-06T16:25:17.340000
CVE-2023-40202,0,0,02ce0ee9e532065d3ec8110515907290b6a6ac08f336f2144dfa6c749aa941e3,2023-10-06T16:24:52.730000
CVE-2023-40204,0,0,b2ef9355887c82c35b632360602127499900794e264bfaccaf874aab676fdd43,2023-12-27T20:22:37.537000
@ -230555,7 +230556,7 @@ CVE-2023-40406,0,0,c231079eb01928b8bbf751f75a639e954e6a22534b400daecfe6d1a7049de
CVE-2023-40407,0,0,ff6e7888e21345c7e6882db9fff3b85ba4a1dd33fc861fbc8d17c958e42ce8ad,2023-10-12T01:54:23.947000
CVE-2023-40408,0,0,8a838c92ea86713ad4ef8c5262255345d230f1e9f4e8369447492d433ffdc0ad,2024-09-10T20:35:02.930000
CVE-2023-40409,0,0,0fd6cbcb82fd727dd717c8d52cb7195ef3aa718ccee1ffb4456194384fd691a9,2023-11-07T04:20:13.650000
CVE-2023-4041,0,0,8a521c9b0e919e28da16f9aa92be2721c331d0861d63b25666c3d4a768192c3b,2023-08-29T14:40:53.097000
CVE-2023-4041,0,1,6ede97fe0321b96de5f2a123ccdc2b44234ea92d49e84ce45ffe648de43f3b52,2024-09-25T17:15:14.643000
CVE-2023-40410,0,0,cf167159847bca50ce6b65b146cab89ae6e47bbc5cf36f5909dcbfe4e7521151,2023-11-07T04:20:13.777000
CVE-2023-40411,0,0,224c9af40ecbd2af6532a741fe650b1e760ad735c156f06f01c96d6fc1f10d52,2024-01-12T14:41:51.583000
CVE-2023-40412,0,0,9c836b9e879b4f609379b15a2029caac8d80f8eb212d30e467ee6b55e0d32041,2023-11-07T04:20:13.900000
@ -231097,9 +231098,9 @@ CVE-2023-41091,0,0,ca1acbfbb48698a0030abb208f0760a15256e3fda004078e03e1a216b077f
CVE-2023-41092,0,0,4e8e931d3ededed79b2045da3cc968b68e4b0145dbe88e1d7c336f100fc82182,2024-05-17T18:36:05.263000
CVE-2023-41093,0,0,e2ec8ffe14945965701d15ef17979727c54dc987034806d91272b18047967a11,2024-09-10T16:19:41.973000
CVE-2023-41094,0,0,e795efab240a0805dca0faef22ec12891be19fc709d62de570a11cabba7cc9f8,2023-10-10T19:40:06.293000
CVE-2023-41095,0,0,deee64e9e520cbd28974f4c3c1b7d02b2c55b60ea677ddead3af0482dd0a784b,2023-11-07T20:35:26.983000
CVE-2023-41096,0,0,52af64b05366a4d43b15642ba40df6e1ae8efc25c5fe20f7a4ec7b8ffa1abd9b,2023-11-08T01:48:37.717000
CVE-2023-41097,0,0,225555e7a96923a582ba79f8ccb5c9ee9b827759fb76ff6066b045a3ae73653f,2024-01-03T17:22:03.797000
CVE-2023-41095,0,1,177941878e5bb1653ee1f949f20555c382f90ba02321d0d46d323e9050a11155,2024-09-25T17:15:14.257000
CVE-2023-41096,0,1,bd326ec60943b89decd659139c45be416116554e0e19a59832973f2d01e7d744,2024-09-25T17:15:14.380000
CVE-2023-41097,0,1,0436ef672b193d9878984b4d43ea4e89fc5377ce41f01664c7f484a6cd337884,2024-09-25T17:15:14.483000
CVE-2023-41098,0,0,1877421a99644398c5448d161e47d1b4f3f34d4c0be4875e9313e545e2d53226,2023-08-28T21:21:37.023000
CVE-2023-41099,0,0,c541702f1a2a5937b975af12a4eb88323b5abfddc3ba442a1352acbd4bacb37f,2024-08-22T17:35:00.720000
CVE-2023-4110,0,0,6f05564b88d67a4e37f9507e8115c927563bedfea67f2dfdbc398b9ca9e94615,2024-05-17T02:31:19.523000
@ -231178,7 +231179,7 @@ CVE-2023-41175,0,0,fbe29740e79a6f110bab7b90278d9d39985394d1613cf8901fe1335b4b651
CVE-2023-41176,0,0,735a0bc0e4dcb12596e8399bf2bb3db1e454d6b0ecbf729493e45efd006cfa90,2024-01-29T17:36:19.543000
CVE-2023-41177,0,0,85d92f4605d3211cf1bde63a5199a5251834ff7f9b179a06c1231042c732c91a,2024-01-29T17:36:01.880000
CVE-2023-41178,0,0,ae4285b4cb6a4ba4be6bd1f532eeda2be8bd03382dfa154527e14597a8ca5649,2024-01-29T17:35:46.797000
CVE-2023-41179,0,1,2bef674c7e750daed2add4f21cbbc303c4db1104b2ba7ed60f9172dacf37b456,2024-09-25T15:35:10.467000
CVE-2023-41179,0,0,2bef674c7e750daed2add4f21cbbc303c4db1104b2ba7ed60f9172dacf37b456,2024-09-25T15:35:10.467000
CVE-2023-4118,0,0,49c8fd5dcf6c9d8b3d7fdb70da024ff5326d11c7e410f78e141b30dbfc95b82d,2024-05-17T02:31:20.433000
CVE-2023-41180,0,0,1b43d9ebf796521501b25c4d1df423a5fa172bc47aa4e768647fe9d6437306b7,2023-09-08T17:15:34.357000
CVE-2023-41181,0,0,ce8d7f4f3537484fb37642fb235ff955f751e8845ab8f79a0432507c247ddc49,2024-05-03T12:49:24.027000
@ -231622,7 +231623,7 @@ CVE-2023-41797,0,0,d7e4633821167d99054cbec7b694b6e4999a2302a809bdbebc652ab0389a3
CVE-2023-41798,0,0,83e9fcdf95a46f239202f5d75ee32f7f07fe571137e40d0e2853e0e947c05e6b,2023-11-14T20:08:51.377000
CVE-2023-4180,0,0,5d3c1912575569ebb9e0756b8786704fe9ca7f2bb609446e2b417d106a3cb85d,2024-05-17T02:31:24.523000
CVE-2023-41800,0,0,178a3a78ea773c20c95721fa0242d9947f201fe84ac849334bbbe1d425cebb3a,2023-10-04T13:24:01.053000
CVE-2023-41801,0,1,7c42397651beba286442212d368a2bacaf0e8b1a7c1fc3db375979c2f1067bfa,2024-09-25T14:33:47.597000
CVE-2023-41801,0,0,7c42397651beba286442212d368a2bacaf0e8b1a7c1fc3db375979c2f1067bfa,2024-09-25T14:33:47.597000
CVE-2023-41804,0,0,8149d0401ab2252928bb8a0da4030ea53ead1f11056c77b9bb3565608fa9dd10,2023-12-12T16:59:18.847000
CVE-2023-41805,0,0,82c89112cdbc1fcd641e2f0533d0143ae2c950801f8544c0f29b9536a5df601d,2024-09-20T19:07:21.190000
CVE-2023-41806,0,0,4ddc5fa3c904efe0db4807d8335e589d7a5cb0b3231a4c5a9500fe7c2ee2a163,2023-11-29T20:57:54.670000
@ -232358,7 +232359,7 @@ CVE-2023-42796,0,0,5cfb091fe1dbe6507a85154ef5245e6811b2df11a098a4cde7edf2a9af6af
CVE-2023-42797,0,0,03c8f3e71a945929e84b9db5605983b40db1ce0e95fd50de1cd8e26ab8c216e3,2024-01-16T15:29:43.977000
CVE-2023-42798,0,0,adc434cb66de4ebb0eafd45a46135c8e7705fd6a0e1a9c1b970279560849ba82,2023-09-26T14:34:42.430000
CVE-2023-42799,0,0,6158777c7e2fd2896ca0e66d81eb41b80eeceb6b85ae57d9c1ffdeb847adf45c,2023-12-20T14:46:20.553000
CVE-2023-4280,0,0,88e939b69d4caa1fdccb8b279cfb486407c3c9e742548dbc68e5279dd331e59b,2024-01-09T16:51:14.477000
CVE-2023-4280,0,1,420ccb9ed75f1620edc9bdea0d2c993644debade9f6400e1831d2d82741353aa,2024-09-25T16:15:08.820000
CVE-2023-42800,0,0,313e0835b2b210142cf82e79664298222eba71a846e936025c82e38c5c7f8bd7,2023-12-21T17:17:02.843000
CVE-2023-42801,0,0,292c2290fb7f791c4d77fa4e8c6a6a992c808902185809589cb4185e25e64c30,2023-12-27T19:29:03.877000
CVE-2023-42802,0,0,057ebe2ab68864abad4bad69fe1f83be24a035730115139337b50b33774e2fed,2023-11-09T18:39:13.100000
@ -232992,12 +232993,12 @@ CVE-2023-43757,0,0,65e67c23b9757842bfee58d1e8d2a004690171bc97b4c5835e48b3b9396b3
CVE-2023-4376,0,0,caa6c3c07fad165d81c5d5776b92b6518eb1a0f6aa8ef1f63df4da6b5f4f61f3,2023-11-07T04:22:28.740000
CVE-2023-43760,0,0,36c037731733e2e294a5843b659d2aad1605abf55a2d4ed65fefea849d3e8935,2023-09-26T14:51:03.770000
CVE-2023-43761,0,0,9e9dac75946f77ad0027c20f9162ece0ed163d5b30b82b9069d36c1135d5e013,2024-09-25T01:36:35.440000
CVE-2023-43762,0,0,85fe4a7be19e4df6ad7574a946086d487a7cebdd042e25cebf6b877e02ed4c7d,2023-10-13T16:15:12.030000
CVE-2023-43762,0,1,4a3d5bb9546efc6b15b9029951b6d8fc607ee5505d1a91de00822efae7fc1362,2024-09-25T16:35:08.433000
CVE-2023-43763,0,0,ad3b6d3f3e0da3b7452322da5a003e6c3c066cc43784fd16ddb4173105c087b0,2023-09-26T15:17:46.050000
CVE-2023-43764,0,0,8889491e93115695f3fc431c4c0f9d76300cca9f46772a36c586711caeafa3d3,2023-11-07T04:21:29.433000
CVE-2023-43765,0,0,5c4872389b318f4c7530f1c578fdad56afadf196ae8e0f4ba8c447bd204a6995,2023-09-26T14:52:04.797000
CVE-2023-43766,0,1,c6a88587a2a8ee8cde523a53dcacc6d0ba77e01352696079cdce368cede349b6,2024-09-25T14:35:03.310000
CVE-2023-43767,0,1,b347065f41a38bb3b988ca8b34fc42840783a6b7af72cc203506ace26949c90e,2024-09-25T14:35:04.100000
CVE-2023-43765,0,1,70a5591427de6ddb2b0c05d9b262d5513d4ac75d65503cb95c39e68ab5de9574,2024-09-25T17:35:09.517000
CVE-2023-43766,0,0,c6a88587a2a8ee8cde523a53dcacc6d0ba77e01352696079cdce368cede349b6,2024-09-25T14:35:03.310000
CVE-2023-43767,0,0,b347065f41a38bb3b988ca8b34fc42840783a6b7af72cc203506ace26949c90e,2024-09-25T14:35:04.100000
CVE-2023-43768,0,0,8c20823b844f3a9e03681ad3a89abbeac68d3ffbdb0715685e9ab48bbbd54ca4,2024-08-05T15:35:06.983000
CVE-2023-43769,0,0,c9ac3b45a6e5a8e8f9bade6fa502768ac8c514f0d2ca4cf91d7c69f448e9810a,2024-02-29T13:49:47.277000
CVE-2023-43770,0,0,f29dc8bdb9d7b048af488c931e5105cc1ca7a11e56981fca4cbc06661f550bcc,2024-08-14T15:27:53.727000
@ -238108,9 +238109,9 @@ CVE-2023-5139,0,0,1703630468285261ed8fc04774841fb8122f0aa2e090a95b0549614dd0a159
CVE-2023-51390,0,0,1ec52342e74e0a9387acccc87ff54c51a5029a59bad7e42ad3f15fa93e7d2252,2024-01-02T16:25:35.387000
CVE-2023-51391,0,0,e894166f0bc1eaf044d8a1533d447b6903e43c193dc6bd758ce18ed7fccf5afa,2024-04-18T09:15:11.370000
CVE-2023-51392,0,0,99781b0d297344404c9a938182515b9eb3e57b2206cc666c8cabd9c886858e74,2024-02-23T19:31:25.817000
CVE-2023-51393,0,0,ea682b55142153f364da3886597877341a7daf91ddc9915880213fe92f7ae00a,2024-02-26T13:42:22.567000
CVE-2023-51393,0,1,139abfb803e26ef22b2ba7e67e5ea6e3ad9dc2dee8a035bb241ec16edd4c052b,2024-09-25T16:15:09.297000
CVE-2023-51394,0,0,d27eeec344a886820a200dad161b001cfca532d09ac4c989e0efe8db665013af,2024-02-26T13:42:22.567000
CVE-2023-51395,0,0,905694c2a45743fb3b9352643716d43d584c6f59709fd0f5849e40a535d76117,2024-03-07T13:52:27.110000
CVE-2023-51395,0,1,a996b0a26c06b74dbdfa8bb23c3c0eb6ccaa9b3ec5296b12351477fcfac45c9a,2024-09-25T16:15:09.650000
CVE-2023-51396,0,0,e3a99e8335041462b192e0bc975805a2bb94f1177bb93a5a3397d522bec34a16,2024-01-05T04:53:57.677000
CVE-2023-51397,0,0,ce8fa13ba2bf8ce93bcdcec3b21bf8760f494288959f87e5c5d38adb78730595,2024-01-05T04:54:05.133000
CVE-2023-51398,0,0,cf693ab5054859b453799819b1a5d5978f8e17a10ee7359acf259b4cc37b1ef3,2024-05-17T18:36:05.263000
@ -240448,7 +240449,7 @@ CVE-2023-6382,0,0,677b8ba78a3950c407d5f70e933225e49d1269bdb2574412cc97645ebd315f
CVE-2023-6383,0,0,04402cf1af000e3b2b2bf470240ece0579ef0dce0c2c101495cc23a086e2498b,2024-01-11T20:02:29.963000
CVE-2023-6384,0,0,9703e1c61b0fd4952ad920f691c7927f056a6d5810f51f36b8c4aebcef433bd2,2024-01-26T19:41:47.807000
CVE-2023-6385,0,0,ae5f06d582ab2698724387cffc86caab8521499d470761485fa67ab8816b8cb6,2024-04-10T13:23:38.787000
CVE-2023-6387,0,0,70fe86f58aa65a7f7ac8d25feea25d2cb57b321eb290d33b100e8e75e3b07d91,2024-02-10T04:10:48.473000
CVE-2023-6387,0,1,83d9048c961115e3308c68394f1fb5f1ca093ff6ada02b7b75cf22a678d2443e,2024-09-25T17:15:14.770000
CVE-2023-6388,0,0,5e071fcd7bffe6b819c4b98cb3bf54bea6c7548de7eed630e94bfdf8d64bd6c0,2024-02-14T20:15:52.940000
CVE-2023-6389,0,0,3bad45658517d50c5a3ea7602cb5b27aa1c9697839a1c46e114a438e1baae0da,2024-02-03T01:20:39.633000
CVE-2023-6390,0,0,99adee0c0316dbc352d6c7dd50407ee58ab46369582299a48ec3ab82aa01d48b,2024-02-03T00:28:00.603000
@ -240858,7 +240859,7 @@ CVE-2023-6870,0,0,b5c182e771fbf62983e0903f942aea7c6d19fb1570eb5dfa3c8f2320d85c57
CVE-2023-6871,0,0,20b7e734e8fdf0433e112f944f82f18d357e3bea2cc64dcf4aad685e971d1f39,2024-02-02T02:29:14.237000
CVE-2023-6872,0,0,724364bff09a1d79a78aaa45d6fbbf4f971d3441905004df82b74b069e300326,2024-02-02T02:29:18.200000
CVE-2023-6873,0,0,49669310eb593a130a8c0b6d9b86743d8b50de862f6be4b06e7aacefd665460c,2024-02-02T02:29:27.507000
CVE-2023-6874,0,0,d4a7ee9e2f6a7a60b8d6e8ac65095c57b3d4e86ca063d24cf334a46e98931354,2024-02-10T04:08:53.127000
CVE-2023-6874,0,1,b82068fd9feb99f841309790de7d0d7de12ec6e8814590c679efe39a2b624443,2024-09-25T16:15:09.773000
CVE-2023-6875,0,0,112ab71dbc43443bd36e485eee215426e7155ea7027f59ddbeb52b546d2a947b,2024-01-18T16:11:25.827000
CVE-2023-6876,0,0,b4edc77fdd5e36942044d6d3efca301bb94b768849844e07f437166240596220,2024-06-07T14:56:05.647000
CVE-2023-6877,0,0,1ba400724cdfa0e83b80abd00aa055ba38b62cc33b1e79011bf973661e716b47,2024-04-08T18:48:40.217000
@ -241327,7 +241328,7 @@ CVE-2024-0156,0,0,8cd5e770d8e5e59c7d65e04a0fa431766acdcdc3da422c86f8e66acb026110
CVE-2024-0157,0,0,b052323977852302a8b3dcef1c5407bc4b130da554cec8becf021fa4a53f3bd5,2024-04-15T13:15:51.577000
CVE-2024-0158,0,0,493e720f8594a13096c6819cd0491d46fb8daaf76a807516ccfa3d60519923af,2024-07-31T20:37:32.247000
CVE-2024-0159,0,0,0c6ed74ef93fe0f2339dad38605d4189f768646821accb8389e98e7b0a8e8104,2024-04-10T13:23:38.787000
CVE-2024-0160,0,1,c92710127c3c68cbfcf31693a730fa150e45b62f8c20846b8836a7583cfb4e6e,2024-09-25T14:25:53.447000
CVE-2024-0160,0,0,c92710127c3c68cbfcf31693a730fa150e45b62f8c20846b8836a7583cfb4e6e,2024-09-25T14:25:53.447000
CVE-2024-0161,0,0,dd7d9dd18beebfb5eb1c0fb111a222d1a21f2e0da1cca5f6b086372a8f3ea8a6,2024-03-13T18:16:18.563000
CVE-2024-0162,0,0,cbdcbc03600ba58dbcdc575cc7249a44d017ce4f0eee1c18c3e62afa66eb3ddd,2024-03-13T18:15:58.530000
CVE-2024-0163,0,0,326c77330b2d430b11602559de70e87e5e5cae16e2045c400e82b135f0a941b6,2024-03-13T18:15:58.530000
@ -241395,7 +241396,7 @@ CVE-2024-0236,0,0,d9697450b7c550696ba826d4a5c09ba44504829011aeb7383b4ef297cfd008
CVE-2024-0237,0,0,3cd4f630d7f09eac73799766111a68cd8d2cbc3d703e5d79b3879a607677b7f0,2024-02-05T22:15:59.487000
CVE-2024-0238,0,0,d4095c0a8e7378c06d38757534fbedffecb0ea0b47a56ee691aeb3f8065bb971,2024-02-05T22:15:59.563000
CVE-2024-0239,0,0,efe7307cc9d65830067699eb43f88203c6dbee64c0fc359b41ac3969d4f4faf5,2024-01-23T15:53:40.833000
CVE-2024-0240,0,0,b233a6ea31364d952bad6d9a89e03b870b20f46b3e0fd256e51fc5ff4d91814e,2024-02-16T13:38:00.047000
CVE-2024-0240,0,1,5e7dee0cc8716762f0a37299c89ab7d408eaea179f73f2ca1b03cf195c0058b8,2024-09-25T17:15:14.890000
CVE-2024-0241,0,0,378734bd689a96b05ae95db86541df391ab2aaff35cbdffab6cea4f33055fcbe,2024-01-10T15:11:15.457000
CVE-2024-0242,0,0,603f0d643835b160962f1ad7acdd9c074fc445f154f88c6c68d0edf3c11246e7,2024-02-15T19:08:40.337000
CVE-2024-0243,0,0,68610412076a7e370f30938c644e93518171abb2434f307575d1a2f3a6537f5e,2024-03-13T21:15:55.173000
@ -243239,6 +243240,7 @@ CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657
CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5809,2024-04-03T17:24:18.150000
CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000
CVE-2024-2035,0,0,110d7e573a79ae4fed8a8a9d020094f1c8f635a8a07029ac6a9636d645716be8,2024-06-07T14:56:05.647000
CVE-2024-20350,1,1,21e842511c18da1a879b2f10ca1346e8d7f33c9571ed56308be51a65b2580beb,2024-09-25T17:15:15
CVE-2024-20352,0,0,b6df069392724fdc834a80403afd09f590785680a76232df596c3f6fea90f0b6,2024-04-03T17:24:18.150000
CVE-2024-20353,0,0,e2f72ffa3936c97cc6267050a0bce7d53259a8a25c98d8322d782dc399b18d7e,2024-04-26T15:22:27.803000
CVE-2024-20354,0,0,2b17296c0b4719e35a35904483c6c06073bfa6005008b3509f848c7bb9f4faf5,2024-03-27T17:48:21.140000
@ -243261,7 +243263,7 @@ CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc
CVE-2024-20378,0,0,1d0c211142ee7b64cb979c7d6fe81a8dda4cc3d613763c0904f9ebf5643e5461,2024-05-01T19:50:25.633000
CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0ec,2024-05-24T01:15:30.977000
CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000
CVE-2024-20381,0,0,206ca6b90b48001500d951647099fc1ca56b0d1770630ec5c7fd8591f92f83a7,2024-09-12T12:35:54.013000
CVE-2024-20381,0,1,1d137d93b0598fd47692ad3c3d2e46a37f7acfa84f78f58b2c3c09528c8e86fc,2024-09-25T17:15:15.240000
CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000
CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000
CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000
@ -243282,6 +243284,7 @@ CVE-2024-20406,0,0,01aaafe449ee420500b1edefdacc3ddc2b6232e6350a88c752467bf1ed2b3
CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000
CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67ce95,2024-08-29T13:25:27.537000
CVE-2024-20413,0,0,eef91fa550f9bdcbf9b050eb11a257fdd75cd91f9c74286f67575b2cf9d8093e,2024-08-29T13:25:27.537000
CVE-2024-20414,1,1,f7f8a07e56cb061cf450dbcf11ac145820185f1273d20051c1db3a138502e1cb,2024-09-25T17:15:15.413000
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
@ -243289,7 +243292,11 @@ CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f
CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000
CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000
CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000
CVE-2024-20433,1,1,d7c9bd36fbcb8ca3ef11f0a4fac7dcffb13819f245822dee919475a5fae89797,2024-09-25T17:15:15.677000
CVE-2024-20434,1,1,4df3a5da2b5d72cf75f6698a910a421cd315ce3b3d348b51e07d11524f2a2f5e,2024-09-25T17:15:16.090000
CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000
CVE-2024-20436,1,1,47c3ec92ef11c0ab1b124636825d16a0aa274475413e01d9be6c494bdf94542e,2024-09-25T17:15:16.400000
CVE-2024-20437,1,1,748f2baa3f86b8c67da3e954dabb92c73fb68f24b5c8c2413994da077aa09523,2024-09-25T17:15:16.630000
CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000
CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000
CVE-2024-20440,0,0,c9c53dc5c2cee258d8848cdc1782766d626f4ac361af7ec1e658341d1dc604f2,2024-09-19T13:42:41.017000
@ -243299,24 +243306,33 @@ CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58a
CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000
CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000
CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000
CVE-2024-20455,1,1,6236028b597326f180238e58ba1dd89263cb30e98cded2fe2b05c03b69440239,2024-09-25T17:15:16.827000
CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000
CVE-2024-20464,1,1,d4787998aafff3ce0cdc812a1f559b2cd60480cc1e3c154fc1bff899b55defc6,2024-09-25T17:15:17.043000
CVE-2024-20465,1,1,025217cc158c216045d663a5773a6334893830270cbd6a58725fb372f8172902,2024-09-25T17:15:17.220000
CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000
CVE-2024-20467,1,1,97c22b2246966de74cba72328e5b5b499a0ab8b55e378bd4691ef2c1d81edde9,2024-09-25T17:15:17.393000
CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000
CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000
CVE-2024-20475,1,1,2be68aed31e19e4a0a97439137334a2085a19983c519c6919ed33746dede5f13,2024-09-25T17:15:17.587000
CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000
CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000
CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000
CVE-2024-20480,1,1,d9fc015eed28bc580ee970e1e4a5b1e4e31140db7b327aa64af8f542ee854402,2024-09-25T17:15:17.787000
CVE-2024-20483,0,0,c3aaa012ac8e934bf0fa344f4717405eb9a54f40a1dd6df07175cd5998974e08,2024-09-12T12:35:54.013000
CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000
CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000
CVE-2024-20489,0,0,21cc73253209554f6b4b15a9223bc3f2b9ae3b7c0f2dd8d7b8823af1edcfee1e,2024-09-12T12:35:54.013000
CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000
CVE-2024-20496,1,1,129a9a36db4edfd3c129f2ac5507d7f75ebb74286527cd3034969de2e9e31bf4,2024-09-25T17:15:18.020000
CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000
CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000
CVE-2024-20503,0,0,e85721e4e1cede24d93f2a47467ca55ab63c155dde7e0c41a923091bcc7e874a,2024-09-13T19:24:37.420000
CVE-2024-20505,0,0,3cc28c634084a10df250df318d1f65f6c920a21d5650beb89eb991b35e09151f,2024-09-12T17:28:47.010000
CVE-2024-20506,0,0,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3413,2024-09-12T17:26:37.643000
CVE-2024-20508,1,1,9d11d92d8d0618ad11b9143f5b8b6fcd26bc6b28daf36d2b0d8b5445dcc1ae0d,2024-09-25T17:15:18.267000
CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000
CVE-2024-20510,1,1,5ebdba214b9449adbfbb079b23b70a7ce9b6e8d5de1b6b591ce43c9fbb977e57,2024-09-25T17:15:18.470000
CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000
@ -244285,7 +244301,7 @@ CVE-2024-21748,0,0,2a197de0adbf993ed118e27e797a4f0c8754f47a7d945195f996e25827117
CVE-2024-21749,0,0,5487855d4429da4fac08226224f1538028a7a5ac2df658cc224a0e240622cf41,2024-02-29T13:49:47.277000
CVE-2024-2175,0,0,e25106a44fdb025eeacb5d45a3528175fd9b5c4474d6e05002e4ccb474d65bca,2024-08-19T13:00:23.117000
CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000
CVE-2024-21751,0,1,b7ed8c4fa6a86b73f6c8da24c7b3692a53b0d8972ec8abb4dfce264018a5c531,2024-09-25T14:44:47.350000
CVE-2024-21751,0,0,b7ed8c4fa6a86b73f6c8da24c7b3692a53b0d8972ec8abb4dfce264018a5c531,2024-09-25T14:44:47.350000
CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000
CVE-2024-21753,0,0,a306f3d58f3ec335b13488f5fd07d845590af6725b02e29d9bbf081cb21b4d53,2024-09-10T15:50:47.237000
CVE-2024-21754,0,0,8eef9cb01c9e62c140e9e4b8ce590b49e1091c67b7edd25a8a35093e89b8087c,2024-06-13T18:36:45.417000
@ -244719,7 +244735,7 @@ CVE-2024-22292,0,0,05f44b540ee4b706deb8e09b5e69b435b9dee71b39c6d96ee3c96b12ff15b
CVE-2024-22293,0,0,296fa146ecd1a55b7646dd9883e3fc5819ea3e43c48385e5a75924ea0264fb4a,2024-02-06T15:44:56.407000
CVE-2024-22294,0,0,5828b62d00c0d214ddf9919c1c3796377ff7531e0fceb3bab86331c9c099e1b6,2024-01-30T17:44:30.747000
CVE-2024-22295,0,0,d8a56e8232d865eb2471c9f7cc7882bfe5253c665fca50e3355b76153ee25551,2024-02-06T15:49:30.457000
CVE-2024-22296,0,0,493c4fe98de6e60c8c5df5aae52d35200af769db6ec74faecc462ef92ed3b5a5,2024-06-10T12:40:41.360000
CVE-2024-22296,0,1,f2df095aa923c12859108c667f113bfd3a25fbe9a3b1b2689ea18af316e3edfc,2024-09-25T16:36:14.417000
CVE-2024-22297,0,0,69db8457fa1d249d320b83331a8449158f3912a853adfc0368560278e4f35b7e,2024-02-06T15:38:07.050000
CVE-2024-22298,0,0,86d41c7c38953434af44ec69f6987e84e3813f9b3dc986536bf16768d7f8791e,2024-06-10T12:40:41.360000
CVE-2024-22299,0,0,687bdc03a263fa90a2cb028d0d28e6c356e2b9adaefe0d5738557ee7430f3c3d,2024-03-27T12:29:30.307000
@ -245043,8 +245059,8 @@ CVE-2024-2288,0,0,cd7c5230343a968ec1284ad6d84a2effc1ddaec094bc18cd1b2aea35c83f88
CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000
CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000
CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000
CVE-2024-22892,1,1,80254893987b632f368888a0fdc9b53a21be3a1356524ad4827824dce5b9c5aa,2024-09-25T15:15:13.430000
CVE-2024-22893,1,1,fbd2f221fbdd703871bbcde8ae8b8446994d44da7421d06d3bdb792f69ec66a0,2024-09-25T15:15:13.520000
CVE-2024-22892,0,0,80254893987b632f368888a0fdc9b53a21be3a1356524ad4827824dce5b9c5aa,2024-09-25T15:15:13.430000
CVE-2024-22893,0,0,fbd2f221fbdd703871bbcde8ae8b8446994d44da7421d06d3bdb792f69ec66a0,2024-09-25T15:15:13.520000
CVE-2024-22894,0,0,ecc90d1f90435a146d50bcd73db1df9adeb9ffb1597740cac1fbe4451cd93336,2024-08-29T20:36:06.063000
CVE-2024-22895,0,0,ed8706063f1e23de8c688f7d1c47a27a8939e76d7f567287b7abe53b8af0f9ba,2024-01-26T19:34:53.417000
CVE-2024-22899,0,0,ad9a2b4d52cbb00f23c5860d056ec6bdcc5b6635f7aa86a4f629c4d09c9c8f73,2024-02-07T17:33:34.347000
@ -245481,7 +245497,7 @@ CVE-2024-23520,0,0,8ff478c5c4b5d739c301da902e3e561a7792ffa17404a3200b51330a193d7
CVE-2024-23521,0,0,588f9fef9e0931685bae8548cadda61591045c56809e69e9531787a263c78369,2024-08-07T14:53:07.043000
CVE-2024-23522,0,0,a52846eb42ad17ad8127f05143918d462e102a0513c46b5ed2f59dacea5e3889,2024-05-17T18:36:05.263000
CVE-2024-23523,0,0,09948d73039e543f65f5a12001864aed427ffc0f0117c9e9dfa8de2b2366d9fc,2024-03-17T22:38:29.433000
CVE-2024-23524,0,1,0803489cedc8d3b84696d90e26589e2f1dfdd06a1522beccf3119dd2645f2c57,2024-09-25T14:48:24.990000
CVE-2024-23524,0,0,0803489cedc8d3b84696d90e26589e2f1dfdd06a1522beccf3119dd2645f2c57,2024-09-25T14:48:24.990000
CVE-2024-23525,0,0,2fe4da7c61ec52781689ef5f10eb4fabb25623b93d66d848e3ba906b64f196ad,2024-05-05T15:15:49.067000
CVE-2024-23526,0,0,807e029925542dd0305ba76d2ef112e9c9d0141646231e69bc0a89a5683f9dc3,2024-07-03T01:47:48.580000
CVE-2024-23527,0,0,fbaf08c918532fa4419949f5ba9061caea7372e46fcf19a02a62eb7a204d2683,2024-04-25T13:18:20.370000
@ -247932,7 +247948,7 @@ CVE-2024-26976,0,0,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4bae
CVE-2024-26977,0,0,1ebc6c5c595b695887aee884e1b3633cb0833cb65f13c96d7b2e671b86068f61,2024-05-01T13:02:20.750000
CVE-2024-26978,0,0,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000
CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709b88,2024-06-12T16:15:11.147000
CVE-2024-2698,0,1,afa7c6d99994d30301dfc895821f75402b97e3dee976fb2af7dea84b7fe08a7e,2024-09-25T14:19:16.097000
CVE-2024-2698,0,0,afa7c6d99994d30301dfc895821f75402b97e3dee976fb2af7dea84b7fe08a7e,2024-09-25T14:19:16.097000
CVE-2024-26980,0,0,66004865e97bac01ca2fcc8b2212adb69ec738c42c9473f52383ac2219c51794,2024-05-17T11:15:08.357000
CVE-2024-26981,0,0,d2097042ff43763161fba07eb2edb36cfb373acac608a1af8d5b7b1aed54db35,2024-06-27T12:15:23.460000
CVE-2024-26982,0,0,1a2169fa3b40190b3ed39d1072c0508ff86c68871ae50c9090fd9edb12452c09,2024-05-03T06:15:10.953000
@ -250172,7 +250188,7 @@ CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe201
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000
CVE-2024-30128,1,1,820869ef61e83fbf81c3f8092c37a6f29489d0c1ee72c33c90c66bd0edb64c12,2024-09-25T15:15:13.717000
CVE-2024-30128,0,1,789b25625375c55bddf46d13ba3688b4c8905e407ee92c25082f7b38fc23b49a,2024-09-25T16:35:10.083000
CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000
CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000
CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000
@ -250910,8 +250926,8 @@ CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2a
CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000
CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000
CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000
CVE-2024-31145,0,1,3c68d6c42a82be69732bb07ae1510acb165a3f045f1d558a63e873d817b2f394,2024-09-25T14:35:05.397000
CVE-2024-31146,0,1,6fec4a23cf47e3198ae7c71002553dfd83f463d212841c68a9f9e0964d16adf0,2024-09-25T14:35:06.133000
CVE-2024-31145,0,0,3c68d6c42a82be69732bb07ae1510acb165a3f045f1d558a63e873d817b2f394,2024-09-25T14:35:05.397000
CVE-2024-31146,0,0,6fec4a23cf47e3198ae7c71002553dfd83f463d212841c68a9f9e0964d16adf0,2024-09-25T14:35:06.133000
CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000
CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000
CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000
@ -251115,9 +251131,9 @@ CVE-2024-31347,0,0,acf8f05b8434aab28c056143d3c5bbf346bc17b2a72c670eeeca8cf6f2e47
CVE-2024-31348,0,0,21fb9d543e6e3e7eca659bafa6b30c57732d01c43a441e87c8a8bc6f61ff0e61,2024-04-08T18:48:40.217000
CVE-2024-31349,0,0,6958dc31882ac788c6aead8b8caf022481ebc40e925e57f6fdba5545c64b5bac,2024-04-08T18:48:40.217000
CVE-2024-3135,0,0,14787e54c44a14e19f931debd6e7b0362645939106d66f074d2eb61a2e05c4fb,2024-04-16T12:15:10.367000
CVE-2024-31350,0,1,632f223e6b1eb6174b5b006d92158547f477320a7ac1ccf51cf9535b4edc5d68,2024-09-25T14:36:25.450000
CVE-2024-31350,0,0,632f223e6b1eb6174b5b006d92158547f477320a7ac1ccf51cf9535b4edc5d68,2024-09-25T14:36:25.450000
CVE-2024-31351,0,0,bcbac2112f543a47a582400e16158e61b20d74c688ac093896e1aaf7d515575a,2024-05-17T18:36:05.263000
CVE-2024-31352,0,1,1efeab1b8ac23352d588e7c493517298cb74ce4d73067ae81649c047f0e64e13,2024-09-25T14:37:38.550000
CVE-2024-31352,0,0,1efeab1b8ac23352d588e7c493517298cb74ce4d73067ae81649c047f0e64e13,2024-09-25T14:37:38.550000
CVE-2024-31353,0,0,e50827540a58fe3cd0fcdfc9ae9a072f34f1953d48a4cc1bcabca911b7d42b59,2024-04-19T19:25:34.677000
CVE-2024-31354,0,0,2021071244b49d04bfdae8f1fde1b120ffd4deb5b549bedcae3ab4e58eda06ff,2024-04-15T13:15:51.577000
CVE-2024-31355,0,0,44ccad3b09c334b6cae7bae0ef859237dbf5b126bcbd1960091f3a7b56f3bd0e,2024-04-10T19:49:51.183000
@ -251284,7 +251300,7 @@ CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db
CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000
CVE-2024-3156,0,0,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000
CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000
CVE-2024-31570,0,1,13eadb758f3d135a35bcbdc0da22b0a2db0abd3a7461107672829d5315a1eac1,2024-09-25T14:57:47.337000
CVE-2024-31570,0,0,13eadb758f3d135a35bcbdc0da22b0a2db0abd3a7461107672829d5315a1eac1,2024-09-25T14:57:47.337000
CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000
CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000
CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000
@ -251397,7 +251413,7 @@ CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc460
CVE-2024-31822,0,0,f5a60a4c5bebe79b36a24a50e6b8d88f76d622645863bbbdd8c3e989dd18102d,2024-08-01T13:51:14.517000
CVE-2024-31823,0,0,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000
CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000
CVE-2024-3183,0,0,a7afd3858ca4e60bf13c0ad26522a6454f59f043acef65e275ce78e07ed0d6ff,2024-09-16T20:15:46.490000
CVE-2024-3183,0,1,0492ca93cdfb91fe06164185f64dfd6e79760054d26b360873216c2809fc0f55,2024-09-25T16:29:45.630000
CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb008909a,2024-04-30T13:11:16.690000
CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000
CVE-2024-31840,0,0,2a239ae6429f1e619b6ab41616165b617110dec5fa8e072accfd9e1f9e2b5f58,2024-07-26T19:12:02.190000
@ -252048,10 +252064,10 @@ CVE-2024-32698,0,0,fdb6803b5dd86012a335aabef408290e444c359a1e305da67d57de34152c3
CVE-2024-32699,0,0,be768bbce852bcdad18724ac2d72cb1952dc4973a9b2ba3cfb91f099369fe620,2024-04-24T17:16:50.397000
CVE-2024-3270,0,0,cd1dc223e1bb7ba9458930fbe30425847724139a42bec6d9a460ed9757120c1d,2024-05-17T02:39:49.333000
CVE-2024-32700,0,0,9f71f6d70ceff87b6bcc7fb8a5e6f43f08fca897ae80882ba16d02dfaad35456,2024-05-17T09:15:39.783000
CVE-2024-32701,0,1,590776d7a2a9337926f886bf7bdc0c7b75e90c5d9330a73a9643e2a2609d703b,2024-09-25T14:39:47.870000
CVE-2024-32701,0,0,590776d7a2a9337926f886bf7bdc0c7b75e90c5d9330a73a9643e2a2609d703b,2024-09-25T14:39:47.870000
CVE-2024-32702,0,0,59e8f4da0f6fd5e6589c67ea6062707b9cd4e42b90abd493d5af3e3a271b28d7,2024-04-24T13:39:42.883000
CVE-2024-32703,0,1,3114859e77dee092d03e8185c52cd885fc9542e50effa91b7dba4589c6f9db5d,2024-09-25T14:42:02.487000
CVE-2024-32704,0,1,ee9e85f773127b03e0a4d9ccdba4918852ffb014508b669852b9114d4a79bc9c,2024-09-25T14:42:40.943000
CVE-2024-32703,0,0,3114859e77dee092d03e8185c52cd885fc9542e50effa91b7dba4589c6f9db5d,2024-09-25T14:42:02.487000
CVE-2024-32704,0,0,ee9e85f773127b03e0a4d9ccdba4918852ffb014508b669852b9114d4a79bc9c,2024-09-25T14:42:40.943000
CVE-2024-32705,0,0,bd5c1fceeebf3216d7a43299331ad75dd0f53c84521f7a39c88a1d85c984cfb0,2024-06-12T13:35:06.540000
CVE-2024-32706,0,0,37bc04f61db61a090e2ed6154ea739be1bc72b4942ea5b612055456d2c307efa,2024-04-24T13:39:42.883000
CVE-2024-32707,0,0,4c3ded36a06b33a6c90c1fb58c42a7f9398ce197f42ee1d348c6d8c1f58dc26d,2024-04-24T13:39:42.883000
@ -252393,7 +252409,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176
CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000
CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000
CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000
CVE-2024-33109,0,1,b893019ba7a5d5385ca87135f20f011d1b195977e7dba6b9ad5ac8b3abcf4e5c,2024-09-25T14:47:54.217000
CVE-2024-33109,0,0,b893019ba7a5d5385ca87135f20f011d1b195977e7dba6b9ad5ac8b3abcf4e5c,2024-09-25T14:47:54.217000
CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000
CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000
CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000
@ -252990,7 +253006,7 @@ CVE-2024-3405,0,0,1a36e7936640d8ee3b950dcf5e1524049898a441fb6f4e16f7e747a8431e73
CVE-2024-34050,0,0,44c48f4071fada74be495a02e6832030ef2b56f478d8d3c41b6b32ec804128b6,2024-08-01T13:52:14.410000
CVE-2024-34051,0,0,a8120ee635d56801294cebdedb69db5ed1626c2ec52a245c57ea4ea12a675bfb,2024-08-20T16:35:10.510000
CVE-2024-34055,0,0,7427a319dd0c198f833560a21a2edb42d0df57c5ad7676dbca6086efaa896fb1,2024-06-14T06:15:11.650000
CVE-2024-34057,0,0,2a8ecfe7c44315b491d127002756bfaceeb0ba27dfdb08a9c26d894f51c73964,2024-09-20T12:30:17.483000
CVE-2024-34057,0,1,144833c264b8d13b78d4b5938239b0da10202219948b3f1de2d39cbfc6aa2bc9,2024-09-25T17:08:16.017000
CVE-2024-34058,0,0,cfbb8590d55f48cefc143414c8f3d439d56763f898de84d852e391cab57a6cc6,2024-07-03T01:59:19.210000
CVE-2024-3406,0,0,43419e68856488b4b180d817f6df1b0507098cc5d23fc41e4c9ff5a45a3194f6,2024-08-12T19:35:11.330000
CVE-2024-34060,0,0,2c26fe7958cdb41774953e3a2b34d9d42eff17a3a4c0aa9130168786a97a1825,2024-05-24T01:15:30.977000
@ -253154,7 +253170,7 @@ CVE-2024-3427,0,0,04d120d0d57c1b307c564812a2a90dbdd8ac5486efff94685b4ef467060605
CVE-2024-34273,0,0,4c0c9834fc4b51c4a9b9199849839d68fcd657ddede4c1f2ac2a03c81dfcc2ae,2024-08-01T13:52:18.903000
CVE-2024-34274,0,0,04cf77661d40b20b86001188951fe9b60cb45ce0a3967bd1c023b7bfcd657c79,2024-07-03T01:59:50.460000
CVE-2024-3428,0,0,14a86e039ac8cb265b9d604c5dfa68dc90fd322057a6dfd51fe11334090fcad8,2024-05-17T02:39:55.420000
CVE-2024-3429,0,1,1b21bacd9290b4a4c3f7f58bf8aa254378b9b7384a99cfeb925ecfff9ab6baed,2024-09-25T15:53:55.867000
CVE-2024-3429,0,0,1b21bacd9290b4a4c3f7f58bf8aa254378b9b7384a99cfeb925ecfff9ab6baed,2024-09-25T15:53:55.867000
CVE-2024-3430,0,0,a941a2bdaed6734132b4bed8d998008948b76c9a3932a595684037246d003245,2024-05-17T02:39:55.503000
CVE-2024-34308,0,0,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000
CVE-2024-3431,0,0,5fc2c93ae5310a51e046f84945a2a838f604d6025e1cecd0f4843d0687905336,2024-05-17T02:39:55.597000
@ -254080,11 +254096,11 @@ CVE-2024-35713,0,0,ca8ba5d4caa775840c63bd81e19b8b2c3127ce17c1b54bccd5ab2a83c900f
CVE-2024-35714,0,0,8ad26a0c069cd7496b482871d778b1a0bc1b05193b8516e83b54f6455b846405,2024-08-29T21:10:17.630000
CVE-2024-35715,0,0,c5e9be613e22e2fc44f89d54f3164d7d8990eeb3c59fcb4a70e49f768e380c3e,2024-09-18T00:15:03.447000
CVE-2024-35716,0,0,31701854ea5aabdd20ee7c3d1f2ecac85ca8e50bcb2d7b44a201fe7038b52764,2024-07-23T18:21:24.257000
CVE-2024-35717,0,1,37f0ecbb97c46d8d21aec034d8ca92096dd3f999480fccf5e128fd3c6dd61528,2024-09-25T14:46:17.400000
CVE-2024-35717,0,0,37f0ecbb97c46d8d21aec034d8ca92096dd3f999480fccf5e128fd3c6dd61528,2024-09-25T14:46:17.400000
CVE-2024-35718,0,0,223668ad06091da54030dcd99f3617788339139ce57d8c19397b9e702415dc22,2024-08-29T21:15:11.230000
CVE-2024-35719,0,0,654572645a72aed91b6397ff11bb2909c265f1c87e8f07aca797c61ec4fe801d,2024-08-29T21:16:30.363000
CVE-2024-3572,0,0,358c8cea0f66b609b18250018a3e0beb2b858435bcda9c64899afe87e118fccd,2024-04-16T13:24:07.103000
CVE-2024-35720,0,1,15b66e7747e75989b47c7d0180f243d57d689a2f71aa742f4825b2215ee23e5a,2024-09-25T14:46:44.140000
CVE-2024-35720,0,0,15b66e7747e75989b47c7d0180f243d57d689a2f71aa742f4825b2215ee23e5a,2024-09-25T14:46:44.140000
CVE-2024-35721,0,0,403808b7ed18588cd66dee94bf769203fe91a72280712700be1c25ea8cb639f1,2024-06-12T16:29:34.530000
CVE-2024-35722,0,0,900f52c63024bc31ebeec814424e23a50e10f9bab2e81b43138d101b966398d7,2024-06-12T16:29:22.497000
CVE-2024-35723,0,0,4b4f1b40c0f9bfef4b6800e9ab37bdf9cecea3df8bc822ae05c354686639054b,2024-06-12T16:28:51.920000
@ -257137,7 +257153,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca
CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000
CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000
CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000
CVE-2024-40125,0,1,b6102a5000d62445f3dfb355103da71acf49221ffdd95d01bc78b0a2980bc0d0,2024-09-25T14:46:52.523000
CVE-2024-40125,0,0,b6102a5000d62445f3dfb355103da71acf49221ffdd95d01bc78b0a2980bc0d0,2024-09-25T14:46:52.523000
CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000
CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000
CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000
@ -257369,7 +257385,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98
CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000
CVE-2024-40754,0,0,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000
CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000
CVE-2024-40761,0,0,ec7f44b1984f115e0baf55e04afbf98ea946ffa2e84b8d5284f88043a6f46ced,2024-09-25T08:15:04.437000
CVE-2024-40761,0,1,d492be653750f3663697dc849205192fd85d7d2517bf1ddd3c4e6d9c40031dc5,2024-09-25T16:35:10.803000
CVE-2024-40764,0,0,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000
CVE-2024-40766,0,0,9ffdda3005aa6c238f823c6e65a3a89594c21a379fd17878a86615d17b31de27,2024-09-16T19:48:30.827000
CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000
@ -257440,7 +257456,7 @@ CVE-2024-40834,0,0,7e20f67bc8b08fc4adc47071793a554467422544bba4ba726067a06c6b9b9
CVE-2024-40835,0,0,ffa2d0f502e7a09e89b4898498fc215520bfece3735d19b72358067234b3c222,2024-08-23T14:39:03.070000
CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe62dd,2024-08-01T13:58:15.220000
CVE-2024-40837,0,0,ccc4fbf4d07a48518f7fa02b46184c88d2b8e0a64ca26c4f8ffcf17903cd52b7,2024-09-23T18:50:16.050000
CVE-2024-40838,0,0,ea75880f64ff7d123e05b02ff724ba26aa62c0c8ce55d78d668e510b3e5ff9ec,2024-09-20T12:31:20.110000
CVE-2024-40838,0,1,57ccc58a6e0da28c4781c076dd6b53ecfc2f0b846080c275e7f92f16bacc87fe,2024-09-25T16:46:24.123000
CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000
CVE-2024-40840,0,0,5e34a232df19c586251cf91538c4a202969b10a4d2f3a98a453d52aac010eb9d,2024-09-20T12:31:20.110000
CVE-2024-40841,0,0,7e2ae925fab3d81814eaf43566b8461aa33db3e07f1b71490d71856e29358264,2024-09-20T12:31:20.110000
@ -257851,6 +257867,7 @@ CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1
CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000
CVE-2024-41443,0,0,4b989230a84b85398c5698bceac0a0dd2b8192cac38c0d61b31ca0600868cc4e,2024-09-11T15:54:29.327000
CVE-2024-41444,0,0,5ea59719718418adee108f9ce5540b96facb8a58caf3370b9e6aa1a42ff02782,2024-09-05T18:36:39.773000
CVE-2024-41445,1,1,335a49b47dfd8ad0cc5d4d87d1f2bee14a442d08d67f7a08f91aed7abd36943e,2024-09-25T17:15:18.740000
CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000
CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000
CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000
@ -257970,6 +257987,7 @@ CVE-2024-41704,0,0,2bc018b99d38a9eaaef3e278b3999e228c9f0ef28a260142aea13990cbc48
CVE-2024-41705,0,0,1186e60c4c15e6e9e0b15aecd586260e87327f5da15827cf4d98592a0e7276c8,2024-08-01T13:59:07.983000
CVE-2024-41706,0,0,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f08765e,2024-08-01T13:59:08.790000
CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000
CVE-2024-41708,1,1,95d1a803ed769e3cdcb9d1647d4cc503c95cfb5d1fdf19bb4fdc04997b464fa8,2024-09-25T17:15:18.823000
CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000
CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000
CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000
@ -257979,7 +257997,7 @@ CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79
CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000
CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000
CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000
CVE-2024-41721,0,1,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000
CVE-2024-41721,0,0,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000
CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000
CVE-2024-41725,0,0,21bbc62325c2482a0a8901148be83c11d24610782aed5e5a17dc78b6664e4bda,2024-09-25T01:15:41.833000
CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000
@ -258256,7 +258274,7 @@ CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d07665
CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000
CVE-2024-42112,0,0,053ed3da7b6fa8b9c64b9dd46522be8c0a3889161664650c546eddc66722489c,2024-07-30T13:32:45.943000
CVE-2024-42113,0,0,055bfc7352f8708916cb02878daf8b9abd49f09673041c2a3f1555d3e0438485,2024-07-30T13:32:45.943000
CVE-2024-42114,0,1,9975c17cda36886fe3dd1c3e92dff536b06cf6f9784b3fb1441a9cd391ce6816,2024-09-25T14:44:11.110000
CVE-2024-42114,0,0,9975c17cda36886fe3dd1c3e92dff536b06cf6f9784b3fb1441a9cd391ce6816,2024-09-25T14:44:11.110000
CVE-2024-42115,0,0,c1bf508190d9d011d99e9e0c6936167394e909cd6a7f0f4a4e381df1abddbea8,2024-07-30T13:32:45.943000
CVE-2024-42116,0,0,30a90b9468660b29848bbd64238d702f03ad6275f3a02231616e417bdbda5513,2024-07-30T13:32:45.943000
CVE-2024-42117,0,0,e86f5875f9840b49edb38024936f207409c0f434c81331cd923e6aaf28928c94,2024-07-30T13:32:45.943000
@ -258266,7 +258284,7 @@ CVE-2024-4212,0,0,5766e7a6d4fbc74d070c835b010281385271ca336cbd1f30b8212e7da6caf8
CVE-2024-42120,0,0,692318adb3e3bc8ee3327c58f85ce2f0a478d2c89b683bc854fcb9227f9c337f,2024-07-30T13:32:45.943000
CVE-2024-42121,0,0,c5e25bbf3c91bf25bcaa878ff72039e7afac3b1d4b647d19649fd2a0460d64a7,2024-07-30T13:32:45.943000
CVE-2024-42122,0,0,f1aff74be0c8f2add47447c4fc3e19fab36b7330d7c3102774809c41ed96d349,2024-09-16T13:49:27.837000
CVE-2024-42123,0,1,fcf3797a52cf94737c36d1a9dcc7dcdf4f1621793123c3aa297da1a863bdccb1,2024-09-25T14:45:25.770000
CVE-2024-42123,0,0,fcf3797a52cf94737c36d1a9dcc7dcdf4f1621793123c3aa297da1a863bdccb1,2024-09-25T14:45:25.770000
CVE-2024-42124,0,0,fac73a1c1853cbd61b92ef3a19f9f7f6792c7fb13275a38cdccfee119802151b,2024-07-30T13:32:45.943000
CVE-2024-42125,0,0,623dede6e7a867ee2a4793db37771abbdecba1b4f67d59179866a3aa7e89529c,2024-07-30T13:32:45.943000
CVE-2024-42126,0,0,5ead821db32439b0032661ea186379c9f55f1afa1bc2284b38295084f9f2435e,2024-08-19T05:15:06.927000
@ -258275,7 +258293,7 @@ CVE-2024-42128,0,0,b8155b78412ff52ea13f2f9c045e69435a1427918f79cc2d9ffa4f93326cb
CVE-2024-42129,0,0,46d5c1746954fb4a02665ba978862f55732f5e2a31e0452c7452c5970d864bc8,2024-07-30T13:32:45.943000
CVE-2024-4213,0,0,4af0c7bd943d1e93f39eb470b6c791f96149e0a985dfe97529e29ee085d7cdf1,2024-05-14T16:11:39.510000
CVE-2024-42130,0,0,c0bf8d6705687d288b22cfe1365e7dce03a7394108689b183e481d0372b856b1,2024-07-30T13:32:45.943000
CVE-2024-42131,0,1,aff9a000aec3d408b4c99da176c5accb9bb8915c7fb722324b63293008e9a5e7,2024-09-25T14:45:11.617000
CVE-2024-42131,0,0,aff9a000aec3d408b4c99da176c5accb9bb8915c7fb722324b63293008e9a5e7,2024-09-25T14:45:11.617000
CVE-2024-42132,0,0,2f4d4ac80a7ca69cb3eacfe6d114a16e8e41ad14f4a3bea559c41eac32d31205,2024-07-30T13:32:45.943000
CVE-2024-42133,0,0,774a28cde62878f7ee006cd2f913f8ca89836e6fe0716586b68a30db7f392c96,2024-07-30T13:32:45.943000
CVE-2024-42134,0,0,b964a563fe31ebeed4bd473713e48eeb088a769f2eb83d9ee50ca797235dadc8,2024-07-30T13:32:45.943000
@ -258308,7 +258326,7 @@ CVE-2024-42158,0,0,f708fe0c9b8afdea7e816433ff8d7e695756b23c2951cd3e7d51dd4aa0ae2
CVE-2024-42159,0,0,ddb54cf3e23058b0cc94c2454029ec74eccf92e763ca85662f68c5080c1191bb,2024-08-02T14:29:46.240000
CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000
CVE-2024-42160,0,0,99059c88b605f4fa1bbf18da91fe0a3527191b8f257bfef3a73d85473c482ede,2024-08-02T14:29:26.330000
CVE-2024-42161,0,1,97279a99e7775c2140b5fea2afa6ffe875092f1c8ad4660f6960f7eace3a4bd7,2024-09-25T15:54:47.837000
CVE-2024-42161,0,0,97279a99e7775c2140b5fea2afa6ffe875092f1c8ad4660f6960f7eace3a4bd7,2024-09-25T15:54:47.837000
CVE-2024-42162,0,0,6afe87ab720ed2f9c2f080d1a44ac6b35a3f68a956a94f09bb5c649d3b32abfa,2024-08-05T20:19:56.047000
CVE-2024-42163,0,0,e648bd08f6f5002b2c2be8dfcddf503eeb253615a38731eaff8171d82d0e084b,2024-08-29T15:17:38.217000
CVE-2024-42164,0,0,5f7394f2c8b7091142f24f8a74012a4af598e6428e8a46bdce2f469fbbd5cc92,2024-08-29T15:19:40.220000
@ -258324,7 +258342,7 @@ CVE-2024-42219,0,0,6d72ad1f1e2233036625c33df60f051fc9699cbd96bd0caf5f28288f63cee
CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000
CVE-2024-42222,0,0,b89ef57d67246c59e7b320f402a614639a269bceaaa0c30be9cf5a9576c14c01,2024-08-29T16:43:59.923000
CVE-2024-42223,0,0,870080f23f69c4b1a872bfc25aea5e5eeb6250775d6b9b06e156b439a569181b,2024-08-02T14:24:48.680000
CVE-2024-42224,0,1,0865a03e98dd11ed105a5bc1eccb5a484aeb3ca4bb6400b3a913f08fe9d68aff,2024-09-25T15:55:09.027000
CVE-2024-42224,0,0,0865a03e98dd11ed105a5bc1eccb5a484aeb3ca4bb6400b3a913f08fe9d68aff,2024-09-25T15:55:09.027000
CVE-2024-42225,0,0,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000
CVE-2024-42226,0,0,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13993,2024-08-12T13:38:33.853000
CVE-2024-42227,0,0,defe5641015aadc42156aed9e400c997682c21664defa4c542b824140e095fad,2024-07-30T20:15:03.963000
@ -258927,7 +258945,7 @@ CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b5803
CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000
CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000
CVE-2024-43236,0,0,023011a32949e87f6bc318354cd0a34190696d548e7018a1624254d686b58e3b,2024-08-19T18:36:07.297000
CVE-2024-43237,1,1,cd4ab728831e6e0577a88455d0cda3b2e88386eeeb9db5eaa94711a551210f62,2024-09-25T15:15:14
CVE-2024-43237,0,0,cd4ab728831e6e0577a88455d0cda3b2e88386eeeb9db5eaa94711a551210f62,2024-09-25T15:15:14
CVE-2024-43238,0,0,55a9737df7d3a7bb29b80dc0b631f8b007fbdc439de2c352cd0a0288d492e84f,2024-09-17T19:27:03.220000
CVE-2024-43239,0,0,79d51d8573e5ae7ca3d4a994fc625c6641954aca391d8556cc284fe714bd5440,2024-08-19T12:59:59.177000
CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000
@ -259340,7 +259358,7 @@ CVE-2024-43954,0,0,76c216e4287ea3e21df8a5c42687b7643218c83658145d7a54c571f2f9829
CVE-2024-43955,0,0,4ede473467403747b1a04930906c4ff684161a593463954ac3ec5bae261e5e01,2024-08-30T16:23:35.187000
CVE-2024-43957,0,0,e37eee71e6d3d39b6eee1646ea93bd080fe2f853ce321f65d1106d4fc89b111e,2024-09-05T14:49:17.983000
CVE-2024-43958,0,0,3f3bf4212bc2e74c074c138fa03eac2a971b658d4caf8d2e0f7172d721ab1b4b,2024-08-30T16:15:19.047000
CVE-2024-43959,1,1,32df0dc233040d83518e528926a0c9d41449588a10056a96e22cc88fed5664e8,2024-09-25T15:15:14.187000
CVE-2024-43959,0,0,32df0dc233040d83518e528926a0c9d41449588a10056a96e22cc88fed5664e8,2024-09-25T15:15:14.187000
CVE-2024-43960,0,0,980e57c6c61444ba89ee403d9dc5147321c211af37703070f5947ad7256ca9de,2024-08-30T16:12:24.113000
CVE-2024-43961,0,0,c6e06e0e8287f3f53bd61136fa1d8e035e3cae74e7a2040db5ee6246ae551f29,2024-09-05T14:39:38.957000
CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26fb3,2024-08-30T16:10:16.647000
@ -259350,35 +259368,35 @@ CVE-2024-43966,0,0,2901acb1eb63b7a55cb46d133ca8742f966f34bb1db4feb1259a3cd63030f
CVE-2024-43967,0,0,efb5ab215f4087a53f8dcd252d52ef141005b5764a5e2b6c3ee9faa1675f0e1c,2024-09-18T17:00:57.497000
CVE-2024-43969,0,0,1a95b579d41eb8faee65f3858dc0c26a2595ef0cb4c3d2f4551a96318123fd7f,2024-09-20T12:30:51.220000
CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000
CVE-2024-43970,0,1,77a129e80056cfc70e3460dbd898d58f094794bf07956a918ea43df613f14f34,2024-09-25T14:18:53.297000
CVE-2024-43971,0,1,15271454200ca48e9894c5709f39b2a82fcb070edabcc7bed44b538ba98121f8,2024-09-25T14:18:13.137000
CVE-2024-43972,0,1,45d166e4dbb457cad4f9e6ecf80d8044e3ef67293a1719d9634316ae0fc28afb,2024-09-25T14:16:18.150000
CVE-2024-43975,0,1,277d0207a09080b919f3f219105b7c4323354cd0721ba6e67221ba9226888308,2024-09-25T14:13:32.910000
CVE-2024-43970,0,0,77a129e80056cfc70e3460dbd898d58f094794bf07956a918ea43df613f14f34,2024-09-25T14:18:53.297000
CVE-2024-43971,0,0,15271454200ca48e9894c5709f39b2a82fcb070edabcc7bed44b538ba98121f8,2024-09-25T14:18:13.137000
CVE-2024-43972,0,0,45d166e4dbb457cad4f9e6ecf80d8044e3ef67293a1719d9634316ae0fc28afb,2024-09-25T14:16:18.150000
CVE-2024-43975,0,0,277d0207a09080b919f3f219105b7c4323354cd0721ba6e67221ba9226888308,2024-09-25T14:13:32.910000
CVE-2024-43976,0,0,b5b36a728accce9a5c243e352c901188e8a688872f36e1c893cd85efac637a21,2024-09-24T16:32:37.747000
CVE-2024-43977,0,0,8548dd346f70e10bd02563139f9662536c4c908bc4be8bbe5ccbe1834db20d5d,2024-09-24T19:17:15.327000
CVE-2024-43978,0,0,b84c789c57b2300e5e696cc4e44909900a0446291c850df47c011342afd925c3,2024-09-24T16:44:01.557000
CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd54,2024-05-14T16:11:39.510000
CVE-2024-43983,0,1,8ea56144e7b46aa8d46319391d511f11093468f3fcd70ebf4dabea21dfbfa0ca,2024-09-25T14:11:22.450000
CVE-2024-43983,0,0,8ea56144e7b46aa8d46319391d511f11093468f3fcd70ebf4dabea21dfbfa0ca,2024-09-25T14:11:22.450000
CVE-2024-43985,0,0,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000
CVE-2024-43986,0,0,9478adfda55868d7b94f2eea7c2c936b95469666be97191a74de84a03c2187a9,2024-08-29T13:25:27.537000
CVE-2024-43987,0,1,e42ccbdb2b94d874179a0c5a29e5439a09d4ffe036d9ba2323192b8072b93dd2,2024-09-25T14:08:22.987000
CVE-2024-43987,0,0,e42ccbdb2b94d874179a0c5a29e5439a09d4ffe036d9ba2323192b8072b93dd2,2024-09-25T14:08:22.987000
CVE-2024-43988,0,0,43ffe19e41988c419aca249be075847312c9c8cd41c433297d22c781cef44325,2024-09-25T13:55:55.460000
CVE-2024-43989,0,0,9f19cbbd07eac2d4997a02808c8ed7b359c9c31bd68dd720d1ab97474c15e7dd,2024-09-23T00:15:10.800000
CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000
CVE-2024-43990,1,1,26605399405821a9babcc1c4c479025743910126069041bffd554c24a81ff9a3,2024-09-25T15:15:14.370000
CVE-2024-43990,0,0,26605399405821a9babcc1c4c479025743910126069041bffd554c24a81ff9a3,2024-09-25T15:15:14.370000
CVE-2024-43991,0,0,62375b0bd15282a5169a9db83c3c584ee6643c24a05676f00ee713a46015a5a5,2024-09-25T13:53:50.107000
CVE-2024-43992,0,0,e9a152f92c5b0e9db22adc26709ee0e8b5e307e1de9d16d60489758c638181ee,2024-09-25T13:47:17.277000
CVE-2024-43993,0,0,c2d6d52348aca85630fcb2a37f72e9ad613ffd4f41ea865abac1f2b4dc17f7fc,2024-09-25T13:44:39.917000
CVE-2024-43994,0,0,92a57f752ce2faa73917c46fd03cd7058c3f4fe6668ac24e011d5cce000e100c,2024-09-20T12:30:51.220000
CVE-2024-43994,0,1,e95fee6088b53dd53004a837f528725d2b5541f3917b446ee4145995cc44627e,2024-09-25T17:09:09.230000
CVE-2024-43995,0,0,d2bc15228a0936c9d52925ee78d8f61fa4f243d84362a990cf6cd93f080ed156,2024-09-20T12:30:51.220000
CVE-2024-43996,0,0,d7156f428d1448ad8b6ccd44d882e30f14df1390e059d6ddfa9925733f3aeac4,2024-09-23T01:15:11.510000
CVE-2024-43999,0,1,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000
CVE-2024-43999,0,0,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000
CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000
CVE-2024-44001,0,0,43db0f88c3e640d31c1ced26a25fee31b35f13afe37712fdf24ec0f8f0863bb5,2024-09-20T12:30:51.220000
CVE-2024-44002,0,0,78aabec616bf445add31137b546b3614b9511be8a441ab676da5dce9d6232c6b,2024-09-20T12:30:51.220000
CVE-2024-44003,0,0,2744e27ce4993c02a8ad8b34984a99e1a86eb64e2a65d6dacdbd3f08ce311e94,2024-09-20T12:30:51.220000
CVE-2024-44004,0,0,aa050c3ee15a31d1070dbd236f7b72cf53d90d76d0c2baff9d9ca9b4dc524727,2024-09-24T19:22:14.760000
CVE-2024-44005,0,1,68e5b326ea17b9b2aa08f2073b87c5fda6849dde25f3e2d16502638d6b5bba85,2024-09-25T15:25:30.083000
CVE-2024-44005,0,0,68e5b326ea17b9b2aa08f2073b87c5fda6849dde25f3e2d16502638d6b5bba85,2024-09-25T15:25:30.083000
CVE-2024-44007,0,0,d7d1930aeec9d62758ccc2ddf09e21d07c0b586fa0d9735f7d5dee1a37d7874e,2024-09-24T22:08:52.857000
CVE-2024-44008,0,0,c6d2b6687f1293a95753882058aa8ed47455c99d54b3161e64050d330a139582,2024-09-24T22:08:01.060000
CVE-2024-44009,0,0,5b0cf6c82d301fa9d5358bb5d9e7b1a016eed523b7e9c7d9c1329e61fba4852b,2024-09-24T22:06:15.843000
@ -259433,7 +259451,7 @@ CVE-2024-44116,0,0,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea
CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000
CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000
CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000
CVE-2024-44124,0,1,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000
CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000
CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000
CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000
CVE-2024-44128,0,0,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000
@ -259574,7 +259592,7 @@ CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3
CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000
CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
CVE-2024-44623,0,1,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000
CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc1915,2024-09-20T13:15:19.850000
CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000
@ -259582,6 +259600,7 @@ CVE-2024-44667,0,0,67bc66d5934efb1ec507a459f00d72755f90d65f712e9b4a25f261f89a211
CVE-2024-4467,0,0,57c2229fa6c3e84bff363dc59d2c80befb785107da1c6be3c514b7e8bc55ed5c,2024-09-13T22:15:02.260000
CVE-2024-44676,0,0,94a19418954ecc436057825518b8ebed31524cf2f3974b4b1c98d6cc7a26626a,2024-09-10T20:35:11.767000
CVE-2024-44677,0,0,37f096131b37c64ecd3fc3fc2de6424d39f5522109a7a0d481410b531195bf1c,2024-09-10T19:35:08.760000
CVE-2024-44678,1,1,d878c7756fa052dcb9bda7bc8ae3a81429c10c0f8799352cf68543a7783c0965,2024-09-25T17:15:18.990000
CVE-2024-4468,0,0,b3276ced4484e0a6677a57dac2ac7e9a5b704e2ae059b48a7256dc6a67d6da0e,2024-06-10T02:52:08.267000
CVE-2024-44682,0,0,5c1099c9946a7bbad39157bc8cb36499b7070c93884284356ba775c02b16ef60,2024-09-04T16:38:36.817000
CVE-2024-44683,0,0,3331119c07881f90997c72dc65301a112931dc9af3d318f7996e768fd590a104,2024-09-04T16:41:01.467000
@ -259629,6 +259648,7 @@ CVE-2024-44819,0,0,fb850f7977d16cbee039f22251cb3645c89cd534504aa87478038b012f6c8
CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000
CVE-2024-44820,0,0,23715176f3bb998fe09881aa49c8309f9c9998e3ed78bd103540e1e82782315e,2024-09-04T19:35:13.010000
CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000
CVE-2024-44825,1,1,e304323bbce544570d1744d27864d02d670ecce24748a6cd994315f8f7256714,2024-09-25T16:15:10.187000
CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000
CVE-2024-44837,0,0,18c58708dc7b004f14a9bc90ac21fd88d28a642d1b4f00511d7bd006e7eb4f62,2024-09-12T16:17:57.797000
CVE-2024-44838,0,0,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000
@ -259913,7 +259933,7 @@ CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebf
CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000
CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000
CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac208e0,2024-09-03T19:40:46.783000
CVE-2024-45311,0,0,e1c89e007360c82e1c247aeb49c5c1a5ea2214c99aed5f47bced78ef186e4d38,2024-09-03T12:59:02.453000
CVE-2024-45311,0,1,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2befc3,2024-09-25T17:03:36.817000
CVE-2024-45312,0,0,4476866c9a0b7f514de1f948afa080c627a68be3fca1f01a9754ac6804bbd59a,2024-09-03T12:59:02.453000
CVE-2024-45313,0,0,82e38f6d2921c3b3e9a238db6883354f1d86d2d1f780a332f8c54bf5a5667942,2024-09-03T12:59:02.453000
CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ecee3c,2024-09-12T16:39:53.690000
@ -259953,7 +259973,7 @@ CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a3137
CVE-2024-45407,0,0,761b4924e4b46db1752cf42f388ca76c7e573211ea8b116cb02c0d2e460e33eb,2024-09-20T16:18:46.717000
CVE-2024-45409,0,0,8d3455cc5d06aa00e7efc9d2b07d7d23ff8f7e545f196a7071950bdb754db616,2024-09-20T14:13:10.700000
CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000
CVE-2024-45410,0,0,d97b3f55ffaa7f1c72d1eb4293ac6b508c6644d3210d0f4e5c5139a0826526a8,2024-09-20T12:30:17.483000
CVE-2024-45410,0,1,aaed882cbb27e3b763a7cf27ed0a68c177e01a433a2f2467dda1cd610cffbe15,2024-09-25T17:39:08.033000
CVE-2024-45411,0,0,9447be5f23a6dce6216fa2fc0d1f4dbe990c7e9c91ca7c4cc6b7685ee626123e,2024-09-19T14:31:13.697000
CVE-2024-45412,0,0,4ebe28fee983ebb500b7770c94cd65bf653ad33a172923a2e65f485408d0f1b5,2024-09-20T16:32:52.310000
CVE-2024-45413,0,0,072ecefbd02221baa97e08c8b2b2cf75fcea808cd89eb8ab6dce8bd1cc6d17eb,2024-09-20T12:31:20.110000
@ -259979,7 +259999,7 @@ CVE-2024-45449,0,0,16fcc8f3add1fcba18b36fc04f0c4a19c97d176cb514abd9722e7bafd45dc
CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000
CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000
CVE-2024-45451,0,0,48b512aae28f050030a3079457d4f6895fe3bb1928b27b88000e380a07e6de13,2024-09-24T22:02:48.057000
CVE-2024-45452,0,1,4047a805b68a8ced2844a8ca7ba17139f576bc1b78cfe202a5caf646808b8ca7,2024-09-25T14:19:17.113000
CVE-2024-45452,0,0,4047a805b68a8ced2844a8ca7ba17139f576bc1b78cfe202a5caf646808b8ca7,2024-09-25T14:19:17.113000
CVE-2024-45453,0,0,bb3a8aaa7954777d3aa9635504c34c96f8cc4336ef5a6f0756ed7dd58888f5e4,2024-09-23T01:15:11.923000
CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000
CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000
@ -260038,7 +260058,7 @@ CVE-2024-45606,0,0,3387cf6bafc97f34cf884f7ca0b4f85a8bd2d59f53c4b0d6b1c8b12f643f3
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-45612,0,0,3e30286b1d723ddfef1522eda155227a0e1e8c66d0b8dce0d9a777734913d222,2024-09-23T19:33:04.650000
CVE-2024-45613,1,1,8ae1f326ec208cdb879174826b69c78543fdb5244b75318a9385cf06c6383d99,2024-09-25T14:15:05.303000
CVE-2024-45613,0,0,8ae1f326ec208cdb879174826b69c78543fdb5244b75318a9385cf06c6383d99,2024-09-25T14:15:05.303000
CVE-2024-45614,0,0,a4bd2872c46f9cbb2c0f25769a726f94bca2a9c47d47af3e4cd0649a5803ebb7,2024-09-20T12:30:17.483000
CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000
CVE-2024-45616,0,0,ec4ff704ba2aae95f08442d1bfa2173f2a102c1c3b0570dfa4cb1518cb449547,2024-09-13T19:21:11.507000
@ -260074,7 +260094,7 @@ CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df6109
CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000
CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000
CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000
CVE-2024-45752,0,0,c0805cf3ab6310e7a4b6dbb56a1c3b55ab51506387ae9690f4eec83bbec021e5,2024-09-20T12:30:17.483000
CVE-2024-45752,0,1,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4a91,2024-09-25T16:54:27.520000
CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000
CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000
CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b36f,2024-09-20T12:30:17.483000
@ -260097,8 +260117,8 @@ CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd
CVE-2024-45803,0,0,229c857bfa292cdb0ba4078b3fbf512c465922b11345a00889b8daf4243936d0,2024-09-20T12:30:51.220000
CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000
CVE-2024-45806,0,0,ee7bdd929f099bc0d44c29c8857730257f438aed487ae0ce57760928a6cdb1c9,2024-09-20T12:30:17.483000
CVE-2024-45807,0,0,0583ab979f5125f3c1777b86424a8cca2418c3c516284529f50828ffaa393646,2024-09-20T12:30:17.483000
CVE-2024-45808,0,0,fcd02d4bc62e64bc1e1b5e25085baa0bdf51fdc7c6386ccd327c0759771739d2,2024-09-20T12:30:17.483000
CVE-2024-45807,0,1,109f977914214954b1d4c58b77a41ab231481644c3f0d5e0c1a61fe3a8137355,2024-09-25T17:12:38.380000
CVE-2024-45808,0,1,e0b8548e8c97a2dbe35aa53aed4f22546b5e8aaa33f6c0d1789ad77d012310d8,2024-09-25T17:18:38.823000
CVE-2024-45809,0,0,61a35443140d3227d7a81e1d73cdcea190bec5c7e8b6089514de0625aa5d92ef,2024-09-24T20:12:24.597000
CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000
CVE-2024-45810,0,0,2c07def9e565fb1be9ff61f66b9422d8dc435c56937db2ea8df79036719b50e7,2024-09-24T19:48:22.993000
@ -260163,7 +260183,7 @@ CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000
CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000
CVE-2024-46086,0,0,ae34b30986f1e813f622cb2d55126bfe93452e0dc2a10c54d34629700e751404,2024-09-20T12:30:17.483000
CVE-2024-46086,0,1,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000
CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000
CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000
CVE-2024-46101,0,0,6828af36bf86aa04495e4dfb6987906e20dd439d909b318b0c5a57e63a82dc68,2024-09-23T16:35:10.900000
@ -260200,9 +260220,9 @@ CVE-2024-46375,0,0,efaf3c452fc78cd47f1de30f27156020a55e9f97430000be5918d84fee1df
CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406ddbc,2024-09-20T12:30:17.483000
CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000
CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000
CVE-2024-46382,0,0,d58e1ea27f21cfd47bdd0489944511f3488ae805b6df4b21cae37b2aaa67b3bc,2024-09-20T12:30:17.483000
CVE-2024-46382,0,1,65cd8f8715b62b5a7598d3b8d6186f6e2f4b087b931ac8f129c8f64b10f1fd55,2024-09-25T16:56:09.927000
CVE-2024-4639,0,0,63d049eee594beebe77a9774e9d66b077e03fa99e5b29364c893c36c24e6ccaf,2024-09-18T15:46:04.960000
CVE-2024-46394,0,0,0cb3fe3a4b01a54d8b30c75c71beb8830d2ea64caa3449cc0a9fec5e06be42b1,2024-09-20T12:30:17.483000
CVE-2024-46394,0,1,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdadeb1,2024-09-25T16:55:15.023000
CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
CVE-2024-4641,0,0,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000
CVE-2024-46419,0,0,75fafdfe43d678734223982a9d05d92176b9e138ef313759af24f79de1b289e9,2024-09-17T14:35:29.797000
@ -260213,9 +260233,10 @@ CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f63
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
CVE-2024-46461,1,1,f949e3c7d0307650b2b581379586a85548caee32fedd5af683baadd63f1ad7ee,2024-09-25T15:15:14.567000
CVE-2024-46461,0,1,4f9c282e8057127f22e248b90d1ef5c3b5c716273014b14b60a6a7a677e1d503,2024-09-25T16:35:11.207000
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
CVE-2024-46485,1,1,192fccce7e4c850555d8027544c000d2a64eb08a31da8a3df369bd9a155b6577,2024-09-25T16:15:10.480000
CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000
CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000
CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0b9,2024-06-20T20:15:19.353000
@ -260263,6 +260284,7 @@ CVE-2024-46596,0,0,ad9c8b28bdb98700f500b3744a438a4de82660bb3bab40faf707c89a0cad0
CVE-2024-46597,0,0,8f236358fa12b20d7d532e9a104df6fc7e0ce7ec4a140308bc23ebcdc16146c6,2024-09-24T16:41:09.457000
CVE-2024-46598,0,0,3f997be93c6377cc697c394dfc90ddad6cd8938191b35fea7934308cfcf432e0,2024-09-24T16:37:39.833000
CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000
CVE-2024-46600,1,1,796b956cc90816ef5f688a5e37639916bc0b1b4cbf15f16e1ba2248001158de5,2024-09-25T16:15:10.707000
CVE-2024-46607,0,0,cc46b152bf69541e766834cf176ccd6cc18aaf0dab610626c49628432d135ce7,2024-09-25T01:36:58.367000
CVE-2024-46609,0,0,1ff591f5894bdb57c3fd575159ec489820cec83d50f025633c8daed9e36be2a6,2024-09-25T01:36:59.080000
CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000
@ -260457,8 +260479,8 @@ CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3
CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
CVE-2024-46982,0,0,3d9f669d24afb928408eff7284c81bba148f4b4b0d8de4608d668ca1c9286073,2024-09-20T12:30:51.220000
CVE-2024-46983,0,0,acaa55f24871e509b77d1e06f663550a224b0f8e1fdd17d482c575b8d54a8432,2024-09-20T12:30:17.483000
CVE-2024-46984,0,0,a2d03b7a5561555bfe246598e474bdc74be23a5595876ca1a73ac153425b0c5b,2024-09-20T12:30:17.483000
CVE-2024-46983,0,1,ec8817c062e2bbc441fd890e19bc6c98486be5ca90653148f7abcab9b4d72f76,2024-09-25T17:46:48.927000
CVE-2024-46984,0,1,8ed08a9f75ebb534fe57273695d27a9994db3769e0e07c54bfc9165453c74828,2024-09-25T17:49:17.007000
CVE-2024-46985,0,0,152de56e5c06dc44c656be325fda3eba217d7b9fb216b9fe4063b28a1b887280,2024-09-23T16:15:06.097000
CVE-2024-46986,0,0,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000
CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000
@ -260482,13 +260504,14 @@ CVE-2024-47050,0,0,5ddac1f8a8053f0642ae4dbec5cd7e9a4084918d6fb4495768633d435a3f2
CVE-2024-47058,0,0,ce9dc8340a8922ed16d37cd23094d408dba7fce77515a97a3b8ba24288e2b02f,2024-09-20T12:30:17.483000
CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000
CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000
CVE-2024-47060,0,0,c8534b944f9f43cb46cae0367e9011f6cce8af6cd945cedb8784aafc5607d945,2024-09-20T12:30:17.483000
CVE-2024-47060,0,1,3723bb9e2990e983919d891a0f942a097942693d70a5d147a7a34b2c3bd8fa94,2024-09-25T16:43:47.267000
CVE-2024-47061,0,0,d35d800a552506cce8d336a186cda281a21c1486ce173d69e2a8d12e34d7b412,2024-09-20T19:15:16.550000
CVE-2024-47062,0,0,a27f6919fd132abe1f68377588675b20d8c353d333cc16869e3ce560cb8d5962,2024-09-20T19:15:16.760000
CVE-2024-47066,0,0,0fd04bf0fe851ef804f709f0494f681003c7313c34ecad7109c91c0118ecc040,2024-09-23T16:15:06.670000
CVE-2024-47068,0,0,1c0fa32d3c7c90f5e402559e77504a06792de39e051b9b551e0baa1ab20aac1b,2024-09-23T16:15:06.947000
CVE-2024-47069,0,0,01aba5c1f723ce4512d27371a66e8599350ee54993b802af859bc0ddfe251b04,2024-09-23T16:15:07.160000
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
CVE-2024-47078,1,1,8149292b607148477453ddc01685f1722913cf66efc81f82a1d0e788c5dc7bf0,2024-09-25T16:15:10.907000
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
CVE-2024-47085,0,0,612c4ee1afdc108ee26a19ffa4ef99d7ce5dec79600533d571ae4fcd8b698a7c,2024-09-20T13:15:18.703000
CVE-2024-47086,0,0,19622658bc16613a77f76eedbc221d6bedafd71c37603778fc455e0fbce10980,2024-09-20T12:30:17.483000
@ -260515,7 +260538,7 @@ CVE-2024-47210,0,0,0912a487d5daeed626dcd74f4415cecd1eb468c441d638b636aa1a85523b3
CVE-2024-47218,0,0,282809bf9fbf4fe32ac58189d7505fcb23fd7fbf82337654d318e4cf55ce811d,2024-09-23T16:35:14.730000
CVE-2024-47219,0,0,f0a9ad83025607df7abe898ed6aca97a5bcbe21c309d715694757e39cfd2aaff,2024-09-23T16:35:15.607000
CVE-2024-4722,0,0,d0eb70616d7559be2944527d8cacda4cb03faa787985cf2ceace067dd7c5ef1c,2024-06-04T19:20:47.553000
CVE-2024-47220,0,1,daf529d73f7ddf35861135b59755de956602c48e032cbc5022c4f4e726ff7007,2024-09-25T15:15:14.653000
CVE-2024-47220,0,0,daf529d73f7ddf35861135b59755de956602c48e032cbc5022c4f4e726ff7007,2024-09-25T15:15:14.653000
CVE-2024-47221,0,0,a39f783e0f1837714118df09b4ab8d238e18d056086adb1e01ef68294fa04896,2024-09-22T01:15:12.013000
CVE-2024-47222,0,0,91d32f3eb46664421f317c4ce1a08c39837b1d65e0376c618bfc415d4bbf17ec,2024-09-23T20:15:05.493000
CVE-2024-47226,0,0,1a012385db8ac429d656612487127291792ff2b1003cc416b62a404a726b12b7,2024-09-23T15:35:09.070000
@ -261036,9 +261059,9 @@ CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc6
CVE-2024-5297,0,0,d1218091e3a48aa0835b7de76e914f2fa4d051775431f4beee97941e4c178297,2024-05-24T01:15:30.977000
CVE-2024-5298,0,0,751024870f0005efd62d8664aa885c619c01fff4fc9d9e46acd3d648d421b0e1,2024-05-24T01:15:30.977000
CVE-2024-5299,0,0,ec4fa401441140dbf77742461a619e82e80b0b3301518890cfd68e9b147d30dc,2024-05-24T01:15:30.977000
CVE-2024-5301,0,1,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000
CVE-2024-5302,0,1,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000
CVE-2024-5303,0,1,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f886,2024-09-25T15:24:18.680000
CVE-2024-5301,0,0,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000
CVE-2024-5302,0,0,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000
CVE-2024-5303,0,0,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f886,2024-09-25T15:24:18.680000
CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000
CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000
CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000
@ -261688,10 +261711,10 @@ CVE-2024-6057,0,0,4f1880d8a457c0154151497f14a41bdfe090560f87d7d21e18d9c6ac0683f1
CVE-2024-6058,0,0,34aeceda11f80f38d584c0391ccaa9eb6fb38bf947af47d43e1b576e9ff3c1a5,2024-09-23T22:40:42.487000
CVE-2024-6059,0,0,a3f22e86cf3480d835f2079aa405ac75308d3d1b370e70dca18b2cc307b4486b,2024-09-23T22:44:27.003000
CVE-2024-6060,0,0,8504cbe6b891066e73ef95904dad6e7d3e41cca53b5727c2ba7b2242343c8b03,2024-06-26T15:15:20.570000
CVE-2024-6061,0,0,7f7515a9103fe150db8d8da13e6a9c9caaab344d369b5c8dd58076cec7cacc3f,2024-06-20T12:44:22.977000
CVE-2024-6062,0,0,808f4f8498f1342bcb60477c52f8c9df70bfd9d854975b3c8c0875386f5a1f2d,2024-06-20T12:44:22.977000
CVE-2024-6063,0,0,981173af34d136f2acefe4974764928b03bc5b536dcdb29e6c8460ed6390b915,2024-06-20T12:44:22.977000
CVE-2024-6064,0,1,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d7e,2024-09-25T15:08:46.537000
CVE-2024-6061,0,1,151803bcf8181dcb11e03e1de82c118e69912ea600cf1a22cb1783b56d65c969,2024-09-25T16:16:22.767000
CVE-2024-6062,0,1,4c0ded0dd1566290ba82dc0979160dd224c76b88a1bcf6bc8aea8e2120b444aa,2024-09-25T16:13:02.947000
CVE-2024-6063,0,1,85570a1de271fc269e6ac5f76ecfe5f776f0b719a051060f0436f23007cb3bab,2024-09-25T16:01:30.283000
CVE-2024-6064,0,0,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d7e,2024-09-25T15:08:46.537000
CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000
CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000
CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000
@ -261764,14 +261787,14 @@ CVE-2024-6143,0,0,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1
CVE-2024-6144,0,0,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000
CVE-2024-6145,0,0,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000
CVE-2024-6146,0,0,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000
CVE-2024-6147,0,1,db2ce187f9efb973dad5a788ee3407e3ef389a31e13ca493ef84c0a33e1e2b14,2024-09-25T15:29:33.477000
CVE-2024-6147,0,0,db2ce187f9efb973dad5a788ee3407e3ef389a31e13ca493ef84c0a33e1e2b14,2024-09-25T15:29:33.477000
CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000
CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000
CVE-2024-6150,0,0,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000
CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d73f,2024-08-01T14:00:12.180000
CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000
CVE-2024-6153,0,1,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000
CVE-2024-6154,0,1,dc8e40c1ebb3902f0ae8583b2bff8d4b47a9e71d6b236591b7095fe43b4769aa,2024-09-25T14:40:26.970000
CVE-2024-6153,0,0,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000
CVE-2024-6154,0,0,dc8e40c1ebb3902f0ae8583b2bff8d4b47a9e71d6b236591b7095fe43b4769aa,2024-09-25T14:40:26.970000
CVE-2024-6158,0,0,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000
CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000
CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000
@ -262071,7 +262094,7 @@ CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08d
CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000
CVE-2024-6510,0,0,271701171f98244795ebd972ebc5048aac2cefcf02c3610beea189409c6fb6ff,2024-09-12T18:14:03.913000
CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000
CVE-2024-6512,1,1,a7f19bb418f3681251a83d8c7152609787c1d8d7aa73dc4d789c2213bedbc546,2024-09-25T14:15:05.560000
CVE-2024-6512,0,0,a7f19bb418f3681251a83d8c7152609787c1d8d7aa73dc4d789c2213bedbc546,2024-09-25T14:15:05.560000
CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000
CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000
CVE-2024-6520,0,0,788783a471766cea8e4d7400c47ef97ab3609f9b749a996b82510813b15dd35e,2024-08-27T13:15:39.697000
@ -262326,7 +262349,7 @@ CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de971307
CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000
CVE-2024-6840,0,0,32a3665f80239333fecee34a11f4d8a5f93588e98d39b1a4bfaa2fe487feef20,2024-09-12T18:14:03.913000
CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000
CVE-2024-6845,0,1,7827ce1657e31797f4aef8976c6c66910fefbb9b9f9e4945938f09c5cdf43568,2024-09-25T14:35:07.500000
CVE-2024-6845,0,0,7827ce1657e31797f4aef8976c6c66910fefbb9b9f9e4945938f09c5cdf43568,2024-09-25T14:35:07.500000
CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000
CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000
CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000
@ -262598,7 +262621,7 @@ CVE-2024-7202,0,0,cd873862dd9c581add7def3fb09e4d862139cb04eed28a9bf2f7047259aa2b
CVE-2024-7203,0,0,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000
CVE-2024-7204,0,0,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee3314,2024-09-11T14:23:45.127000
CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000
CVE-2024-7207,0,0,20818f32fe2bb704fccc065021bd5b1db8e154a6eefd90303159ea299821a11a,2024-09-20T12:30:17.483000
CVE-2024-7207,0,1,7d162a46bdd86c9ef89d18404bf5c26cb639ca8d9bf2e70cc4f9daf2fa9be1a1,2024-09-25T17:51:34.800000
CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000
CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000
CVE-2024-7211,0,0,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000
@ -262740,7 +262763,7 @@ CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c5
CVE-2024-7383,0,0,21277f7530eb9638c0031a3484c43cc9bf1c76998abaa0508791395c60c4cd7b,2024-09-25T01:15:45.270000
CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000
CVE-2024-7385,0,0,c57dfb846ac8f152b5875b81a1392f19fcb3046476cadb54527484a942b703c1,2024-09-25T04:15:04.343000
CVE-2024-7386,0,0,4c1f6d2483cfeb3382ddce98f82fb67cba67b1b578ddf17650f44be8ada6a812,2024-09-25T03:15:03.040000
CVE-2024-7386,0,1,b6fcae623722156be1d966117ebd44659745a67ca97bc3d715d748d574115653,2024-09-25T17:15:19.110000
CVE-2024-7387,0,0,de7380b259c5cde0120b2e8a809f8a10a35a7d4a44cb8d5f57cbb1470484b8a0,2024-09-20T12:31:20.110000
CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
@ -262753,7 +262776,7 @@ CVE-2024-7398,0,0,bf74324d9583b04acd6d5dc12af363326e45b9b81ea7ee42ac5be4e61135b6
CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000
CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000
CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000
CVE-2024-7409,0,0,e8e22839b7fd24bdc388f23e2aa2e7fb387a8147f142fa0225fbb8ea758f0461,2024-09-25T05:15:10.570000
CVE-2024-7409,0,1,f8780d25575ceaa72bb05ea56c673e2b6be1f1e6ecd77c7a6074e31ef6bc0967,2024-09-25T17:15:19.213000
CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000
CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000
CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000
@ -262763,6 +262786,7 @@ CVE-2024-7415,0,0,635de2a957d86d33c8ae8c57c08ec9a59fa790990e371bc472902145ad47b9
CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000
CVE-2024-7418,0,0,6785004d3e0c8a7d4acd7be47cb26ee53d058e1a0fbb989539468dc8c9c8a1ec,2024-08-29T13:25:27.537000
CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000
CVE-2024-7421,1,1,2c1c293c95b00638950ab173ba2dc5d75a1e850cb77059843520ad17507f1a2f,2024-09-25T16:15:11.187000
CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000
CVE-2024-7423,0,0,dc92034a31c1fbf241740bc9981c3c0234f0876c05ddbb1f303f7596381e5810,2024-09-13T16:37:22.997000
CVE-2024-7426,0,0,23a5f2b77efdcf0501e79df7e4cead37c98398874153961f722e2b924fe930ef,2024-09-25T03:15:03.230000
@ -262876,8 +262900,8 @@ CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f1
CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000
CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000
CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000
CVE-2024-7575,1,1,d1edcc53851c456f5b5fe8a36908daf09816d1253eceb08ea52597b6a10ff659,2024-09-25T14:15:05.750000
CVE-2024-7576,1,1,12b7bb07dd235d7921447b5ad6e6cae0f86c3468ac4ac4f450135757402c9e38,2024-09-25T14:15:05.970000
CVE-2024-7575,0,0,d1edcc53851c456f5b5fe8a36908daf09816d1253eceb08ea52597b6a10ff659,2024-09-25T14:15:05.750000
CVE-2024-7576,0,0,12b7bb07dd235d7921447b5ad6e6cae0f86c3468ac4ac4f450135757402c9e38,2024-09-25T14:15:05.970000
CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000
CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000
CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000
@ -262916,7 +262940,7 @@ CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b
CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000
CVE-2024-7622,0,0,e8b0a7e738dd27b48509d655a6df73f19572cd065cdf11177fd537747fb3bbad,2024-09-06T16:46:26.830000
CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000
CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000
CVE-2024-7625,0,1,4f5f0ea453f9f08d3ef494db1594d491ac8f8c4407ed3e3b9397d9300e56df26,2024-09-25T16:15:11.307000
CVE-2024-7626,0,0,ab4302f2299005b8f4920df30dd87a3008463f5f96c444122c7e8131dd027b5f,2024-09-11T16:26:11.920000
CVE-2024-7627,0,0,6ac6d3af060539e387faae82d1ad555da11f32786c0cb712e03cd669f141c08f,2024-09-11T16:31:21.893000
CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472cd,2024-08-15T13:01:10.150000
@ -262960,7 +262984,7 @@ CVE-2024-7669,0,0,1ab8d834092c7284d64294dd9869665d57807a9389d554f2c75360b4021639
CVE-2024-7676,0,0,7817fdd5f2edbb492448eb9de4bc52ee9c1fd35a5b97e69f44935e966a3aaa34,2024-08-15T18:05:17.853000
CVE-2024-7677,0,0,619a29b11672f1d6182de3fe0ed62cac67fac40890fa3659f2ed393ccafc6a23,2024-08-15T18:06:06.680000
CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f03181a,2024-08-15T18:06:54.127000
CVE-2024-7679,1,1,a18a30cfdf41dc6c99217740980fde96799fadf655b1c8b3e8667399a6f35400,2024-09-25T14:15:06.180000
CVE-2024-7679,0,0,a18a30cfdf41dc6c99217740980fde96799fadf655b1c8b3e8667399a6f35400,2024-09-25T14:15:06.180000
CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000
CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000
CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000
@ -263102,7 +263126,7 @@ CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d
CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000
CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000
CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000
CVE-2024-7878,0,1,12502179334adb04b735c4035e0e77a9e1b2c17baea755ae2cd695609e776c25,2024-09-25T14:35:08.010000
CVE-2024-7878,0,0,12502179334adb04b735c4035e0e77a9e1b2c17baea755ae2cd695609e776c25,2024-09-25T14:35:08.010000
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
CVE-2024-7885,0,0,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
@ -263111,7 +263135,7 @@ CVE-2024-7888,0,0,2881b53b5410d8b7f634ff84d81ce7bcb024ba75858c366b9280d55d99841e
CVE-2024-7889,0,0,67539a9ea3afa10e1ef371a140e40e7f2e32fcedee02ec133e59e6ef2a347260,2024-09-13T18:35:18.777000
CVE-2024-7890,0,0,1dded06d7bba5f894e59f4fd824f843aaf6c5f24e5dfcfedb3ff09adc8671b20,2024-09-13T18:35:19.517000
CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000
CVE-2024-7892,0,1,40974c0cc57d40137303f2cc20edb34ed2ea852cc275daaa8e4e4a536c4f74f5,2024-09-25T14:35:08.167000
CVE-2024-7892,0,0,40974c0cc57d40137303f2cc20edb34ed2ea852cc275daaa8e4e4a536c4f74f5,2024-09-25T14:35:08.167000
CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000
CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000
CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000
@ -263301,7 +263325,7 @@ CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ad
CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000
CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000
CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000
CVE-2024-8175,0,1,c9ce83d87880543b6b1f6b65781f57c06977fbfb0efcc17207428d279365fe63,2024-09-25T14:15:06.400000
CVE-2024-8175,0,0,c9ce83d87880543b6b1f6b65781f57c06977fbfb0efcc17207428d279365fe63,2024-09-25T14:15:06.400000
CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
@ -263382,7 +263406,7 @@ CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6
CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000
CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000
CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000
CVE-2024-8316,1,1,3b42763453abe342c15e1dbc53e93aa928ecf8224136bb2240e47174bd766b15,2024-09-25T14:15:06.550000
CVE-2024-8316,0,0,3b42763453abe342c15e1dbc53e93aa928ecf8224136bb2240e47174bd766b15,2024-09-25T14:15:06.550000
CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000
CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000
CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000
@ -263414,10 +263438,10 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3
CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000
CVE-2024-8349,0,0,762716c9d0bc6d56996439d82b0700c4d3e5025adbe1204930418276cd28da7e,2024-09-25T03:15:03.817000
CVE-2024-8350,0,0,dde82d4ddd4aa970a610f22c7e95d262bb72ed6249cce87c1a47dce023dc0c5b,2024-09-25T03:15:04.013000
CVE-2024-8354,0,0,c1d02a1fc95123a7759961217f307a83eec87733739438039b5b9ddbf5c0d461,2024-09-20T12:30:17.483000
CVE-2024-8354,0,1,0cb564ed9384fcf3167b4bc2e43f53ae9109518b7fd9476c53aef4e78eb45a15,2024-09-25T16:58:59.537000
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
CVE-2024-8364,0,1,7767c7c95e089c6b038abf689ec85904f48b602f94f00381bdc8869619571039,2024-09-25T15:08:08.503000
CVE-2024-8364,0,0,7767c7c95e089c6b038abf689ec85904f48b602f94f00381bdc8869619571039,2024-09-25T15:08:08.503000
CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000
CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000
CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000
@ -263570,7 +263594,7 @@ CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a8
CVE-2024-8657,0,0,a0c9190bdc2cff5290512f4637b68def1b96889903d32a46efeb60b6ec8d0b09,2024-09-24T02:15:03.937000
CVE-2024-8658,0,0,06204177bb4a7af3778696973ba542cc2cefbf3c1b07867e6b255ad7ff0f87fa,2024-09-25T06:15:05.797000
CVE-2024-8660,0,0,e1cfacda5ac49937121e76566dcec30a46275de6b23ffe4cf313c4cb8bedeacf,2024-09-23T23:00:00.437000
CVE-2024-8661,0,0,0afd1b1d511a5cb974c5ec483781301a64c5aef2b66e34c656ba899fea9e8652,2024-09-20T12:31:20.110000
CVE-2024-8661,0,1,5b5eb9186f84a6299e6266b90655b3635cbc98e54795da81756013706cf03752,2024-09-25T16:15:11.420000
CVE-2024-8662,0,0,e073f824c2d6ac151923027c9c193587423576a62a0ff2f5ffd111c7dd804c8b,2024-09-24T02:15:04.150000
CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000
CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000
@ -263640,7 +263664,7 @@ CVE-2024-8796,0,0,85a6dfb5fb230c10b66238538bd5fe186ab9999598b67e5deda1ed4d1b78b2
CVE-2024-8797,0,0,ba4df0bb11568fe010be4c16334a8844a03d9d0d5268879bae12ea87dcdf4b9f,2024-09-14T11:47:14.677000
CVE-2024-8801,0,0,f1edc9c7bb1482d2f7aa53a58527c89ff09517b0d8b72cf3ccbe7bbb09f96d53,2024-09-25T01:15:47.050000
CVE-2024-8850,0,0,16d3ef25e9e3c3a395e24ef62b53309c976d74bdad746efe4904407697f24dbe,2024-09-20T12:30:17.483000
CVE-2024-8853,0,0,9f4483af2fc4525065d6409c29e78f86f7ea099a8bfb3db8a350d2fbd96a1485,2024-09-20T12:30:17.483000
CVE-2024-8853,0,1,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000
CVE-2024-8858,0,0,0d529df68aab7882afa1c5531609cd4c3cd7930c85ebac7f6f37123e0eea3aa1,2024-09-25T11:15:12.730000
CVE-2024-8862,0,0,d2fbbde6c386af624a5ae935a7a4eac6c09ff6dabefe8b3cf0bd8d2bf80b0d66,2024-09-20T15:47:10.697000
CVE-2024-8863,0,0,1a5131e94b007579c37dce9de5dfd5f9d496b886a484aa9376e9e793818d4aa7,2024-09-20T15:43:43.927000
@ -263655,7 +263679,7 @@ CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97
CVE-2024-8877,0,0,ca152484093e8941c510114c5a75373aafb04159b9ed70f8060e78345e32ca9a,2024-09-25T01:15:47.267000
CVE-2024-8878,0,0,707cf93e5a7503257afc68dc8487c96c746d12a7de1aacc95f6adecb7e600fdd,2024-09-25T01:15:47.367000
CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000
CVE-2024-8883,0,0,acc01ec9c3f72dcdfde915e68c8076ac17eb948c45b5a812494bde62dc939653,2024-09-20T12:30:17.483000
CVE-2024-8883,0,1,9cef595db799db08b678f8a28be821702773d1b0045d378f8c6e0ef2aaaa99fb,2024-09-25T17:17:35.637000
CVE-2024-8887,0,0,a3051d5be0b46f2e314e247c4baa7ed0aa876885e0f5e30506d6e71c9b64e9ac,2024-09-20T12:30:51.220000
CVE-2024-8888,0,0,d3d200e7933cf93bb4518f85255c1552ff25ba2dbbac181116d14fe38ef319f6,2024-09-20T12:30:51.220000
CVE-2024-8889,0,0,409f189e1cc8763baf41f6d7663087a2138f3ee0ecad616a441fc7d44385c004,2024-09-20T12:30:51.220000
@ -263690,21 +263714,23 @@ CVE-2024-8956,0,0,469912f1c3a233b9c6103ff1ea98b03260e653e6a7cf65fa430bb18bb060e2
CVE-2024-8957,0,0,479bb87a5ce094312d7bf571ad4a1b1d6922673dde5733f096aa7041bc35da67,2024-09-20T12:30:51.220000
CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000
CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000
CVE-2024-8975,1,1,09581c4f612b5af5f25f7cf22169e176a6949f69ad636faaae54b2b14ed3fb9b,2024-09-25T17:15:19.360000
CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000
CVE-2024-8996,1,1,80bbc2f5b6da65d55d73c450f7cd2a94bda747da45ca34191f950fbff2673585,2024-09-25T17:15:19.567000
CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000
CVE-2024-9003,0,0,89e492cdf9625bcd402f2d372b84ed9d063d82d6c6e605d6ac046e5c4fddcb18,2024-09-20T12:30:17.483000
CVE-2024-9003,0,1,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000
CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000
CVE-2024-9006,0,0,805559a09583efeb06925be384f63cc093facd6e855c0ba9fc2043765aba904e,2024-09-20T12:30:17.483000
CVE-2024-9007,0,0,581c2ba65ec659d9c22f4f8880fffa59f82f1fd7135c7acfcd1cdb0e2069fea2,2024-09-20T12:30:17.483000
CVE-2024-9008,0,0,52622a85f30c63eabac86e540eb777bb56ea4ab0b052ff445cc04b0bad1ec80c,2024-09-20T17:01:23.517000
CVE-2024-9009,0,0,a24093e7453ee5daa60bbd1d07887893a23817bdecb379704d3ec4c3a657d4c8,2024-09-20T12:30:17.483000
CVE-2024-9011,0,0,03481aa1fc23d04f5f01c277cb1ccbe773851297a61a74ed2c552453b357c9ed,2024-09-20T12:30:17.483000
CVE-2024-9009,0,1,8ca9aa7668c5d5c77c4f8dc75f965a1fc61562deadeb769eddb6e3d475ae864f,2024-09-25T17:46:59.077000
CVE-2024-9011,0,1,31757df34dd4fee90035c8c1e734eec12ab6ab10926115bc714ff7e9ad5eeaab,2024-09-25T17:48:14.820000
CVE-2024-9014,0,0,689b3f70b90906bf8ba0602332ae74caaaa0c51086cb80a3227272766ee5db1f,2024-09-23T20:35:16.443000
CVE-2024-9024,0,0,ce1bb5c58ae8358f32b8d7a74d1640e1cb3618b27a26351c51ff86354e3cfa3d,2024-09-25T03:15:06.237000
CVE-2024-9027,0,0,fcb1425076b717576a38c922e16397fccba079ed4817a8340fd7f86be38aeb10,2024-09-25T03:15:06.440000
CVE-2024-9028,0,0,4474f0826e6fda308b8dc8e7d1eb64f116bb3b00c60f0de54c4d42c1285efa77,2024-09-25T03:15:06.643000
CVE-2024-9030,0,0,06f92f25693230afc97260d22c777bbfe25a871139888d95fb2f2cc017b0e468,2024-09-20T12:30:17.483000
CVE-2024-9031,0,0,06ab539213d5e8c28cdb0c2ff261c49fa2a6eb4969ae007f2d88a0f9b5124cf9,2024-09-20T12:30:17.483000
CVE-2024-9031,0,1,a2a75f47877f3d25b358bad394fac156601d3202f3a82ad425179531288fce65,2024-09-25T16:52:25.327000
CVE-2024-9032,0,0,8becc8e05b7d6005b24bf74218ec0dbc532806e337cd797ce3550c4bccf0a3b2,2024-09-20T17:04:51.490000
CVE-2024-9033,0,0,5feaed785b91c629da8340e233ebf5b8fde7d7489c10a9000a33b1543d92b771,2024-09-20T15:15:18.037000
CVE-2024-9034,0,0,500b1e9b1d1c8149dfed6afb4e1938b7181d08b14d1b288d7a124581dff6ed31,2024-09-20T16:35:05.003000
@ -263715,7 +263741,7 @@ CVE-2024-9038,0,0,365851023fc9dc6c27186a3ad37cb0026a4a47fee90ed12bdf7b4812e1541b
CVE-2024-9039,0,0,087cac0290e47165349fcc9b25a216fd7a16ea1bb358d6d78a77dd7b638c921b,2024-09-20T16:15:06.153000
CVE-2024-9040,0,0,b2e6ba9f70727fa0a7ad666e492a886dd19e8c26da377d2d82938ce54a27f8e4,2024-09-20T17:15:15.240000
CVE-2024-9041,0,0,9b2bb47050dcdd44edd27fd4fde021bb936ec7198fce2f08f9ad2c86bf8bcde4,2024-09-20T17:15:15.507000
CVE-2024-9043,0,0,81423ab8fcfb05dd45e3302e824ef8ada797ee829706f87e181d341455e8e98d,2024-09-20T12:30:17.483000
CVE-2024-9043,0,1,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000
CVE-2024-9048,0,0,913e9b0e4b91d6981c8b5bd62134205df1942a32410b4410b939157a5d95c26c,2024-09-21T09:15:04.660000
CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000
CVE-2024-9068,0,0,be88e270964450b7d11a282b84758e1ac87aaad118f1cd23bc3d5a8c454e264e,2024-09-25T03:15:06.830000
@ -263741,9 +263767,9 @@ CVE-2024-9091,0,0,dd0c4181c9cebd1724087613a8f14499a1c11b7d8978304e7db23b64c9d6b1
CVE-2024-9092,0,0,f51078b662d0fa87f13a1c2b2a8f39772bb1bf1e2106b52a00ceedceb2be97fe,2024-09-23T01:15:12.153000
CVE-2024-9093,0,0,438238c069c5ac6529bb6292011378d5d671dd4896066b5e610aac0da08b63e7,2024-09-23T01:15:12.397000
CVE-2024-9094,0,0,73f29876641967f48e743806e18be47edac1de549021375f728e997ae5717f94,2024-09-23T02:15:02.290000
CVE-2024-9120,0,0,3fb9bf26157138977c619b0d13d2e77297642ca790cb0830a5ac5b2a29b4a663,2024-09-25T01:15:48.720000
CVE-2024-9121,0,0,f4d1a3e8a3757a1674ce3b3ceae7895000ad4e29c3524a421368eb201377d448,2024-09-25T01:15:48.797000
CVE-2024-9122,0,0,f89824f31b2d05d6170ddedf6ec4a64762a0c07d127119629c0d8c6f68aa2192,2024-09-25T01:15:48.837000
CVE-2024-9120,0,1,efd90f1436929044dd26538c7611ad38f4fdfda28d6aa8841ee126ec10825525,2024-09-25T17:35:12.403000
CVE-2024-9121,0,1,74d318acd609b4139930cc47677fbcae842185180dabec66aca5919f5136824c,2024-09-25T17:35:13.613000
CVE-2024-9122,0,1,3f366d19c6c61cc7f3c97129db91d73488397f41c9e80eea311ecf00cb980695,2024-09-25T17:35:15.597000
CVE-2024-9123,0,0,172c86ced5df086b16e63a8a266a4c5ff3fe491725d35f3cb8541fcec31e9312,2024-09-25T01:37:09.460000
CVE-2024-9141,0,0,97f84a42cf7f2b9f57889b2bac4e897bf7424fe08455ac2a5757a2f7675a5b26,2024-09-25T01:15:48.980000
CVE-2024-9142,0,0,b03e9d1b56d58ec574118dab2b1ce3d1ed2fc8b91f932eace62a06c5ffb66458,2024-09-25T01:37:10.240000

Can't render this file because it is too large.