From 91889eda7f60cd5f222131421eedf66c696885d0 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 25 Sep 2024 18:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-09-25T18:00:19.666232+00:00 --- CVE-2007/CVE-2007-25xx/CVE-2007-2534.json | 34 ++- CVE-2023/CVE-2023-09xx/CVE-2023-0969.json | 8 +- CVE-2023/CVE-2023-09xx/CVE-2023-0970.json | 6 +- CVE-2023/CVE-2023-09xx/CVE-2023-0972.json | 8 +- CVE-2023/CVE-2023-251xx/CVE-2023-25189.json | 44 +++ CVE-2023/CVE-2023-26xx/CVE-2023-2683.json | 8 +- CVE-2023/CVE-2023-275xx/CVE-2023-27584.json | 65 ++++- CVE-2023/CVE-2023-294xx/CVE-2023-29492.json | 34 ++- CVE-2023/CVE-2023-30xx/CVE-2023-3024.json | 6 +- CVE-2023/CVE-2023-31xx/CVE-2023-3110.json | 8 +- CVE-2023/CVE-2023-34xx/CVE-2023-3487.json | 10 +- CVE-2023/CVE-2023-383xx/CVE-2023-38346.json | 34 ++- CVE-2023/CVE-2023-40xx/CVE-2023-4020.json | 10 +- CVE-2023/CVE-2023-40xx/CVE-2023-4041.json | 10 +- CVE-2023/CVE-2023-410xx/CVE-2023-41095.json | 8 +- CVE-2023/CVE-2023-410xx/CVE-2023-41096.json | 8 +- CVE-2023/CVE-2023-410xx/CVE-2023-41097.json | 8 +- CVE-2023/CVE-2023-42xx/CVE-2023-4280.json | 8 +- CVE-2023/CVE-2023-437xx/CVE-2023-43762.json | 22 +- CVE-2023/CVE-2023-437xx/CVE-2023-43765.json | 24 +- CVE-2023/CVE-2023-513xx/CVE-2023-51393.json | 8 +- CVE-2023/CVE-2023-513xx/CVE-2023-51395.json | 8 +- CVE-2023/CVE-2023-63xx/CVE-2023-6387.json | 10 +- CVE-2023/CVE-2023-68xx/CVE-2023-6874.json | 6 +- CVE-2024/CVE-2024-02xx/CVE-2024-0240.json | 4 +- CVE-2024/CVE-2024-203xx/CVE-2024-20350.json | 56 ++++ CVE-2024/CVE-2024-203xx/CVE-2024-20381.json | 4 +- CVE-2024/CVE-2024-204xx/CVE-2024-20414.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20433.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20434.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20436.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20437.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20455.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20464.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20465.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20467.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20475.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20480.json | 56 ++++ CVE-2024/CVE-2024-204xx/CVE-2024-20496.json | 56 ++++ CVE-2024/CVE-2024-205xx/CVE-2024-20508.json | 56 ++++ CVE-2024/CVE-2024-205xx/CVE-2024-20510.json | 56 ++++ CVE-2024/CVE-2024-222xx/CVE-2024-22296.json | 47 +++- CVE-2024/CVE-2024-301xx/CVE-2024-30128.json | 14 +- CVE-2024/CVE-2024-31xx/CVE-2024-3183.json | 147 +++++++++- CVE-2024/CVE-2024-340xx/CVE-2024-34057.json | 168 ++++++++++- CVE-2024/CVE-2024-407xx/CVE-2024-40761.json | 27 +- CVE-2024/CVE-2024-408xx/CVE-2024-40838.json | 65 ++++- CVE-2024/CVE-2024-414xx/CVE-2024-41445.json | 21 ++ CVE-2024/CVE-2024-417xx/CVE-2024-41708.json | 25 ++ CVE-2024/CVE-2024-439xx/CVE-2024-43994.json | 47 +++- CVE-2024/CVE-2024-446xx/CVE-2024-44678.json | 25 ++ CVE-2024/CVE-2024-448xx/CVE-2024-44825.json | 25 ++ CVE-2024/CVE-2024-453xx/CVE-2024-45311.json | 68 ++++- CVE-2024/CVE-2024-454xx/CVE-2024-45410.json | 76 ++++- CVE-2024/CVE-2024-457xx/CVE-2024-45752.json | 62 ++++- CVE-2024/CVE-2024-458xx/CVE-2024-45807.json | 60 +++- CVE-2024/CVE-2024-458xx/CVE-2024-45808.json | 80 +++++- CVE-2024/CVE-2024-460xx/CVE-2024-46086.json | 56 +++- CVE-2024/CVE-2024-463xx/CVE-2024-46382.json | 56 +++- CVE-2024/CVE-2024-463xx/CVE-2024-46394.json | 56 +++- CVE-2024/CVE-2024-464xx/CVE-2024-46461.json | 39 ++- CVE-2024/CVE-2024-464xx/CVE-2024-46485.json | 21 ++ CVE-2024/CVE-2024-466xx/CVE-2024-46600.json | 21 ++ CVE-2024/CVE-2024-469xx/CVE-2024-46983.json | 59 +++- CVE-2024/CVE-2024-469xx/CVE-2024-46984.json | 72 ++++- CVE-2024/CVE-2024-470xx/CVE-2024-47060.json | 112 +++++++- CVE-2024/CVE-2024-470xx/CVE-2024-47078.json | 60 ++++ CVE-2024/CVE-2024-60xx/CVE-2024-6061.json | 72 ++++- CVE-2024/CVE-2024-60xx/CVE-2024-6062.json | 72 ++++- CVE-2024/CVE-2024-60xx/CVE-2024-6063.json | 72 ++++- CVE-2024/CVE-2024-72xx/CVE-2024-7207.json | 106 ++++++- CVE-2024/CVE-2024-73xx/CVE-2024-7386.json | 10 +- CVE-2024/CVE-2024-74xx/CVE-2024-7409.json | 6 +- CVE-2024/CVE-2024-74xx/CVE-2024-7421.json | 33 +++ CVE-2024/CVE-2024-76xx/CVE-2024-7625.json | 4 +- CVE-2024/CVE-2024-83xx/CVE-2024-8354.json | 78 +++++- CVE-2024/CVE-2024-86xx/CVE-2024-8661.json | 4 +- CVE-2024/CVE-2024-88xx/CVE-2024-8853.json | 49 +++- CVE-2024/CVE-2024-88xx/CVE-2024-8883.json | 154 +++++++++- CVE-2024/CVE-2024-89xx/CVE-2024-8975.json | 64 +++++ CVE-2024/CVE-2024-89xx/CVE-2024-8996.json | 64 +++++ CVE-2024/CVE-2024-90xx/CVE-2024-9003.json | 73 ++++- CVE-2024/CVE-2024-90xx/CVE-2024-9009.json | 67 ++++- CVE-2024/CVE-2024-90xx/CVE-2024-9011.json | 67 ++++- CVE-2024/CVE-2024-90xx/CVE-2024-9031.json | 66 ++++- CVE-2024/CVE-2024-90xx/CVE-2024-9043.json | 49 +++- CVE-2024/CVE-2024-91xx/CVE-2024-9120.json | 41 ++- CVE-2024/CVE-2024-91xx/CVE-2024-9121.json | 43 ++- CVE-2024/CVE-2024-91xx/CVE-2024-9122.json | 41 ++- README.md | 98 ++++--- _state.csv | 294 +++++++++++--------- 91 files changed, 3931 insertions(+), 448 deletions(-) create mode 100644 CVE-2023/CVE-2023-251xx/CVE-2023-25189.json create mode 100644 CVE-2024/CVE-2024-203xx/CVE-2024-20350.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20414.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20433.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20434.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20436.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20437.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20455.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20464.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20465.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20467.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20475.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20480.json create mode 100644 CVE-2024/CVE-2024-204xx/CVE-2024-20496.json create mode 100644 CVE-2024/CVE-2024-205xx/CVE-2024-20508.json create mode 100644 CVE-2024/CVE-2024-205xx/CVE-2024-20510.json create mode 100644 CVE-2024/CVE-2024-414xx/CVE-2024-41445.json create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41708.json create mode 100644 CVE-2024/CVE-2024-446xx/CVE-2024-44678.json create mode 100644 CVE-2024/CVE-2024-448xx/CVE-2024-44825.json create mode 100644 CVE-2024/CVE-2024-464xx/CVE-2024-46485.json create mode 100644 CVE-2024/CVE-2024-466xx/CVE-2024-46600.json create mode 100644 CVE-2024/CVE-2024-470xx/CVE-2024-47078.json create mode 100644 CVE-2024/CVE-2024-74xx/CVE-2024-7421.json create mode 100644 CVE-2024/CVE-2024-89xx/CVE-2024-8975.json create mode 100644 CVE-2024/CVE-2024-89xx/CVE-2024-8996.json diff --git a/CVE-2007/CVE-2007-25xx/CVE-2007-2534.json b/CVE-2007/CVE-2007-25xx/CVE-2007-2534.json index 839d6ef8daa..f06852fee4a 100644 --- a/CVE-2007/CVE-2007-25xx/CVE-2007-2534.json +++ b/CVE-2007/CVE-2007-25xx/CVE-2007-2534.json @@ -2,7 +2,7 @@ "id": "CVE-2007-2534", "sourceIdentifier": "cve@mitre.org", "published": "2007-05-09T00:19:00.000", - "lastModified": "2024-08-07T14:15:22.890", + "lastModified": "2024-09-25T16:35:02.057", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -59,6 +81,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0969.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0969.json index 42ac42d7e66..974e5b38ff2 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0969.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0969.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0969", "sourceIdentifier": "product-security@silabs.com", "published": "2023-06-21T20:15:09.660", - "lastModified": "2023-06-28T14:59:30.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:06.440", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,11 +72,11 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-125" }, { "lang": "en", - "value": "CWE-125" + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0970.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0970.json index 08264fac180..786a872f589 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0970.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0970.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0970", "sourceIdentifier": "product-security@silabs.com", "published": "2023-06-21T20:15:09.843", - "lastModified": "2023-06-28T16:05:03.873", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:06.567", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-125" }, { "lang": "en", diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0972.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0972.json index e132699da27..2b1a6a55d77 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0972.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0972.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0972", "sourceIdentifier": "product-security@silabs.com", "published": "2023-06-21T20:15:10.023", - "lastModified": "2023-06-28T16:15:36.920", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:06.663", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,11 +72,11 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-125" }, { "lang": "en", - "value": "CWE-120" + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json new file mode 100644 index 00000000000..ec5a26a488f --- /dev/null +++ b/CVE-2023/CVE-2023-251xx/CVE-2023-25189.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2023-25189", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-25T16:15:06.827", + "lastModified": "2024-09-25T16:15:06.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "BTS is affected by information disclosure vulnerability where mobile network operator personnel connected over BTS Web Element Manager, regardless of the access privileges, having a possibility to read BTS service operation details performed by Nokia Care service personnel via SSH." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://www.nokia.com/about-us/security-and-privacy/product-security-advisory/cve-2023-25189/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2683.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2683.json index bd42e196e91..7f4cfd7519c 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2683.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2683.json @@ -2,13 +2,13 @@ "id": "CVE-2023-2683", "sourceIdentifier": "product-security@silabs.com", "published": "2023-06-15T20:15:09.260", - "lastModified": "2023-07-05T13:13:07.587", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T17:15:13.520", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nA memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error.\n\n" + "value": "A memory leak in the EFR32 Bluetooth LE stack 5.1.0 through 5.1.1 allows an attacker to send an invalid pairing message and cause future legitimate connection attempts to fail. A reset of the device immediately clears the error." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-401" } ] } diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json index 8e2efda8b02..9036d4e8261 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27584", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-19T23:15:11.233", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:28:33.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:d7y:dragonfly:*:*:*:*:*:go:*:*", + "versionEndExcluding": "2.0.9", + "matchCriteriaId": "E4C68635-55DA-41B8-B69C-B50946D419CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dragonflyoss/Dragonfly2/releases/tag/v2.0.9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/dragonflyoss/Dragonfly2/security/advisories/GHSA-hpc8-7wpm-889w", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json index 11d70cf5a3d..d930ca20b9a 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29492.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29492", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-11T05:15:07.393", - "lastModified": "2023-04-18T02:16:54.183", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:35:03.390", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2023-04-13", "cisaActionDue": "2023-05-04", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-30xx/CVE-2023-3024.json b/CVE-2023/CVE-2023-30xx/CVE-2023-3024.json index b80eaa3bb82..87389173148 100644 --- a/CVE-2023/CVE-2023-30xx/CVE-2023-3024.json +++ b/CVE-2023/CVE-2023-30xx/CVE-2023-3024.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3024", "sourceIdentifier": "product-security@silabs.com", "published": "2023-09-29T17:15:47.043", - "lastModified": "2023-10-06T13:22:29.397", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:07.607", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-31xx/CVE-2023-3110.json b/CVE-2023/CVE-2023-31xx/CVE-2023-3110.json index 4907b8d24d8..c6484f3c8a5 100644 --- a/CVE-2023/CVE-2023-31xx/CVE-2023-3110.json +++ b/CVE-2023/CVE-2023-31xx/CVE-2023-3110.json @@ -2,8 +2,8 @@ "id": "CVE-2023-3110", "sourceIdentifier": "product-security@silabs.com", "published": "2023-06-21T20:15:10.263", - "lastModified": "2023-06-28T15:59:59.863", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:07.760", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,11 +72,11 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-125" }, { "lang": "en", - "value": "CWE-120" + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-34xx/CVE-2023-3487.json b/CVE-2023/CVE-2023-34xx/CVE-2023-3487.json index b9a5b8304e6..0e2a1c2b0d5 100644 --- a/CVE-2023/CVE-2023-34xx/CVE-2023-3487.json +++ b/CVE-2023/CVE-2023-34xx/CVE-2023-3487.json @@ -2,13 +2,13 @@ "id": "CVE-2023-3487", "sourceIdentifier": "product-security@silabs.com", "published": "2023-10-20T15:15:11.967", - "lastModified": "2023-10-27T18:50:10.740", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:07.870", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nAn integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots.\n\n" + "value": "An integer overflow in Silicon Labs Gecko Bootloader version 4.3.1 and earlier allows unbounded memory access when reading from or writing to storage slots." }, { "lang": "es", @@ -78,10 +78,6 @@ "lang": "en", "value": "CWE-125" }, - { - "lang": "en", - "value": "CWE-20" - }, { "lang": "en", "value": "CWE-787" diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38346.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38346.json index f534a37c77e..3afc04f4704 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38346.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38346", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-22T19:15:09.593", - "lastModified": "2023-09-26T14:58:24.360", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:35:04.973", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4020.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4020.json index bff03d71d3c..599047c946d 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4020.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4020.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4020", "sourceIdentifier": "product-security@silabs.com", "published": "2023-12-15T21:15:08.560", - "lastModified": "2023-12-19T20:37:21.960", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:08.653", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,11 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-40xx/CVE-2023-4041.json b/CVE-2023/CVE-2023-40xx/CVE-2023-4041.json index 24146afb707..21eb6b84cbc 100644 --- a/CVE-2023/CVE-2023-40xx/CVE-2023-4041.json +++ b/CVE-2023/CVE-2023-40xx/CVE-2023-4041.json @@ -2,13 +2,13 @@ "id": "CVE-2023-4041", "sourceIdentifier": "product-security@silabs.com", "published": "2023-08-23T05:15:47.990", - "lastModified": "2023-08-29T14:40:53.097", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T17:15:14.643", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules) allows Code Injection, Authentication Bypass.This issue affects \"Standalone\" and \"Application\" versions of Gecko Bootloader.\n\n" + "value": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Out-of-bounds Write, Download of Code Without Integrity Check vulnerability in Silicon Labs Gecko Bootloader on ARM (Firmware Update File Parser modules) allows Code Injection, Authentication Bypass.This issue affects \"Standalone\" and \"Application\" versions of Gecko Bootloader." } ], "metrics": { @@ -84,11 +84,11 @@ }, { "lang": "en", - "value": "CWE-494" + "value": "CWE-787" }, { "lang": "en", - "value": "CWE-787" + "value": "CWE-913" } ] } diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41095.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41095.json index a82af918fb5..23e6360cb2e 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41095.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41095.json @@ -2,13 +2,13 @@ "id": "CVE-2023-41095", "sourceIdentifier": "product-security@silabs.com", "published": "2023-10-26T14:15:08.637", - "lastModified": "2023-11-07T20:35:26.983", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T17:15:14.257", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Encryption of Security Keys vulnerability in Silicon Labs OpenThread SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash.\nThis issue affects Silicon Labs OpenThread SDK: 2.3.1 and earlier.\n\n" + "value": "Missing Encryption of Security Keys vulnerability in Silicon Labs OpenThread SDK on 32 bit, ARM (SecureVault High modules) allows potential modification or extraction of network credentials stored in flash.\nThis issue affects Silicon Labs OpenThread SDK: 2.3.1 and earlier." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-311" + "value": "CWE-312" } ] } diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41096.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41096.json index 16f83cb2b0e..e9a36c09dca 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41096.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41096.json @@ -2,13 +2,13 @@ "id": "CVE-2023-41096", "sourceIdentifier": "product-security@silabs.com", "published": "2023-10-26T14:15:08.720", - "lastModified": "2023-11-08T01:48:37.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T17:15:14.380", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules)\n allows potential modification or extraction of network credentials stored in flash.\n\n\nThis issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier.\n\n" + "value": "Missing Encryption of Security Keys vulnerability in Silicon Labs Ember ZNet SDK on 32 bit, ARM (SecureVault High modules)\n allows potential modification or extraction of network credentials stored in flash.\n\n\nThis issue affects Silicon Labs Ember ZNet SDK: 7.3.1 and earlier." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-311" + "value": "CWE-312" } ] } diff --git a/CVE-2023/CVE-2023-410xx/CVE-2023-41097.json b/CVE-2023/CVE-2023-410xx/CVE-2023-41097.json index 5a5ca790be4..247565c063e 100644 --- a/CVE-2023/CVE-2023-410xx/CVE-2023-41097.json +++ b/CVE-2023/CVE-2023-410xx/CVE-2023-41097.json @@ -2,13 +2,13 @@ "id": "CVE-2023-41097", "sourceIdentifier": "product-security@silabs.com", "published": "2023-12-21T21:15:08.020", - "lastModified": "2024-01-03T17:22:03.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T17:15:14.483", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0.\n\n" + "value": "An Observable Timing Discrepancy, Covert Timing Channel vulnerability in Silabs GSDK on ARM potentially allows Padding Oracle Crypto Attack on CBC PKCS7.This issue affects GSDK: through 4.4.0." }, { "lang": "es", @@ -80,7 +80,7 @@ }, { "lang": "en", - "value": "CWE-385" + "value": "CWE-327" } ] } diff --git a/CVE-2023/CVE-2023-42xx/CVE-2023-4280.json b/CVE-2023/CVE-2023-42xx/CVE-2023-4280.json index b75109cbc97..f782086b117 100644 --- a/CVE-2023/CVE-2023-42xx/CVE-2023-4280.json +++ b/CVE-2023/CVE-2023-42xx/CVE-2023-4280.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4280", "sourceIdentifier": "product-security@silabs.com", "published": "2024-01-02T17:15:09.520", - "lastModified": "2024-01-09T16:51:14.477", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:08.820", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -78,10 +78,6 @@ "lang": "en", "value": "CWE-125" }, - { - "lang": "en", - "value": "CWE-20" - }, { "lang": "en", "value": "CWE-787" diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43762.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43762.json index 94e75f485bc..2fa9d2af87e 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43762.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43762.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43762", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-22T05:15:09.530", - "lastModified": "2023-10-13T16:15:12.030", + "lastModified": "2024-09-25T16:35:08.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43765.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43765.json index 86609c9a24a..41324bc639e 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43765.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43765.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43765", "sourceIdentifier": "cve@mitre.org", "published": "2023-09-22T05:15:09.793", - "lastModified": "2023-09-26T14:52:04.797", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T17:35:09.517", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json index 524da0b1af0..d0d0691b4a9 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51393.json @@ -2,13 +2,13 @@ "id": "CVE-2023-51393", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-23T20:15:51.687", - "lastModified": "2024-02-26T13:42:22.567", + "lastModified": "2024-09-25T16:15:09.297", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nDue to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network." + "value": "Due to an allocation of resources without limits, an uncontrolled resource consumption vulnerability exists in Silicon Labs Ember ZNet SDK prior to v7.4.0.0 (delivered as part of Silicon Labs Gecko SDK v4.4.0) which may enable attackers to trigger a bus fault and crash of the device, requiring a reboot in order to rejoin the network." }, { "lang": "es", @@ -44,10 +44,6 @@ "source": "product-security@silabs.com", "type": "Secondary", "description": [ - { - "lang": "en", - "value": "CWE-400" - }, { "lang": "en", "value": "CWE-770" diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51395.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51395.json index 45be529c13e..e05c605ac57 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51395.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51395.json @@ -2,13 +2,13 @@ "id": "CVE-2023-51395", "sourceIdentifier": "product-security@silabs.com", "published": "2024-03-07T05:15:53.373", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-09-25T16:15:09.650", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\nThe vulnerability described by CVE-2023-0972 has been additionally discovered in Silicon Labs Z-Wave end devices. This vulnerability may allow an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution.\n\n" + "value": "The vulnerability described by CVE-2023-0972 has been additionally discovered in Silicon Labs Z-Wave end devices. This vulnerability may allow an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution." }, { "lang": "es", @@ -46,11 +46,11 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-125" }, { "lang": "en", - "value": "CWE-120" + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-63xx/CVE-2023-6387.json b/CVE-2023/CVE-2023-63xx/CVE-2023-6387.json index f225472da10..cfc8cc6c10d 100644 --- a/CVE-2023/CVE-2023-63xx/CVE-2023-6387.json +++ b/CVE-2023/CVE-2023-63xx/CVE-2023-6387.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6387", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-02T16:15:53.337", - "lastModified": "2024-02-10T04:10:48.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T17:15:14.770", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,11 @@ "description": [ { "lang": "en", - "value": "CWE-131" + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" } ] } diff --git a/CVE-2023/CVE-2023-68xx/CVE-2023-6874.json b/CVE-2023/CVE-2023-68xx/CVE-2023-6874.json index 0cfa2809bda..d887ea1b933 100644 --- a/CVE-2023/CVE-2023-68xx/CVE-2023-6874.json +++ b/CVE-2023/CVE-2023-68xx/CVE-2023-6874.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6874", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-05T18:15:51.877", - "lastModified": "2024-02-10T04:08:53.127", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-25T16:15:09.773", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-754" + "value": "CWE-312" } ] } diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0240.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0240.json index 07d1bd68cc7..501e440bc38 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0240.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0240.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0240", "sourceIdentifier": "product-security@silabs.com", "published": "2024-02-15T21:15:08.673", - "lastModified": "2024-02-16T13:38:00.047", + "lastModified": "2024-09-25T17:15:14.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-401" } ] } diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json new file mode 100644 index 00000000000..152e0a4e6db --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20350.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20350", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:15.000", + "lastModified": "2024-09-25T17:15:15.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SSH server of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to impersonate a Cisco Catalyst Center appliance.\r\n\r\nThis vulnerability is due to the presence of a static SSH host key. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections, which could allow the attacker to intercept traffic between SSH clients and a Cisco Catalyst Center appliance. A successful exploit could allow the attacker to impersonate the affected appliance, inject commands into the terminal session, and steal valid user credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-ssh-e4uOdASj", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json index 89cdfe72dad..8661de5ba9e 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20381.json @@ -2,13 +2,13 @@ "id": "CVE-2024-20381", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-09-11T17:15:12.403", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-25T17:15:15.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability in the JSON-RPC API feature in ConfD that is used by the web-based management interfaces of Cisco Crosswork Network Services Orchestrator (NSO), Cisco Optical Site Manager, and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device.\r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system." + "value": "A vulnerability in the JSON-RPC API feature in Cisco Crosswork Network Services Orchestrator (NSO) and ConfD that is used by the web-based management interfaces of Cisco Optical Site Manager and Cisco RV340 Dual WAN Gigabit VPN Routers could allow an authenticated, remote attacker to modify the configuration of an affected application or device. \r\n\r\nThis vulnerability is due to improper authorization checks on the API. An attacker with privileges sufficient to access the affected application or device could exploit this vulnerability by sending malicious requests to the JSON-RPC API. A successful exploit could allow the attacker to make unauthorized modifications to the configuration of the affected application or device, including creating new user accounts or elevating their own privileges on an affected system." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20414.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20414.json new file mode 100644 index 00000000000..163289b1f69 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20414.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20414", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:15.413", + "lastModified": "2024-09-25T17:15:15.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web UI feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system through the web UI.\r\n\r This vulnerability is due to incorrectly accepting configuration changes through the HTTP GET method. An attacker could exploit this vulnerability by persuading a currently authenticated administrator to follow a crafted link. A successful exploit could allow the attacker to change the configuration of the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-webui-HfwnRgk", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20433.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20433.json new file mode 100644 index 00000000000..617c08510b0 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20433.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20433", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:15.677", + "lastModified": "2024-09-25T17:15:15.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Resource Reservation Protocol (RSVP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a buffer overflow when processing crafted RSVP packets. An attacker could exploit this vulnerability by sending RSVP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rsvp-dos-OypvgVZf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json new file mode 100644 index 00000000000..cb0623769f7 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20434.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20434", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:16.090", + "lastModified": "2024-09-25T17:15:16.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the control plane of an affected device.\r\n\r This vulnerability is due to improper handling of frames with VLAN tag information. An attacker could exploit this vulnerability by sending crafted frames to an affected device. A successful exploit could allow the attacker to render the control plane of the affected device unresponsive. The device would not be accessible through the console or CLI, and it would not respond to ping requests, SNMP requests, or requests from other control plane protocols. Traffic that is traversing the device through the data plane is not affected. A reload of the device is required to restore control plane services." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vlan-dos-27Pur5RT", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20436.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20436.json new file mode 100644 index 00000000000..e85438d1fc7 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20436.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20436", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:16.400", + "lastModified": "2024-09-25T17:15:16.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the HTTP Server feature of Cisco IOS XE Software when the Telephony Service feature is enabled could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to a null pointer dereference when accessing specific URLs. An attacker could exploit this vulnerability by sending crafted HTTP traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, causing a DoS condition on the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-httpsrvr-dos-yOZThut", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20437.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20437.json new file mode 100644 index 00000000000..769acee9aeb --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20437.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20437", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:16.630", + "lastModified": "2024-09-25T17:15:16.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack and execute commands on the CLI of an affected device.\r\n\r This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webui-csrf-ycUYxkKO", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20455.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20455.json new file mode 100644 index 00000000000..b3833abd8a7 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20455", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:16.827", + "lastModified": "2024-09-25T17:15:16.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the process that classifies traffic that is going to the Unified Threat Defense (UTD) component of Cisco IOS XE Software in controller mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability exists because UTD improperly handles certain packets as those packets egress an SD-WAN IPsec tunnel. An attacker could exploit this vulnerability by sending crafted traffic through an SD-WAN IPsec tunnel that is configured on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: SD-WAN tunnels that are configured with Generic Routing Encapsulation (GRE) are not affected by this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-371" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-utd-dos-hDATqxs", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20464.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20464.json new file mode 100644 index 00000000000..c2fb7fa305b --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20464.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20464", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:17.043", + "lastModified": "2024-09-25T17:15:17.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient validation of received IPv4 PIMv2 packets. An attacker could exploit this vulnerability by sending a crafted PIMv2 packet to a PIM-enabled interface on an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition.\r\n\r Note: This vulnerability can be exploited with either an IPv4 multicast or unicast packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pim-APbVfySJ", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20465.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20465.json new file mode 100644 index 00000000000..e9b2ea63c90 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20465.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20465", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:17.220", + "lastModified": "2024-09-25T17:15:17.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-repacl-9eXgnBpD", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20467.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20467.json new file mode 100644 index 00000000000..0e56744a7f1 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20467.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20467", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:17.393", + "lastModified": "2024-09-25T17:15:17.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the implementation of the IPv4 fragmentation reassembly code in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to improper management of resources during fragment reassembly. An attacker could exploit this vulnerability by sending specific sizes of fragmented packets to an affected device or through a Virtual Fragmentation Reassembly (VFR)-enabled interface on an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.\r\n\r Note: This vulnerability affects Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers if they are running Cisco IOS XE Software Release 17.12.1 or 17.12.1a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-399" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cpp-vfr-dos-nhHKGgO", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20475.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20475.json new file mode 100644 index 00000000000..3b06223a4b4 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20475.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20475", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:17.587", + "lastModified": "2024-09-25T17:15:17.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious data into a specific data field in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-xss-zQ4KPvYd", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20480.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20480.json new file mode 100644 index 00000000000..85c349c96da --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20480.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20480", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:17.787", + "lastModified": "2024-09-25T17:15:17.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the DHCP Snooping feature of Cisco IOS XE Software on Software-Defined Access (SD-Access) fabric edge nodes could allow an unauthenticated, remote attacker to cause high CPU utilization on an affected device, resulting in a denial of service (DoS) condition that requires a manual reload to recover. \r\n\r This vulnerability is due to improper handling of IPv4 DHCP packets. An attacker could exploit this vulnerability by sending certain IPv4 DHCP packets to an affected device. A successful exploit could allow the attacker to cause the device to exhaust CPU resources and stop processing traffic, resulting in a DoS condition that requires a manual reload to recover." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-783" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xe-sda-edge-dos-MBcbG9k", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json new file mode 100644 index 00000000000..015403c8404 --- /dev/null +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20496.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20496", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:18.020", + "lastModified": "2024-09-25T17:15:18.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the UDP packet validation code of Cisco SD-WAN vEdge Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected system.\r\n\r\nThis vulnerability is due to incorrect handling of a specific type of malformed UDP packet. An attacker in a machine-in-the-middle position could exploit this vulnerability by sending crafted UDP packets to an affected device. A successful exploit could allow the attacker to cause the device to reboot, resulting in a DoS condition on the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-vedos-KqFfhps3", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json new file mode 100644 index 00000000000..c734d583e00 --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20508.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20508", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:18.267", + "lastModified": "2024-09-25T17:15:18.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cisco UTD Snort IPS Engine to be dropped." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-utd-snort3-dos-bypas-b4OUEwxD", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json b/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json new file mode 100644 index 00000000000..8ea019e824f --- /dev/null +++ b/CVE-2024/CVE-2024-205xx/CVE-2024-20510.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20510", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-09-25T17:15:18.470", + "lastModified": "2024-09-25T17:15:18.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Central Web Authentication (CWA) feature of Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent attacker to bypass the pre-authentication access control list (ACL), which could allow access to network resources before user authentication.\r\n\r This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server. An attacker could exploit this vulnerability by connecting to a wireless network that is configured for CWA and sending traffic through an affected device that should be denied by the configured ACL before user authentication. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device before the user authentication is completed, allowing the attacker to access trusted networks that the device might be protecting." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-c9800-cwa-acl-nPSbHSnA", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22296.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22296.json index 9725750a500..07ae998017f 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22296.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22296", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-10T08:15:48.017", - "lastModified": "2024-06-10T12:40:41.360", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T16:36:14.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code4recovery:12_step_meeting_list:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.14.29", + "matchCriteriaId": "A21AF535-0BBB-4715-9DD3-4EBF2AD25B79" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/12-step-meeting-list/wordpress-12-step-meeting-list-plugin-3-14-26-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30128.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30128.json index 78d2b69b5d3..f3bd8048e4d 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30128.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30128.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30128", "sourceIdentifier": "psirt@hcl.com", "published": "2024-09-25T15:15:13.717", - "lastModified": "2024-09-25T15:15:13.717", + "lastModified": "2024-09-25T16:35:10.083", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-441" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0115504", diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3183.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3183.json index 89921d1ddf2..1d4a9989cb6 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3183.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3183.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3183", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-12T09:15:18.683", - "lastModified": "2024-09-16T20:15:46.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T16:29:45.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -51,54 +71,153 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7883DE07-470D-4160-9767-4F831B75B9A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5F4FA7-E5C5-4C23-BDA8-36A36972E4F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_aus:8.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5CA4F12A-5BC5-4D75-8F20-80D8BB2C5BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", + "matchCriteriaId": "62C31522-0A17-4025-B269-855C7F4B45C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BF14A415-15BD-4A6C-87CF-675E09390474" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_tus:8.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C237415F-33FE-4686-9B19-A0916BF75D2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E881C927-DF96-4D2E-9887-FF12E456B1FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:8.6:*:*:*:*:*:*:*", + "matchCriteriaId": "FB096D5D-E8F6-4164-8B76-0217B7151D30" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:3754", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3755", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3756", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3757", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3758", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3759", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3760", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3761", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:3775", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-3183", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270685", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://www.freeipa.org/release-notes/4-12-1.html", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34057.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34057.json index 49ea14ca3ac..0e0b74cba78 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34057.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34057.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34057", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T19:15:40.777", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:08:16.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,144 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trianglemicroworks:iec_61850_source_code_library:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.2.0", + "matchCriteriaId": "C3253ACC-02E5-4AFD-AAA0-2F47E5AD3D26" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:sicam_a8000_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05.30", + "matchCriteriaId": "6EA612FA-5E60-4278-A7A3-9C28E5857AD8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:sicam_a8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BF612C4-56F9-4946-86E5-6D7C309E195F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:sicam_scc_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0", + "matchCriteriaId": "1760C8BA-E26C-48BD-8733-801C5245B1D0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:sicam_scc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26100EEE-4859-41BD-83A8-F2D57FC3F5C1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:sicam_egs_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05.30", + "matchCriteriaId": "7D8AAD69-99AA-48C7-AD40-431FC65085AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:sicam_egs:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B926004A-C343-4C15-9AF4-32C1B4EEEEB2" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:sicam_s8000:*:*:*:*:*:*:*:*", + "versionEndExcluding": "05.30", + "matchCriteriaId": "48484B01-98F1-41CB-876D-5DE76E65E7B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:sitipe_at:*:*:*:*:*:*:*:*", + "matchCriteriaId": "5A83D1DC-FCF0-4E05-BF26-CFDFAC4A2513" + } + ] + } + ] + } + ], "references": [ { "url": "https://trianglemicroworks.com/products/source-code-libraries/iec-61850-scl-pages/what%27s-new", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-256-16", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40761.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40761.json index a7c1ea2ffb5..35b003da801 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40761.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40761.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40761", "sourceIdentifier": "security@apache.org", "published": "2024-09-25T08:15:04.437", - "lastModified": "2024-09-25T08:15:04.437", + "lastModified": "2024-09-25T16:35:10.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Vulnerabilidad de fuerza de cifrado inadecuada en Apache Answer. Este problema afecta a Apache Answer: hasta la versi\u00f3n 1.3.5. El uso del valor MD5 del correo electr\u00f3nico de un usuario para acceder a Gravatar es inseguro y puede provocar la filtraci\u00f3n del correo electr\u00f3nico del usuario. La recomendaci\u00f3n oficial es utilizar SHA256 en su lugar. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.4.0, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40838.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40838.json index bdf8b65040b..0d3f0ad5a47 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40838.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40838.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40838", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:48.853", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T16:46:24.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se solucion\u00f3 un problema de privacidad moviendo los datos confidenciales a una ubicaci\u00f3n protegida. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n maliciosa podr\u00eda acceder a las notificaciones del dispositivo del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41445.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41445.json new file mode 100644 index 00000000000..f6863017bf9 --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41445.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41445", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-25T17:15:18.740", + "lastModified": "2024-09-25T17:15:18.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Library MDF (mdflib) v2.1 is vulnerable to a heap-based buffer overread via a crafted mdf4 file is parsed using the ReadData function" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/g0ku704/vulnerabilities/tree/main/CVE-2024-41445", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41708.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41708.json new file mode 100644 index 00000000000..78e5f5c6114 --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41708.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41708", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-25T17:15:18.823", + "lastModified": "2024-09-25T17:15:18.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in AdaCore ada_web_services 20.0 allows an attacker to escalate privileges and steal sessions via the Random_String() function in the src/core/aws-utils.adb module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://docs.adacore.com/corp/security-advisories/SEC.AWS-0040-v2.pdf", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/AdaCore/aws", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43994.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43994.json index 22a8e7be5cf..6d1a7e445a0 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43994.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43994.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43994", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-18T00:15:08.720", - "lastModified": "2024-09-20T12:30:51.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:09:09.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cryoutcreations:kahuna:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.7.0", + "matchCriteriaId": "CA53EA10-DD54-4C24-960B-586519A86C69" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/kahuna/wordpress-kahuna-theme-1-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-446xx/CVE-2024-44678.json b/CVE-2024/CVE-2024-446xx/CVE-2024-44678.json new file mode 100644 index 00000000000..f6b259cee69 --- /dev/null +++ b/CVE-2024/CVE-2024-446xx/CVE-2024-44678.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44678", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-25T17:15:18.990", + "lastModified": "2024-09-25T17:15:18.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Gigastone TR1 Travel Router R101 v1.0.2 is vulnerable to Command Injection. This allows an authenticated attacker to execute arbitrary commands on the device by sending a crafted HTTP request to the ssid parameter in the request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.bridewell.com/insights/blogs/detail/cve-2024-44678-identified-vulnerability-in-gigastone-wi-fi-range-extenders", + "source": "cve@mitre.org" + }, + { + "url": "https://www.newegg.com/gigastone-tr1/p/0E6-008K-00004", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44825.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44825.json new file mode 100644 index 00000000000..293c68430b6 --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44825.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44825", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-25T16:15:10.187", + "lastModified": "2024-09-25T16:15:10.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Directory Traversal vulnerability in Centro de Tecnologia da Informaco Renato Archer InVesalius3 v3.1.99995 allows attackers to write arbitrary files unto the system via a crafted .inv3 file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/invesalius/invesalius3", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/partywavesec/invesalius3_vulnerabilities/tree/main/CVE-2024-44825", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45311.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45311.json index 75220fc1c2f..43250e37d7e 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45311.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45311", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-02T18:15:37.373", - "lastModified": "2024-09-03T12:59:02.453", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T17:03:36.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quinn_project:quinn:*:*:*:*:*:rust:*:*", + "versionStartIncluding": "0.11.0", + "versionEndExcluding": "0.11.4", + "matchCriteriaId": "4C67B1D7-FE4B-4EE4-95F0-D8EA749AA4CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/quinn-rs/quinn/blob/bb02a12a8435a7732a1d762783eeacbb7e50418e/quinn-proto/src/endpoint.rs#L213", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/quinn-rs/quinn/commit/e01609ccd8738bd438d86fa7185a0f85598cb58f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/quinn-rs/quinn/security/advisories/GHSA-vr26-jcq5-fjj8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45410.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45410.json index 5b72978b85e..64f84b03b57 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45410.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45410", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-19T23:15:11.480", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:39:08.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,18 +85,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.11.9", + "matchCriteriaId": "D8862E39-A57C-4CD5-A289-A853D9402298" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:traefik:traefik:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.1.3", + "matchCriteriaId": "31D16308-8F47-4EAC-B102-1FDEA4B3F9F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/traefik/traefik/releases/tag/v2.11.9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/traefik/traefik/releases/tag/v3.1.3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/traefik/traefik/security/advisories/GHSA-62c8-mh53-4cqv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45752.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45752.json index 022c5f4e6b4..1d4ff289aaa 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45752.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45752.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45752", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-19T16:15:04.910", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T16:54:27.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixlone:logiops:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.3.4", + "matchCriteriaId": "A61D6CCE-2D44-4329-907E-CA1E689FCCFF" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.suse.com/show_bug.cgi?id=1226598", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/PixlOne/logiops/releases", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45807.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45807.json index b7304919446..76d94a36c11 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45807.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45807.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45807", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-20T00:15:02.520", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T17:12:38.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.31.0", + "versionEndExcluding": "1.31.2", + "matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-qc52-r4x5-9w37", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45808.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45808.json index 043b4cadbdd..40556ed9053 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45808.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45808", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-20T00:15:02.733", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T17:18:38.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.28.7", + "matchCriteriaId": "C5E423BE-4022-47AB-A5D4-B218627517DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.29.0", + "versionEndExcluding": "1.29.9", + "matchCriteriaId": "E442EF13-A99D-42B9-BC76-AC398C32D132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.30.0", + "versionEndExcluding": "1.30.6", + "matchCriteriaId": "D9685C62-CFE4-43C5-B0C2-1C6722FB4F64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.31.0", + "versionEndExcluding": "1.31.2", + "matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-p222-xhp9-39rc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46086.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46086.json index b0297a78910..9cd85cd04a9 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46086.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46086.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46086", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-18T16:15:06.160", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:08:41.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "1B03397C-68B4-4C54-B001-8B5BC5FE427A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PG2Stom/cms/tree/main/12/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46382.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46382.json index a0ee3d639e9..4b20b93904d 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46382.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46382.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46382", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-19T13:15:04.007", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T16:56:09.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linlinjava:litemall:1.8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DEBF7CF8-8C16-4129-AF35-F29414CD08EF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/linlinjava/litemall/issues/552", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46394.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46394.json index 81dd4717901..9a12f574e55 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46394.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46394.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46394", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-19T14:15:17.373", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T16:55:15.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:frogcms_project:frogcms:0.9.5:*:*:*:*:*:*:*", + "matchCriteriaId": "1B03397C-68B4-4C54-B001-8B5BC5FE427A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/fffccx1/cms/tree/main/14/readme.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46461.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46461.json index 039b18db9fc..21c47ffc31b 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46461.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46461.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46461", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-25T15:15:14.567", - "lastModified": "2024-09-25T15:15:14.567", + "lastModified": "2024-09-25T16:35:11.207", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "VLC media player 3.0.20 and earlier is vulnerable to denial of service through an integer overflow which could be triggered with a maliciously crafted mms stream (heap based overflow). If successful, a malicious third party could trigger either a crash of VLC or an arbitrary code execution with the target user's privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "https://www.videolan.org/security/sb-vlc3021.html", diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46485.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46485.json new file mode 100644 index 00000000000..0ab3bd6ec55 --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46485.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46485", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-25T16:15:10.480", + "lastModified": "2024-09-25T16:15:10.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "dingfanzu CMS 1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) via /admin/doAdminAction.php?act=addCate" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/kikaku-ship/cms/tree/main/1/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46600.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46600.json new file mode 100644 index 00000000000..bd45508e438 --- /dev/null +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46600.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46600", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-25T16:15:10.707", + "lastModified": "2024-09-25T16:15:10.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "dingfanzu CMS 1.0 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/doAdminAction.php?act=delCate&id=31" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/loading15678/cms/tree/main/3/readme.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46983.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46983.json index b941d70acb9..a25f90a3aa2 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46983.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46983", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-19T23:15:11.920", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:46:48.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:antfin:sofa-hessian:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.5.5", + "matchCriteriaId": "40BEC4BD-1D1B-4904-9DF2-4F7E9EFD3A05" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sofastack/sofa-hessian/security/advisories/GHSA-c459-2m73-67hj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46984.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46984.json index da60945b895..7495173c5a0 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46984.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46984", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-19T23:15:12.107", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:49:17.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,30 +71,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gematik:reference_validator:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.5.1", + "matchCriteriaId": "AEEBDA61-217C-44BD-973D-A118D24213AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://cheatsheetseries.owasp.org/cheatsheets/XML_External_Entity_Prevention_Cheat_Sheet.html#transformerfactory", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://github.com/gematik/app-referencevalidator/releases/tag/2.5.1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/gematik/app-referencevalidator/security/advisories/GHSA-68j8-fp38-p48q", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://owasp.org/www-community/attacks/Server_Side_Request_Forgery", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://owasp.org/www-project-top-ten/2017/A4_2017-XML_External_Entities_(XXE)#", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47060.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47060.json index ab548f2fd08..09f53cca378 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47060.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47060", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-20T00:15:03.767", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T16:43:47.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,84 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.54.10", + "matchCriteriaId": "B57963B2-68B5-4E7C-97B7-64304BB64F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.55.0", + "versionEndExcluding": "2.55.8", + "matchCriteriaId": "BD559AF6-7A21-405F-A421-B801F37B9B3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.56.0", + "versionEndExcluding": "2.56.6", + "matchCriteriaId": "04A51D71-DC37-4443-AFD4-5C1DACBD9026" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.57.0", + "versionEndExcluding": "2.57.5", + "matchCriteriaId": "3A379F08-C3D5-4C5F-8799-AC2E9097A655" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.58.0", + "versionEndExcluding": "2.58.5", + "matchCriteriaId": "095B9185-EB6C-4601-95AC-C1F8CE4CF757" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.59.0", + "versionEndExcluding": "2.59.3", + "matchCriteriaId": "790DC952-225B-4AAA-873C-EACDE249982B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.60.0", + "versionEndExcluding": "2.60.2", + "matchCriteriaId": "89E084F5-D132-4244-8E7C-4E26E033A636" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.61.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ED36FAD4-DAB7-41FE-8C14-119B24E2CCCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:zitadel:zitadel:2.62.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D15D8180-D356-4933-8390-19B2DCE2D89F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zitadel/zitadel/security/advisories/GHSA-jj94-6f5c-65r8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47078.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47078.json new file mode 100644 index 00000000000..759cf9475c9 --- /dev/null +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47078.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47078", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-25T16:15:10.907", + "lastModified": "2024-09-25T16:15:10.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Meshtastic is an open source, off-grid, decentralized, mesh network. Meshtastic uses MQTT to communicate over an internet connection to a shared or private MQTT Server. Nodes can communicate directly via an internet connection or proxied through a connected phone (i.e., via bluetooth). Prior to version 2.5.1, multiple weaknesses in the MQTT implementation allow for authentication and authorization bypasses resulting in unauthorized control of MQTT-connected nodes. Version 2.5.1 contains a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + }, + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/meshtastic/firmware/security/advisories/GHSA-vqcq-wjwx-7252", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json index f0a2c90e659..69e85c0f692 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6061", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T20:15:14.850", - "lastModified": "2024-06-20T12:44:22.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T16:16:22.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,30 +140,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", + "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/20c0f29139a82779b86453ce7f68d0681ec7624c", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/gpac/gpac/issues/2871", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/user-attachments/files/15801058/poc1.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.268789", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268789", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.356308", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json index 7adccf2b56d..c2fde384899 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6062", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T20:15:15.170", - "lastModified": "2024-06-20T12:44:22.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T16:13:02.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,30 +140,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", + "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/31e499d310a48bd17c8b055a0bfe0fe35887a7cd", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/gpac/gpac/issues/2872", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/user-attachments/files/15801126/poc2.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.268790", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268790", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.356314", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json index dfb37caea0a..da2bd92c879 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6063", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T21:15:51.443", - "lastModified": "2024-06-20T12:44:22.977", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T16:01:30.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,30 +140,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gpac:gpac:2.5-dev-rev288-g11067ea92-master:*:*:*:*:*:*:*", + "matchCriteriaId": "8CB1A488-697C-4770-B217-33A7F8403E77" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gpac/gpac/commit/8767ed0a77c4b02287db3723e92c2169f67c85d5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/gpac/gpac/issues/2873", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/user-attachments/files/15801157/poc.zip", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.268791", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.268791", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.356315", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json index 064a9d788e1..0bbd34c8f6c 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7207", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T23:15:12.337", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:51:34.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,18 +81,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.28.7", + "matchCriteriaId": "C5E423BE-4022-47AB-A5D4-B218627517DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.29.0", + "versionEndExcluding": "1.29.9", + "matchCriteriaId": "E442EF13-A99D-42B9-BC76-AC398C32D132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.30.0", + "versionEndExcluding": "1.30.6", + "matchCriteriaId": "D9685C62-CFE4-43C5-B0C2-1C6722FB4F64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.31.0", + "versionEndExcluding": "1.31.2", + "matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-7207", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300352", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json index 1007e771e3d..770129f6da2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7386.json @@ -2,13 +2,17 @@ "id": "CVE-2024-7386", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T03:15:03.040", - "lastModified": "2024-09-25T03:15:03.040", + "lastModified": "2024-09-25T17:15:19.110", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Premium Packages \u2013 Sell Digital Products Securely plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.1. This is due to missing nonce validation on the wpdmpp_async_request() function. This makes it possible for unauthenticated attackers to perform actions such as initiating refunds via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link." + "value": "The Premium Packages \u2013 Sell Digital Products Securely plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.9.1. This is due to missing nonce validation on the addRefund() function. This makes it possible for unauthenticated attackers to perform actions such as initiating refunds via a forged request granted they can trick a site administrator or shop manager into performing an action such as clicking on a link." + }, + { + "lang": "es", + "value": "El complemento Premium Packages \u2013 Sell Digital Products Securely para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 5.9.1 incluida. Esto se debe a la falta de validaci\u00f3n de nonce en la funci\u00f3n wpdmpp_async_request(). Esto permite que atacantes no autenticados realicen acciones como iniciar reembolsos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio o al gerente de la tienda para que realice una acci\u00f3n como hacer clic en un enlace." } ], "metrics": { @@ -49,7 +53,7 @@ ], "references": [ { - "url": "https://plugins.trac.wordpress.org/browser/wpdm-premium-packages/trunk/wpdm-premium-packages.php?rev=3102989#L1148", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3156970%40wpdm-premium-packages&new=3156970%40wpdm-premium-packages&sfp_email=&sfph_mail=", "source": "security@wordfence.com" }, { diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json index 4cad38054e6..daef1e9a772 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7409", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-05T14:15:35.813", - "lastModified": "2024-09-25T05:15:10.570", + "lastModified": "2024-09-25T17:15:19.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6811", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6818", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:6964", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7421.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7421.json new file mode 100644 index 00000000000..fbc2415deba --- /dev/null +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7421.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-7421", + "sourceIdentifier": "security@devolutions.net", + "published": "2024-09-25T16:15:11.187", + "lastModified": "2024-09-25T16:15:11.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An information exposure in Devolutions Remote Desktop Manager 2024.2.20.0 and earlier on Windows allows local attackers with access to system logs to obtain session credentials via passwords included in command-line arguments when launching WinSCP sessions" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@devolutions.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2024-0014", + "source": "security@devolutions.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7625.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7625.json index 92592c973cd..1370c383565 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7625.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7625.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7625", "sourceIdentifier": "security@hashicorp.com", "published": "2024-08-15T00:15:13.127", - "lastModified": "2024-08-15T13:01:10.150", + "lastModified": "2024-09-25T16:15:11.307", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.16.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability." + "value": "In HashiCorp Nomad and Nomad Enterprise from 0.6.1 up to 1.6.13, 1.7.10, and 1.8.2, the archive unpacking process is vulnerable to writes outside the allocation directory during migration of allocation directories when multiple archive headers target the same file. This vulnerability, CVE-2024-7625, is fixed in Nomad 1.6.14, 1.7.11, and 1.8.3. Access or compromise of the Nomad client agent at the source allocation first is a prerequisite for leveraging this vulnerability." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8354.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8354.json index 4a3d3ae8e12..7ab1dd375f7 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8354.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8354.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8354", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T11:15:10.440", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T16:58:59.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -51,14 +71,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qemu:qemu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D9E0C78-9678-4CEE-9389-962CF618A51F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*", + "matchCriteriaId": "053C1B35-3869-41C2-9551-044182DE0A64" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*", + "matchCriteriaId": "3AA08768-75AF-4791-B229-AE938C780959" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-8354", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2313497", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json index cdef8909838..ea782cb6b79 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8661.json @@ -2,13 +2,13 @@ "id": "CVE-2024-8661", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-09-16T18:15:54.583", - "lastModified": "2024-09-20T12:31:20.110", + "lastModified": "2024-09-25T16:15:11.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.18 are vulnerable to Stored XSS in the \"Next&Previous Nav\" block. A rogue administrator could add a malicious payload by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N \u00a0Since the \"Next&Previous Nav\" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users.\u00a0Thanks, Chu Quoc Khanh for reporting." + "value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in the \"Next&Previous Nav\" block. A rogue administrator could add a malicious payload by executing it in the browsers of targeted users. The Concrete CMS Security Team gave this vulnerability a CVSS v4 score of 4.6 with vector CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N \u00a0Since the \"Next&Previous Nav\" block output was not sufficiently sanitized, the malicious payload could be executed in the browsers of targeted users.\u00a0Thanks, Chu Quoc Khanh for reporting." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8853.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8853.json index 4acf357a250..43879845367 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8853.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8853", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-20T08:15:11.493", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:49:25.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,18 +61,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:medialibs:webo-facto:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.41", + "matchCriteriaId": "950849A5-AADE-4DB0-98D0-27F7001051BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/webo-facto-connector/tags/1.40/WeboFacto/Sso.php#L78", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3153062/webo-facto-connector", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c1280ceb-9ce8-47fc-8fd3-6af80015dea9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json index 4f1406fc20c..39c389feba0 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8883", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T16:15:06.403", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:17:35.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", @@ -51,54 +71,158 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:*", + "matchCriteriaId": "1830E455-7E11-4264-862D-05971A42D4A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*", + "matchCriteriaId": "EA983F8C-3A06-450A-AEFF-9429DE9A3454" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "40449571-22F8-44FA-B57B-B43F71AB25E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "01B0F191-ADDB-4AAE-A5C5-5CC16909E64A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "FD75BCB4-F0E1-4C05-A2D7-001503C805C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "B02036DD-4489-480B-B7D4-4EB08952377B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C7E78C55-45B6-4E01-9773-D3468F8EA9C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "30E2CF79-2D56-48AB-952E-5DDAFE471073" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "54E24055-813B-4E6D-94B7-FAD5F78B8537" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*", + "matchCriteriaId": "341E6313-20D5-44CB-9719-B20585DC5AD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:single_sign-on:7.6:*:*:*:*:*:*:*", + "matchCriteriaId": "2DEC61BC-E699-456E-99B6-C049F2A5F23F" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:6878", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6879", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6880", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6882", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6886", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6887", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6888", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6889", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2024:6890", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8883", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312511", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://github.com/keycloak/keycloak/blob/main/services/src/main/java/org/keycloak/protocol/oidc/utils/RedirectUtils.java", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json new file mode 100644 index 00000000000..f09e21ae87f --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8975.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8975", + "sourceIdentifier": "security@grafana.com", + "published": "2024-09-25T17:15:19.360", + "lastModified": "2024-09-25T17:15:19.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unquoted Search Path or Element vulnerability in Grafana Alloy on Windows allows Privilege Escalation from Local User to SYSTEM\nThis issue affects Alloy: before 1.3.3, from 1.4.0-rc.0 through 1.4.0-rc.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/grafana/alloy/releases/tag/v1.4.0", + "source": "security@grafana.com" + }, + { + "url": "https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996/", + "source": "security@grafana.com" + }, + { + "url": "https://grafana.com/security/security-advisories/cve-2024-8975/", + "source": "security@grafana.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8996.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8996.json new file mode 100644 index 00000000000..f2f410e9852 --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8996.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8996", + "sourceIdentifier": "security@grafana.com", + "published": "2024-09-25T17:15:19.567", + "lastModified": "2024-09-25T17:15:19.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unquoted Search Path or Element vulnerability in Grafana Agent (Flow mode) on Windows allows Privilege Escalation from Local User to SYSTEM\nThis issue affects Agent Flow: before 0.43.2" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/grafana/agent/releases/tag/v0.43.2", + "source": "security@grafana.com" + }, + { + "url": "https://grafana.com/blog/2024/09/25/grafana-alloy-and-grafana-agent-flow-security-release-high-severity-fix-for-cve-2024-8975-and-cve-2024-8996/", + "source": "security@grafana.com" + }, + { + "url": "https://grafana.com/security/security-advisories/cve-2024-8996/", + "source": "security@grafana.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9003.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9003.json index 5d69874a384..d76ecb77f69 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9003.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9003", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-19T21:15:16.143", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-25T17:18:44.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,22 +150,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jflow_project:jflow:2.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6962B89B-25B5-4A11-A9C3-002C07491F62" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sweatxi/BugHub/blob/main/Jinan%20Gallop%20JFlow%20CMS%20port%20is%20not%20authorized%20to%20cause%20the%20leakage%20of%20database%20attachment%20information.pdf", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.278153", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278153", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.406225", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9009.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9009.json index 827e0305598..f8845662767 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9009.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9009", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T00:15:03.997", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T17:46:59.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:online_quiz_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "15DF6E37-6F4D-459A-823E-73DB8450C6CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ZTurNA/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278165", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278165", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.410183", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9011.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9011.json index a0863e16274..18d123b9fac 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9011.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9011", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T01:15:10.550", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T17:48:14.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ppp-src/a/issues/14", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278166", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278166", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.410396", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9031.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9031.json index 506af757b20..33e5731bda1 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9031.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9031.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9031", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T12:15:06.073", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T16:52:25.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in CodeCanyon CRMGo SaaS up to 7.2. This issue affects some unknown processing of the file /project/task/{task_id}/show. The manipulation of the argument comment leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en CodeCanyon CRMGo SaaS hasta la versi\u00f3n 7.2. Este problema afecta a algunos procesos desconocidos del archivo /project/task/{task_id}/show. La manipulaci\u00f3n del argumento comment provoca cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:workdo:crmgo_saas:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.2", + "matchCriteriaId": "F7AA0E2C-521E-45AB-9EA1-2FAD8F40F1E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://bytium.com/stored-xss-vulnerabilities-in-crmgo-sass-version-7-2/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278201", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.278201", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.410565", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9043.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9043.json index 879186c9a35..5012b895c2b 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9043.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9043.json @@ -2,13 +2,17 @@ "id": "CVE-2024-9043", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-20T11:15:13.280", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-25T17:54:05.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Secure Email Gateway from Cellopoint has Buffer Overflow Vulnerability in authentication process. Remote unauthenticated attackers can send crafted packets to crash the process, thereby bypassing authentication and obtaining system administrator privileges." + }, + { + "lang": "es", + "value": "Secure Email Gateway de Cellopoint tiene una vulnerabilidad de desbordamiento de b\u00fafer en el proceso de autenticaci\u00f3n. Los atacantes remotos no autenticados pueden enviar paquetes manipulados para bloquear el proceso, eludiendo as\u00ed la autenticaci\u00f3n y obteniendo privilegios de administrador del sistema." } ], "metrics": { @@ -37,8 +41,18 @@ }, "weaknesses": [ { - "source": "twcert@cert.org.tw", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "twcert@cert.org.tw", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,14 +61,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cellopoint:secure_email_gateway:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.1", + "versionEndIncluding": "4.5.0", + "matchCriteriaId": "1B586F4B-F5B1-49C1-9ACD-1B4B1F6EB6D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-8103-b0568-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-8102-b94a9-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9120.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9120.json index 89b4aeeb2e6..ed96dc57ddc 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9120.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9120.json @@ -2,16 +2,43 @@ "id": "CVE-2024-9120", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-09-25T01:15:48.720", - "lastModified": "2024-09-25T01:15:48.720", + "lastModified": "2024-09-25T17:35:12.403", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Use after free in Dawn in Google Chrome on Windows prior to 129.0.6668.70 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Use after free de Dawn en Google Chrome en Windows antes de la versi\u00f3n 129.0.6668.70 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del mont\u00f3n a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: Alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +49,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9121.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9121.json index 5c4a6df065f..6cee4656b59 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9121.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9121.json @@ -2,16 +2,55 @@ "id": "CVE-2024-9121", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-09-25T01:15:48.797", - "lastModified": "2024-09-25T01:15:48.797", + "lastModified": "2024-09-25T17:35:13.613", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Inappropriate implementation in V8 in Google Chrome prior to 129.0.6668.70 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "Una implementaci\u00f3n inadecuada en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.70 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites establecidos a trav\u00e9s de una p\u00e1gina HTML manipulada espec\u00edficamente. (Gravedad de seguridad de Chromium: alta)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html", diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9122.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9122.json index bacf6fd0cd0..dfaf11bf85c 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9122.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9122.json @@ -2,16 +2,43 @@ "id": "CVE-2024-9122", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-09-25T01:15:48.837", - "lastModified": "2024-09-25T01:15:48.837", + "lastModified": "2024-09-25T17:35:15.597", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Type Confusion in V8 in Google Chrome prior to 129.0.6668.70 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)" + }, + { + "lang": "es", + "value": "La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 129.0.6668.70 permit\u00eda a un atacante remoto realizar un acceso a la memoria fuera de los l\u00edmites a trav\u00e9s de una p\u00e1gina HTML manipulada espec\u00edficamente. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +49,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "references": [ diff --git a/README.md b/README.md index 12b7d60be16..ab59428cfb6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-25T16:00:26.886560+00:00 +2024-09-25T18:00:19.666232+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-25T15:55:09.027000+00:00 +2024-09-25T17:54:05.297000+00:00 ``` ### Last Data Feed Release @@ -33,57 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -263750 +263776 ``` ### CVEs added in the last Commit -Recently added CVEs: `13` +Recently added CVEs: `26` -- [CVE-2024-22892](CVE-2024/CVE-2024-228xx/CVE-2024-22892.json) (`2024-09-25T15:15:13.430`) -- [CVE-2024-22893](CVE-2024/CVE-2024-228xx/CVE-2024-22893.json) (`2024-09-25T15:15:13.520`) -- [CVE-2024-30128](CVE-2024/CVE-2024-301xx/CVE-2024-30128.json) (`2024-09-25T15:15:13.717`) -- [CVE-2024-43237](CVE-2024/CVE-2024-432xx/CVE-2024-43237.json) (`2024-09-25T15:15:14.000`) -- [CVE-2024-43959](CVE-2024/CVE-2024-439xx/CVE-2024-43959.json) (`2024-09-25T15:15:14.187`) -- [CVE-2024-43990](CVE-2024/CVE-2024-439xx/CVE-2024-43990.json) (`2024-09-25T15:15:14.370`) -- [CVE-2024-45613](CVE-2024/CVE-2024-456xx/CVE-2024-45613.json) (`2024-09-25T14:15:05.303`) -- [CVE-2024-46461](CVE-2024/CVE-2024-464xx/CVE-2024-46461.json) (`2024-09-25T15:15:14.567`) -- [CVE-2024-6512](CVE-2024/CVE-2024-65xx/CVE-2024-6512.json) (`2024-09-25T14:15:05.560`) -- [CVE-2024-7575](CVE-2024/CVE-2024-75xx/CVE-2024-7575.json) (`2024-09-25T14:15:05.750`) -- [CVE-2024-7576](CVE-2024/CVE-2024-75xx/CVE-2024-7576.json) (`2024-09-25T14:15:05.970`) -- [CVE-2024-7679](CVE-2024/CVE-2024-76xx/CVE-2024-7679.json) (`2024-09-25T14:15:06.180`) -- [CVE-2024-8316](CVE-2024/CVE-2024-83xx/CVE-2024-8316.json) (`2024-09-25T14:15:06.550`) +- [CVE-2024-20350](CVE-2024/CVE-2024-203xx/CVE-2024-20350.json) (`2024-09-25T17:15:15.000`) +- [CVE-2024-20414](CVE-2024/CVE-2024-204xx/CVE-2024-20414.json) (`2024-09-25T17:15:15.413`) +- [CVE-2024-20433](CVE-2024/CVE-2024-204xx/CVE-2024-20433.json) (`2024-09-25T17:15:15.677`) +- [CVE-2024-20434](CVE-2024/CVE-2024-204xx/CVE-2024-20434.json) (`2024-09-25T17:15:16.090`) +- [CVE-2024-20436](CVE-2024/CVE-2024-204xx/CVE-2024-20436.json) (`2024-09-25T17:15:16.400`) +- [CVE-2024-20437](CVE-2024/CVE-2024-204xx/CVE-2024-20437.json) (`2024-09-25T17:15:16.630`) +- [CVE-2024-20455](CVE-2024/CVE-2024-204xx/CVE-2024-20455.json) (`2024-09-25T17:15:16.827`) +- [CVE-2024-20464](CVE-2024/CVE-2024-204xx/CVE-2024-20464.json) (`2024-09-25T17:15:17.043`) +- [CVE-2024-20465](CVE-2024/CVE-2024-204xx/CVE-2024-20465.json) (`2024-09-25T17:15:17.220`) +- [CVE-2024-20467](CVE-2024/CVE-2024-204xx/CVE-2024-20467.json) (`2024-09-25T17:15:17.393`) +- [CVE-2024-20475](CVE-2024/CVE-2024-204xx/CVE-2024-20475.json) (`2024-09-25T17:15:17.587`) +- [CVE-2024-20480](CVE-2024/CVE-2024-204xx/CVE-2024-20480.json) (`2024-09-25T17:15:17.787`) +- [CVE-2024-20496](CVE-2024/CVE-2024-204xx/CVE-2024-20496.json) (`2024-09-25T17:15:18.020`) +- [CVE-2024-20508](CVE-2024/CVE-2024-205xx/CVE-2024-20508.json) (`2024-09-25T17:15:18.267`) +- [CVE-2024-20510](CVE-2024/CVE-2024-205xx/CVE-2024-20510.json) (`2024-09-25T17:15:18.470`) +- [CVE-2024-41445](CVE-2024/CVE-2024-414xx/CVE-2024-41445.json) (`2024-09-25T17:15:18.740`) +- [CVE-2024-41708](CVE-2024/CVE-2024-417xx/CVE-2024-41708.json) (`2024-09-25T17:15:18.823`) +- [CVE-2024-44678](CVE-2024/CVE-2024-446xx/CVE-2024-44678.json) (`2024-09-25T17:15:18.990`) +- [CVE-2024-44825](CVE-2024/CVE-2024-448xx/CVE-2024-44825.json) (`2024-09-25T16:15:10.187`) +- [CVE-2024-46485](CVE-2024/CVE-2024-464xx/CVE-2024-46485.json) (`2024-09-25T16:15:10.480`) +- [CVE-2024-46600](CVE-2024/CVE-2024-466xx/CVE-2024-46600.json) (`2024-09-25T16:15:10.707`) +- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-09-25T16:15:10.907`) +- [CVE-2024-7421](CVE-2024/CVE-2024-74xx/CVE-2024-7421.json) (`2024-09-25T16:15:11.187`) +- [CVE-2024-8975](CVE-2024/CVE-2024-89xx/CVE-2024-8975.json) (`2024-09-25T17:15:19.360`) +- [CVE-2024-8996](CVE-2024/CVE-2024-89xx/CVE-2024-8996.json) (`2024-09-25T17:15:19.567`) ### CVEs modified in the last Commit -Recently modified CVEs: `60` +Recently modified CVEs: `63` -- [CVE-2024-42224](CVE-2024/CVE-2024-422xx/CVE-2024-42224.json) (`2024-09-25T15:55:09.027`) -- [CVE-2024-43970](CVE-2024/CVE-2024-439xx/CVE-2024-43970.json) (`2024-09-25T14:18:53.297`) -- [CVE-2024-43971](CVE-2024/CVE-2024-439xx/CVE-2024-43971.json) (`2024-09-25T14:18:13.137`) -- [CVE-2024-43972](CVE-2024/CVE-2024-439xx/CVE-2024-43972.json) (`2024-09-25T14:16:18.150`) -- [CVE-2024-43975](CVE-2024/CVE-2024-439xx/CVE-2024-43975.json) (`2024-09-25T14:13:32.910`) -- [CVE-2024-43983](CVE-2024/CVE-2024-439xx/CVE-2024-43983.json) (`2024-09-25T14:11:22.450`) -- [CVE-2024-43987](CVE-2024/CVE-2024-439xx/CVE-2024-43987.json) (`2024-09-25T14:08:22.987`) -- [CVE-2024-43999](CVE-2024/CVE-2024-439xx/CVE-2024-43999.json) (`2024-09-25T15:15:43.683`) -- [CVE-2024-44005](CVE-2024/CVE-2024-440xx/CVE-2024-44005.json) (`2024-09-25T15:25:30.083`) -- [CVE-2024-44124](CVE-2024/CVE-2024-441xx/CVE-2024-44124.json) (`2024-09-25T15:14:13.593`) -- [CVE-2024-44623](CVE-2024/CVE-2024-446xx/CVE-2024-44623.json) (`2024-09-25T14:53:20.253`) -- [CVE-2024-45452](CVE-2024/CVE-2024-454xx/CVE-2024-45452.json) (`2024-09-25T14:19:17.113`) -- [CVE-2024-47220](CVE-2024/CVE-2024-472xx/CVE-2024-47220.json) (`2024-09-25T15:15:14.653`) -- [CVE-2024-5301](CVE-2024/CVE-2024-53xx/CVE-2024-5301.json) (`2024-09-25T15:18:18.097`) -- [CVE-2024-5302](CVE-2024/CVE-2024-53xx/CVE-2024-5302.json) (`2024-09-25T15:22:17.627`) -- [CVE-2024-5303](CVE-2024/CVE-2024-53xx/CVE-2024-5303.json) (`2024-09-25T15:24:18.680`) -- [CVE-2024-6064](CVE-2024/CVE-2024-60xx/CVE-2024-6064.json) (`2024-09-25T15:08:46.537`) -- [CVE-2024-6147](CVE-2024/CVE-2024-61xx/CVE-2024-6147.json) (`2024-09-25T15:29:33.477`) -- [CVE-2024-6153](CVE-2024/CVE-2024-61xx/CVE-2024-6153.json) (`2024-09-25T14:44:14.567`) -- [CVE-2024-6154](CVE-2024/CVE-2024-61xx/CVE-2024-6154.json) (`2024-09-25T14:40:26.970`) -- [CVE-2024-6845](CVE-2024/CVE-2024-68xx/CVE-2024-6845.json) (`2024-09-25T14:35:07.500`) -- [CVE-2024-7878](CVE-2024/CVE-2024-78xx/CVE-2024-7878.json) (`2024-09-25T14:35:08.010`) -- [CVE-2024-7892](CVE-2024/CVE-2024-78xx/CVE-2024-7892.json) (`2024-09-25T14:35:08.167`) -- [CVE-2024-8175](CVE-2024/CVE-2024-81xx/CVE-2024-8175.json) (`2024-09-25T14:15:06.400`) -- [CVE-2024-8364](CVE-2024/CVE-2024-83xx/CVE-2024-8364.json) (`2024-09-25T15:08:08.503`) +- [CVE-2024-46382](CVE-2024/CVE-2024-463xx/CVE-2024-46382.json) (`2024-09-25T16:56:09.927`) +- [CVE-2024-46394](CVE-2024/CVE-2024-463xx/CVE-2024-46394.json) (`2024-09-25T16:55:15.023`) +- [CVE-2024-46461](CVE-2024/CVE-2024-464xx/CVE-2024-46461.json) (`2024-09-25T16:35:11.207`) +- [CVE-2024-46983](CVE-2024/CVE-2024-469xx/CVE-2024-46983.json) (`2024-09-25T17:46:48.927`) +- [CVE-2024-46984](CVE-2024/CVE-2024-469xx/CVE-2024-46984.json) (`2024-09-25T17:49:17.007`) +- [CVE-2024-47060](CVE-2024/CVE-2024-470xx/CVE-2024-47060.json) (`2024-09-25T16:43:47.267`) +- [CVE-2024-6061](CVE-2024/CVE-2024-60xx/CVE-2024-6061.json) (`2024-09-25T16:16:22.767`) +- [CVE-2024-6062](CVE-2024/CVE-2024-60xx/CVE-2024-6062.json) (`2024-09-25T16:13:02.947`) +- [CVE-2024-6063](CVE-2024/CVE-2024-60xx/CVE-2024-6063.json) (`2024-09-25T16:01:30.283`) +- [CVE-2024-7207](CVE-2024/CVE-2024-72xx/CVE-2024-7207.json) (`2024-09-25T17:51:34.800`) +- [CVE-2024-7386](CVE-2024/CVE-2024-73xx/CVE-2024-7386.json) (`2024-09-25T17:15:19.110`) +- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-09-25T17:15:19.213`) +- [CVE-2024-7625](CVE-2024/CVE-2024-76xx/CVE-2024-7625.json) (`2024-09-25T16:15:11.307`) +- [CVE-2024-8354](CVE-2024/CVE-2024-83xx/CVE-2024-8354.json) (`2024-09-25T16:58:59.537`) +- [CVE-2024-8661](CVE-2024/CVE-2024-86xx/CVE-2024-8661.json) (`2024-09-25T16:15:11.420`) +- [CVE-2024-8853](CVE-2024/CVE-2024-88xx/CVE-2024-8853.json) (`2024-09-25T17:49:25.653`) +- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-09-25T17:17:35.637`) +- [CVE-2024-9003](CVE-2024/CVE-2024-90xx/CVE-2024-9003.json) (`2024-09-25T17:18:44.523`) +- [CVE-2024-9009](CVE-2024/CVE-2024-90xx/CVE-2024-9009.json) (`2024-09-25T17:46:59.077`) +- [CVE-2024-9011](CVE-2024/CVE-2024-90xx/CVE-2024-9011.json) (`2024-09-25T17:48:14.820`) +- [CVE-2024-9031](CVE-2024/CVE-2024-90xx/CVE-2024-9031.json) (`2024-09-25T16:52:25.327`) +- [CVE-2024-9043](CVE-2024/CVE-2024-90xx/CVE-2024-9043.json) (`2024-09-25T17:54:05.297`) +- [CVE-2024-9120](CVE-2024/CVE-2024-91xx/CVE-2024-9120.json) (`2024-09-25T17:35:12.403`) +- [CVE-2024-9121](CVE-2024/CVE-2024-91xx/CVE-2024-9121.json) (`2024-09-25T17:35:13.613`) +- [CVE-2024-9122](CVE-2024/CVE-2024-91xx/CVE-2024-9122.json) (`2024-09-25T17:35:15.597`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7895eb15bfa..a9690311b46 100644 --- a/_state.csv +++ b/_state.csv @@ -25430,7 +25430,7 @@ CVE-2007-2530,0,0,27fc9612c9ef7bab2c461f4deaef10f8d613ed2e3612de59f03a3a832d1696 CVE-2007-2531,0,0,fc6c7e03f835ecd8f7e1aa0bbb94000901e70d2d2de7cd2cc522f47225e50b07,2017-10-11T01:32:15.847000 CVE-2007-2532,0,0,a3f74747fb0fd0e9932e279b29324a59a4a1948ef61dbe4bde4b65e155e2ba9c,2018-10-16T16:44:25.273000 CVE-2007-2533,0,0,35dacb57c46cfcc497677ea34ca5a5283edfc6bc21e54343e462c2f9f8cb0c63,2017-07-29T01:31:32.033000 -CVE-2007-2534,0,0,20797b037ff2d5eb07f1b82fd8ac4c744a31821e862747f23d6c60a1672d37df,2024-08-07T14:15:22.890000 +CVE-2007-2534,0,1,03b678b360dfe3ee149acd823e6b2984a71d4619a1218834e1983f141979a7cd,2024-09-25T16:35:02.057000 CVE-2007-2535,0,0,3d3f6a3777ad8e2e82443a4af059d57801b151d3e087be973ba2b70ba747302c,2018-10-16T16:44:25.963000 CVE-2007-2536,0,0,14dfba36b9340d37bfe74040e0d90eefd212d0fff611be2d31e9b59e98c903f4,2018-10-16T16:44:26.900000 CVE-2007-2537,0,0,6c61cb6b95ef930e39145c72352e80d02222e248be973bb1a9da334a59ceea81,2018-10-16T16:44:27.617000 @@ -65478,8 +65478,8 @@ CVE-2014-10008,0,0,c9839b42466df6beb62d1b1e45c36224bda5f6d1ad22c43d836c3d23656d4 CVE-2014-10009,0,0,df296901c13fe6baff7d5ac20357c2eef6ecf7f3d71325bb64d51a88d8548002,2017-09-08T01:29:02.917000 CVE-2014-10010,0,0,6d9a81d47c969b3ea791d6753382dd65d7c2a93676798dda7f32f07b0c98d2a8,2017-09-08T01:29:02.963000 CVE-2014-10011,0,0,092ee8c8c8a45c1155c1b71aed77e090fe2cea3f82188e10cd61e6d7d7895e81,2017-09-08T01:29:03.010000 -CVE-2014-10012,0,1,daaf8c969b9f4ebaf47fca9d506670973bd23dbf2e51d7a2b0942b97123277ec,2024-09-25T14:33:47.597000 -CVE-2014-10013,0,1,baf4579213fbe6c83dffa430a45ecb4104282f326ed9edc70c88f069430960bb,2024-09-25T14:33:47.597000 +CVE-2014-10012,0,0,daaf8c969b9f4ebaf47fca9d506670973bd23dbf2e51d7a2b0942b97123277ec,2024-09-25T14:33:47.597000 +CVE-2014-10013,0,0,baf4579213fbe6c83dffa430a45ecb4104282f326ed9edc70c88f069430960bb,2024-09-25T14:33:47.597000 CVE-2014-10014,0,0,305132c6d7e4206ba7c86202f4d8962c03eede73f05aae003b37d8624f37ec52,2017-09-08T01:29:03.217000 CVE-2014-10015,0,0,8bdaa58d6e6d04c6a3a852aeb6795ecd8f6bedd5de4ec2648b0a7afed602d848,2015-01-14T00:20:07.893000 CVE-2014-10016,0,0,7482aabf75f9d7ccfa9665d6dc9ff1ecb0553351c5f6ecc3fd28bb637df16ff3,2017-09-08T01:29:03.277000 @@ -153831,7 +153831,7 @@ CVE-2020-24074,0,0,59fdc34b4f7dd03fb4891733b958226ee9c62d0393073e6dadd8229420004 CVE-2020-24075,0,0,a4e1c0929a794592036d4f4f55f2018c473c4420020ce6d38d3ff859bb8f2b54,2023-08-16T15:38:26.680000 CVE-2020-24085,0,0,36dc9ecfad21733adba79f670b8a0c7f72d1bc23a9ed5c08a1249114aa915aee,2021-01-30T01:52:56.210000 CVE-2020-24088,0,0,5daaaa8199391d28694f1b5e660719fee34f66a68451cf84904db2a0d6ae742c,2023-09-13T15:03:46.090000 -CVE-2020-24089,0,1,282b4d81fac57266234ac87556408f747c8f5763ce7f614722ab28a41c09cd0a,2024-09-25T15:35:01.817000 +CVE-2020-24089,0,0,282b4d81fac57266234ac87556408f747c8f5763ce7f614722ab28a41c09cd0a,2024-09-25T15:35:01.817000 CVE-2020-24102,0,0,d3877bead379765bc8bffb763a2d8dd99333c47ae5cb0b72e7c15b6d60e1c603,2024-08-01T13:42:06.163000 CVE-2020-24104,0,0,fbb4efcf58d1f727ffff0ae67b74aa346d7d8b26414283515bb2ec728cd84fb4,2020-08-31T16:29:12.210000 CVE-2020-24113,0,0,a33d0a4b1ae816dfcdb9871437627d7bc94b10a4e745b33597c039104d4ac8f1,2023-08-28T20:09:43.660000 @@ -190734,7 +190734,7 @@ CVE-2022-21441,0,0,bc2ca46e6b7937a154c140b4a5ab92f0fe51eb40dd60d8e39ccd8ee9b50cd CVE-2022-21442,0,0,257f19bcc8308bc457fa0199ecf1803ecbe3efe979daa70e98bbbd82ecfc0db4,2022-04-28T13:28:05.600000 CVE-2022-21443,0,0,0a55afeb6e47955f04f9d4642999e8ade129ce15078f095634d2e8d92fadc82e,2024-06-21T19:15:22.373000 CVE-2022-21444,0,0,5186be85aad1c4d733889f4a1f5150301ec25d3c487f0e278a98712336303143,2022-05-10T17:46:03.480000 -CVE-2022-21445,0,1,1d4294dbd66c8e237cc0614165de3c6698917adb7a62a99d78c027fed19f825a,2024-09-25T15:14:05.637000 +CVE-2022-21445,0,0,1d4294dbd66c8e237cc0614165de3c6698917adb7a62a99d78c027fed19f825a,2024-09-25T15:14:05.637000 CVE-2022-21446,0,0,6df2d5472ab8a30f78a13d35e05951c925360ed3964b8391492edcb6d5f83424,2022-04-28T13:42:16.247000 CVE-2022-21447,0,0,f80ea28619779d9bdde592cde6cc89b379fc127f0863353efe45deee94a406c5,2022-05-02T12:43:42.497000 CVE-2022-21448,0,0,93c9b9807154fbdebfb139861e1ac56e4abb764f7d6b8097c300b3d4c3ddacdd,2022-05-02T12:53:57.220000 @@ -200169,7 +200169,7 @@ CVE-2022-32534,0,0,49082fcd77bc9ed33ce1ca5189b1d0fff5c5b4fc85b523f95d21dad8c0624 CVE-2022-32535,0,0,c23527abbc835749505ee2ce59cc5365f156b2932be4767c37f320c75fe6f7ea,2022-07-01T13:57:39.323000 CVE-2022-32536,0,0,7cf13b78624f79eae1ae83be4b8da553ca755efbcb608aac7283ac023a1cef99,2022-07-01T13:56:45.913000 CVE-2022-32537,0,0,bc4d027c93a618d2581c415009b913d71d9a1e29481c76d490ed8c1944dcac0a,2023-11-07T03:47:51.340000 -CVE-2022-3254,0,1,9dff466e43c2e9ed9ef88d50e2ab6441513af00d720a4c72cb80cf541b81175a,2024-09-25T14:33:47.597000 +CVE-2022-3254,0,0,9dff466e43c2e9ed9ef88d50e2ab6441513af00d720a4c72cb80cf541b81175a,2024-09-25T14:33:47.597000 CVE-2022-32540,0,0,fd7100497f3d3aa8a4681d2cd3bf4b490bda3e818a2bf43c35f604d14b207914,2022-10-04T14:38:17.087000 CVE-2022-32543,0,0,afe29426622bdb7e68cda90003e7668fad2ff96f469836d522dfffd3aa158d9f,2023-06-29T14:55:58.867000 CVE-2022-32544,0,0,4d9e4c16a6d076dc02fc77f9d1610ed7b6413cdf8bc1bd1e43ca35c4bb81c866,2023-08-08T14:22:24.967000 @@ -213515,10 +213515,10 @@ CVE-2023-0965,0,0,f364c07d7f21f2f13d7f65238cb1ab921dd4751f28ac310c9cd79b0b72a23d CVE-2023-0966,0,0,ff724625f2c4e32e0158333eea2b32d9f1a9b03d6965b4045cdeccc269f65973,2024-09-07T12:56:42.300000 CVE-2023-0967,0,0,32992b9773623ae1c67a0f75211aca2f84f7fc06c270510c579b6ee175bb9ae8,2023-04-17T17:03:08.577000 CVE-2023-0968,0,0,95b0762f374679c0942698e686febcb31a83eacf7a4dfe16c37d1d71500ebc4f,2023-11-07T04:02:03.980000 -CVE-2023-0969,0,0,b67f6afa39fcaca23cd4c00a353d5c1bc0f825a6706fa07ca5f610d2efc71b89,2023-06-28T14:59:30.573000 -CVE-2023-0970,0,0,2d362919f6c88e7b11acad34cae9c095387eacfcb2c59c5b5958ba4fc0711d12,2023-06-28T16:05:03.873000 +CVE-2023-0969,0,1,53f811df46d4459a3e48a262078a5d43a264922b54dbc03a90b194ae71a024a5,2024-09-25T16:15:06.440000 +CVE-2023-0970,0,1,f747e3e636628f0354bd3e65bfda63dc0e744c4c96d16a00cf4b0ba4cea468db,2024-09-25T16:15:06.567000 CVE-2023-0971,0,0,99558240d427b189796a3bddc0c8f3692956c3fa55e1ed8ff636f00dcdf7acdf,2023-06-28T16:10:43.917000 -CVE-2023-0972,0,0,6354a52938e3e14c2dde0882a762a082145dcb9b29b7f861529430c91bf281af,2023-06-28T16:15:36.920000 +CVE-2023-0972,0,1,d0b2b25e0a2f8add4d1141b54103ab37fb60eff064595e1927041740e47ca91d,2024-09-25T16:15:06.663000 CVE-2023-0973,0,0,2ae6508976684d5694e7c37733743e9656bed6b11e24aeac1658f73c6b31bcc7,2023-11-07T04:02:04.333000 CVE-2023-0975,0,0,f4e4c201aa7b5b4d85cf487eb41a658d8e5e408adcd4b74bf689cf72a5ab65ff,2023-11-07T04:02:04.430000 CVE-2023-0976,0,0,5a5fa5d0bedb7eaf47f5985d12ddd7809516e859e2b99ee4db53273cc573cfea,2023-06-13T18:56:11.973000 @@ -218847,6 +218847,7 @@ CVE-2023-25185,0,0,1135c662e57f51c34416e024b4987aa850e5741deacd604b74a870538bfd2 CVE-2023-25186,0,0,84fdf198fca54d82274bf23f7a19407034d6d7950ada02a9b488f31cf7adb57c,2023-07-05T15:48:07.843000 CVE-2023-25187,0,0,e89bd4fa4c1c86879c04daf0b42f122bc213686f65f5bd42b68cf2726238ff4f,2023-06-29T19:17:48.053000 CVE-2023-25188,0,0,99a89a05ad15ad65c3e7bcd487b49199dddb071e95c006fb1db1eae71d2117f6,2023-06-30T16:10:18.383000 +CVE-2023-25189,1,1,48a0d8067c195d69cf3da3653891774985076f0ee2333ba9aa58d2640bc2742b,2024-09-25T16:15:06.827000 CVE-2023-2519,0,0,8cda41d4e7e8d661e9517bd8596373028e42458752588636e6f9350df8a49a49,2024-05-17T02:23:01.927000 CVE-2023-25191,0,0,85db906bc04b5d6fc3bb6f91c549d5e5b7ee59e11d5b5bb8995020c923f11762,2023-02-24T17:51:34.277000 CVE-2023-25192,0,0,408ab00a0fee17449a1dde61e3baf17726d13732731f80e617385e1174ac9859,2023-02-24T18:02:49.487000 @@ -220113,7 +220114,7 @@ CVE-2023-26820,0,0,c35296228f204f05ef326974bb41babe92f7a96d45ad8db8c99c4cd83574f CVE-2023-26822,0,0,1a194fba67bf8f5ecce1f29303689f8b649cbe8b4ea3451f63d3ab21eea61e2f,2023-04-07T18:45:24.683000 CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000 CVE-2023-26829,0,0,dc1f38e668dc3f89258923e8d76e5f56ba587ffd1793a405c23f4d98f8713562,2023-04-07T17:49:46.897000 -CVE-2023-2683,0,0,7a7def7870164485bb345ec384e77204c7d8a0c7f19ef2cbe3c4915c87e0c351,2023-07-05T13:13:07.587000 +CVE-2023-2683,0,1,6adc6983e719aef1953b63413e431c1382298d549f7aae82cb0472c8776058c0,2024-09-25T17:15:13.520000 CVE-2023-26830,0,0,9293332e8b49602f252fb9d156aa97f3c80a14c512337cfabc9ec4202356dd45,2023-04-07T17:53:39.373000 CVE-2023-26839,0,0,ca5dfa748f3f05fd0da1bf81d6270601ab25a538422c5c701e24edf2c50309f7,2023-04-28T02:57:16.577000 CVE-2023-2684,0,0,db03b8836c0b86ce9d768cc6105efbaffdf887852957cef92162ca127c8e4f4e,2023-11-07T04:13:08.130000 @@ -220685,7 +220686,7 @@ CVE-2023-27580,0,0,49adfe72e2abd2b9132f8e9f105c54c3095346080a8c8fdc9db68f8615c86 CVE-2023-27581,0,0,3be21d9e38984ab40cfdf16e35bd0ec94bf38f82166aa990fa09b019ce7d31db,2023-03-17T16:05:39.477000 CVE-2023-27582,0,0,1a1817c890efe2e9cb7f9b5758e04dfd44298e130771f54319db300ecaa127b3,2023-03-17T16:20:47.580000 CVE-2023-27583,0,0,485632ece7b84277edc8c6c8e35a35af799ce3f1829dea2d8e24153e4ca28fa0,2023-11-07T04:10:00.917000 -CVE-2023-27584,0,0,167ce088bd8f9c80da4e6d625fe319f047d2a9162f0ce98f9401931fcf08cdbd,2024-09-20T12:30:17.483000 +CVE-2023-27584,0,1,0d1bdda5bc7c29760463b4c8c6012f87b707998aafeaeb5bf167be344b292673,2024-09-25T17:28:33.473000 CVE-2023-27585,0,0,0445bd17c5084701b2dbcf65f77e303187fa2b90831341ed725bac756a8cffd0,2023-08-30T01:15:37.417000 CVE-2023-27586,0,0,72de1619c31b9c2ff4ad09f40e3b9c53d6bc1c9f49761fe93846248e8881b816,2023-03-23T18:23:58.923000 CVE-2023-27587,0,0,ff84401de0a75d958d75bc60aaf34fc3791f8b67e0e2909ed4ac19eca27c4613,2023-03-17T16:26:13.203000 @@ -222393,7 +222394,7 @@ CVE-2023-29487,0,0,00f0215644182ce533f7be2f31ee60331b6b2d670b25cebe99fccf5d24f06 CVE-2023-29489,0,0,eeb44832099785d7672fc44fccff777478ebffcce86e943bc666648f94e128cc,2023-05-05T18:12:20.760000 CVE-2023-2949,0,0,3eb161c032c6dec305ddf5dbcd36990b595d88b2b919aff79d7a4f970d6f18ad,2023-06-01T03:51:11.007000 CVE-2023-29491,0,0,55ea1830228950a279eed0bbf0476eadd4c3d7fe358ad1881edead01d4efe705,2024-01-31T03:15:07.860000 -CVE-2023-29492,0,0,b195e26cbfb0451de7df344cfaffc51284718b8452a79cc20350ff44bf78271f,2023-04-18T02:16:54.183000 +CVE-2023-29492,0,1,70e0ed7b29ef52d97d8e72fdeaf049b8151cceced6b95f2e8dd41db754a3218b,2024-09-25T16:35:03.390000 CVE-2023-29494,0,0,471ba052844f3c21aa20101a87ec812294ba4bf6d13f0e66db2344226c2ced42,2023-11-07T04:11:19.913000 CVE-2023-29495,0,0,856c0b36503e9c48d9c2a0c2c48c36020c7bde67dd0c0d2ef3043353163fc65d,2024-01-30T15:18:07.920000 CVE-2023-29497,0,0,f48f7a47b2ff6bd230ce340dbe0eab6f75349f5cc601bdc5df7e638138ea9db8,2023-10-05T13:33:08.890000 @@ -222787,7 +222788,7 @@ CVE-2023-30223,0,0,e3aaa3a915e76588dcbcd0a115df5f367f43c60c48751a13cfff84871436f CVE-2023-30226,0,0,b0df8ea2c9895183517578551da63c583b445efacab6de1c9b873ebcaa46e148,2023-07-18T20:32:10.273000 CVE-2023-3023,0,0,d12785a583e2f3f2929a4f39e70f5ad2afc3ceb960acbddd96bc0e8ce16c2249,2023-11-07T04:17:47.303000 CVE-2023-30237,0,0,d641746a1923466abb27aaed0db09e261de62698f0743788d56f032e6464a28b,2023-05-16T15:12:00.423000 -CVE-2023-3024,0,0,b456a8d8c7db0ed45664bb62864ab33ca1fd9d4f988685dacda20a024f987411,2023-10-06T13:22:29.397000 +CVE-2023-3024,0,1,04399d95dee8c8bfffc2e5f8e6aed99675c1c0351cfc18d4bed71245d26fe105,2024-09-25T16:15:07.607000 CVE-2023-30242,0,0,d77da56c0f096ef62f932e920adf166cc26912cae32c98ade9bc341a29833075,2023-05-11T15:10:27.660000 CVE-2023-30243,0,0,ee801e891564b70fc3a9d642f985f24382494cdfeaaabbc8015230509b4bcc63,2023-05-11T14:27:54 CVE-2023-30245,0,0,91ba5bff6e9cfdc87b7a3b340228f7b251da33d1979c50f43f94245b2e82d66b,2023-05-24T17:09:02.543000 @@ -223496,7 +223497,7 @@ CVE-2023-31095,0,0,98e0f47eba8da250ce26faae77d30e0457e0c45653a31789fae2ad954aab3 CVE-2023-31096,0,0,a698767f9322d993190762ac896ddab6d6251e7fd40e72d56e0e836c0e80b816,2023-10-18T20:27:16.947000 CVE-2023-31098,0,0,7762b7eafd22172ea8485d8980463d4841a6c3b6a880a4a18cc3ad17d161a68c,2023-05-31T13:55:07.513000 CVE-2023-31099,0,0,316dca47a441bcbff49b7c01682f0edc834d3579c34610a0d65d4f7cacad7083,2023-05-10T03:53:41.293000 -CVE-2023-3110,0,0,cb45d3e424e5f4d9ba44917b64a5258a7d77c882331cea6e65d589e098116cad,2023-06-28T15:59:59.863000 +CVE-2023-3110,0,1,b29dcd6052905acdf5c62021f47c31535233f1a817dcc0ff8104fbe3e3af0bcc,2024-09-25T16:15:07.760000 CVE-2023-31100,0,0,52728b9e8ab26aa70b0ab55039f170907999be466f5e8b560dabc4fb805a29bd,2024-02-01T02:30:22.687000 CVE-2023-31101,0,0,77f4e544f11b5e739b1479f6e19b6ccd2456975f67b8561aaa2c58229b75968c,2023-05-27T02:26:38.467000 CVE-2023-31102,0,0,5080e71e8f917eeae0dd70983299a81d3f1547c01aad2307d315c1afe001c7a1,2024-09-06T14:35:01.717000 @@ -226355,7 +226356,7 @@ CVE-2023-34865,0,0,1b36d74bd7693679d2f94ff1e9fb2488fe2b5cced51b28d04dd34209170ce CVE-2023-34867,0,0,f056fcac036e312217370b8455714a327494e08f4bbfd8fe2b1911cfe3d7b2ed,2023-06-23T18:46:59.963000 CVE-2023-34868,0,0,58b71d1b502c9c6ee43947f61f2f5d7875e5e2d61cd2f3f3320aa3c9e0ec4dea,2023-06-23T18:34:10.497000 CVE-2023-34869,0,0,8bb225a426cfc8ddd2a25878c0522550b2b532884374456e012b0d892be82fa1,2023-11-07T04:15:47.680000 -CVE-2023-3487,0,0,2fb9c705ca5893e1b59ee711f338cd42541dcf394108567502bc70a6a95857aa,2023-10-27T18:50:10.740000 +CVE-2023-3487,0,1,95caefd0b868babb07f36055e4d235376d51e5914475500a79298bae605b7cf5,2024-09-25T16:15:07.870000 CVE-2023-34872,0,0,8405661666f10931e63f987f8b84bd138c74889a0c89b5fad76396479a42dd8d,2023-12-06T03:15:07.057000 CVE-2023-34878,0,0,1590924f136c24f4935a016e801f63a0247f36726e2be418973057b73731eb61,2023-06-22T17:12:17.883000 CVE-2023-3488,0,0,a70591268fa234c71dbf0f2e10e35a45b583dbcb37cfa3629a3b44a1aae47ba4,2023-08-03T17:10:17.167000 @@ -227993,7 +227994,7 @@ CVE-2023-3726,0,0,ac750baaeff2ed8dad84b40df631d00ba8ce0ef4cbd1cbbd2025aab71f295e CVE-2023-37260,0,0,9591f29f2336c88423330f41871bd7bd98ea2f435e69f4e8a0163bb034d3ac2f,2023-07-13T19:25:56.337000 CVE-2023-37261,0,0,c15061219f2054586e998e8e4191db1232262de421297ca29f05c987298cc1ac,2023-07-18T18:12:11.467000 CVE-2023-37262,0,0,d0455064d20e123f0efdfc579aca1bed0d88c3dfbf5f4865e75fc0095d4745d9,2023-07-18T18:12:57.687000 -CVE-2023-37263,0,1,23af5506fb46073bfd90bf07738035dd86dce7d0db119ec5eff286db7e24445c,2024-09-25T15:35:06.763000 +CVE-2023-37263,0,0,23af5506fb46073bfd90bf07738035dd86dce7d0db119ec5eff286db7e24445c,2024-09-25T15:35:06.763000 CVE-2023-37264,0,0,2d98c554455d093e3319d84a2315bcc53035940b0f3139573004068fd205692a,2023-07-18T17:55:49.017000 CVE-2023-37265,0,0,95fd52ebc6ae133f92282bc8388d2b5ded8f235541e60455426da249c877067e,2023-07-31T13:05:33.253000 CVE-2023-37266,0,0,5be0af2b81f1d9b932768440d1721bcb9eff8cc22db486b542279ff33d6e17e9,2023-07-31T13:05:29.030000 @@ -228915,7 +228916,7 @@ CVE-2023-38337,0,0,f4c79ade4dd8bc46340daddde44bf3d0768b2f1f21fc874630a9ca34158f8 CVE-2023-3834,0,0,79f59e2e98a9edb2bce976eba92b3e888a255a070425958fd0ee797e6d1975cb,2024-05-17T02:27:51.830000 CVE-2023-38343,0,0,7dd61897313bfa7b6e7a7ec4a51761b31a68820901a904dce649cfbeee64cb1c,2023-09-25T17:09:47.507000 CVE-2023-38344,0,0,6aa70b970a3560f3e6a03901004163337d6930ed6731eb0600cd3abdbbdb7b70,2024-09-25T01:35:51.997000 -CVE-2023-38346,0,0,5b6af5a91418cfb0ebf972e7838f5c580de478b91b4c9de27f24859c48d2011d,2023-09-26T14:58:24.360000 +CVE-2023-38346,0,1,1157d09e3bce05cb2db63d02f84211a617d750569840f9ffcad9d6bb70270d36,2024-09-25T16:35:04.973000 CVE-2023-38347,0,0,151b29b38988e431ab4b94fc3c03ddfb9ecb32265637f0e94b050567feb248ac,2023-08-11T17:22:46.230000 CVE-2023-38348,0,0,00d9736c3f3f606a3cddbf908203dfcc82d9e4509f9f78f1010036a59ba7a297,2023-08-11T17:50:10 CVE-2023-38349,0,0,bbf302608fbbb3e008be10cb1392e9d7d836667c3108321534aef5bf623f5a43,2023-07-26T21:39:44.207000 @@ -229377,7 +229378,7 @@ CVE-2023-38882,0,0,ec5ea47603a3086e4c462ba386dc895b14ddd5086093287271e85209edeb5 CVE-2023-38883,0,0,cd3140914d8c0ffbddee1828a1208821a650be5b41e85c41ea10c0430b03dc40,2023-11-30T14:21:33.187000 CVE-2023-38884,0,0,b5da0fb4dc777fd8639d5172b4dd9aea4eb0ed10d64ef9ac2f442f4a7ce780e9,2023-11-30T14:22:37.007000 CVE-2023-38885,0,0,67e051d301210858c0625bde39e7896fe7b2dbfbfe47cef5c5337fab13eb282e,2023-11-30T14:23:35.557000 -CVE-2023-38886,0,1,94472bd9e9147d61ca51246df24167cb9efca241b8d0378ba7368418ce654f8d,2024-09-25T15:35:07.707000 +CVE-2023-38886,0,0,94472bd9e9147d61ca51246df24167cb9efca241b8d0378ba7368418ce654f8d,2024-09-25T15:35:07.707000 CVE-2023-38887,0,0,ef6a800e913218682570d1543412894773e7fd59652e5edddda59874ebf59aa3,2024-09-25T01:35:53.460000 CVE-2023-38888,0,0,58087cc61e3ca9f72ca37b211c6f2b3cf8a5b8d6853a9a2b39aabbeb170b1082,2023-09-22T01:37:33.650000 CVE-2023-38889,0,0,a0fef916a432e79e5bd8ea399af336a0c2bb6f7f29a61b363335de74959388c0,2023-08-25T12:58:20.617000 @@ -229494,7 +229495,7 @@ CVE-2023-39041,0,0,4d2d80ed29ee24b6cf6a78aa3d12d1c146d9a3291971e1efcab61cd8aac90 CVE-2023-39042,0,0,a7a48f880646aadc134f0732e1d990e50286c7395769d5435f8dbb80591cc8d2,2024-09-05T16:35:08.263000 CVE-2023-39043,0,0,ba87098ff2bd45dc807c6b3c45c4d66fca97b5b793c3dc3373facd890703338e,2023-09-22T13:22:19.643000 CVE-2023-39044,0,0,50243e0bac844c04b7b4f63fd226a1af22956f7d9c562fd19fa07b15eb962106,2023-09-25T16:36:04.260000 -CVE-2023-39045,0,1,6d884e440d5100507ad947ab48028b0d01e64df7c86eeb963e462356814b2c26,2024-09-25T15:35:08.613000 +CVE-2023-39045,0,0,6d884e440d5100507ad947ab48028b0d01e64df7c86eeb963e462356814b2c26,2024-09-25T15:35:08.613000 CVE-2023-39046,0,0,143f854cafec6743bb41bfbb8e25ead3a2d45ac15cdc3b4a97748ef03fb13246,2023-09-20T20:49:29.943000 CVE-2023-39047,0,0,330bee41b764040dd805e09cfff457ad69307d4794890a3decee0e8a8207a24f,2024-09-05T16:35:09.043000 CVE-2023-39048,0,0,e78542bc4874a647db5adf59501a708f98fb1b693a6bb7216920949ea0533622,2024-09-05T16:35:09.877000 @@ -230009,7 +230010,7 @@ CVE-2023-39673,0,0,1383a722f73fa45ec1f409f9bced11a36c7bbb97d093acfe8f3c7683f293c CVE-2023-39674,0,0,3960c98ff7a06cfa573d9f681ebf121310862d3c5cae123e3ff9f469bbeca873,2023-08-25T14:51:47.643000 CVE-2023-39675,0,0,a2fd8b9d51e0e1e0080a91cc68dd1c3065ba8ba51b711ea573cc7f02e58c64f0,2023-09-22T18:43:26.797000 CVE-2023-39676,0,0,c58b61d951aa8285e7616075d06acc199f6ffa44476dc59aacf6aefafb0e14ef,2023-09-12T12:59:31.113000 -CVE-2023-39677,0,1,7689b7378372a2a1e5764de709118ccf2d4a6367a98fb1ed33264ffc1139f47b,2024-09-25T15:35:09.437000 +CVE-2023-39677,0,0,7689b7378372a2a1e5764de709118ccf2d4a6367a98fb1ed33264ffc1139f47b,2024-09-25T15:35:09.437000 CVE-2023-39678,0,0,5768a64945dc98c32f9397bc6565496b6289700b44c9156333712cee617624c9,2023-09-01T14:56:42.557000 CVE-2023-39680,0,0,0f1d0edcc59b98882ba5ae1194c193c2446d562066de2b63c33cb78785d6f847,2023-10-26T17:36:04 CVE-2023-39681,0,0,d99ea53c9c5dbc568c58a90c53b41291d128837a76f3340d451cf74637118d0e,2023-09-08T14:16:00.450000 @@ -230383,7 +230384,7 @@ CVE-2023-40196,0,0,2c18fe72af7f16859ec0cfc77337e1278666df8b18f95112ec6873d072e66 CVE-2023-40197,0,0,15252a01276b2d00f5439d7894bb462e7fe26d00e74d17d4bf9043503a6b0780,2023-09-08T06:47:28.880000 CVE-2023-40198,0,0,74b320a927aea88cf5ec2943cdb22c19c4a5d4d886ee632f85c4702faf94fe13,2023-10-06T15:38:45.037000 CVE-2023-40199,0,0,f93b388db4620ad54edde6a3f0cba8ccd74e37ca52541e78a5f985a62fb1579f,2023-10-06T16:24:47.113000 -CVE-2023-4020,0,0,1d3ff3e39f14f94f4ccc0dd207c83b597df26f7b367f63f5982a02ac1d47fd2a,2023-12-19T20:37:21.960000 +CVE-2023-4020,0,1,36992084f5a38a92e5b114219426fff08b7f54e861ab9bb7b79847873dba4042,2024-09-25T16:15:08.653000 CVE-2023-40201,0,0,96c0bda11c7d8aafed97c93fbf9d7174002c633560e878a0bea50678c7041f1d,2023-10-06T16:25:17.340000 CVE-2023-40202,0,0,02ce0ee9e532065d3ec8110515907290b6a6ac08f336f2144dfa6c749aa941e3,2023-10-06T16:24:52.730000 CVE-2023-40204,0,0,b2ef9355887c82c35b632360602127499900794e264bfaccaf874aab676fdd43,2023-12-27T20:22:37.537000 @@ -230555,7 +230556,7 @@ CVE-2023-40406,0,0,c231079eb01928b8bbf751f75a639e954e6a22534b400daecfe6d1a7049de CVE-2023-40407,0,0,ff6e7888e21345c7e6882db9fff3b85ba4a1dd33fc861fbc8d17c958e42ce8ad,2023-10-12T01:54:23.947000 CVE-2023-40408,0,0,8a838c92ea86713ad4ef8c5262255345d230f1e9f4e8369447492d433ffdc0ad,2024-09-10T20:35:02.930000 CVE-2023-40409,0,0,0fd6cbcb82fd727dd717c8d52cb7195ef3aa718ccee1ffb4456194384fd691a9,2023-11-07T04:20:13.650000 -CVE-2023-4041,0,0,8a521c9b0e919e28da16f9aa92be2721c331d0861d63b25666c3d4a768192c3b,2023-08-29T14:40:53.097000 +CVE-2023-4041,0,1,6ede97fe0321b96de5f2a123ccdc2b44234ea92d49e84ce45ffe648de43f3b52,2024-09-25T17:15:14.643000 CVE-2023-40410,0,0,cf167159847bca50ce6b65b146cab89ae6e47bbc5cf36f5909dcbfe4e7521151,2023-11-07T04:20:13.777000 CVE-2023-40411,0,0,224c9af40ecbd2af6532a741fe650b1e760ad735c156f06f01c96d6fc1f10d52,2024-01-12T14:41:51.583000 CVE-2023-40412,0,0,9c836b9e879b4f609379b15a2029caac8d80f8eb212d30e467ee6b55e0d32041,2023-11-07T04:20:13.900000 @@ -231097,9 +231098,9 @@ CVE-2023-41091,0,0,ca1acbfbb48698a0030abb208f0760a15256e3fda004078e03e1a216b077f CVE-2023-41092,0,0,4e8e931d3ededed79b2045da3cc968b68e4b0145dbe88e1d7c336f100fc82182,2024-05-17T18:36:05.263000 CVE-2023-41093,0,0,e2ec8ffe14945965701d15ef17979727c54dc987034806d91272b18047967a11,2024-09-10T16:19:41.973000 CVE-2023-41094,0,0,e795efab240a0805dca0faef22ec12891be19fc709d62de570a11cabba7cc9f8,2023-10-10T19:40:06.293000 -CVE-2023-41095,0,0,deee64e9e520cbd28974f4c3c1b7d02b2c55b60ea677ddead3af0482dd0a784b,2023-11-07T20:35:26.983000 -CVE-2023-41096,0,0,52af64b05366a4d43b15642ba40df6e1ae8efc25c5fe20f7a4ec7b8ffa1abd9b,2023-11-08T01:48:37.717000 -CVE-2023-41097,0,0,225555e7a96923a582ba79f8ccb5c9ee9b827759fb76ff6066b045a3ae73653f,2024-01-03T17:22:03.797000 +CVE-2023-41095,0,1,177941878e5bb1653ee1f949f20555c382f90ba02321d0d46d323e9050a11155,2024-09-25T17:15:14.257000 +CVE-2023-41096,0,1,bd326ec60943b89decd659139c45be416116554e0e19a59832973f2d01e7d744,2024-09-25T17:15:14.380000 +CVE-2023-41097,0,1,0436ef672b193d9878984b4d43ea4e89fc5377ce41f01664c7f484a6cd337884,2024-09-25T17:15:14.483000 CVE-2023-41098,0,0,1877421a99644398c5448d161e47d1b4f3f34d4c0be4875e9313e545e2d53226,2023-08-28T21:21:37.023000 CVE-2023-41099,0,0,c541702f1a2a5937b975af12a4eb88323b5abfddc3ba442a1352acbd4bacb37f,2024-08-22T17:35:00.720000 CVE-2023-4110,0,0,6f05564b88d67a4e37f9507e8115c927563bedfea67f2dfdbc398b9ca9e94615,2024-05-17T02:31:19.523000 @@ -231178,7 +231179,7 @@ CVE-2023-41175,0,0,fbe29740e79a6f110bab7b90278d9d39985394d1613cf8901fe1335b4b651 CVE-2023-41176,0,0,735a0bc0e4dcb12596e8399bf2bb3db1e454d6b0ecbf729493e45efd006cfa90,2024-01-29T17:36:19.543000 CVE-2023-41177,0,0,85d92f4605d3211cf1bde63a5199a5251834ff7f9b179a06c1231042c732c91a,2024-01-29T17:36:01.880000 CVE-2023-41178,0,0,ae4285b4cb6a4ba4be6bd1f532eeda2be8bd03382dfa154527e14597a8ca5649,2024-01-29T17:35:46.797000 -CVE-2023-41179,0,1,2bef674c7e750daed2add4f21cbbc303c4db1104b2ba7ed60f9172dacf37b456,2024-09-25T15:35:10.467000 +CVE-2023-41179,0,0,2bef674c7e750daed2add4f21cbbc303c4db1104b2ba7ed60f9172dacf37b456,2024-09-25T15:35:10.467000 CVE-2023-4118,0,0,49c8fd5dcf6c9d8b3d7fdb70da024ff5326d11c7e410f78e141b30dbfc95b82d,2024-05-17T02:31:20.433000 CVE-2023-41180,0,0,1b43d9ebf796521501b25c4d1df423a5fa172bc47aa4e768647fe9d6437306b7,2023-09-08T17:15:34.357000 CVE-2023-41181,0,0,ce8d7f4f3537484fb37642fb235ff955f751e8845ab8f79a0432507c247ddc49,2024-05-03T12:49:24.027000 @@ -231622,7 +231623,7 @@ CVE-2023-41797,0,0,d7e4633821167d99054cbec7b694b6e4999a2302a809bdbebc652ab0389a3 CVE-2023-41798,0,0,83e9fcdf95a46f239202f5d75ee32f7f07fe571137e40d0e2853e0e947c05e6b,2023-11-14T20:08:51.377000 CVE-2023-4180,0,0,5d3c1912575569ebb9e0756b8786704fe9ca7f2bb609446e2b417d106a3cb85d,2024-05-17T02:31:24.523000 CVE-2023-41800,0,0,178a3a78ea773c20c95721fa0242d9947f201fe84ac849334bbbe1d425cebb3a,2023-10-04T13:24:01.053000 -CVE-2023-41801,0,1,7c42397651beba286442212d368a2bacaf0e8b1a7c1fc3db375979c2f1067bfa,2024-09-25T14:33:47.597000 +CVE-2023-41801,0,0,7c42397651beba286442212d368a2bacaf0e8b1a7c1fc3db375979c2f1067bfa,2024-09-25T14:33:47.597000 CVE-2023-41804,0,0,8149d0401ab2252928bb8a0da4030ea53ead1f11056c77b9bb3565608fa9dd10,2023-12-12T16:59:18.847000 CVE-2023-41805,0,0,82c89112cdbc1fcd641e2f0533d0143ae2c950801f8544c0f29b9536a5df601d,2024-09-20T19:07:21.190000 CVE-2023-41806,0,0,4ddc5fa3c904efe0db4807d8335e589d7a5cb0b3231a4c5a9500fe7c2ee2a163,2023-11-29T20:57:54.670000 @@ -232358,7 +232359,7 @@ CVE-2023-42796,0,0,5cfb091fe1dbe6507a85154ef5245e6811b2df11a098a4cde7edf2a9af6af CVE-2023-42797,0,0,03c8f3e71a945929e84b9db5605983b40db1ce0e95fd50de1cd8e26ab8c216e3,2024-01-16T15:29:43.977000 CVE-2023-42798,0,0,adc434cb66de4ebb0eafd45a46135c8e7705fd6a0e1a9c1b970279560849ba82,2023-09-26T14:34:42.430000 CVE-2023-42799,0,0,6158777c7e2fd2896ca0e66d81eb41b80eeceb6b85ae57d9c1ffdeb847adf45c,2023-12-20T14:46:20.553000 -CVE-2023-4280,0,0,88e939b69d4caa1fdccb8b279cfb486407c3c9e742548dbc68e5279dd331e59b,2024-01-09T16:51:14.477000 +CVE-2023-4280,0,1,420ccb9ed75f1620edc9bdea0d2c993644debade9f6400e1831d2d82741353aa,2024-09-25T16:15:08.820000 CVE-2023-42800,0,0,313e0835b2b210142cf82e79664298222eba71a846e936025c82e38c5c7f8bd7,2023-12-21T17:17:02.843000 CVE-2023-42801,0,0,292c2290fb7f791c4d77fa4e8c6a6a992c808902185809589cb4185e25e64c30,2023-12-27T19:29:03.877000 CVE-2023-42802,0,0,057ebe2ab68864abad4bad69fe1f83be24a035730115139337b50b33774e2fed,2023-11-09T18:39:13.100000 @@ -232992,12 +232993,12 @@ CVE-2023-43757,0,0,65e67c23b9757842bfee58d1e8d2a004690171bc97b4c5835e48b3b9396b3 CVE-2023-4376,0,0,caa6c3c07fad165d81c5d5776b92b6518eb1a0f6aa8ef1f63df4da6b5f4f61f3,2023-11-07T04:22:28.740000 CVE-2023-43760,0,0,36c037731733e2e294a5843b659d2aad1605abf55a2d4ed65fefea849d3e8935,2023-09-26T14:51:03.770000 CVE-2023-43761,0,0,9e9dac75946f77ad0027c20f9162ece0ed163d5b30b82b9069d36c1135d5e013,2024-09-25T01:36:35.440000 -CVE-2023-43762,0,0,85fe4a7be19e4df6ad7574a946086d487a7cebdd042e25cebf6b877e02ed4c7d,2023-10-13T16:15:12.030000 +CVE-2023-43762,0,1,4a3d5bb9546efc6b15b9029951b6d8fc607ee5505d1a91de00822efae7fc1362,2024-09-25T16:35:08.433000 CVE-2023-43763,0,0,ad3b6d3f3e0da3b7452322da5a003e6c3c066cc43784fd16ddb4173105c087b0,2023-09-26T15:17:46.050000 CVE-2023-43764,0,0,8889491e93115695f3fc431c4c0f9d76300cca9f46772a36c586711caeafa3d3,2023-11-07T04:21:29.433000 -CVE-2023-43765,0,0,5c4872389b318f4c7530f1c578fdad56afadf196ae8e0f4ba8c447bd204a6995,2023-09-26T14:52:04.797000 -CVE-2023-43766,0,1,c6a88587a2a8ee8cde523a53dcacc6d0ba77e01352696079cdce368cede349b6,2024-09-25T14:35:03.310000 -CVE-2023-43767,0,1,b347065f41a38bb3b988ca8b34fc42840783a6b7af72cc203506ace26949c90e,2024-09-25T14:35:04.100000 +CVE-2023-43765,0,1,70a5591427de6ddb2b0c05d9b262d5513d4ac75d65503cb95c39e68ab5de9574,2024-09-25T17:35:09.517000 +CVE-2023-43766,0,0,c6a88587a2a8ee8cde523a53dcacc6d0ba77e01352696079cdce368cede349b6,2024-09-25T14:35:03.310000 +CVE-2023-43767,0,0,b347065f41a38bb3b988ca8b34fc42840783a6b7af72cc203506ace26949c90e,2024-09-25T14:35:04.100000 CVE-2023-43768,0,0,8c20823b844f3a9e03681ad3a89abbeac68d3ffbdb0715685e9ab48bbbd54ca4,2024-08-05T15:35:06.983000 CVE-2023-43769,0,0,c9ac3b45a6e5a8e8f9bade6fa502768ac8c514f0d2ca4cf91d7c69f448e9810a,2024-02-29T13:49:47.277000 CVE-2023-43770,0,0,f29dc8bdb9d7b048af488c931e5105cc1ca7a11e56981fca4cbc06661f550bcc,2024-08-14T15:27:53.727000 @@ -238108,9 +238109,9 @@ CVE-2023-5139,0,0,1703630468285261ed8fc04774841fb8122f0aa2e090a95b0549614dd0a159 CVE-2023-51390,0,0,1ec52342e74e0a9387acccc87ff54c51a5029a59bad7e42ad3f15fa93e7d2252,2024-01-02T16:25:35.387000 CVE-2023-51391,0,0,e894166f0bc1eaf044d8a1533d447b6903e43c193dc6bd758ce18ed7fccf5afa,2024-04-18T09:15:11.370000 CVE-2023-51392,0,0,99781b0d297344404c9a938182515b9eb3e57b2206cc666c8cabd9c886858e74,2024-02-23T19:31:25.817000 -CVE-2023-51393,0,0,ea682b55142153f364da3886597877341a7daf91ddc9915880213fe92f7ae00a,2024-02-26T13:42:22.567000 +CVE-2023-51393,0,1,139abfb803e26ef22b2ba7e67e5ea6e3ad9dc2dee8a035bb241ec16edd4c052b,2024-09-25T16:15:09.297000 CVE-2023-51394,0,0,d27eeec344a886820a200dad161b001cfca532d09ac4c989e0efe8db665013af,2024-02-26T13:42:22.567000 -CVE-2023-51395,0,0,905694c2a45743fb3b9352643716d43d584c6f59709fd0f5849e40a535d76117,2024-03-07T13:52:27.110000 +CVE-2023-51395,0,1,a996b0a26c06b74dbdfa8bb23c3c0eb6ccaa9b3ec5296b12351477fcfac45c9a,2024-09-25T16:15:09.650000 CVE-2023-51396,0,0,e3a99e8335041462b192e0bc975805a2bb94f1177bb93a5a3397d522bec34a16,2024-01-05T04:53:57.677000 CVE-2023-51397,0,0,ce8fa13ba2bf8ce93bcdcec3b21bf8760f494288959f87e5c5d38adb78730595,2024-01-05T04:54:05.133000 CVE-2023-51398,0,0,cf693ab5054859b453799819b1a5d5978f8e17a10ee7359acf259b4cc37b1ef3,2024-05-17T18:36:05.263000 @@ -240448,7 +240449,7 @@ CVE-2023-6382,0,0,677b8ba78a3950c407d5f70e933225e49d1269bdb2574412cc97645ebd315f CVE-2023-6383,0,0,04402cf1af000e3b2b2bf470240ece0579ef0dce0c2c101495cc23a086e2498b,2024-01-11T20:02:29.963000 CVE-2023-6384,0,0,9703e1c61b0fd4952ad920f691c7927f056a6d5810f51f36b8c4aebcef433bd2,2024-01-26T19:41:47.807000 CVE-2023-6385,0,0,ae5f06d582ab2698724387cffc86caab8521499d470761485fa67ab8816b8cb6,2024-04-10T13:23:38.787000 -CVE-2023-6387,0,0,70fe86f58aa65a7f7ac8d25feea25d2cb57b321eb290d33b100e8e75e3b07d91,2024-02-10T04:10:48.473000 +CVE-2023-6387,0,1,83d9048c961115e3308c68394f1fb5f1ca093ff6ada02b7b75cf22a678d2443e,2024-09-25T17:15:14.770000 CVE-2023-6388,0,0,5e071fcd7bffe6b819c4b98cb3bf54bea6c7548de7eed630e94bfdf8d64bd6c0,2024-02-14T20:15:52.940000 CVE-2023-6389,0,0,3bad45658517d50c5a3ea7602cb5b27aa1c9697839a1c46e114a438e1baae0da,2024-02-03T01:20:39.633000 CVE-2023-6390,0,0,99adee0c0316dbc352d6c7dd50407ee58ab46369582299a48ec3ab82aa01d48b,2024-02-03T00:28:00.603000 @@ -240858,7 +240859,7 @@ CVE-2023-6870,0,0,b5c182e771fbf62983e0903f942aea7c6d19fb1570eb5dfa3c8f2320d85c57 CVE-2023-6871,0,0,20b7e734e8fdf0433e112f944f82f18d357e3bea2cc64dcf4aad685e971d1f39,2024-02-02T02:29:14.237000 CVE-2023-6872,0,0,724364bff09a1d79a78aaa45d6fbbf4f971d3441905004df82b74b069e300326,2024-02-02T02:29:18.200000 CVE-2023-6873,0,0,49669310eb593a130a8c0b6d9b86743d8b50de862f6be4b06e7aacefd665460c,2024-02-02T02:29:27.507000 -CVE-2023-6874,0,0,d4a7ee9e2f6a7a60b8d6e8ac65095c57b3d4e86ca063d24cf334a46e98931354,2024-02-10T04:08:53.127000 +CVE-2023-6874,0,1,b82068fd9feb99f841309790de7d0d7de12ec6e8814590c679efe39a2b624443,2024-09-25T16:15:09.773000 CVE-2023-6875,0,0,112ab71dbc43443bd36e485eee215426e7155ea7027f59ddbeb52b546d2a947b,2024-01-18T16:11:25.827000 CVE-2023-6876,0,0,b4edc77fdd5e36942044d6d3efca301bb94b768849844e07f437166240596220,2024-06-07T14:56:05.647000 CVE-2023-6877,0,0,1ba400724cdfa0e83b80abd00aa055ba38b62cc33b1e79011bf973661e716b47,2024-04-08T18:48:40.217000 @@ -241327,7 +241328,7 @@ CVE-2024-0156,0,0,8cd5e770d8e5e59c7d65e04a0fa431766acdcdc3da422c86f8e66acb026110 CVE-2024-0157,0,0,b052323977852302a8b3dcef1c5407bc4b130da554cec8becf021fa4a53f3bd5,2024-04-15T13:15:51.577000 CVE-2024-0158,0,0,493e720f8594a13096c6819cd0491d46fb8daaf76a807516ccfa3d60519923af,2024-07-31T20:37:32.247000 CVE-2024-0159,0,0,0c6ed74ef93fe0f2339dad38605d4189f768646821accb8389e98e7b0a8e8104,2024-04-10T13:23:38.787000 -CVE-2024-0160,0,1,c92710127c3c68cbfcf31693a730fa150e45b62f8c20846b8836a7583cfb4e6e,2024-09-25T14:25:53.447000 +CVE-2024-0160,0,0,c92710127c3c68cbfcf31693a730fa150e45b62f8c20846b8836a7583cfb4e6e,2024-09-25T14:25:53.447000 CVE-2024-0161,0,0,dd7d9dd18beebfb5eb1c0fb111a222d1a21f2e0da1cca5f6b086372a8f3ea8a6,2024-03-13T18:16:18.563000 CVE-2024-0162,0,0,cbdcbc03600ba58dbcdc575cc7249a44d017ce4f0eee1c18c3e62afa66eb3ddd,2024-03-13T18:15:58.530000 CVE-2024-0163,0,0,326c77330b2d430b11602559de70e87e5e5cae16e2045c400e82b135f0a941b6,2024-03-13T18:15:58.530000 @@ -241395,7 +241396,7 @@ CVE-2024-0236,0,0,d9697450b7c550696ba826d4a5c09ba44504829011aeb7383b4ef297cfd008 CVE-2024-0237,0,0,3cd4f630d7f09eac73799766111a68cd8d2cbc3d703e5d79b3879a607677b7f0,2024-02-05T22:15:59.487000 CVE-2024-0238,0,0,d4095c0a8e7378c06d38757534fbedffecb0ea0b47a56ee691aeb3f8065bb971,2024-02-05T22:15:59.563000 CVE-2024-0239,0,0,efe7307cc9d65830067699eb43f88203c6dbee64c0fc359b41ac3969d4f4faf5,2024-01-23T15:53:40.833000 -CVE-2024-0240,0,0,b233a6ea31364d952bad6d9a89e03b870b20f46b3e0fd256e51fc5ff4d91814e,2024-02-16T13:38:00.047000 +CVE-2024-0240,0,1,5e7dee0cc8716762f0a37299c89ab7d408eaea179f73f2ca1b03cf195c0058b8,2024-09-25T17:15:14.890000 CVE-2024-0241,0,0,378734bd689a96b05ae95db86541df391ab2aaff35cbdffab6cea4f33055fcbe,2024-01-10T15:11:15.457000 CVE-2024-0242,0,0,603f0d643835b160962f1ad7acdd9c074fc445f154f88c6c68d0edf3c11246e7,2024-02-15T19:08:40.337000 CVE-2024-0243,0,0,68610412076a7e370f30938c644e93518171abb2434f307575d1a2f3a6537f5e,2024-03-13T21:15:55.173000 @@ -243239,6 +243240,7 @@ CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657 CVE-2024-20347,0,0,b7a6ed5ce0c3cf37e0f41269507973b9ad509f6fe22a9ad105d991e5f0ee5809,2024-04-03T17:24:18.150000 CVE-2024-20348,0,0,11d8baf9f242470d1ef8d7212943b2dddf3a3133229405d4842c11f474e90460,2024-04-03T17:24:18.150000 CVE-2024-2035,0,0,110d7e573a79ae4fed8a8a9d020094f1c8f635a8a07029ac6a9636d645716be8,2024-06-07T14:56:05.647000 +CVE-2024-20350,1,1,21e842511c18da1a879b2f10ca1346e8d7f33c9571ed56308be51a65b2580beb,2024-09-25T17:15:15 CVE-2024-20352,0,0,b6df069392724fdc834a80403afd09f590785680a76232df596c3f6fea90f0b6,2024-04-03T17:24:18.150000 CVE-2024-20353,0,0,e2f72ffa3936c97cc6267050a0bce7d53259a8a25c98d8322d782dc399b18d7e,2024-04-26T15:22:27.803000 CVE-2024-20354,0,0,2b17296c0b4719e35a35904483c6c06073bfa6005008b3509f848c7bb9f4faf5,2024-03-27T17:48:21.140000 @@ -243261,7 +243263,7 @@ CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc CVE-2024-20378,0,0,1d0c211142ee7b64cb979c7d6fe81a8dda4cc3d613763c0904f9ebf5643e5461,2024-05-01T19:50:25.633000 CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0ec,2024-05-24T01:15:30.977000 CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000 -CVE-2024-20381,0,0,206ca6b90b48001500d951647099fc1ca56b0d1770630ec5c7fd8591f92f83a7,2024-09-12T12:35:54.013000 +CVE-2024-20381,0,1,1d137d93b0598fd47692ad3c3d2e46a37f7acfa84f78f58b2c3c09528c8e86fc,2024-09-25T17:15:15.240000 CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000 CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000 CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000 @@ -243282,6 +243284,7 @@ CVE-2024-20406,0,0,01aaafe449ee420500b1edefdacc3ddc2b6232e6350a88c752467bf1ed2b3 CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000 CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67ce95,2024-08-29T13:25:27.537000 CVE-2024-20413,0,0,eef91fa550f9bdcbf9b050eb11a257fdd75cd91f9c74286f67575b2cf9d8093e,2024-08-29T13:25:27.537000 +CVE-2024-20414,1,1,f7f8a07e56cb061cf450dbcf11ac145820185f1273d20051c1db3a138502e1cb,2024-09-25T17:15:15.413000 CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 @@ -243289,7 +243292,11 @@ CVE-2024-2042,0,0,148bfce3b5f48e2144e9167826ed5f6f120e539bf15296a435b2ce580e8b1f CVE-2024-20429,0,0,f467ae3dedce5a1f38518317999bbc8fc79bc2960eb95679505ee1fcb992ae20,2024-07-18T12:28:43.707000 CVE-2024-2043,0,0,7a3896d230f6f1ae602a08f92e2eaaa644b5893021849dee8a675eb9b7c81e88,2024-05-02T18:00:37.360000 CVE-2024-20430,0,0,10fa05ef1e262e03d3ec6f9856a4fd60e476d60000f282e33b3976f1a0227974,2024-09-18T18:56:05.510000 +CVE-2024-20433,1,1,d7c9bd36fbcb8ca3ef11f0a4fac7dcffb13819f245822dee919475a5fae89797,2024-09-25T17:15:15.677000 +CVE-2024-20434,1,1,4df3a5da2b5d72cf75f6698a910a421cd315ce3b3d348b51e07d11524f2a2f5e,2024-09-25T17:15:16.090000 CVE-2024-20435,0,0,bea0a896db86de220514ce1618de53b05523503910f680b3361f4c8bb8734dd9,2024-07-18T12:28:43.707000 +CVE-2024-20436,1,1,47c3ec92ef11c0ab1b124636825d16a0aa274475413e01d9be6c494bdf94542e,2024-09-25T17:15:16.400000 +CVE-2024-20437,1,1,748f2baa3f86b8c67da3e954dabb92c73fb68f24b5c8c2413994da077aa09523,2024-09-25T17:15:16.630000 CVE-2024-20439,0,0,d6b5bcbae917ca310708f2b3bf5f6e48a7ee01ce537e933ecbd837bca81ceec5,2024-09-13T19:35:32.477000 CVE-2024-2044,0,0,20580816ecbcb2d456bf5030911ad2dbba893322604e54631bb30d65d5e1ff74,2024-08-01T13:49:39.293000 CVE-2024-20440,0,0,c9c53dc5c2cee258d8848cdc1782766d626f4ac361af7ec1e658341d1dc604f2,2024-09-19T13:42:41.017000 @@ -243299,24 +243306,33 @@ CVE-2024-2045,0,0,711ac9453656184dc732c4f4633f4f7bda646ec847d7f0c1c60c568976f58a CVE-2024-20450,0,0,a40597aa01c7c808e6329a0cff711d7709db0a15729885e98911c863c6fe701c,2024-08-23T18:14:43.787000 CVE-2024-20451,0,0,616ab4cb2b50cee49c462941d4d3e48792a6a3c09b725bd97a134b2f4a53bec9,2024-08-23T18:14:11.137000 CVE-2024-20454,0,0,b7df5fe3c7f3ad82ec42e5ba189942703f651e8bba204ff78589b452573f75e5,2024-08-23T18:13:47.510000 +CVE-2024-20455,1,1,6236028b597326f180238e58ba1dd89263cb30e98cded2fe2b05c03b69440239,2024-09-25T17:15:16.827000 CVE-2024-20456,0,0,bf56f0f0f8d3ed0f6616c43fc8ca6a47b6257ec17aaac25185ba7a05790b5cc9,2024-07-11T13:05:54.930000 +CVE-2024-20464,1,1,d4787998aafff3ce0cdc812a1f559b2cd60480cc1e3c154fc1bff899b55defc6,2024-09-25T17:15:17.043000 +CVE-2024-20465,1,1,025217cc158c216045d663a5773a6334893830270cbd6a58725fb372f8172902,2024-09-25T17:15:17.220000 CVE-2024-20466,0,0,1f67211864766033ae7df34d7b817672b03d47284d690437051f747cfe419304,2024-09-11T16:15:05.683000 +CVE-2024-20467,1,1,97c22b2246966de74cba72328e5b5b499a0ab8b55e378bd4691ef2c1d81edde9,2024-09-25T17:15:17.393000 CVE-2024-20469,0,0,394110c2afcd5812c9d147805c76bc56d743563b5c07576e0d27ad32427aafe0,2024-09-20T16:58:14.327000 CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c8025,2024-04-01T01:12:59.077000 +CVE-2024-20475,1,1,2be68aed31e19e4a0a97439137334a2085a19983c519c6919ed33746dede5f13,2024-09-25T17:15:17.587000 CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611029,2024-08-29T13:25:27.537000 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 +CVE-2024-20480,1,1,d9fc015eed28bc580ee970e1e4a5b1e4e31140db7b327aa64af8f542ee854402,2024-09-25T17:15:17.787000 CVE-2024-20483,0,0,c3aaa012ac8e934bf0fa344f4717405eb9a54f40a1dd6df07175cd5998974e08,2024-09-12T12:35:54.013000 CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000 CVE-2024-20489,0,0,21cc73253209554f6b4b15a9223bc3f2b9ae3b7c0f2dd8d7b8823af1edcfee1e,2024-09-12T12:35:54.013000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 +CVE-2024-20496,1,1,129a9a36db4edfd3c129f2ac5507d7f75ebb74286527cd3034969de2e9e31bf4,2024-09-25T17:15:18.020000 CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 CVE-2024-20503,0,0,e85721e4e1cede24d93f2a47467ca55ab63c155dde7e0c41a923091bcc7e874a,2024-09-13T19:24:37.420000 CVE-2024-20505,0,0,3cc28c634084a10df250df318d1f65f6c920a21d5650beb89eb991b35e09151f,2024-09-12T17:28:47.010000 CVE-2024-20506,0,0,b3839959ba904d7db54237791da3f84bfa0eea3b79a536a06b85b587186e3413,2024-09-12T17:26:37.643000 +CVE-2024-20508,1,1,9d11d92d8d0618ad11b9143f5b8b6fcd26bc6b28daf36d2b0d8b5445dcc1ae0d,2024-09-25T17:15:18.267000 CVE-2024-2051,0,0,7b283f8057b783b668166a17f1e1ff3c63b74d0e0fa3f6b8acdcd7e3ce5a09c9,2024-03-18T19:40:00.173000 +CVE-2024-20510,1,1,5ebdba214b9449adbfbb079b23b70a7ce9b6e8d5de1b6b591ce43c9fbb977e57,2024-09-25T17:15:18.470000 CVE-2024-2052,0,0,b3dd7173b956ed9ab7dfaa381fa39b77e63aea1f604a72f8ac014b370895d6ab,2024-03-18T19:40:00.173000 CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000 CVE-2024-2054,0,0,5af7272a2140be959232b9c889b5facdacd3c4cf8342e14293010d7ec8d01b60,2024-08-05T20:35:09.723000 @@ -244285,7 +244301,7 @@ CVE-2024-21748,0,0,2a197de0adbf993ed118e27e797a4f0c8754f47a7d945195f996e25827117 CVE-2024-21749,0,0,5487855d4429da4fac08226224f1538028a7a5ac2df658cc224a0e240622cf41,2024-02-29T13:49:47.277000 CVE-2024-2175,0,0,e25106a44fdb025eeacb5d45a3528175fd9b5c4474d6e05002e4ccb474d65bca,2024-08-19T13:00:23.117000 CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000 -CVE-2024-21751,0,1,b7ed8c4fa6a86b73f6c8da24c7b3692a53b0d8972ec8abb4dfce264018a5c531,2024-09-25T14:44:47.350000 +CVE-2024-21751,0,0,b7ed8c4fa6a86b73f6c8da24c7b3692a53b0d8972ec8abb4dfce264018a5c531,2024-09-25T14:44:47.350000 CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000 CVE-2024-21753,0,0,a306f3d58f3ec335b13488f5fd07d845590af6725b02e29d9bbf081cb21b4d53,2024-09-10T15:50:47.237000 CVE-2024-21754,0,0,8eef9cb01c9e62c140e9e4b8ce590b49e1091c67b7edd25a8a35093e89b8087c,2024-06-13T18:36:45.417000 @@ -244719,7 +244735,7 @@ CVE-2024-22292,0,0,05f44b540ee4b706deb8e09b5e69b435b9dee71b39c6d96ee3c96b12ff15b CVE-2024-22293,0,0,296fa146ecd1a55b7646dd9883e3fc5819ea3e43c48385e5a75924ea0264fb4a,2024-02-06T15:44:56.407000 CVE-2024-22294,0,0,5828b62d00c0d214ddf9919c1c3796377ff7531e0fceb3bab86331c9c099e1b6,2024-01-30T17:44:30.747000 CVE-2024-22295,0,0,d8a56e8232d865eb2471c9f7cc7882bfe5253c665fca50e3355b76153ee25551,2024-02-06T15:49:30.457000 -CVE-2024-22296,0,0,493c4fe98de6e60c8c5df5aae52d35200af769db6ec74faecc462ef92ed3b5a5,2024-06-10T12:40:41.360000 +CVE-2024-22296,0,1,f2df095aa923c12859108c667f113bfd3a25fbe9a3b1b2689ea18af316e3edfc,2024-09-25T16:36:14.417000 CVE-2024-22297,0,0,69db8457fa1d249d320b83331a8449158f3912a853adfc0368560278e4f35b7e,2024-02-06T15:38:07.050000 CVE-2024-22298,0,0,86d41c7c38953434af44ec69f6987e84e3813f9b3dc986536bf16768d7f8791e,2024-06-10T12:40:41.360000 CVE-2024-22299,0,0,687bdc03a263fa90a2cb028d0d28e6c356e2b9adaefe0d5738557ee7430f3c3d,2024-03-27T12:29:30.307000 @@ -245043,8 +245059,8 @@ CVE-2024-2288,0,0,cd7c5230343a968ec1284ad6d84a2effc1ddaec094bc18cd1b2aea35c83f88 CVE-2024-22889,0,0,f0896593ec3ca9dd1c8d891024a90166832eac7f6f24d69ccef8118546590c89,2024-03-06T15:18:08.093000 CVE-2024-2289,0,0,88c8ea445f3ec0f52a4a4915f3451dfa2a58f08cca6c52d35d5827b3a85f59bb,2024-04-10T13:23:38.787000 CVE-2024-22891,0,0,c372c37d8d29f1a790c33c777dd74eb88692521ab57198e3805ccc92c63aff20,2024-08-29T20:36:05.290000 -CVE-2024-22892,1,1,80254893987b632f368888a0fdc9b53a21be3a1356524ad4827824dce5b9c5aa,2024-09-25T15:15:13.430000 -CVE-2024-22893,1,1,fbd2f221fbdd703871bbcde8ae8b8446994d44da7421d06d3bdb792f69ec66a0,2024-09-25T15:15:13.520000 +CVE-2024-22892,0,0,80254893987b632f368888a0fdc9b53a21be3a1356524ad4827824dce5b9c5aa,2024-09-25T15:15:13.430000 +CVE-2024-22893,0,0,fbd2f221fbdd703871bbcde8ae8b8446994d44da7421d06d3bdb792f69ec66a0,2024-09-25T15:15:13.520000 CVE-2024-22894,0,0,ecc90d1f90435a146d50bcd73db1df9adeb9ffb1597740cac1fbe4451cd93336,2024-08-29T20:36:06.063000 CVE-2024-22895,0,0,ed8706063f1e23de8c688f7d1c47a27a8939e76d7f567287b7abe53b8af0f9ba,2024-01-26T19:34:53.417000 CVE-2024-22899,0,0,ad9a2b4d52cbb00f23c5860d056ec6bdcc5b6635f7aa86a4f629c4d09c9c8f73,2024-02-07T17:33:34.347000 @@ -245481,7 +245497,7 @@ CVE-2024-23520,0,0,8ff478c5c4b5d739c301da902e3e561a7792ffa17404a3200b51330a193d7 CVE-2024-23521,0,0,588f9fef9e0931685bae8548cadda61591045c56809e69e9531787a263c78369,2024-08-07T14:53:07.043000 CVE-2024-23522,0,0,a52846eb42ad17ad8127f05143918d462e102a0513c46b5ed2f59dacea5e3889,2024-05-17T18:36:05.263000 CVE-2024-23523,0,0,09948d73039e543f65f5a12001864aed427ffc0f0117c9e9dfa8de2b2366d9fc,2024-03-17T22:38:29.433000 -CVE-2024-23524,0,1,0803489cedc8d3b84696d90e26589e2f1dfdd06a1522beccf3119dd2645f2c57,2024-09-25T14:48:24.990000 +CVE-2024-23524,0,0,0803489cedc8d3b84696d90e26589e2f1dfdd06a1522beccf3119dd2645f2c57,2024-09-25T14:48:24.990000 CVE-2024-23525,0,0,2fe4da7c61ec52781689ef5f10eb4fabb25623b93d66d848e3ba906b64f196ad,2024-05-05T15:15:49.067000 CVE-2024-23526,0,0,807e029925542dd0305ba76d2ef112e9c9d0141646231e69bc0a89a5683f9dc3,2024-07-03T01:47:48.580000 CVE-2024-23527,0,0,fbaf08c918532fa4419949f5ba9061caea7372e46fcf19a02a62eb7a204d2683,2024-04-25T13:18:20.370000 @@ -247932,7 +247948,7 @@ CVE-2024-26976,0,0,30943d015d6f9e470cbf6f9a436113a4fc8c476dd148f5ad8d13b404e4bae CVE-2024-26977,0,0,1ebc6c5c595b695887aee884e1b3633cb0833cb65f13c96d7b2e671b86068f61,2024-05-01T13:02:20.750000 CVE-2024-26978,0,0,b62ba10e220aee05c207f27d9ce90b8810a5ae9c8aebf27ac3c64683154dd1d6,2024-07-03T01:50:11.337000 CVE-2024-26979,0,0,33d8a117099141e9ac17b778389695861dbfcb2a950ec3472e402d03bd709b88,2024-06-12T16:15:11.147000 -CVE-2024-2698,0,1,afa7c6d99994d30301dfc895821f75402b97e3dee976fb2af7dea84b7fe08a7e,2024-09-25T14:19:16.097000 +CVE-2024-2698,0,0,afa7c6d99994d30301dfc895821f75402b97e3dee976fb2af7dea84b7fe08a7e,2024-09-25T14:19:16.097000 CVE-2024-26980,0,0,66004865e97bac01ca2fcc8b2212adb69ec738c42c9473f52383ac2219c51794,2024-05-17T11:15:08.357000 CVE-2024-26981,0,0,d2097042ff43763161fba07eb2edb36cfb373acac608a1af8d5b7b1aed54db35,2024-06-27T12:15:23.460000 CVE-2024-26982,0,0,1a2169fa3b40190b3ed39d1072c0508ff86c68871ae50c9090fd9edb12452c09,2024-05-03T06:15:10.953000 @@ -250172,7 +250188,7 @@ CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe201 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000 -CVE-2024-30128,1,1,820869ef61e83fbf81c3f8092c37a6f29489d0c1ee72c33c90c66bd0edb64c12,2024-09-25T15:15:13.717000 +CVE-2024-30128,0,1,789b25625375c55bddf46d13ba3688b4c8905e407ee92c25082f7b38fc23b49a,2024-09-25T16:35:10.083000 CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000 CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000 CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000 @@ -250910,8 +250926,8 @@ CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2a CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000 CVE-2024-31142,0,0,16502fe8420294098dded506476ced118645fadee97cfcf27213cce5ae7650bd,2024-05-16T15:44:44.683000 CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000 -CVE-2024-31145,0,1,3c68d6c42a82be69732bb07ae1510acb165a3f045f1d558a63e873d817b2f394,2024-09-25T14:35:05.397000 -CVE-2024-31146,0,1,6fec4a23cf47e3198ae7c71002553dfd83f463d212841c68a9f9e0964d16adf0,2024-09-25T14:35:06.133000 +CVE-2024-31145,0,0,3c68d6c42a82be69732bb07ae1510acb165a3f045f1d558a63e873d817b2f394,2024-09-25T14:35:05.397000 +CVE-2024-31146,0,0,6fec4a23cf47e3198ae7c71002553dfd83f463d212841c68a9f9e0964d16adf0,2024-09-25T14:35:06.133000 CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000 @@ -251115,9 +251131,9 @@ CVE-2024-31347,0,0,acf8f05b8434aab28c056143d3c5bbf346bc17b2a72c670eeeca8cf6f2e47 CVE-2024-31348,0,0,21fb9d543e6e3e7eca659bafa6b30c57732d01c43a441e87c8a8bc6f61ff0e61,2024-04-08T18:48:40.217000 CVE-2024-31349,0,0,6958dc31882ac788c6aead8b8caf022481ebc40e925e57f6fdba5545c64b5bac,2024-04-08T18:48:40.217000 CVE-2024-3135,0,0,14787e54c44a14e19f931debd6e7b0362645939106d66f074d2eb61a2e05c4fb,2024-04-16T12:15:10.367000 -CVE-2024-31350,0,1,632f223e6b1eb6174b5b006d92158547f477320a7ac1ccf51cf9535b4edc5d68,2024-09-25T14:36:25.450000 +CVE-2024-31350,0,0,632f223e6b1eb6174b5b006d92158547f477320a7ac1ccf51cf9535b4edc5d68,2024-09-25T14:36:25.450000 CVE-2024-31351,0,0,bcbac2112f543a47a582400e16158e61b20d74c688ac093896e1aaf7d515575a,2024-05-17T18:36:05.263000 -CVE-2024-31352,0,1,1efeab1b8ac23352d588e7c493517298cb74ce4d73067ae81649c047f0e64e13,2024-09-25T14:37:38.550000 +CVE-2024-31352,0,0,1efeab1b8ac23352d588e7c493517298cb74ce4d73067ae81649c047f0e64e13,2024-09-25T14:37:38.550000 CVE-2024-31353,0,0,e50827540a58fe3cd0fcdfc9ae9a072f34f1953d48a4cc1bcabca911b7d42b59,2024-04-19T19:25:34.677000 CVE-2024-31354,0,0,2021071244b49d04bfdae8f1fde1b120ffd4deb5b549bedcae3ab4e58eda06ff,2024-04-15T13:15:51.577000 CVE-2024-31355,0,0,44ccad3b09c334b6cae7bae0ef859237dbf5b126bcbd1960091f3a7b56f3bd0e,2024-04-10T19:49:51.183000 @@ -251284,7 +251300,7 @@ CVE-2024-31552,0,0,0858b0a24a58ed1b7ceca30a28b8a4da432490c7becdeaa833c16bdd5d9db CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b836,2024-07-03T01:55:10.450000 CVE-2024-3156,0,0,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000 CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000 -CVE-2024-31570,0,1,13eadb758f3d135a35bcbdc0da22b0a2db0abd3a7461107672829d5315a1eac1,2024-09-25T14:57:47.337000 +CVE-2024-31570,0,0,13eadb758f3d135a35bcbdc0da22b0a2db0abd3a7461107672829d5315a1eac1,2024-09-25T14:57:47.337000 CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000 CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000 CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000 @@ -251397,7 +251413,7 @@ CVE-2024-31821,0,0,7ffbf5610a7d2af61b143191111032e3581481a662d8ad2f16b1a632dc460 CVE-2024-31822,0,0,f5a60a4c5bebe79b36a24a50e6b8d88f76d622645863bbbdd8c3e989dd18102d,2024-08-01T13:51:14.517000 CVE-2024-31823,0,0,9d12c900b5aea261a617c0c45db69af06e76753d660b696289c6db95f54b5297,2024-07-03T01:55:25.480000 CVE-2024-31828,0,0,abbd4faafd1830e19da09ba99cc549c95f576d3b26460d61eb3b11d4f3cf3073,2024-07-03T01:55:26.250000 -CVE-2024-3183,0,0,a7afd3858ca4e60bf13c0ad26522a6454f59f043acef65e275ce78e07ed0d6ff,2024-09-16T20:15:46.490000 +CVE-2024-3183,0,1,0492ca93cdfb91fe06164185f64dfd6e79760054d26b360873216c2809fc0f55,2024-09-25T16:29:45.630000 CVE-2024-31837,0,0,d4b11924eb0f296c66c4011d26e3c8d35fd7f17f46fa8fcc1ff3c6feb008909a,2024-04-30T13:11:16.690000 CVE-2024-31839,0,0,245f03de749181e8cafb68397f015c580f5b17ce16f6f34c9de9bdd347018299,2024-07-08T14:18:26.223000 CVE-2024-31840,0,0,2a239ae6429f1e619b6ab41616165b617110dec5fa8e072accfd9e1f9e2b5f58,2024-07-26T19:12:02.190000 @@ -252048,10 +252064,10 @@ CVE-2024-32698,0,0,fdb6803b5dd86012a335aabef408290e444c359a1e305da67d57de34152c3 CVE-2024-32699,0,0,be768bbce852bcdad18724ac2d72cb1952dc4973a9b2ba3cfb91f099369fe620,2024-04-24T17:16:50.397000 CVE-2024-3270,0,0,cd1dc223e1bb7ba9458930fbe30425847724139a42bec6d9a460ed9757120c1d,2024-05-17T02:39:49.333000 CVE-2024-32700,0,0,9f71f6d70ceff87b6bcc7fb8a5e6f43f08fca897ae80882ba16d02dfaad35456,2024-05-17T09:15:39.783000 -CVE-2024-32701,0,1,590776d7a2a9337926f886bf7bdc0c7b75e90c5d9330a73a9643e2a2609d703b,2024-09-25T14:39:47.870000 +CVE-2024-32701,0,0,590776d7a2a9337926f886bf7bdc0c7b75e90c5d9330a73a9643e2a2609d703b,2024-09-25T14:39:47.870000 CVE-2024-32702,0,0,59e8f4da0f6fd5e6589c67ea6062707b9cd4e42b90abd493d5af3e3a271b28d7,2024-04-24T13:39:42.883000 -CVE-2024-32703,0,1,3114859e77dee092d03e8185c52cd885fc9542e50effa91b7dba4589c6f9db5d,2024-09-25T14:42:02.487000 -CVE-2024-32704,0,1,ee9e85f773127b03e0a4d9ccdba4918852ffb014508b669852b9114d4a79bc9c,2024-09-25T14:42:40.943000 +CVE-2024-32703,0,0,3114859e77dee092d03e8185c52cd885fc9542e50effa91b7dba4589c6f9db5d,2024-09-25T14:42:02.487000 +CVE-2024-32704,0,0,ee9e85f773127b03e0a4d9ccdba4918852ffb014508b669852b9114d4a79bc9c,2024-09-25T14:42:40.943000 CVE-2024-32705,0,0,bd5c1fceeebf3216d7a43299331ad75dd0f53c84521f7a39c88a1d85c984cfb0,2024-06-12T13:35:06.540000 CVE-2024-32706,0,0,37bc04f61db61a090e2ed6154ea739be1bc72b4942ea5b612055456d2c307efa,2024-04-24T13:39:42.883000 CVE-2024-32707,0,0,4c3ded36a06b33a6c90c1fb58c42a7f9398ce197f42ee1d348c6d8c1f58dc26d,2024-04-24T13:39:42.883000 @@ -252393,7 +252409,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176 CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000 CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000 -CVE-2024-33109,0,1,b893019ba7a5d5385ca87135f20f011d1b195977e7dba6b9ad5ac8b3abcf4e5c,2024-09-25T14:47:54.217000 +CVE-2024-33109,0,0,b893019ba7a5d5385ca87135f20f011d1b195977e7dba6b9ad5ac8b3abcf4e5c,2024-09-25T14:47:54.217000 CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000 CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000 CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000 @@ -252990,7 +253006,7 @@ CVE-2024-3405,0,0,1a36e7936640d8ee3b950dcf5e1524049898a441fb6f4e16f7e747a8431e73 CVE-2024-34050,0,0,44c48f4071fada74be495a02e6832030ef2b56f478d8d3c41b6b32ec804128b6,2024-08-01T13:52:14.410000 CVE-2024-34051,0,0,a8120ee635d56801294cebdedb69db5ed1626c2ec52a245c57ea4ea12a675bfb,2024-08-20T16:35:10.510000 CVE-2024-34055,0,0,7427a319dd0c198f833560a21a2edb42d0df57c5ad7676dbca6086efaa896fb1,2024-06-14T06:15:11.650000 -CVE-2024-34057,0,0,2a8ecfe7c44315b491d127002756bfaceeb0ba27dfdb08a9c26d894f51c73964,2024-09-20T12:30:17.483000 +CVE-2024-34057,0,1,144833c264b8d13b78d4b5938239b0da10202219948b3f1de2d39cbfc6aa2bc9,2024-09-25T17:08:16.017000 CVE-2024-34058,0,0,cfbb8590d55f48cefc143414c8f3d439d56763f898de84d852e391cab57a6cc6,2024-07-03T01:59:19.210000 CVE-2024-3406,0,0,43419e68856488b4b180d817f6df1b0507098cc5d23fc41e4c9ff5a45a3194f6,2024-08-12T19:35:11.330000 CVE-2024-34060,0,0,2c26fe7958cdb41774953e3a2b34d9d42eff17a3a4c0aa9130168786a97a1825,2024-05-24T01:15:30.977000 @@ -253154,7 +253170,7 @@ CVE-2024-3427,0,0,04d120d0d57c1b307c564812a2a90dbdd8ac5486efff94685b4ef467060605 CVE-2024-34273,0,0,4c0c9834fc4b51c4a9b9199849839d68fcd657ddede4c1f2ac2a03c81dfcc2ae,2024-08-01T13:52:18.903000 CVE-2024-34274,0,0,04cf77661d40b20b86001188951fe9b60cb45ce0a3967bd1c023b7bfcd657c79,2024-07-03T01:59:50.460000 CVE-2024-3428,0,0,14a86e039ac8cb265b9d604c5dfa68dc90fd322057a6dfd51fe11334090fcad8,2024-05-17T02:39:55.420000 -CVE-2024-3429,0,1,1b21bacd9290b4a4c3f7f58bf8aa254378b9b7384a99cfeb925ecfff9ab6baed,2024-09-25T15:53:55.867000 +CVE-2024-3429,0,0,1b21bacd9290b4a4c3f7f58bf8aa254378b9b7384a99cfeb925ecfff9ab6baed,2024-09-25T15:53:55.867000 CVE-2024-3430,0,0,a941a2bdaed6734132b4bed8d998008948b76c9a3932a595684037246d003245,2024-05-17T02:39:55.503000 CVE-2024-34308,0,0,5c6830d7ba39b77cbaffad44e790f498af6b587a6f9837b67570228055e4e3d7,2024-07-03T01:59:51.267000 CVE-2024-3431,0,0,5fc2c93ae5310a51e046f84945a2a838f604d6025e1cecd0f4843d0687905336,2024-05-17T02:39:55.597000 @@ -254080,11 +254096,11 @@ CVE-2024-35713,0,0,ca8ba5d4caa775840c63bd81e19b8b2c3127ce17c1b54bccd5ab2a83c900f CVE-2024-35714,0,0,8ad26a0c069cd7496b482871d778b1a0bc1b05193b8516e83b54f6455b846405,2024-08-29T21:10:17.630000 CVE-2024-35715,0,0,c5e9be613e22e2fc44f89d54f3164d7d8990eeb3c59fcb4a70e49f768e380c3e,2024-09-18T00:15:03.447000 CVE-2024-35716,0,0,31701854ea5aabdd20ee7c3d1f2ecac85ca8e50bcb2d7b44a201fe7038b52764,2024-07-23T18:21:24.257000 -CVE-2024-35717,0,1,37f0ecbb97c46d8d21aec034d8ca92096dd3f999480fccf5e128fd3c6dd61528,2024-09-25T14:46:17.400000 +CVE-2024-35717,0,0,37f0ecbb97c46d8d21aec034d8ca92096dd3f999480fccf5e128fd3c6dd61528,2024-09-25T14:46:17.400000 CVE-2024-35718,0,0,223668ad06091da54030dcd99f3617788339139ce57d8c19397b9e702415dc22,2024-08-29T21:15:11.230000 CVE-2024-35719,0,0,654572645a72aed91b6397ff11bb2909c265f1c87e8f07aca797c61ec4fe801d,2024-08-29T21:16:30.363000 CVE-2024-3572,0,0,358c8cea0f66b609b18250018a3e0beb2b858435bcda9c64899afe87e118fccd,2024-04-16T13:24:07.103000 -CVE-2024-35720,0,1,15b66e7747e75989b47c7d0180f243d57d689a2f71aa742f4825b2215ee23e5a,2024-09-25T14:46:44.140000 +CVE-2024-35720,0,0,15b66e7747e75989b47c7d0180f243d57d689a2f71aa742f4825b2215ee23e5a,2024-09-25T14:46:44.140000 CVE-2024-35721,0,0,403808b7ed18588cd66dee94bf769203fe91a72280712700be1c25ea8cb639f1,2024-06-12T16:29:34.530000 CVE-2024-35722,0,0,900f52c63024bc31ebeec814424e23a50e10f9bab2e81b43138d101b966398d7,2024-06-12T16:29:22.497000 CVE-2024-35723,0,0,4b4f1b40c0f9bfef4b6800e9ab37bdf9cecea3df8bc822ae05c354686639054b,2024-06-12T16:28:51.920000 @@ -257137,7 +257153,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000 CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000 CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000 -CVE-2024-40125,0,1,b6102a5000d62445f3dfb355103da71acf49221ffdd95d01bc78b0a2980bc0d0,2024-09-25T14:46:52.523000 +CVE-2024-40125,0,0,b6102a5000d62445f3dfb355103da71acf49221ffdd95d01bc78b0a2980bc0d0,2024-09-25T14:46:52.523000 CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000 CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000 CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000 @@ -257369,7 +257385,7 @@ CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b98 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-40754,0,0,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000 CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000 -CVE-2024-40761,0,0,ec7f44b1984f115e0baf55e04afbf98ea946ffa2e84b8d5284f88043a6f46ced,2024-09-25T08:15:04.437000 +CVE-2024-40761,0,1,d492be653750f3663697dc849205192fd85d7d2517bf1ddd3c4e6d9c40031dc5,2024-09-25T16:35:10.803000 CVE-2024-40764,0,0,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000 CVE-2024-40766,0,0,9ffdda3005aa6c238f823c6e65a3a89594c21a379fd17878a86615d17b31de27,2024-09-16T19:48:30.827000 CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000 @@ -257440,7 +257456,7 @@ CVE-2024-40834,0,0,7e20f67bc8b08fc4adc47071793a554467422544bba4ba726067a06c6b9b9 CVE-2024-40835,0,0,ffa2d0f502e7a09e89b4898498fc215520bfece3735d19b72358067234b3c222,2024-08-23T14:39:03.070000 CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe62dd,2024-08-01T13:58:15.220000 CVE-2024-40837,0,0,ccc4fbf4d07a48518f7fa02b46184c88d2b8e0a64ca26c4f8ffcf17903cd52b7,2024-09-23T18:50:16.050000 -CVE-2024-40838,0,0,ea75880f64ff7d123e05b02ff724ba26aa62c0c8ce55d78d668e510b3e5ff9ec,2024-09-20T12:31:20.110000 +CVE-2024-40838,0,1,57ccc58a6e0da28c4781c076dd6b53ecfc2f0b846080c275e7f92f16bacc87fe,2024-09-25T16:46:24.123000 CVE-2024-4084,0,0,aed2355093521159d48a9084a5a18f34499717e2daefb72a4c03148c5f7b9d24,2024-06-11T16:44:49.090000 CVE-2024-40840,0,0,5e34a232df19c586251cf91538c4a202969b10a4d2f3a98a453d52aac010eb9d,2024-09-20T12:31:20.110000 CVE-2024-40841,0,0,7e2ae925fab3d81814eaf43566b8461aa33db3e07f1b71490d71856e29358264,2024-09-20T12:31:20.110000 @@ -257851,6 +257867,7 @@ CVE-2024-4144,0,0,f950a1b03316faa802a71776ce4e62cc15162cc9cec7d4c30c76255605b1c1 CVE-2024-41440,0,0,0bba27cb4081a14b1798eb2cddc147a76c07aeb5aeb07d5a7917e7317d9973b7,2024-08-01T13:58:41.773000 CVE-2024-41443,0,0,4b989230a84b85398c5698bceac0a0dd2b8192cac38c0d61b31ca0600868cc4e,2024-09-11T15:54:29.327000 CVE-2024-41444,0,0,5ea59719718418adee108f9ce5540b96facb8a58caf3370b9e6aa1a42ff02782,2024-09-05T18:36:39.773000 +CVE-2024-41445,1,1,335a49b47dfd8ad0cc5d4d87d1f2bee14a442d08d67f7a08f91aed7abd36943e,2024-09-25T17:15:18.740000 CVE-2024-4145,0,0,704254773246494130c81e0600984df247a970411736d475449e315ca595ee9b,2024-07-03T02:07:08.133000 CVE-2024-41459,0,0,9640a7afe79b79343a3929c52d836dc236bb14f56157fc3a97eeb523f4182cdc,2024-08-01T13:58:42.827000 CVE-2024-4146,0,0,44d4e6fc76499583267ad9d2982965e0b01277c59cea588fc1c62cd739f32cf9,2024-08-30T16:15:09.813000 @@ -257970,6 +257987,7 @@ CVE-2024-41704,0,0,2bc018b99d38a9eaaef3e278b3999e228c9f0ef28a260142aea13990cbc48 CVE-2024-41705,0,0,1186e60c4c15e6e9e0b15aecd586260e87327f5da15827cf4d98592a0e7276c8,2024-08-01T13:59:07.983000 CVE-2024-41706,0,0,eb9574b35e7aa157073ca1f400bb0d0353b8ac2c3e5aea70509848a41f08765e,2024-08-01T13:59:08.790000 CVE-2024-41707,0,0,46c44c2d7564627600555fe5a9d2b2412759a5e55f6187d39d18a309c54891ee,2024-07-30T20:31:59.030000 +CVE-2024-41708,1,1,95d1a803ed769e3cdcb9d1647d4cc503c95cfb5d1fdf19bb4fdc04997b464fa8,2024-09-25T17:15:18.823000 CVE-2024-41709,0,0,6713bfc73e81c65bc7923627db30413fcbe413ec587fff89449c3abd86e7e93b,2024-07-25T15:22:06.140000 CVE-2024-4171,0,0,87597e8caa4479ab69c883527c35fc22af72d614757313d16953f50dcfa107c2,2024-06-04T19:20:31.980000 CVE-2024-41710,0,0,60d485e1ae4ab9a6a76b69400c8e45c5632e291398c40e0cff7baeda3bb118be,2024-08-14T18:35:06.257000 @@ -257979,7 +257997,7 @@ CVE-2024-41718,0,0,7651686104923551937c1bf922db9a37da5f3ad1631e564fe3c0dca9a6e79 CVE-2024-41719,0,0,9153c34983715c653b1c300082bd1504f28f779a4622f52f1934f7c462bf8faf,2024-08-19T18:40:35.203000 CVE-2024-4172,0,0,ae5cefdd41ee745a5f3463347f20f3f77110439c81ed1ad285dedf4b40da1c57,2024-06-04T19:20:32.077000 CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a971,2024-08-30T17:49:42.047000 -CVE-2024-41721,0,1,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000 +CVE-2024-41721,0,0,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000 CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000 CVE-2024-41725,0,0,21bbc62325c2482a0a8901148be83c11d24610782aed5e5a17dc78b6664e4bda,2024-09-25T01:15:41.833000 CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 @@ -258256,7 +258274,7 @@ CVE-2024-42110,0,0,d32e698de0e7b17bea1969eb2144abdc6b889fd7317c6b8113fda73d07665 CVE-2024-42111,0,0,54db76ff7e8130362d41c492aa2e759d1e30f80ea24bf90a20c876a40458428a,2024-07-30T13:32:45.943000 CVE-2024-42112,0,0,053ed3da7b6fa8b9c64b9dd46522be8c0a3889161664650c546eddc66722489c,2024-07-30T13:32:45.943000 CVE-2024-42113,0,0,055bfc7352f8708916cb02878daf8b9abd49f09673041c2a3f1555d3e0438485,2024-07-30T13:32:45.943000 -CVE-2024-42114,0,1,9975c17cda36886fe3dd1c3e92dff536b06cf6f9784b3fb1441a9cd391ce6816,2024-09-25T14:44:11.110000 +CVE-2024-42114,0,0,9975c17cda36886fe3dd1c3e92dff536b06cf6f9784b3fb1441a9cd391ce6816,2024-09-25T14:44:11.110000 CVE-2024-42115,0,0,c1bf508190d9d011d99e9e0c6936167394e909cd6a7f0f4a4e381df1abddbea8,2024-07-30T13:32:45.943000 CVE-2024-42116,0,0,30a90b9468660b29848bbd64238d702f03ad6275f3a02231616e417bdbda5513,2024-07-30T13:32:45.943000 CVE-2024-42117,0,0,e86f5875f9840b49edb38024936f207409c0f434c81331cd923e6aaf28928c94,2024-07-30T13:32:45.943000 @@ -258266,7 +258284,7 @@ CVE-2024-4212,0,0,5766e7a6d4fbc74d070c835b010281385271ca336cbd1f30b8212e7da6caf8 CVE-2024-42120,0,0,692318adb3e3bc8ee3327c58f85ce2f0a478d2c89b683bc854fcb9227f9c337f,2024-07-30T13:32:45.943000 CVE-2024-42121,0,0,c5e25bbf3c91bf25bcaa878ff72039e7afac3b1d4b647d19649fd2a0460d64a7,2024-07-30T13:32:45.943000 CVE-2024-42122,0,0,f1aff74be0c8f2add47447c4fc3e19fab36b7330d7c3102774809c41ed96d349,2024-09-16T13:49:27.837000 -CVE-2024-42123,0,1,fcf3797a52cf94737c36d1a9dcc7dcdf4f1621793123c3aa297da1a863bdccb1,2024-09-25T14:45:25.770000 +CVE-2024-42123,0,0,fcf3797a52cf94737c36d1a9dcc7dcdf4f1621793123c3aa297da1a863bdccb1,2024-09-25T14:45:25.770000 CVE-2024-42124,0,0,fac73a1c1853cbd61b92ef3a19f9f7f6792c7fb13275a38cdccfee119802151b,2024-07-30T13:32:45.943000 CVE-2024-42125,0,0,623dede6e7a867ee2a4793db37771abbdecba1b4f67d59179866a3aa7e89529c,2024-07-30T13:32:45.943000 CVE-2024-42126,0,0,5ead821db32439b0032661ea186379c9f55f1afa1bc2284b38295084f9f2435e,2024-08-19T05:15:06.927000 @@ -258275,7 +258293,7 @@ CVE-2024-42128,0,0,b8155b78412ff52ea13f2f9c045e69435a1427918f79cc2d9ffa4f93326cb CVE-2024-42129,0,0,46d5c1746954fb4a02665ba978862f55732f5e2a31e0452c7452c5970d864bc8,2024-07-30T13:32:45.943000 CVE-2024-4213,0,0,4af0c7bd943d1e93f39eb470b6c791f96149e0a985dfe97529e29ee085d7cdf1,2024-05-14T16:11:39.510000 CVE-2024-42130,0,0,c0bf8d6705687d288b22cfe1365e7dce03a7394108689b183e481d0372b856b1,2024-07-30T13:32:45.943000 -CVE-2024-42131,0,1,aff9a000aec3d408b4c99da176c5accb9bb8915c7fb722324b63293008e9a5e7,2024-09-25T14:45:11.617000 +CVE-2024-42131,0,0,aff9a000aec3d408b4c99da176c5accb9bb8915c7fb722324b63293008e9a5e7,2024-09-25T14:45:11.617000 CVE-2024-42132,0,0,2f4d4ac80a7ca69cb3eacfe6d114a16e8e41ad14f4a3bea559c41eac32d31205,2024-07-30T13:32:45.943000 CVE-2024-42133,0,0,774a28cde62878f7ee006cd2f913f8ca89836e6fe0716586b68a30db7f392c96,2024-07-30T13:32:45.943000 CVE-2024-42134,0,0,b964a563fe31ebeed4bd473713e48eeb088a769f2eb83d9ee50ca797235dadc8,2024-07-30T13:32:45.943000 @@ -258308,7 +258326,7 @@ CVE-2024-42158,0,0,f708fe0c9b8afdea7e816433ff8d7e695756b23c2951cd3e7d51dd4aa0ae2 CVE-2024-42159,0,0,ddb54cf3e23058b0cc94c2454029ec74eccf92e763ca85662f68c5080c1191bb,2024-08-02T14:29:46.240000 CVE-2024-4216,0,0,fba12328dbaabec1dc61fd9a4f006fbf116bfe15b54035daf7cebf0a0d91ce67,2024-07-03T02:07:14.290000 CVE-2024-42160,0,0,99059c88b605f4fa1bbf18da91fe0a3527191b8f257bfef3a73d85473c482ede,2024-08-02T14:29:26.330000 -CVE-2024-42161,0,1,97279a99e7775c2140b5fea2afa6ffe875092f1c8ad4660f6960f7eace3a4bd7,2024-09-25T15:54:47.837000 +CVE-2024-42161,0,0,97279a99e7775c2140b5fea2afa6ffe875092f1c8ad4660f6960f7eace3a4bd7,2024-09-25T15:54:47.837000 CVE-2024-42162,0,0,6afe87ab720ed2f9c2f080d1a44ac6b35a3f68a956a94f09bb5c649d3b32abfa,2024-08-05T20:19:56.047000 CVE-2024-42163,0,0,e648bd08f6f5002b2c2be8dfcddf503eeb253615a38731eaff8171d82d0e084b,2024-08-29T15:17:38.217000 CVE-2024-42164,0,0,5f7394f2c8b7091142f24f8a74012a4af598e6428e8a46bdce2f469fbbd5cc92,2024-08-29T15:19:40.220000 @@ -258324,7 +258342,7 @@ CVE-2024-42219,0,0,6d72ad1f1e2233036625c33df60f051fc9699cbd96bd0caf5f28288f63cee CVE-2024-4222,0,0,4d6355f51e627298e66c1522bbe3d0815b2694594ed1a3761ea4bb349286c8e6,2024-05-16T13:03:05.353000 CVE-2024-42222,0,0,b89ef57d67246c59e7b320f402a614639a269bceaaa0c30be9cf5a9576c14c01,2024-08-29T16:43:59.923000 CVE-2024-42223,0,0,870080f23f69c4b1a872bfc25aea5e5eeb6250775d6b9b06e156b439a569181b,2024-08-02T14:24:48.680000 -CVE-2024-42224,0,1,0865a03e98dd11ed105a5bc1eccb5a484aeb3ca4bb6400b3a913f08fe9d68aff,2024-09-25T15:55:09.027000 +CVE-2024-42224,0,0,0865a03e98dd11ed105a5bc1eccb5a484aeb3ca4bb6400b3a913f08fe9d68aff,2024-09-25T15:55:09.027000 CVE-2024-42225,0,0,027ebcc5c2c6118571549793bb32b350e19f50787f15d2954fa76e31ccdae212,2024-07-30T20:15:19.600000 CVE-2024-42226,0,0,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13993,2024-08-12T13:38:33.853000 CVE-2024-42227,0,0,defe5641015aadc42156aed9e400c997682c21664defa4c542b824140e095fad,2024-07-30T20:15:03.963000 @@ -258927,7 +258945,7 @@ CVE-2024-43231,0,0,576ae207e6ba8489a6ff51c30718ab9a1cd372eb2df3fcba4d400349b5803 CVE-2024-43232,0,0,c4f0a290d3d0b6195154848d04103c9516440693673d84bd0355907b0f850350,2024-08-19T18:36:07.297000 CVE-2024-43233,0,0,1b4af7770e832b42b8de9434c8175a113ca03ccd398ae87b3d3135806048f23d,2024-08-13T12:58:25.437000 CVE-2024-43236,0,0,023011a32949e87f6bc318354cd0a34190696d548e7018a1624254d686b58e3b,2024-08-19T18:36:07.297000 -CVE-2024-43237,1,1,cd4ab728831e6e0577a88455d0cda3b2e88386eeeb9db5eaa94711a551210f62,2024-09-25T15:15:14 +CVE-2024-43237,0,0,cd4ab728831e6e0577a88455d0cda3b2e88386eeeb9db5eaa94711a551210f62,2024-09-25T15:15:14 CVE-2024-43238,0,0,55a9737df7d3a7bb29b80dc0b631f8b007fbdc439de2c352cd0a0288d492e84f,2024-09-17T19:27:03.220000 CVE-2024-43239,0,0,79d51d8573e5ae7ca3d4a994fc625c6641954aca391d8556cc284fe714bd5440,2024-08-19T12:59:59.177000 CVE-2024-4324,0,0,fc63521759a8641132ed78ae3099f2b2ca0952db3d329b9ead7b1b38a39cf68e,2024-05-02T18:00:37.360000 @@ -259340,7 +259358,7 @@ CVE-2024-43954,0,0,76c216e4287ea3e21df8a5c42687b7643218c83658145d7a54c571f2f9829 CVE-2024-43955,0,0,4ede473467403747b1a04930906c4ff684161a593463954ac3ec5bae261e5e01,2024-08-30T16:23:35.187000 CVE-2024-43957,0,0,e37eee71e6d3d39b6eee1646ea93bd080fe2f853ce321f65d1106d4fc89b111e,2024-09-05T14:49:17.983000 CVE-2024-43958,0,0,3f3bf4212bc2e74c074c138fa03eac2a971b658d4caf8d2e0f7172d721ab1b4b,2024-08-30T16:15:19.047000 -CVE-2024-43959,1,1,32df0dc233040d83518e528926a0c9d41449588a10056a96e22cc88fed5664e8,2024-09-25T15:15:14.187000 +CVE-2024-43959,0,0,32df0dc233040d83518e528926a0c9d41449588a10056a96e22cc88fed5664e8,2024-09-25T15:15:14.187000 CVE-2024-43960,0,0,980e57c6c61444ba89ee403d9dc5147321c211af37703070f5947ad7256ca9de,2024-08-30T16:12:24.113000 CVE-2024-43961,0,0,c6e06e0e8287f3f53bd61136fa1d8e035e3cae74e7a2040db5ee6246ae551f29,2024-09-05T14:39:38.957000 CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26fb3,2024-08-30T16:10:16.647000 @@ -259350,35 +259368,35 @@ CVE-2024-43966,0,0,2901acb1eb63b7a55cb46d133ca8742f966f34bb1db4feb1259a3cd63030f CVE-2024-43967,0,0,efb5ab215f4087a53f8dcd252d52ef141005b5764a5e2b6c3ee9faa1675f0e1c,2024-09-18T17:00:57.497000 CVE-2024-43969,0,0,1a95b579d41eb8faee65f3858dc0c26a2595ef0cb4c3d2f4551a96318123fd7f,2024-09-20T12:30:51.220000 CVE-2024-4397,0,0,e58140e99ddfaf8bde684cb5f7b842244f11804dcdfb8070d80437acbcb292f3,2024-05-14T16:11:39.510000 -CVE-2024-43970,0,1,77a129e80056cfc70e3460dbd898d58f094794bf07956a918ea43df613f14f34,2024-09-25T14:18:53.297000 -CVE-2024-43971,0,1,15271454200ca48e9894c5709f39b2a82fcb070edabcc7bed44b538ba98121f8,2024-09-25T14:18:13.137000 -CVE-2024-43972,0,1,45d166e4dbb457cad4f9e6ecf80d8044e3ef67293a1719d9634316ae0fc28afb,2024-09-25T14:16:18.150000 -CVE-2024-43975,0,1,277d0207a09080b919f3f219105b7c4323354cd0721ba6e67221ba9226888308,2024-09-25T14:13:32.910000 +CVE-2024-43970,0,0,77a129e80056cfc70e3460dbd898d58f094794bf07956a918ea43df613f14f34,2024-09-25T14:18:53.297000 +CVE-2024-43971,0,0,15271454200ca48e9894c5709f39b2a82fcb070edabcc7bed44b538ba98121f8,2024-09-25T14:18:13.137000 +CVE-2024-43972,0,0,45d166e4dbb457cad4f9e6ecf80d8044e3ef67293a1719d9634316ae0fc28afb,2024-09-25T14:16:18.150000 +CVE-2024-43975,0,0,277d0207a09080b919f3f219105b7c4323354cd0721ba6e67221ba9226888308,2024-09-25T14:13:32.910000 CVE-2024-43976,0,0,b5b36a728accce9a5c243e352c901188e8a688872f36e1c893cd85efac637a21,2024-09-24T16:32:37.747000 CVE-2024-43977,0,0,8548dd346f70e10bd02563139f9662536c4c908bc4be8bbe5ccbe1834db20d5d,2024-09-24T19:17:15.327000 CVE-2024-43978,0,0,b84c789c57b2300e5e696cc4e44909900a0446291c850df47c011342afd925c3,2024-09-24T16:44:01.557000 CVE-2024-4398,0,0,fee297010492d7a9d0bd198f00369fbc7ee85eff508879444e062d535e0abd54,2024-05-14T16:11:39.510000 -CVE-2024-43983,0,1,8ea56144e7b46aa8d46319391d511f11093468f3fcd70ebf4dabea21dfbfa0ca,2024-09-25T14:11:22.450000 +CVE-2024-43983,0,0,8ea56144e7b46aa8d46319391d511f11093468f3fcd70ebf4dabea21dfbfa0ca,2024-09-25T14:11:22.450000 CVE-2024-43985,0,0,b30648ddb1d2b11b33385d41d42e62d1ebe2261e3847ee7222ca30a44e15ddae,2024-09-24T19:33:16.910000 CVE-2024-43986,0,0,9478adfda55868d7b94f2eea7c2c936b95469666be97191a74de84a03c2187a9,2024-08-29T13:25:27.537000 -CVE-2024-43987,0,1,e42ccbdb2b94d874179a0c5a29e5439a09d4ffe036d9ba2323192b8072b93dd2,2024-09-25T14:08:22.987000 +CVE-2024-43987,0,0,e42ccbdb2b94d874179a0c5a29e5439a09d4ffe036d9ba2323192b8072b93dd2,2024-09-25T14:08:22.987000 CVE-2024-43988,0,0,43ffe19e41988c419aca249be075847312c9c8cd41c433297d22c781cef44325,2024-09-25T13:55:55.460000 CVE-2024-43989,0,0,9f19cbbd07eac2d4997a02808c8ed7b359c9c31bd68dd720d1ab97474c15e7dd,2024-09-23T00:15:10.800000 CVE-2024-4399,0,0,037b40419d6c617c61ec971c9e0affd6b35920b718c94b9e88ff7a43f16d3faf,2024-07-03T02:07:31.827000 -CVE-2024-43990,1,1,26605399405821a9babcc1c4c479025743910126069041bffd554c24a81ff9a3,2024-09-25T15:15:14.370000 +CVE-2024-43990,0,0,26605399405821a9babcc1c4c479025743910126069041bffd554c24a81ff9a3,2024-09-25T15:15:14.370000 CVE-2024-43991,0,0,62375b0bd15282a5169a9db83c3c584ee6643c24a05676f00ee713a46015a5a5,2024-09-25T13:53:50.107000 CVE-2024-43992,0,0,e9a152f92c5b0e9db22adc26709ee0e8b5e307e1de9d16d60489758c638181ee,2024-09-25T13:47:17.277000 CVE-2024-43993,0,0,c2d6d52348aca85630fcb2a37f72e9ad613ffd4f41ea865abac1f2b4dc17f7fc,2024-09-25T13:44:39.917000 -CVE-2024-43994,0,0,92a57f752ce2faa73917c46fd03cd7058c3f4fe6668ac24e011d5cce000e100c,2024-09-20T12:30:51.220000 +CVE-2024-43994,0,1,e95fee6088b53dd53004a837f528725d2b5541f3917b446ee4145995cc44627e,2024-09-25T17:09:09.230000 CVE-2024-43995,0,0,d2bc15228a0936c9d52925ee78d8f61fa4f243d84362a990cf6cd93f080ed156,2024-09-20T12:30:51.220000 CVE-2024-43996,0,0,d7156f428d1448ad8b6ccd44d882e30f14df1390e059d6ddfa9925733f3aeac4,2024-09-23T01:15:11.510000 -CVE-2024-43999,0,1,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000 +CVE-2024-43999,0,0,44faf8f669c2612c0005bd86c2cd14309b22432e58922d209b993e9c26847278,2024-09-25T15:15:43.683000 CVE-2024-4400,0,0,387fe642c8f26702c425b79a01d9b1ba308ec0bd188f1564ff2c490875133119,2024-05-16T13:03:05.353000 CVE-2024-44001,0,0,43db0f88c3e640d31c1ced26a25fee31b35f13afe37712fdf24ec0f8f0863bb5,2024-09-20T12:30:51.220000 CVE-2024-44002,0,0,78aabec616bf445add31137b546b3614b9511be8a441ab676da5dce9d6232c6b,2024-09-20T12:30:51.220000 CVE-2024-44003,0,0,2744e27ce4993c02a8ad8b34984a99e1a86eb64e2a65d6dacdbd3f08ce311e94,2024-09-20T12:30:51.220000 CVE-2024-44004,0,0,aa050c3ee15a31d1070dbd236f7b72cf53d90d76d0c2baff9d9ca9b4dc524727,2024-09-24T19:22:14.760000 -CVE-2024-44005,0,1,68e5b326ea17b9b2aa08f2073b87c5fda6849dde25f3e2d16502638d6b5bba85,2024-09-25T15:25:30.083000 +CVE-2024-44005,0,0,68e5b326ea17b9b2aa08f2073b87c5fda6849dde25f3e2d16502638d6b5bba85,2024-09-25T15:25:30.083000 CVE-2024-44007,0,0,d7d1930aeec9d62758ccc2ddf09e21d07c0b586fa0d9735f7d5dee1a37d7874e,2024-09-24T22:08:52.857000 CVE-2024-44008,0,0,c6d2b6687f1293a95753882058aa8ed47455c99d54b3161e64050d330a139582,2024-09-24T22:08:01.060000 CVE-2024-44009,0,0,5b0cf6c82d301fa9d5358bb5d9e7b1a016eed523b7e9c7d9c1329e61fba4852b,2024-09-24T22:06:15.843000 @@ -259433,7 +259451,7 @@ CVE-2024-44116,0,0,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 -CVE-2024-44124,0,1,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000 +CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000 CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000 CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000 CVE-2024-44128,0,0,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000 @@ -259574,7 +259592,7 @@ CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3 CVE-2024-4460,0,0,91888f8bde5a4d48a24dfa2195fe74c4db2ec96b9dcf1f6b0a4392132da82baa,2024-07-17T11:15:10.240000 CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcfce,2024-05-03T12:48:41.067000 CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000 -CVE-2024-44623,0,1,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000 +CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000 CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000 CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc1915,2024-09-20T13:15:19.850000 CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000 @@ -259582,6 +259600,7 @@ CVE-2024-44667,0,0,67bc66d5934efb1ec507a459f00d72755f90d65f712e9b4a25f261f89a211 CVE-2024-4467,0,0,57c2229fa6c3e84bff363dc59d2c80befb785107da1c6be3c514b7e8bc55ed5c,2024-09-13T22:15:02.260000 CVE-2024-44676,0,0,94a19418954ecc436057825518b8ebed31524cf2f3974b4b1c98d6cc7a26626a,2024-09-10T20:35:11.767000 CVE-2024-44677,0,0,37f096131b37c64ecd3fc3fc2de6424d39f5522109a7a0d481410b531195bf1c,2024-09-10T19:35:08.760000 +CVE-2024-44678,1,1,d878c7756fa052dcb9bda7bc8ae3a81429c10c0f8799352cf68543a7783c0965,2024-09-25T17:15:18.990000 CVE-2024-4468,0,0,b3276ced4484e0a6677a57dac2ac7e9a5b704e2ae059b48a7256dc6a67d6da0e,2024-06-10T02:52:08.267000 CVE-2024-44682,0,0,5c1099c9946a7bbad39157bc8cb36499b7070c93884284356ba775c02b16ef60,2024-09-04T16:38:36.817000 CVE-2024-44683,0,0,3331119c07881f90997c72dc65301a112931dc9af3d318f7996e768fd590a104,2024-09-04T16:41:01.467000 @@ -259629,6 +259648,7 @@ CVE-2024-44819,0,0,fb850f7977d16cbee039f22251cb3645c89cd534504aa87478038b012f6c8 CVE-2024-4482,0,0,30c719bdf44110f5d77595f668147507c21a010645f412257434e159bd101a38,2024-07-03T18:24:41.627000 CVE-2024-44820,0,0,23715176f3bb998fe09881aa49c8309f9c9998e3ed78bd103540e1e82782315e,2024-09-04T19:35:13.010000 CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000 +CVE-2024-44825,1,1,e304323bbce544570d1744d27864d02d670ecce24748a6cd994315f8f7256714,2024-09-25T16:15:10.187000 CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000 CVE-2024-44837,0,0,18c58708dc7b004f14a9bc90ac21fd88d28a642d1b4f00511d7bd006e7eb4f62,2024-09-12T16:17:57.797000 CVE-2024-44838,0,0,bdab5f75d8cb8f6b0603423cee486234c8e916846deeaf4e5d878bd69f318676,2024-09-09T14:35:06.773000 @@ -259913,7 +259933,7 @@ CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebf CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac208e0,2024-09-03T19:40:46.783000 -CVE-2024-45311,0,0,e1c89e007360c82e1c247aeb49c5c1a5ea2214c99aed5f47bced78ef186e4d38,2024-09-03T12:59:02.453000 +CVE-2024-45311,0,1,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2befc3,2024-09-25T17:03:36.817000 CVE-2024-45312,0,0,4476866c9a0b7f514de1f948afa080c627a68be3fca1f01a9754ac6804bbd59a,2024-09-03T12:59:02.453000 CVE-2024-45313,0,0,82e38f6d2921c3b3e9a238db6883354f1d86d2d1f780a332f8c54bf5a5667942,2024-09-03T12:59:02.453000 CVE-2024-45314,0,0,2f1c9dd8ac80290a1853d4f2b69fb0ae8e68e38eb15e5edeb668cb7a47ecee3c,2024-09-12T16:39:53.690000 @@ -259953,7 +259973,7 @@ CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a3137 CVE-2024-45407,0,0,761b4924e4b46db1752cf42f388ca76c7e573211ea8b116cb02c0d2e460e33eb,2024-09-20T16:18:46.717000 CVE-2024-45409,0,0,8d3455cc5d06aa00e7efc9d2b07d7d23ff8f7e545f196a7071950bdb754db616,2024-09-20T14:13:10.700000 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 -CVE-2024-45410,0,0,d97b3f55ffaa7f1c72d1eb4293ac6b508c6644d3210d0f4e5c5139a0826526a8,2024-09-20T12:30:17.483000 +CVE-2024-45410,0,1,aaed882cbb27e3b763a7cf27ed0a68c177e01a433a2f2467dda1cd610cffbe15,2024-09-25T17:39:08.033000 CVE-2024-45411,0,0,9447be5f23a6dce6216fa2fc0d1f4dbe990c7e9c91ca7c4cc6b7685ee626123e,2024-09-19T14:31:13.697000 CVE-2024-45412,0,0,4ebe28fee983ebb500b7770c94cd65bf653ad33a172923a2e65f485408d0f1b5,2024-09-20T16:32:52.310000 CVE-2024-45413,0,0,072ecefbd02221baa97e08c8b2b2cf75fcea808cd89eb8ab6dce8bd1cc6d17eb,2024-09-20T12:31:20.110000 @@ -259979,7 +259999,7 @@ CVE-2024-45449,0,0,16fcc8f3add1fcba18b36fc04f0c4a19c97d176cb514abd9722e7bafd45dc CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000 CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000 CVE-2024-45451,0,0,48b512aae28f050030a3079457d4f6895fe3bb1928b27b88000e380a07e6de13,2024-09-24T22:02:48.057000 -CVE-2024-45452,0,1,4047a805b68a8ced2844a8ca7ba17139f576bc1b78cfe202a5caf646808b8ca7,2024-09-25T14:19:17.113000 +CVE-2024-45452,0,0,4047a805b68a8ced2844a8ca7ba17139f576bc1b78cfe202a5caf646808b8ca7,2024-09-25T14:19:17.113000 CVE-2024-45453,0,0,bb3a8aaa7954777d3aa9635504c34c96f8cc4336ef5a6f0756ed7dd58888f5e4,2024-09-23T01:15:11.923000 CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000 CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000 @@ -260038,7 +260058,7 @@ CVE-2024-45606,0,0,3387cf6bafc97f34cf884f7ca0b4f85a8bd2d59f53c4b0d6b1c8b12f643f3 CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 CVE-2024-45612,0,0,3e30286b1d723ddfef1522eda155227a0e1e8c66d0b8dce0d9a777734913d222,2024-09-23T19:33:04.650000 -CVE-2024-45613,1,1,8ae1f326ec208cdb879174826b69c78543fdb5244b75318a9385cf06c6383d99,2024-09-25T14:15:05.303000 +CVE-2024-45613,0,0,8ae1f326ec208cdb879174826b69c78543fdb5244b75318a9385cf06c6383d99,2024-09-25T14:15:05.303000 CVE-2024-45614,0,0,a4bd2872c46f9cbb2c0f25769a726f94bca2a9c47d47af3e4cd0649a5803ebb7,2024-09-20T12:30:17.483000 CVE-2024-45615,0,0,c6d6282e5a9613bcbeb55c568082301f30c66c5c3e170d6aa78e0325f2dae6b9,2024-09-13T19:21:15.423000 CVE-2024-45616,0,0,ec4ff704ba2aae95f08442d1bfa2173f2a102c1c3b0570dfa4cb1518cb449547,2024-09-13T19:21:11.507000 @@ -260074,7 +260094,7 @@ CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df6109 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 -CVE-2024-45752,0,0,c0805cf3ab6310e7a4b6dbb56a1c3b55ab51506387ae9690f4eec83bbec021e5,2024-09-20T12:30:17.483000 +CVE-2024-45752,0,1,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4a91,2024-09-25T16:54:27.520000 CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b36f,2024-09-20T12:30:17.483000 @@ -260097,8 +260117,8 @@ CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd CVE-2024-45803,0,0,229c857bfa292cdb0ba4078b3fbf512c465922b11345a00889b8daf4243936d0,2024-09-20T12:30:51.220000 CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000 CVE-2024-45806,0,0,ee7bdd929f099bc0d44c29c8857730257f438aed487ae0ce57760928a6cdb1c9,2024-09-20T12:30:17.483000 -CVE-2024-45807,0,0,0583ab979f5125f3c1777b86424a8cca2418c3c516284529f50828ffaa393646,2024-09-20T12:30:17.483000 -CVE-2024-45808,0,0,fcd02d4bc62e64bc1e1b5e25085baa0bdf51fdc7c6386ccd327c0759771739d2,2024-09-20T12:30:17.483000 +CVE-2024-45807,0,1,109f977914214954b1d4c58b77a41ab231481644c3f0d5e0c1a61fe3a8137355,2024-09-25T17:12:38.380000 +CVE-2024-45808,0,1,e0b8548e8c97a2dbe35aa53aed4f22546b5e8aaa33f6c0d1789ad77d012310d8,2024-09-25T17:18:38.823000 CVE-2024-45809,0,0,61a35443140d3227d7a81e1d73cdcea190bec5c7e8b6089514de0625aa5d92ef,2024-09-24T20:12:24.597000 CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000 CVE-2024-45810,0,0,2c07def9e565fb1be9ff61f66b9422d8dc435c56937db2ea8df79036719b50e7,2024-09-24T19:48:22.993000 @@ -260163,7 +260183,7 @@ CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000 CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000 CVE-2024-46085,0,0,c40bf34999e41384db415b4f8361df5bc1a972c059bfcf483e35e9bef50d8457,2024-09-20T12:30:51.220000 -CVE-2024-46086,0,0,ae34b30986f1e813f622cb2d55126bfe93452e0dc2a10c54d34629700e751404,2024-09-20T12:30:17.483000 +CVE-2024-46086,0,1,504c7f52322e487d2224c0cc449e69a05fcab67f7a93912f7189c1bccd5d3802,2024-09-25T17:08:41.937000 CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000 CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000 CVE-2024-46101,0,0,6828af36bf86aa04495e4dfb6987906e20dd439d909b318b0c5a57e63a82dc68,2024-09-23T16:35:10.900000 @@ -260200,9 +260220,9 @@ CVE-2024-46375,0,0,efaf3c452fc78cd47f1de30f27156020a55e9f97430000be5918d84fee1df CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406ddbc,2024-09-20T12:30:17.483000 CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000 CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000 -CVE-2024-46382,0,0,d58e1ea27f21cfd47bdd0489944511f3488ae805b6df4b21cae37b2aaa67b3bc,2024-09-20T12:30:17.483000 +CVE-2024-46382,0,1,65cd8f8715b62b5a7598d3b8d6186f6e2f4b087b931ac8f129c8f64b10f1fd55,2024-09-25T16:56:09.927000 CVE-2024-4639,0,0,63d049eee594beebe77a9774e9d66b077e03fa99e5b29364c893c36c24e6ccaf,2024-09-18T15:46:04.960000 -CVE-2024-46394,0,0,0cb3fe3a4b01a54d8b30c75c71beb8830d2ea64caa3449cc0a9fec5e06be42b1,2024-09-20T12:30:17.483000 +CVE-2024-46394,0,1,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdadeb1,2024-09-25T16:55:15.023000 CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000 CVE-2024-4641,0,0,d2927a28c50e25615b8d9b87dbdc2988c0bb0a134e471834d0fabc4f24e49cb1,2024-09-18T15:52:41.237000 CVE-2024-46419,0,0,75fafdfe43d678734223982a9d05d92176b9e138ef313759af24f79de1b289e9,2024-09-17T14:35:29.797000 @@ -260213,9 +260233,10 @@ CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f63 CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000 CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 -CVE-2024-46461,1,1,f949e3c7d0307650b2b581379586a85548caee32fedd5af683baadd63f1ad7ee,2024-09-25T15:15:14.567000 +CVE-2024-46461,0,1,4f9c282e8057127f22e248b90d1ef5c3b5c716273014b14b60a6a7a677e1d503,2024-09-25T16:35:11.207000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000 +CVE-2024-46485,1,1,192fccce7e4c850555d8027544c000d2a64eb08a31da8a3df369bd9a155b6577,2024-09-25T16:15:10.480000 CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000 CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000 CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0b9,2024-06-20T20:15:19.353000 @@ -260263,6 +260284,7 @@ CVE-2024-46596,0,0,ad9c8b28bdb98700f500b3744a438a4de82660bb3bab40faf707c89a0cad0 CVE-2024-46597,0,0,8f236358fa12b20d7d532e9a104df6fc7e0ce7ec4a140308bc23ebcdc16146c6,2024-09-24T16:41:09.457000 CVE-2024-46598,0,0,3f997be93c6377cc697c394dfc90ddad6cd8938191b35fea7934308cfcf432e0,2024-09-24T16:37:39.833000 CVE-2024-4660,0,0,e2da4ceee6df96a1cb7e9b187d6ffc85e3946e3cc1d921567db2bce412f91772,2024-09-14T14:57:01.130000 +CVE-2024-46600,1,1,796b956cc90816ef5f688a5e37639916bc0b1b4cbf15f16e1ba2248001158de5,2024-09-25T16:15:10.707000 CVE-2024-46607,0,0,cc46b152bf69541e766834cf176ccd6cc18aaf0dab610626c49628432d135ce7,2024-09-25T01:36:58.367000 CVE-2024-46609,0,0,1ff591f5894bdb57c3fd575159ec489820cec83d50f025633c8daed9e36be2a6,2024-09-25T01:36:59.080000 CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000 @@ -260457,8 +260479,8 @@ CVE-2024-46978,0,0,3012612591065cdf72fb760bb9d34692ccfd8a93c66cdc7533522797108e3 CVE-2024-46979,0,0,bd5b4b491d76f1da7f15e1f5aed6e68afd31ea61b239078722a0e41874b565fd,2024-09-20T12:30:17.483000 CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000 CVE-2024-46982,0,0,3d9f669d24afb928408eff7284c81bba148f4b4b0d8de4608d668ca1c9286073,2024-09-20T12:30:51.220000 -CVE-2024-46983,0,0,acaa55f24871e509b77d1e06f663550a224b0f8e1fdd17d482c575b8d54a8432,2024-09-20T12:30:17.483000 -CVE-2024-46984,0,0,a2d03b7a5561555bfe246598e474bdc74be23a5595876ca1a73ac153425b0c5b,2024-09-20T12:30:17.483000 +CVE-2024-46983,0,1,ec8817c062e2bbc441fd890e19bc6c98486be5ca90653148f7abcab9b4d72f76,2024-09-25T17:46:48.927000 +CVE-2024-46984,0,1,8ed08a9f75ebb534fe57273695d27a9994db3769e0e07c54bfc9165453c74828,2024-09-25T17:49:17.007000 CVE-2024-46985,0,0,152de56e5c06dc44c656be325fda3eba217d7b9fb216b9fe4063b28a1b887280,2024-09-23T16:15:06.097000 CVE-2024-46986,0,0,b1e8ecab8ee8344e09d3e8f66f5ec81add204bc763f66591964d8fcd8895b71d,2024-09-24T16:30:55.167000 CVE-2024-46987,0,0,3e51e4a66f91f3c1a320e0df76dd0f9bd2a4c4e56143ff227719b395a8a10371,2024-09-24T16:27:30.457000 @@ -260482,13 +260504,14 @@ CVE-2024-47050,0,0,5ddac1f8a8053f0642ae4dbec5cd7e9a4084918d6fb4495768633d435a3f2 CVE-2024-47058,0,0,ce9dc8340a8922ed16d37cd23094d408dba7fce77515a97a3b8ba24288e2b02f,2024-09-20T12:30:17.483000 CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000 CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000 -CVE-2024-47060,0,0,c8534b944f9f43cb46cae0367e9011f6cce8af6cd945cedb8784aafc5607d945,2024-09-20T12:30:17.483000 +CVE-2024-47060,0,1,3723bb9e2990e983919d891a0f942a097942693d70a5d147a7a34b2c3bd8fa94,2024-09-25T16:43:47.267000 CVE-2024-47061,0,0,d35d800a552506cce8d336a186cda281a21c1486ce173d69e2a8d12e34d7b412,2024-09-20T19:15:16.550000 CVE-2024-47062,0,0,a27f6919fd132abe1f68377588675b20d8c353d333cc16869e3ce560cb8d5962,2024-09-20T19:15:16.760000 CVE-2024-47066,0,0,0fd04bf0fe851ef804f709f0494f681003c7313c34ecad7109c91c0118ecc040,2024-09-23T16:15:06.670000 CVE-2024-47068,0,0,1c0fa32d3c7c90f5e402559e77504a06792de39e051b9b551e0baa1ab20aac1b,2024-09-23T16:15:06.947000 CVE-2024-47069,0,0,01aba5c1f723ce4512d27371a66e8599350ee54993b802af859bc0ddfe251b04,2024-09-23T16:15:07.160000 CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 +CVE-2024-47078,1,1,8149292b607148477453ddc01685f1722913cf66efc81f82a1d0e788c5dc7bf0,2024-09-25T16:15:10.907000 CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000 CVE-2024-47085,0,0,612c4ee1afdc108ee26a19ffa4ef99d7ce5dec79600533d571ae4fcd8b698a7c,2024-09-20T13:15:18.703000 CVE-2024-47086,0,0,19622658bc16613a77f76eedbc221d6bedafd71c37603778fc455e0fbce10980,2024-09-20T12:30:17.483000 @@ -260515,7 +260538,7 @@ CVE-2024-47210,0,0,0912a487d5daeed626dcd74f4415cecd1eb468c441d638b636aa1a85523b3 CVE-2024-47218,0,0,282809bf9fbf4fe32ac58189d7505fcb23fd7fbf82337654d318e4cf55ce811d,2024-09-23T16:35:14.730000 CVE-2024-47219,0,0,f0a9ad83025607df7abe898ed6aca97a5bcbe21c309d715694757e39cfd2aaff,2024-09-23T16:35:15.607000 CVE-2024-4722,0,0,d0eb70616d7559be2944527d8cacda4cb03faa787985cf2ceace067dd7c5ef1c,2024-06-04T19:20:47.553000 -CVE-2024-47220,0,1,daf529d73f7ddf35861135b59755de956602c48e032cbc5022c4f4e726ff7007,2024-09-25T15:15:14.653000 +CVE-2024-47220,0,0,daf529d73f7ddf35861135b59755de956602c48e032cbc5022c4f4e726ff7007,2024-09-25T15:15:14.653000 CVE-2024-47221,0,0,a39f783e0f1837714118df09b4ab8d238e18d056086adb1e01ef68294fa04896,2024-09-22T01:15:12.013000 CVE-2024-47222,0,0,91d32f3eb46664421f317c4ce1a08c39837b1d65e0376c618bfc415d4bbf17ec,2024-09-23T20:15:05.493000 CVE-2024-47226,0,0,1a012385db8ac429d656612487127291792ff2b1003cc416b62a404a726b12b7,2024-09-23T15:35:09.070000 @@ -261036,9 +261059,9 @@ CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc6 CVE-2024-5297,0,0,d1218091e3a48aa0835b7de76e914f2fa4d051775431f4beee97941e4c178297,2024-05-24T01:15:30.977000 CVE-2024-5298,0,0,751024870f0005efd62d8664aa885c619c01fff4fc9d9e46acd3d648d421b0e1,2024-05-24T01:15:30.977000 CVE-2024-5299,0,0,ec4fa401441140dbf77742461a619e82e80b0b3301518890cfd68e9b147d30dc,2024-05-24T01:15:30.977000 -CVE-2024-5301,0,1,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000 -CVE-2024-5302,0,1,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000 -CVE-2024-5303,0,1,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f886,2024-09-25T15:24:18.680000 +CVE-2024-5301,0,0,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000 +CVE-2024-5302,0,0,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000 +CVE-2024-5303,0,0,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f886,2024-09-25T15:24:18.680000 CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000 CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000 CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000 @@ -261688,10 +261711,10 @@ CVE-2024-6057,0,0,4f1880d8a457c0154151497f14a41bdfe090560f87d7d21e18d9c6ac0683f1 CVE-2024-6058,0,0,34aeceda11f80f38d584c0391ccaa9eb6fb38bf947af47d43e1b576e9ff3c1a5,2024-09-23T22:40:42.487000 CVE-2024-6059,0,0,a3f22e86cf3480d835f2079aa405ac75308d3d1b370e70dca18b2cc307b4486b,2024-09-23T22:44:27.003000 CVE-2024-6060,0,0,8504cbe6b891066e73ef95904dad6e7d3e41cca53b5727c2ba7b2242343c8b03,2024-06-26T15:15:20.570000 -CVE-2024-6061,0,0,7f7515a9103fe150db8d8da13e6a9c9caaab344d369b5c8dd58076cec7cacc3f,2024-06-20T12:44:22.977000 -CVE-2024-6062,0,0,808f4f8498f1342bcb60477c52f8c9df70bfd9d854975b3c8c0875386f5a1f2d,2024-06-20T12:44:22.977000 -CVE-2024-6063,0,0,981173af34d136f2acefe4974764928b03bc5b536dcdb29e6c8460ed6390b915,2024-06-20T12:44:22.977000 -CVE-2024-6064,0,1,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d7e,2024-09-25T15:08:46.537000 +CVE-2024-6061,0,1,151803bcf8181dcb11e03e1de82c118e69912ea600cf1a22cb1783b56d65c969,2024-09-25T16:16:22.767000 +CVE-2024-6062,0,1,4c0ded0dd1566290ba82dc0979160dd224c76b88a1bcf6bc8aea8e2120b444aa,2024-09-25T16:13:02.947000 +CVE-2024-6063,0,1,85570a1de271fc269e6ac5f76ecfe5f776f0b719a051060f0436f23007cb3bab,2024-09-25T16:01:30.283000 +CVE-2024-6064,0,0,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d7e,2024-09-25T15:08:46.537000 CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000 CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000 CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000 @@ -261764,14 +261787,14 @@ CVE-2024-6143,0,0,50d98a1107b40d9a9120354bf65b97279c6a391f3808857927fc082a7672d1 CVE-2024-6144,0,0,986963a6d8390183315f5e4b05c1a7ccbe7adf88886470ba54215e7b581f9e45,2024-09-19T17:48:27.787000 CVE-2024-6145,0,0,47781cdc64b4bf358cba8739f98a25efcf279cc48fd67a8f163c643617634fb1,2024-09-19T17:50:17.250000 CVE-2024-6146,0,0,248d042ba627ce9e58705ded112d248d6f560cc43a25ec55e54c7100a6195401,2024-09-19T17:50:48.247000 -CVE-2024-6147,0,1,db2ce187f9efb973dad5a788ee3407e3ef389a31e13ca493ef84c0a33e1e2b14,2024-09-25T15:29:33.477000 +CVE-2024-6147,0,0,db2ce187f9efb973dad5a788ee3407e3ef389a31e13ca493ef84c0a33e1e2b14,2024-09-25T15:29:33.477000 CVE-2024-6148,0,0,0d880e6b6ac71f1aa1894a805c806f3c97327dea504b66e4e22e92cfc0d33c58,2024-09-05T17:51:48.560000 CVE-2024-6149,0,0,395390c0a4a5af6048ec84a02f15cc9b9a14b14eb29f0028558366dc9a6418d3,2024-07-11T13:05:54.930000 CVE-2024-6150,0,0,30b18aa77850d40723cb96c8947a52293009392d2d627d33f4d73aaa85165004,2024-07-11T13:05:54.930000 CVE-2024-6151,0,0,12ec1aee3f7de6ecf0a62e21606cbd6e357a6a7e92793df8af534b3f4e67d73f,2024-08-01T14:00:12.180000 CVE-2024-6152,0,0,c1506a96f086f74002edf68148148e3e99d50eb834b579ad16316f4c018a0385,2024-07-29T14:12:08.783000 -CVE-2024-6153,0,1,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000 -CVE-2024-6154,0,1,dc8e40c1ebb3902f0ae8583b2bff8d4b47a9e71d6b236591b7095fe43b4769aa,2024-09-25T14:40:26.970000 +CVE-2024-6153,0,0,b02d5a7d2cf437976ce0fc2bf9815bd6144fa47956956037cde293abd053addb,2024-09-25T14:44:14.567000 +CVE-2024-6154,0,0,dc8e40c1ebb3902f0ae8583b2bff8d4b47a9e71d6b236591b7095fe43b4769aa,2024-09-25T14:40:26.970000 CVE-2024-6158,0,0,a61a49c74eea3cf7b2f2776e552d3388d81c1dff0a3ef5d79b498d50b6e785a3,2024-08-13T15:35:29.740000 CVE-2024-6160,0,0,ef1a3b3e7f3366ded429b369db1d335204ba1e5aa345b7b6a0087f8051f2471a,2024-06-24T12:57:36.513000 CVE-2024-6161,0,0,4874ef369326f57ebaead3e865a12df6057ceb7ec30e698c3deb9b52e2b10028,2024-07-09T18:19:14.047000 @@ -262071,7 +262094,7 @@ CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08d CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000 CVE-2024-6510,0,0,271701171f98244795ebd972ebc5048aac2cefcf02c3610beea189409c6fb6ff,2024-09-12T18:14:03.913000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 -CVE-2024-6512,1,1,a7f19bb418f3681251a83d8c7152609787c1d8d7aa73dc4d789c2213bedbc546,2024-09-25T14:15:05.560000 +CVE-2024-6512,0,0,a7f19bb418f3681251a83d8c7152609787c1d8d7aa73dc4d789c2213bedbc546,2024-09-25T14:15:05.560000 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000 CVE-2024-6520,0,0,788783a471766cea8e4d7400c47ef97ab3609f9b749a996b82510813b15dd35e,2024-08-27T13:15:39.697000 @@ -262326,7 +262349,7 @@ CVE-2024-6835,0,0,41865b692717ae9a44a610e23697ffc045f0e55e3b334eff49e1f6de971307 CVE-2024-6836,0,0,94c1bcaa18f7036265464de8eba36ccdaae9b63d5d20f60a8cc42904bb485160,2024-07-29T20:20:30.867000 CVE-2024-6840,0,0,32a3665f80239333fecee34a11f4d8a5f93588e98d39b1a4bfaa2fe487feef20,2024-09-12T18:14:03.913000 CVE-2024-6843,0,0,aec077e7d49dac8e1cb0382a7568b4a4d58cd66583979c6d1347903e4ac17bee,2024-08-21T15:35:12.407000 -CVE-2024-6845,0,1,7827ce1657e31797f4aef8976c6c66910fefbb9b9f9e4945938f09c5cdf43568,2024-09-25T14:35:07.500000 +CVE-2024-6845,0,0,7827ce1657e31797f4aef8976c6c66910fefbb9b9f9e4945938f09c5cdf43568,2024-09-25T14:35:07.500000 CVE-2024-6846,0,0,3f14d31d382a54a260125fd51294d960031d5921ae608f837ae240e5738c3bfd,2024-09-05T14:35:26.730000 CVE-2024-6847,0,0,3aed5f2ad75c2a50eaefca5c72002315f9d747456f8615efa188f54be39bf54d,2024-08-20T19:35:15.040000 CVE-2024-6848,0,0,e171c12c58967922126feefb09977b436bb9e206684562a37899ca6ed3e35d20,2024-07-22T13:00:31.330000 @@ -262598,7 +262621,7 @@ CVE-2024-7202,0,0,cd873862dd9c581add7def3fb09e4d862139cb04eed28a9bf2f7047259aa2b CVE-2024-7203,0,0,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000 CVE-2024-7204,0,0,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee3314,2024-09-11T14:23:45.127000 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 -CVE-2024-7207,0,0,20818f32fe2bb704fccc065021bd5b1db8e154a6eefd90303159ea299821a11a,2024-09-20T12:30:17.483000 +CVE-2024-7207,0,1,7d162a46bdd86c9ef89d18404bf5c26cb639ca8d9bf2e70cc4f9daf2fa9be1a1,2024-09-25T17:51:34.800000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 CVE-2024-7211,0,0,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000 @@ -262740,7 +262763,7 @@ CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c5 CVE-2024-7383,0,0,21277f7530eb9638c0031a3484c43cc9bf1c76998abaa0508791395c60c4cd7b,2024-09-25T01:15:45.270000 CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000 CVE-2024-7385,0,0,c57dfb846ac8f152b5875b81a1392f19fcb3046476cadb54527484a942b703c1,2024-09-25T04:15:04.343000 -CVE-2024-7386,0,0,4c1f6d2483cfeb3382ddce98f82fb67cba67b1b578ddf17650f44be8ada6a812,2024-09-25T03:15:03.040000 +CVE-2024-7386,0,1,b6fcae623722156be1d966117ebd44659745a67ca97bc3d715d748d574115653,2024-09-25T17:15:19.110000 CVE-2024-7387,0,0,de7380b259c5cde0120b2e8a809f8a10a35a7d4a44cb8d5f57cbb1470484b8a0,2024-09-20T12:31:20.110000 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 @@ -262753,7 +262776,7 @@ CVE-2024-7398,0,0,bf74324d9583b04acd6d5dc12af363326e45b9b81ea7ee42ac5be4e61135b6 CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 -CVE-2024-7409,0,0,e8e22839b7fd24bdc388f23e2aa2e7fb387a8147f142fa0225fbb8ea758f0461,2024-09-25T05:15:10.570000 +CVE-2024-7409,0,1,f8780d25575ceaa72bb05ea56c673e2b6be1f1e6ecd77c7a6074e31ef6bc0967,2024-09-25T17:15:19.213000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 @@ -262763,6 +262786,7 @@ CVE-2024-7415,0,0,635de2a957d86d33c8ae8c57c08ec9a59fa790990e371bc472902145ad47b9 CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000 CVE-2024-7418,0,0,6785004d3e0c8a7d4acd7be47cb26ee53d058e1a0fbb989539468dc8c9c8a1ec,2024-08-29T13:25:27.537000 CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000 +CVE-2024-7421,1,1,2c1c293c95b00638950ab173ba2dc5d75a1e850cb77059843520ad17507f1a2f,2024-09-25T16:15:11.187000 CVE-2024-7422,0,0,36692ebd2df61833999819382a06fe94bffc446bd5a7ed95f5ad6f2f1be17d62,2024-08-19T13:00:23.117000 CVE-2024-7423,0,0,dc92034a31c1fbf241740bc9981c3c0234f0876c05ddbb1f303f7596381e5810,2024-09-13T16:37:22.997000 CVE-2024-7426,0,0,23a5f2b77efdcf0501e79df7e4cead37c98398874153961f722e2b924fe930ef,2024-09-25T03:15:03.230000 @@ -262876,8 +262900,8 @@ CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f1 CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000 CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 -CVE-2024-7575,1,1,d1edcc53851c456f5b5fe8a36908daf09816d1253eceb08ea52597b6a10ff659,2024-09-25T14:15:05.750000 -CVE-2024-7576,1,1,12b7bb07dd235d7921447b5ad6e6cae0f86c3468ac4ac4f450135757402c9e38,2024-09-25T14:15:05.970000 +CVE-2024-7575,0,0,d1edcc53851c456f5b5fe8a36908daf09816d1253eceb08ea52597b6a10ff659,2024-09-25T14:15:05.750000 +CVE-2024-7576,0,0,12b7bb07dd235d7921447b5ad6e6cae0f86c3468ac4ac4f450135757402c9e38,2024-09-25T14:15:05.970000 CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000 CVE-2024-7579,0,0,a0ae8fffc497f7c325419faf1d1612b2d58409c260f2e266adab0d394e09c9de,2024-08-28T18:26:46.117000 CVE-2024-7580,0,0,42ecba325b4da39abdd4ffa702c3c1ac9ada1ac7a2f4a8a88b82d9e7776d5322,2024-08-07T20:47:00.277000 @@ -262916,7 +262940,7 @@ CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000 CVE-2024-7622,0,0,e8b0a7e738dd27b48509d655a6df73f19572cd065cdf11177fd537747fb3bbad,2024-09-06T16:46:26.830000 CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000 -CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000 +CVE-2024-7625,0,1,4f5f0ea453f9f08d3ef494db1594d491ac8f8c4407ed3e3b9397d9300e56df26,2024-09-25T16:15:11.307000 CVE-2024-7626,0,0,ab4302f2299005b8f4920df30dd87a3008463f5f96c444122c7e8131dd027b5f,2024-09-11T16:26:11.920000 CVE-2024-7627,0,0,6ac6d3af060539e387faae82d1ad555da11f32786c0cb712e03cd669f141c08f,2024-09-11T16:31:21.893000 CVE-2024-7628,0,0,13c6e75993fc4e0ea638854e2c037e11703f2e05b1bb0a7d2173b121da5472cd,2024-08-15T13:01:10.150000 @@ -262960,7 +262984,7 @@ CVE-2024-7669,0,0,1ab8d834092c7284d64294dd9869665d57807a9389d554f2c75360b4021639 CVE-2024-7676,0,0,7817fdd5f2edbb492448eb9de4bc52ee9c1fd35a5b97e69f44935e966a3aaa34,2024-08-15T18:05:17.853000 CVE-2024-7677,0,0,619a29b11672f1d6182de3fe0ed62cac67fac40890fa3659f2ed393ccafc6a23,2024-08-15T18:06:06.680000 CVE-2024-7678,0,0,7a80ac621ece570be5503c7435c87b024e4d34454346340a478740f49f03181a,2024-08-15T18:06:54.127000 -CVE-2024-7679,1,1,a18a30cfdf41dc6c99217740980fde96799fadf655b1c8b3e8667399a6f35400,2024-09-25T14:15:06.180000 +CVE-2024-7679,0,0,a18a30cfdf41dc6c99217740980fde96799fadf655b1c8b3e8667399a6f35400,2024-09-25T14:15:06.180000 CVE-2024-7680,0,0,4742cee85d7df5fbe02ea5ecd61db4452ad7db3d8ef0db88ef67139768aab176,2024-08-15T18:08:52.780000 CVE-2024-7681,0,0,e6c1e7782509f60074b687569285020e895fcc1fd23e8fb399f4f22e032de697,2024-08-15T18:09:55.887000 CVE-2024-7682,0,0,8dbcf53cb3ad3a4e3e6c93fa0edfe498b656bd897e790189cda42acfe0f7b35c,2024-08-15T18:10:41.557000 @@ -263102,7 +263126,7 @@ CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254fb2,2024-09-04T13:05:36.067000 CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000 -CVE-2024-7878,0,1,12502179334adb04b735c4035e0e77a9e1b2c17baea755ae2cd695609e776c25,2024-09-25T14:35:08.010000 +CVE-2024-7878,0,0,12502179334adb04b735c4035e0e77a9e1b2c17baea755ae2cd695609e776c25,2024-09-25T14:35:08.010000 CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000 CVE-2024-7885,0,0,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 @@ -263111,7 +263135,7 @@ CVE-2024-7888,0,0,2881b53b5410d8b7f634ff84d81ce7bcb024ba75858c366b9280d55d99841e CVE-2024-7889,0,0,67539a9ea3afa10e1ef371a140e40e7f2e32fcedee02ec133e59e6ef2a347260,2024-09-13T18:35:18.777000 CVE-2024-7890,0,0,1dded06d7bba5f894e59f4fd824f843aaf6c5f24e5dfcfedb3ff09adc8671b20,2024-09-13T18:35:19.517000 CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000 -CVE-2024-7892,0,1,40974c0cc57d40137303f2cc20edb34ed2ea852cc275daaa8e4e4a536c4f74f5,2024-09-25T14:35:08.167000 +CVE-2024-7892,0,0,40974c0cc57d40137303f2cc20edb34ed2ea852cc275daaa8e4e4a536c4f74f5,2024-09-25T14:35:08.167000 CVE-2024-7895,0,0,5d06451cedf9987fa35d6bed95786130c1c32b54d5cc7bebb800749e8d9738bd,2024-09-19T22:13:37.097000 CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000 CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000 @@ -263301,7 +263325,7 @@ CVE-2024-8171,0,0,799233d1b504a7fe9d2115d4edb9b50fc766ecc29c803bfb00827a455960ad CVE-2024-8172,0,0,0f560f815e4f982c5fa8dce4e33b1159bf9bccf943a059983fd049dd30da680a,2024-08-27T16:01:35.047000 CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd83c,2024-09-05T18:39:00.950000 CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 -CVE-2024-8175,0,1,c9ce83d87880543b6b1f6b65781f57c06977fbfb0efcc17207428d279365fe63,2024-09-25T14:15:06.400000 +CVE-2024-8175,0,0,c9ce83d87880543b6b1f6b65781f57c06977fbfb0efcc17207428d279365fe63,2024-09-25T14:15:06.400000 CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 @@ -263382,7 +263406,7 @@ CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6 CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000 CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000 CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000 -CVE-2024-8316,1,1,3b42763453abe342c15e1dbc53e93aa928ecf8224136bb2240e47174bd766b15,2024-09-25T14:15:06.550000 +CVE-2024-8316,0,0,3b42763453abe342c15e1dbc53e93aa928ecf8224136bb2240e47174bd766b15,2024-09-25T14:15:06.550000 CVE-2024-8317,0,0,75ca94f8a803caa3f0996235375e7a6ab4757d251a8a35a9b32dc3ad55213ecc,2024-09-11T17:46:03.753000 CVE-2024-8318,0,0,5a1c058346165498258e6a0dbcca1e25ab26db572376e8715726de97a7feed6e,2024-09-04T13:05:36.067000 CVE-2024-8319,0,0,19bee7e43deb1719502aef7eb4c05b0fb28cffea0ae04999821f01ddbcc0e265,2024-09-03T14:43:13.787000 @@ -263414,10 +263438,10 @@ CVE-2024-8347,0,0,14715b4855076c65c4bf21be6c68b62e0d22e8650a0e63bf9f5074414663f3 CVE-2024-8348,0,0,d08ea1deaed5cbc2f4a773e843468145326bb3a1da186780c7ff7b6cd74aae9b,2024-09-04T16:43:30.310000 CVE-2024-8349,0,0,762716c9d0bc6d56996439d82b0700c4d3e5025adbe1204930418276cd28da7e,2024-09-25T03:15:03.817000 CVE-2024-8350,0,0,dde82d4ddd4aa970a610f22c7e95d262bb72ed6249cce87c1a47dce023dc0c5b,2024-09-25T03:15:04.013000 -CVE-2024-8354,0,0,c1d02a1fc95123a7759961217f307a83eec87733739438039b5b9ddbf5c0d461,2024-09-20T12:30:17.483000 +CVE-2024-8354,0,1,0cb564ed9384fcf3167b4bc2e43f53ae9109518b7fd9476c53aef4e78eb45a15,2024-09-25T16:58:59.537000 CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000 CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000 -CVE-2024-8364,0,1,7767c7c95e089c6b038abf689ec85904f48b602f94f00381bdc8869619571039,2024-09-25T15:08:08.503000 +CVE-2024-8364,0,0,7767c7c95e089c6b038abf689ec85904f48b602f94f00381bdc8869619571039,2024-09-25T15:08:08.503000 CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb9547d,2024-09-04T14:37:03.543000 CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000 CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000 @@ -263570,7 +263594,7 @@ CVE-2024-8656,0,0,fc862011d1e771531d08fceed2dec553d3fda9d67ee9f88d486fa676eb49a8 CVE-2024-8657,0,0,a0c9190bdc2cff5290512f4637b68def1b96889903d32a46efeb60b6ec8d0b09,2024-09-24T02:15:03.937000 CVE-2024-8658,0,0,06204177bb4a7af3778696973ba542cc2cefbf3c1b07867e6b255ad7ff0f87fa,2024-09-25T06:15:05.797000 CVE-2024-8660,0,0,e1cfacda5ac49937121e76566dcec30a46275de6b23ffe4cf313c4cb8bedeacf,2024-09-23T23:00:00.437000 -CVE-2024-8661,0,0,0afd1b1d511a5cb974c5ec483781301a64c5aef2b66e34c656ba899fea9e8652,2024-09-20T12:31:20.110000 +CVE-2024-8661,0,1,5b5eb9186f84a6299e6266b90655b3635cbc98e54795da81756013706cf03752,2024-09-25T16:15:11.420000 CVE-2024-8662,0,0,e073f824c2d6ac151923027c9c193587423576a62a0ff2f5ffd111c7dd804c8b,2024-09-24T02:15:04.150000 CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000 CVE-2024-8664,0,0,2555823c9f06fc746960b11f9d47a03631001b4434e03f9cf5f8083f2818653d,2024-09-13T14:06:04.777000 @@ -263640,7 +263664,7 @@ CVE-2024-8796,0,0,85a6dfb5fb230c10b66238538bd5fe186ab9999598b67e5deda1ed4d1b78b2 CVE-2024-8797,0,0,ba4df0bb11568fe010be4c16334a8844a03d9d0d5268879bae12ea87dcdf4b9f,2024-09-14T11:47:14.677000 CVE-2024-8801,0,0,f1edc9c7bb1482d2f7aa53a58527c89ff09517b0d8b72cf3ccbe7bbb09f96d53,2024-09-25T01:15:47.050000 CVE-2024-8850,0,0,16d3ef25e9e3c3a395e24ef62b53309c976d74bdad746efe4904407697f24dbe,2024-09-20T12:30:17.483000 -CVE-2024-8853,0,0,9f4483af2fc4525065d6409c29e78f86f7ea099a8bfb3db8a350d2fbd96a1485,2024-09-20T12:30:17.483000 +CVE-2024-8853,0,1,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000 CVE-2024-8858,0,0,0d529df68aab7882afa1c5531609cd4c3cd7930c85ebac7f6f37123e0eea3aa1,2024-09-25T11:15:12.730000 CVE-2024-8862,0,0,d2fbbde6c386af624a5ae935a7a4eac6c09ff6dabefe8b3cf0bd8d2bf80b0d66,2024-09-20T15:47:10.697000 CVE-2024-8863,0,0,1a5131e94b007579c37dce9de5dfd5f9d496b886a484aa9376e9e793818d4aa7,2024-09-20T15:43:43.927000 @@ -263655,7 +263679,7 @@ CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97 CVE-2024-8877,0,0,ca152484093e8941c510114c5a75373aafb04159b9ed70f8060e78345e32ca9a,2024-09-25T01:15:47.267000 CVE-2024-8878,0,0,707cf93e5a7503257afc68dc8487c96c746d12a7de1aacc95f6adecb7e600fdd,2024-09-25T01:15:47.367000 CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000 -CVE-2024-8883,0,0,acc01ec9c3f72dcdfde915e68c8076ac17eb948c45b5a812494bde62dc939653,2024-09-20T12:30:17.483000 +CVE-2024-8883,0,1,9cef595db799db08b678f8a28be821702773d1b0045d378f8c6e0ef2aaaa99fb,2024-09-25T17:17:35.637000 CVE-2024-8887,0,0,a3051d5be0b46f2e314e247c4baa7ed0aa876885e0f5e30506d6e71c9b64e9ac,2024-09-20T12:30:51.220000 CVE-2024-8888,0,0,d3d200e7933cf93bb4518f85255c1552ff25ba2dbbac181116d14fe38ef319f6,2024-09-20T12:30:51.220000 CVE-2024-8889,0,0,409f189e1cc8763baf41f6d7663087a2138f3ee0ecad616a441fc7d44385c004,2024-09-20T12:30:51.220000 @@ -263690,21 +263714,23 @@ CVE-2024-8956,0,0,469912f1c3a233b9c6103ff1ea98b03260e653e6a7cf65fa430bb18bb060e2 CVE-2024-8957,0,0,479bb87a5ce094312d7bf571ad4a1b1d6922673dde5733f096aa7041bc35da67,2024-09-20T12:30:51.220000 CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000 CVE-2024-8969,0,0,98dd6be27cce2c3412495467ecb9257ef6e673bce29c0f376bf0c342ca11f9e9,2024-09-20T12:30:51.220000 +CVE-2024-8975,1,1,09581c4f612b5af5f25f7cf22169e176a6949f69ad636faaae54b2b14ed3fb9b,2024-09-25T17:15:19.360000 CVE-2024-8986,0,0,072cf1f180fb390d1b4b3d2d50dea4c4259a9c38757ddb70b883e21ef9d81f01,2024-09-20T12:30:17.483000 +CVE-2024-8996,1,1,80bbc2f5b6da65d55d73c450f7cd2a94bda747da45ca34191f950fbff2673585,2024-09-25T17:15:19.567000 CVE-2024-9001,0,0,3414d6649893c69be27afcf1e3dc2327433e2ecaa7ac9013879a0b1b05bf0f03,2024-09-24T16:14:30.190000 -CVE-2024-9003,0,0,89e492cdf9625bcd402f2d372b84ed9d063d82d6c6e605d6ac046e5c4fddcb18,2024-09-20T12:30:17.483000 +CVE-2024-9003,0,1,7fb287df6f780d926de841fbcfd340e6c80a68c0faa41b54a6866e1139b43c05,2024-09-25T17:18:44.523000 CVE-2024-9004,0,0,94d0f2582229b176f297294b273867d83b4f75c60353b6fab8e5029183cf84e7,2024-09-23T17:29:20.827000 CVE-2024-9006,0,0,805559a09583efeb06925be384f63cc093facd6e855c0ba9fc2043765aba904e,2024-09-20T12:30:17.483000 CVE-2024-9007,0,0,581c2ba65ec659d9c22f4f8880fffa59f82f1fd7135c7acfcd1cdb0e2069fea2,2024-09-20T12:30:17.483000 CVE-2024-9008,0,0,52622a85f30c63eabac86e540eb777bb56ea4ab0b052ff445cc04b0bad1ec80c,2024-09-20T17:01:23.517000 -CVE-2024-9009,0,0,a24093e7453ee5daa60bbd1d07887893a23817bdecb379704d3ec4c3a657d4c8,2024-09-20T12:30:17.483000 -CVE-2024-9011,0,0,03481aa1fc23d04f5f01c277cb1ccbe773851297a61a74ed2c552453b357c9ed,2024-09-20T12:30:17.483000 +CVE-2024-9009,0,1,8ca9aa7668c5d5c77c4f8dc75f965a1fc61562deadeb769eddb6e3d475ae864f,2024-09-25T17:46:59.077000 +CVE-2024-9011,0,1,31757df34dd4fee90035c8c1e734eec12ab6ab10926115bc714ff7e9ad5eeaab,2024-09-25T17:48:14.820000 CVE-2024-9014,0,0,689b3f70b90906bf8ba0602332ae74caaaa0c51086cb80a3227272766ee5db1f,2024-09-23T20:35:16.443000 CVE-2024-9024,0,0,ce1bb5c58ae8358f32b8d7a74d1640e1cb3618b27a26351c51ff86354e3cfa3d,2024-09-25T03:15:06.237000 CVE-2024-9027,0,0,fcb1425076b717576a38c922e16397fccba079ed4817a8340fd7f86be38aeb10,2024-09-25T03:15:06.440000 CVE-2024-9028,0,0,4474f0826e6fda308b8dc8e7d1eb64f116bb3b00c60f0de54c4d42c1285efa77,2024-09-25T03:15:06.643000 CVE-2024-9030,0,0,06f92f25693230afc97260d22c777bbfe25a871139888d95fb2f2cc017b0e468,2024-09-20T12:30:17.483000 -CVE-2024-9031,0,0,06ab539213d5e8c28cdb0c2ff261c49fa2a6eb4969ae007f2d88a0f9b5124cf9,2024-09-20T12:30:17.483000 +CVE-2024-9031,0,1,a2a75f47877f3d25b358bad394fac156601d3202f3a82ad425179531288fce65,2024-09-25T16:52:25.327000 CVE-2024-9032,0,0,8becc8e05b7d6005b24bf74218ec0dbc532806e337cd797ce3550c4bccf0a3b2,2024-09-20T17:04:51.490000 CVE-2024-9033,0,0,5feaed785b91c629da8340e233ebf5b8fde7d7489c10a9000a33b1543d92b771,2024-09-20T15:15:18.037000 CVE-2024-9034,0,0,500b1e9b1d1c8149dfed6afb4e1938b7181d08b14d1b288d7a124581dff6ed31,2024-09-20T16:35:05.003000 @@ -263715,7 +263741,7 @@ CVE-2024-9038,0,0,365851023fc9dc6c27186a3ad37cb0026a4a47fee90ed12bdf7b4812e1541b CVE-2024-9039,0,0,087cac0290e47165349fcc9b25a216fd7a16ea1bb358d6d78a77dd7b638c921b,2024-09-20T16:15:06.153000 CVE-2024-9040,0,0,b2e6ba9f70727fa0a7ad666e492a886dd19e8c26da377d2d82938ce54a27f8e4,2024-09-20T17:15:15.240000 CVE-2024-9041,0,0,9b2bb47050dcdd44edd27fd4fde021bb936ec7198fce2f08f9ad2c86bf8bcde4,2024-09-20T17:15:15.507000 -CVE-2024-9043,0,0,81423ab8fcfb05dd45e3302e824ef8ada797ee829706f87e181d341455e8e98d,2024-09-20T12:30:17.483000 +CVE-2024-9043,0,1,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000 CVE-2024-9048,0,0,913e9b0e4b91d6981c8b5bd62134205df1942a32410b4410b939157a5d95c26c,2024-09-21T09:15:04.660000 CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000 CVE-2024-9068,0,0,be88e270964450b7d11a282b84758e1ac87aaad118f1cd23bc3d5a8c454e264e,2024-09-25T03:15:06.830000 @@ -263741,9 +263767,9 @@ CVE-2024-9091,0,0,dd0c4181c9cebd1724087613a8f14499a1c11b7d8978304e7db23b64c9d6b1 CVE-2024-9092,0,0,f51078b662d0fa87f13a1c2b2a8f39772bb1bf1e2106b52a00ceedceb2be97fe,2024-09-23T01:15:12.153000 CVE-2024-9093,0,0,438238c069c5ac6529bb6292011378d5d671dd4896066b5e610aac0da08b63e7,2024-09-23T01:15:12.397000 CVE-2024-9094,0,0,73f29876641967f48e743806e18be47edac1de549021375f728e997ae5717f94,2024-09-23T02:15:02.290000 -CVE-2024-9120,0,0,3fb9bf26157138977c619b0d13d2e77297642ca790cb0830a5ac5b2a29b4a663,2024-09-25T01:15:48.720000 -CVE-2024-9121,0,0,f4d1a3e8a3757a1674ce3b3ceae7895000ad4e29c3524a421368eb201377d448,2024-09-25T01:15:48.797000 -CVE-2024-9122,0,0,f89824f31b2d05d6170ddedf6ec4a64762a0c07d127119629c0d8c6f68aa2192,2024-09-25T01:15:48.837000 +CVE-2024-9120,0,1,efd90f1436929044dd26538c7611ad38f4fdfda28d6aa8841ee126ec10825525,2024-09-25T17:35:12.403000 +CVE-2024-9121,0,1,74d318acd609b4139930cc47677fbcae842185180dabec66aca5919f5136824c,2024-09-25T17:35:13.613000 +CVE-2024-9122,0,1,3f366d19c6c61cc7f3c97129db91d73488397f41c9e80eea311ecf00cb980695,2024-09-25T17:35:15.597000 CVE-2024-9123,0,0,172c86ced5df086b16e63a8a266a4c5ff3fe491725d35f3cb8541fcec31e9312,2024-09-25T01:37:09.460000 CVE-2024-9141,0,0,97f84a42cf7f2b9f57889b2bac4e897bf7424fe08455ac2a5757a2f7675a5b26,2024-09-25T01:15:48.980000 CVE-2024-9142,0,0,b03e9d1b56d58ec574118dab2b1ce3d1ed2fc8b91f932eace62a06c5ffb66458,2024-09-25T01:37:10.240000