Auto-Update: 2024-10-25T18:00:18.940756+00:00

This commit is contained in:
cad-safe-bot 2024-10-25 18:03:20 +00:00
parent 01310edb37
commit ac9ea544fa
62 changed files with 2737 additions and 308 deletions

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30354",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T16:15:08.663",
"lastModified": "2024-10-25T16:15:08.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserWithTeam. Authentication is required. The information disclosed is associated with all registered user ID numbers."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30354",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30355",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T16:15:08.733",
"lastModified": "2024-10-25T16:15:08.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30355",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30356",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:03.387",
"lastModified": "2024-10-25T17:15:03.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by a Privilege Escalation vulnerability via a POST request to /user/assignuserrole via the userid and role parameters . Authentication is required with OE_ADMIN role privilege."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/privilege-escalation#cve-2022-30356",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30357",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:03.450",
"lastModified": "2024-10-25T17:15:03.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30357",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30358",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:03.507",
"lastModified": "2024-10-25T17:15:03.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /user/updatePassword via the userId and newPsw parameters. Authentication is required."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/account-takeover#cve-2022-30358",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30359",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:03.570",
"lastModified": "2024-10-25T17:15:03.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserList. Authentication is required. The information disclosed is associated with the all registered users, including user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30359",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30360",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:03.630",
"lastModified": "2024-10-25T17:15:03.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by multiple Stored XSS (AKA Persistent or Type II) vulnerabilities via a POST request to /profile/updateProfile via the slackid or phone parameters. Authentication is required."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/stored-xss#cve-2022-30360",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2022-30361",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:03.700",
"lastModified": "2024-10-25T17:15:03.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OvalEdge 5.2.8.0 and earlier is affected by a Sensitive Data Exposure vulnerability via a GET request to /user/getUserType. No authentication is required. The information disclosed is associated with the registered user ID, status, email address, role(s), user type, license type, and personal details such as first name, last name, gender, and user preferences."
}
],
"metrics": {},
"references": [
{
"url": "https://cve.offsecguy.com/ovaledge/vulnerabilities/sensitive-data-exposure#cve-2022-30361",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48989",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:10.820",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:02:05.787",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,115 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fscache: Corregir oops debido a ejecuci\u00f3n con cookie_lru y use_cookie Si una cookie caduca desde la LRU y el indicador LRU_DISCARD est\u00e1 configurado, pero la m\u00e1quina de estado a\u00fan no se ha ejecutado, es posible que otro hilo pueda llamar a fscache_use_cookie y comenzar a usarlo. Cuando finalmente se ejecuta cookie_worker, ver\u00e1 el indicador LRU_DISCARD configurado, har\u00e1 la transici\u00f3n de cookie->state a LRU_DISCARDING, que luego retirar\u00e1 la cookie. Una vez que se retira la cookie, se elimina el objeto, se producir\u00e1n los siguientes oops porque el objeto asociado con la cookie ahora es NULL. Corrija los oops borrando el bit LRU_DISCARD si otro hilo usa la cookie antes de que se ejecute cookie_worker. ERROR: desreferencia de puntero NULL del n\u00facleo, direcci\u00f3n: 0000000000000008 ... CPU: 31 PID: 44773 Comm: kworker/u130:1 Contaminado: GE 6.0.0-5.dneg.x86_64 #1 Nombre del hardware: Google Compute Engine/Google Compute Engine, BIOS Google 26/08/2022 Cola de trabajo: events_unbound netfs_rreq_write_to_cache_work [netfs] RIP: 0010:cachefiles_prepare_write+0x28/0x90 [cachefiles] ... Seguimiento de llamadas: netfs_rreq_write_to_cache_work+0x11c/0x320 [netfs] process_one_work+0x217/0x3e0 worker_thread+0x4a/0x3b0 hilo+0xd6/0x100"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.17",
"versionEndExcluding": "6.0.13",
"matchCriteriaId": "42D50790-F3F1-4BBF-8C57-2D40CE73EC80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*",
"matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*",
"matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/37f0b459c9b67e14fe4dcc3a15d286c4436ed01d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b5b52de3214a29911f949459a79f6640969b5487",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-48990",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:10.910",
"lastModified": "2024-10-23T15:13:25.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:03:41.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,104 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: corregir el use after free durante la recuperaci\u00f3n de la GPU [Por qu\u00e9] [ 754.862560] refcount_t: desbordamiento; use after free. [ 754.862898] Seguimiento de llamadas: [ 754.862903] [ 754.862913] amdgpu_job_free_cb+0xc2/0xe1 [amdgpu] [ 754.863543] drm_sched_main.cold+0x34/0x39 [amd_sched] [C\u00f3mo] Es posible que fw_fence no se inicialice, verifique si dma_fence_init se realiza antes de la liberaci\u00f3n del trabajo"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.0.13",
"matchCriteriaId": "307077FA-2651-41AE-A0DB-B92E0E7F5AE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*",
"matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*",
"matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*",
"matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3cb93f390453cde4d6afda1587aaa00e75e09617",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d2a89cd942edd50c1e652004fd64019be78b0a96",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-26248",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T16:15:09.500",
"lastModified": "2024-10-25T16:15:09.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kademlia DHT (go-libp2p-kad-dht 0.20.0 and earlier) used in IPFS (0.18.1 and earlier) assigns routing information for content (i.e., information about who holds the content) to be stored by peers whose peer IDs have a small DHT distance from the content ID. This allows an attacker to censor content by generating many Sybil peers whose peer IDs have a small distance from the content ID, thus hijacking the content resolution process."
}
],
"metrics": {},
"references": [
{
"url": "https://arxiv.org/abs/2307.12212",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/libp2p/go-libp2p-kad-dht",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-46522",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-10-25T18:17:38.147",
"lastModified": "2024-09-11T16:35:16.773",
"lastModified": "2024-10-25T17:15:03.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function deviceInfoRegister."
"value": "TP-LINK device TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin and TL-WDR7660 2.0.30 were discovered to contain a stack overflow via the function deviceInfoRegister."
},
{
"lang": "es",
@ -111,6 +111,10 @@
}
],
"references": [
{
"url": "https://github.com/Jianchun-Ding/CVE-POC-update2/tree/main",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/XYIYM/Digging/blob/main/TP-LINK/TL-WR886N/2/1.md",
"source": "cve@mitre.org",

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-48082",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T19:15:10.780",
"lastModified": "2024-10-15T15:35:14.013",
"lastModified": "2024-10-25T17:15:03.903",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nagios XI before 5.11.3 2024R1 was discovered to improperly handle API keys generation (randomly-generated), allowing attackers to possibly generate the same set of API keys for all users and utilize them to authenticate."
"value": "Nagios XI before 2024R1 was discovered to improperly handle API keys generation (randomly-generated), allowing attackers to possibly generate the same set of API keys for all users and utilize them to authenticate."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6606",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-12-08T17:15:07.733",
"lastModified": "2024-09-14T00:15:13.730",
"vulnStatus": "Modified",
"lastModified": "2024-10-25T16:37:21.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -90,8 +90,65 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.1",
"versionEndExcluding": "6.7",
"matchCriteriaId": "906C9A16-2487-4D6E-B1CE-9B56E146FFF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:-:*:*:*:*:*:*",
"matchCriteriaId": "DE0B0BF6-0EEF-4FAD-927D-7A0DD77BEE75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc4:*:*:*:*:*:*",
"matchCriteriaId": "89CC80C6-F1EE-4AC7-BD21-DB3217BADE87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc5:*:*:*:*:*:*",
"matchCriteriaId": "41EACEA1-FB69-4AF2-BC52-D39489858D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc6:*:*:*:*:*:*",
"matchCriteriaId": "9E1C36BE-F9D8-40B6-8281-5B8F9B42322D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.4:rc7:*:*:*:*:*:*",
"matchCriteriaId": "1D6CAA59-F0EF-4E0B-8C23-EC9535008572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3A0038DE-E183-4958-A6E3-CE3821FEAFBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc2:*:*:*:*:*:*",
"matchCriteriaId": "E31AD4FC-436C-44AB-BCAB-3A0B37F69EE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C56C6E04-4F04-44A3-8DB8-93899903CFCF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5C78EDA4-8BE6-42FC-9512-49032D525A55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc5:*:*:*:*:*:*",
"matchCriteriaId": "32F2E5CA-13C6-4601-B530-D465CBF73D1C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.7:rc6:*:*:*:*:*:*",
"matchCriteriaId": "5ED5AF93-F831-48BC-9545-CCB344E814FC"
}
]
}
@ -112,6 +169,36 @@
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C74F6FA-FA6C-4648-9079-91446E45EE47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B03506D7-0FCD-47B7-90F6-DDEEB5C5A733"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F32CA554-F9D7-425B-8F1C-89678507F28C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "39D345D3-108A-4551-A112-5EE51991411A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4AEBCB-B1E6-4A6A-9E8C-DDC5A003BCB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*",
"matchCriteriaId": "CC6A25CB-907A-4D05-8460-A2488938A8BE"
}
]
}
@ -121,35 +208,59 @@
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:0723",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0725",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0881",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0897",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1188",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1248",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1404",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2094",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-6606",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10229",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-10-22T22:15:03.180",
"lastModified": "2024-10-24T15:35:13.163",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-25T17:04:54.080",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0.6723.69",
"matchCriteriaId": "A59C613F-292C-481C-A47A-BD9AF03095FE"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/371011220",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10230",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-10-22T22:15:03.960",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T17:02:56.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,8 +15,41 @@
"value": " La confusi\u00f3n de tipos en la versi\u00f3n 8 de Google Chrome anterior a la 130.0.6723.69 permit\u00eda a un atacante remoto explotar potencialmente la corrupci\u00f3n del almacenamiento din\u00e1mico a trav\u00e9s de una p\u00e1gina HTML manipulada. (Gravedad de seguridad de Chromium: alta)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
},
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
@ -28,14 +61,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0.6723.69",
"matchCriteriaId": "A59C613F-292C-481C-A47A-BD9AF03095FE"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/371565065",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10231",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-10-22T22:15:04.130",
"lastModified": "2024-10-23T15:35:19.003",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T17:01:55.633",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
},
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
@ -61,14 +91,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "130.0.6723.69",
"matchCriteriaId": "A59C613F-292C-481C-A47A-BD9AF03095FE"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/372269618",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10250",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T14:15:04.197",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:37:32.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Nioland theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018s\u2019 parameter in all versions up to, and including, 1.2.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El tema Nioland para WordPress es vulnerable a ataques de cross-site scripting reflejado a trav\u00e9s del par\u00e1metro 's' en todas las versiones hasta la 1.2.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
}
],
"metrics": {
@ -47,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:steelthemes:nioland:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.7",
"matchCriteriaId": "0689C700-B658-4DE5-AC21-2BCBBC6B25D1"
}
]
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/nioland-saas-software-startup-tech-wordpress-theme/47895474#item-description__change-log",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e13c6d97-873a-4067-846d-92e54514645d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-10386",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-10-25T17:15:03.987",
"lastModified": "2024-10-25T17:15:03.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CVE-2024-10386 IMPACT\n\n\n\nAn authentication\nvulnerability exists in the affected product. The vulnerability could allow a\nthreat actor with network access to send crafted messages to the device, potentially\nresulting in database manipulation."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1708.html",
"source": "PSIRT@rockwellautomation.com"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-10387",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-10-25T17:15:04.230",
"lastModified": "2024-10-25T17:15:04.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CVE-2024-10387 IMPACT\n\n\n\nA Denial-of-Service\nvulnerability exists in the affected product. The vulnerability could allow a\nthreat actor with network access to send crafted messages to the device,\npotentially resulting in Denial-of-Service."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1708.html",
"source": "PSIRT@rockwellautomation.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30157",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:04.620",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:29:11.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Una vulnerabilidad en el componente Suite Applications Services de Mitel MiCollab hasta la versi\u00f3n 9.7.1.110 podr\u00eda permitir que un atacante autenticado con privilegios administrativos realice un ataque de inyecci\u00f3n SQL debido a una validaci\u00f3n insuficiente de la entrada del usuario. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute operaciones arbitrarias de administraci\u00f3n y base de datos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.7.1.110",
"matchCriteriaId": "00AF6EAC-B97B-468A-AE23-625321787BCA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0004",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30158",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:04.860",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:30:09.927",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.7.1.110",
"matchCriteriaId": "00AF6EAC-B97B-468A-AE23-625321787BCA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0004",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30159",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:05.073",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:30:47.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Una vulnerabilidad en el componente de conferencias web de Mitel MiCollab hasta la versi\u00f3n 9.7.1.110 podr\u00eda permitir que un atacante autenticado con privilegios administrativos realice un ataque de Cross Site Scripting (XSS) almacenado debido a una validaci\u00f3n insuficiente de la entrada del usuario. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute secuencias de comandos arbitrarias."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.7.1.110",
"matchCriteriaId": "00AF6EAC-B97B-468A-AE23-625321787BCA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0005",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30160",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T21:15:05.190",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:30:53.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "Una vulnerabilidad en el componente Suite Applications Services de Mitel MiCollab hasta la versi\u00f3n 9.7.1.110 podr\u00eda permitir que un atacante autenticado con privilegios administrativos realice un ataque de Cross Site Scripting (XSS) Almacenado debido a una validaci\u00f3n insuficiente de la entrada del usuario. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante ejecute secuencias de comandos arbitrarias."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mitel:micollab:*:*:*:*:*:*:*:*",
"versionEndIncluding": "9.7.1.110",
"matchCriteriaId": "00AF6EAC-B97B-468A-AE23-625321787BCA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0005",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,24 @@
"id": "CVE-2024-30875",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-17T22:15:02.977",
"lastModified": "2024-10-18T20:35:01.980",
"lastModified": "2024-10-25T16:15:09.693",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in JavaScript Library jquery-ui v.1.13.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted payload to the window.addEventListener component."
"value": "Cross Site Scripting vulnerability in JavaScript Library jquery-ui v.1.13.1 allows a remote attacker to obtain sensitive information and execute arbitrary code via a crafted payload to the window.addEventListener component. NOTE: this is disputed by the Supplier because it cannot be reproduced, and because the exploitation example does not indicate whether, or how, the example website is using jQuery UI."
},
{
"lang": "es",
"value": "La vulnerabilidad de Cross-Site Scripting en la librer\u00eda JavaScript jquery-ui v.1.13.1 permite a un atacante remoto obtener informaci\u00f3n confidencial y ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para el componente window.addEventListener."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40493",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:04.407",
"lastModified": "2024-10-23T16:35:08.327",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T17:01:22.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keith-cullen:freecoap:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E8787D78-015B-4E25-BBCB-B0748567705B"
}
]
}
]
}
],
"references": [
{
"url": "https://gist.github.com/dqp10515/fe80005e2fb58ed8ada178ac017e4ad4",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/keith-cullen/FreeCoAP/issues/37",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43177",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-10-22T15:15:07.020",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:05:15.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
@ -41,7 +61,7 @@
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -49,12 +69,47 @@
"value": "CWE-295"
}
]
},
{
"source": "psirt@us.ibm.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "557B94A2-6EC2-4F29-95AE-306B55C7C11D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DB02F586-96A0-4FAC-91CD-2B48EF222945"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7173596",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44098",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:16.170",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T17:35:01.100",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In lwis_device_event_states_clear_locked of lwis_event.c, there is a possible privilege escalation due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44812",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:05.543",
"lastModified": "2024-10-23T15:35:20.023",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:56:11.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:janobe:online_complaint_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CD2BB2E2-459C-48EB-B07A-4BA39A23C9F5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/b1u3st0rm/CVE-2024-44812-PoC",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47024",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.063",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T17:35:01.947",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,46 @@
"value": "In vring_size of external/headers/include/virtio/virtio_ring.h, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47025",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.113",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T17:35:02.767",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In ppmp_protect_buf of drm_fw.c, there is a possible information disclosure due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47026",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.167",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T17:35:03.593",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In gsc_gsa_rescue of gsc_gsa.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47027",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.220",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T17:35:04.390",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In sm_mem_compat_get_vmm_obj of lib/sm/shared_mem.c, there is a possible arbitrary physical memory access due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47028",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.280",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T17:35:05.147",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In ffu_flash_pack of ffu.c, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47029",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.340",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T16:35:07.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In TrustySharedMemoryManager::GetSharedMemory of ondevice/trusty/trusty_shared_memory_manager.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47033",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.500",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T17:35:05.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In lwis_allocator_free of lwis_allocator.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47034",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.557",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T16:35:08.630",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.4,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47035",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.610",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T16:35:09.407",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In vring_init of external/headers/include/virtio/virtio_ring.h, there is a possible out of bounds write due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47041",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.667",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T16:35:10.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.4,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48204",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T16:15:09.873",
"lastModified": "2024-10-25T16:15:09.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in Hanzhou Haobo network management system 1.0 allows a remote attacker to execute arbitrary code via a crafted script."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/NasYangh/161618e4552ca40ad1ac25b4d673bfcf",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48415",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:05.890",
"lastModified": "2024-10-23T16:35:09.317",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:55:26.083",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:loan_management_system_project:loan_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A0FA1DFF-3E84-4E0A-A16B-9888A9104374"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/khaliquesX/CVE-2024-48415/blob/main/README.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48459",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:04.703",
"lastModified": "2024-10-25T17:15:04.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command execution vulnerability exists in the AX2 Pro home router produced by Shenzhen Tenda Technology Co., Ltd. (Jixiang Tenda) v.DI_7003G-19.12.24A1V16.03.29.50;V16.03.29.50;V16.03.29.50. An attacker can exploit this vulnerability by constructing a malicious payload to execute commands and further obtain shell access to the router's file system with the highest privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Swind1er/da24125da98f6616a50a35a3e60141f4",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48540",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-24T17:15:16.967",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T16:35:11.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El control de acceso incorrecto en XIAO HE Smart 4.3.1 permite a los atacantes acceder a informaci\u00f3n confidencial mediante el an\u00e1lisis del c\u00f3digo y los datos dentro del archivo APK."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/HankJames/Vul-Reports/blob/main/FirmwareLeakage/com.hle.china.smarthome.xiaohe/com.hle.china.smarthome.xiaohe.md",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48579",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T16:15:09.940",
"lastModified": "2024-10-25T16:15:09.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Best House rental management system project in php v.1.0 allows a remote attacker to execute arbitrary code via the username parameter of the login request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/baineoli/CVE/blob/main/2024/house%20rental%20management%20system%20-%20SQL%20Injection%20%28Admin%20Login%29.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48580",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T16:15:09.993",
"lastModified": "2024-10-25T16:15:09.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the email parameter of the login request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/baineoli/CVE/blob/main/2024/courier%20management%20system%20-%20SQL%20Injection%20%28Admin%20Login%29.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48581",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T16:15:10.047",
"lastModified": "2024-10-25T16:15:10.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File Upload vulnerability in Best courier management system in php v.1.0 allows a remote attacker to execute arbitrary code via the admin_class.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/baineoli/CVE/blob/main/2024/courier%20management%20system%20-%20Unrestricted%20File%20Upload%20to%20RCE%20%28Sign%20Up%29.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48652",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-22T22:15:06.057",
"lastModified": "2024-10-23T16:35:10.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:51:57.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:tuzitio:camaleon_cms:2.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CD5475E8-ECFE-43EA-830B-0EE2270E89ED"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/paragbagul111/CVE-2024-48652/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48654",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:04.763",
"lastModified": "2024-10-25T17:15:04.763",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Blood Bank v.1 allows a remote attacker to execute arbitrary code via a crafted script to the login.php component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Prabhatsk7/CVE/blob/main/CVE-2024-48654",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Prabhatsk7/CVE/commit/d735e4f0bab7267608098284f51b602ead429b27",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48655",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:04.817",
"lastModified": "2024-10-25T17:15:04.817",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Total.js CMS v.1.0 allows a remote attacker to execute arbitrary code via the func.js file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/totaljs/cms/issues/49",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/%400x0d0x0a/cve-2024-48655-server-side-javascript-code-injection-in-total-js-cms-c5fc18359bdc",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48743",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T17:15:04.873",
"lastModified": "2024-10-25T17:15:04.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Sentry v.6.0.9 allows a remote attacker to execute arbitrary code via the z parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/rvismit/538232c3f258e468195febb69f3f2d3b",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48926",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:08.090",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:19:17.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,10 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.18.15",
"matchCriteriaId": "75C1654D-B325-4892-AB59-149FD50C2BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.8.7",
"matchCriteriaId": "BA620DAB-4CDD-44E7-BBCB-63C96DA80E0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.5.2",
"matchCriteriaId": "5419BCC9-4611-4323-AB7D-B4EC7448DED7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-fp6q-gccw-7qqm",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48927",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:08.360",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:15:13.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0",
"versionEndExcluding": "8.18.15",
"matchCriteriaId": "75C1654D-B325-4892-AB59-149FD50C2BCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.8.7",
"matchCriteriaId": "BA620DAB-4CDD-44E7-BBCB-63C96DA80E0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.5.2",
"matchCriteriaId": "5419BCC9-4611-4323-AB7D-B4EC7448DED7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-5955-cwv4-h7qh",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48929",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-22T16:15:08.617",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:12:15.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 2.5
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,10 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0",
"versionEndExcluding": "10.8.7",
"matchCriteriaId": "BA620DAB-4CDD-44E7-BBCB-63C96DA80E0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.5.2",
"matchCriteriaId": "5419BCC9-4611-4323-AB7D-B4EC7448DED7"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wxw9-6pv9-c3xc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-8036",
"sourceIdentifier": "cybersecurity@ch.abb.com",
"published": "2024-10-25T17:15:04.963",
"lastModified": "2024-10-25T17:15:04.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ABB is aware of privately reported vulnerabilities in the product versions referenced in this CVE. An attacker could exploit these vulnerabilities by sending a specially crafted firmware or configuration to the system node, causing the node to stop, become inaccessible, or allowing the attacker to take control of the node."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cybersecurity@ch.abb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.4,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "cybersecurity@ch.abb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://search.abb.com/library/Download.aspx?DocumentID=2NGA001911&LanguageCode=en&DocumentPartId=&Action=Launch",
"source": "cybersecurity@ch.abb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8500",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T11:15:13.490",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:43:24.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:-:wordpress:*:*",
"versionEndExcluding": "7.3.0",
"matchCriteriaId": "6FA9325C-B28E-4B2C-9E7E-5F54BB93FD1D"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/js/shortcodes/index.js",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3171844/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78af6e06-4b4c-4f56-a6f8-f98e8f681976?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9583",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T07:15:03.283",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:28:17.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "security@wordfence.com",
"type": "Secondary",
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rebelcode:rss_aggregator:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.23.13",
"matchCriteriaId": "2E1EF8CB-51DA-44D6-B896-AB65338C0B96"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-rss-aggregator/trunk/includes/admin-help.php#L274",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3168468/wp-rss-aggregator/trunk/includes/admin-help.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/126c77fa-11c5-431f-8fc9-0375ed6c8a91?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-9628",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-25T08:15:03.457",
"lastModified": "2024-10-25T12:56:07.750",
"lastModified": "2024-10-25T16:15:10.160",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WPS Telegram Chat plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'Wps_Telegram_Chat_Admin::check?onnection' function in versions up to, and including, 4.5.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to have full access to the Telegram Bot API endpoint and communicate with it."
"value": "The WPS Telegram Chat plugin for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check on the 'Wps_Telegram_Chat_Admin::check\u0421onnection' function in versions up to, and including, 4.5.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to have full access to the Telegram Bot API endpoint and communicate with it."
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9829",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T06:15:11.007",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:30:44.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,26 +51,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metagauss:download_plugin:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.1",
"matchCriteriaId": "22852E7F-A806-40BB-8400-43E28BBE37E4"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/download-plugin/trunk/download-plugin.php#L242",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/download-plugin/trunk/download-plugin.php#L262",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/download-plugin/trunk/download-plugin.php#L335",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3170600/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e0891211-e4b3-4dcf-8ee0-e20abeb91640?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9927",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T02:15:07.467",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:29:27.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpovernight:woocommerce_order_proposal:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.6",
"matchCriteriaId": "A267ECB4-6D4A-4089-AC8E-37EFDC6C362F"
}
]
}
]
}
],
"references": [
{
"url": "https://wpovernight.com/downloads/woocommerce-order-proposal/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cdc993a4-6f65-4570-811c-13a80dbec064?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9947",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-23T07:15:04.560",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-25T16:53:12.867",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
@ -41,7 +61,7 @@
},
"weaknesses": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -50,6 +70,16 @@
}
]
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -61,14 +91,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "4.11.2",
"matchCriteriaId": "B430F599-F863-4B4B-A253-666072A6DD44"
}
]
}
]
}
],
"references": [
{
"url": "https://profilepress.com/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/61b477c3-88b7-45a4-9fc4-6bca6f7c3604?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-25T16:00:31.271744+00:00
2024-10-25T18:00:18.940756+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-25T15:58:02.297000+00:00
2024-10-25T17:35:05.913000+00:00
```
### Last Data Feed Release
@ -33,49 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
267075
267095
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `20`
- [CVE-2024-48428](CVE-2024/CVE-2024-484xx/CVE-2024-48428.json) (`2024-10-25T15:15:18.827`)
- [CVE-2024-49380](CVE-2024/CVE-2024-493xx/CVE-2024-49380.json) (`2024-10-25T14:15:12.040`)
- [CVE-2024-49381](CVE-2024/CVE-2024-493xx/CVE-2024-49381.json) (`2024-10-25T14:15:12.160`)
- [CVE-2024-49753](CVE-2024/CVE-2024-497xx/CVE-2024-49753.json) (`2024-10-25T14:15:12.280`)
- [CVE-2024-49757](CVE-2024/CVE-2024-497xx/CVE-2024-49757.json) (`2024-10-25T15:15:18.957`)
- [CVE-2022-30354](CVE-2022/CVE-2022-303xx/CVE-2022-30354.json) (`2024-10-25T16:15:08.663`)
- [CVE-2022-30355](CVE-2022/CVE-2022-303xx/CVE-2022-30355.json) (`2024-10-25T16:15:08.733`)
- [CVE-2022-30356](CVE-2022/CVE-2022-303xx/CVE-2022-30356.json) (`2024-10-25T17:15:03.387`)
- [CVE-2022-30357](CVE-2022/CVE-2022-303xx/CVE-2022-30357.json) (`2024-10-25T17:15:03.450`)
- [CVE-2022-30358](CVE-2022/CVE-2022-303xx/CVE-2022-30358.json) (`2024-10-25T17:15:03.507`)
- [CVE-2022-30359](CVE-2022/CVE-2022-303xx/CVE-2022-30359.json) (`2024-10-25T17:15:03.570`)
- [CVE-2022-30360](CVE-2022/CVE-2022-303xx/CVE-2022-30360.json) (`2024-10-25T17:15:03.630`)
- [CVE-2022-30361](CVE-2022/CVE-2022-303xx/CVE-2022-30361.json) (`2024-10-25T17:15:03.700`)
- [CVE-2023-26248](CVE-2023/CVE-2023-262xx/CVE-2023-26248.json) (`2024-10-25T16:15:09.500`)
- [CVE-2024-10386](CVE-2024/CVE-2024-103xx/CVE-2024-10386.json) (`2024-10-25T17:15:03.987`)
- [CVE-2024-10387](CVE-2024/CVE-2024-103xx/CVE-2024-10387.json) (`2024-10-25T17:15:04.230`)
- [CVE-2024-48204](CVE-2024/CVE-2024-482xx/CVE-2024-48204.json) (`2024-10-25T16:15:09.873`)
- [CVE-2024-48459](CVE-2024/CVE-2024-484xx/CVE-2024-48459.json) (`2024-10-25T17:15:04.703`)
- [CVE-2024-48579](CVE-2024/CVE-2024-485xx/CVE-2024-48579.json) (`2024-10-25T16:15:09.940`)
- [CVE-2024-48580](CVE-2024/CVE-2024-485xx/CVE-2024-48580.json) (`2024-10-25T16:15:09.993`)
- [CVE-2024-48581](CVE-2024/CVE-2024-485xx/CVE-2024-48581.json) (`2024-10-25T16:15:10.047`)
- [CVE-2024-48654](CVE-2024/CVE-2024-486xx/CVE-2024-48654.json) (`2024-10-25T17:15:04.763`)
- [CVE-2024-48655](CVE-2024/CVE-2024-486xx/CVE-2024-48655.json) (`2024-10-25T17:15:04.817`)
- [CVE-2024-48743](CVE-2024/CVE-2024-487xx/CVE-2024-48743.json) (`2024-10-25T17:15:04.873`)
- [CVE-2024-8036](CVE-2024/CVE-2024-80xx/CVE-2024-8036.json) (`2024-10-25T17:15:04.963`)
### CVEs modified in the last Commit
Recently modified CVEs: `86`
Recently modified CVEs: `40`
- [CVE-2024-49942](CVE-2024/CVE-2024-499xx/CVE-2024-49942.json) (`2024-10-25T14:56:59.397`)
- [CVE-2024-49981](CVE-2024/CVE-2024-499xx/CVE-2024-49981.json) (`2024-10-25T14:56:40.073`)
- [CVE-2024-49982](CVE-2024/CVE-2024-499xx/CVE-2024-49982.json) (`2024-10-25T15:08:03.790`)
- [CVE-2024-49992](CVE-2024/CVE-2024-499xx/CVE-2024-49992.json) (`2024-10-25T14:52:00.273`)
- [CVE-2024-49993](CVE-2024/CVE-2024-499xx/CVE-2024-49993.json) (`2024-10-25T14:52:19.167`)
- [CVE-2024-49994](CVE-2024/CVE-2024-499xx/CVE-2024-49994.json) (`2024-10-25T14:52:32.877`)
- [CVE-2024-50019](CVE-2024/CVE-2024-500xx/CVE-2024-50019.json) (`2024-10-25T14:45:56.190`)
- [CVE-2024-50020](CVE-2024/CVE-2024-500xx/CVE-2024-50020.json) (`2024-10-25T14:50:42.230`)
- [CVE-2024-50021](CVE-2024/CVE-2024-500xx/CVE-2024-50021.json) (`2024-10-25T14:52:13.890`)
- [CVE-2024-50022](CVE-2024/CVE-2024-500xx/CVE-2024-50022.json) (`2024-10-25T15:05:57.403`)
- [CVE-2024-50023](CVE-2024/CVE-2024-500xx/CVE-2024-50023.json) (`2024-10-25T15:07:10.487`)
- [CVE-2024-50024](CVE-2024/CVE-2024-500xx/CVE-2024-50024.json) (`2024-10-25T15:08:58.293`)
- [CVE-2024-50025](CVE-2024/CVE-2024-500xx/CVE-2024-50025.json) (`2024-10-25T15:12:00.453`)
- [CVE-2024-50026](CVE-2024/CVE-2024-500xx/CVE-2024-50026.json) (`2024-10-25T15:13:04.783`)
- [CVE-2024-50027](CVE-2024/CVE-2024-500xx/CVE-2024-50027.json) (`2024-10-25T15:19:07.347`)
- [CVE-2024-50028](CVE-2024/CVE-2024-500xx/CVE-2024-50028.json) (`2024-10-25T15:21:23.237`)
- [CVE-2024-50029](CVE-2024/CVE-2024-500xx/CVE-2024-50029.json) (`2024-10-25T15:27:06.047`)
- [CVE-2024-50030](CVE-2024/CVE-2024-500xx/CVE-2024-50030.json) (`2024-10-25T14:06:40.707`)
- [CVE-2024-50031](CVE-2024/CVE-2024-500xx/CVE-2024-50031.json) (`2024-10-25T15:30:15.727`)
- [CVE-2024-50032](CVE-2024/CVE-2024-500xx/CVE-2024-50032.json) (`2024-10-25T15:34:22.353`)
- [CVE-2024-50036](CVE-2024/CVE-2024-500xx/CVE-2024-50036.json) (`2024-10-25T15:41:31.273`)
- [CVE-2024-50037](CVE-2024/CVE-2024-500xx/CVE-2024-50037.json) (`2024-10-25T15:43:07.520`)
- [CVE-2024-50038](CVE-2024/CVE-2024-500xx/CVE-2024-50038.json) (`2024-10-25T15:45:51.340`)
- [CVE-2024-50039](CVE-2024/CVE-2024-500xx/CVE-2024-50039.json) (`2024-10-25T15:47:04.950`)
- [CVE-2024-50040](CVE-2024/CVE-2024-500xx/CVE-2024-50040.json) (`2024-10-25T15:49:33.317`)
- [CVE-2024-43177](CVE-2024/CVE-2024-431xx/CVE-2024-43177.json) (`2024-10-25T16:05:15.777`)
- [CVE-2024-44098](CVE-2024/CVE-2024-440xx/CVE-2024-44098.json) (`2024-10-25T17:35:01.100`)
- [CVE-2024-44812](CVE-2024/CVE-2024-448xx/CVE-2024-44812.json) (`2024-10-25T16:56:11.150`)
- [CVE-2024-47024](CVE-2024/CVE-2024-470xx/CVE-2024-47024.json) (`2024-10-25T17:35:01.947`)
- [CVE-2024-47025](CVE-2024/CVE-2024-470xx/CVE-2024-47025.json) (`2024-10-25T17:35:02.767`)
- [CVE-2024-47026](CVE-2024/CVE-2024-470xx/CVE-2024-47026.json) (`2024-10-25T17:35:03.593`)
- [CVE-2024-47027](CVE-2024/CVE-2024-470xx/CVE-2024-47027.json) (`2024-10-25T17:35:04.390`)
- [CVE-2024-47028](CVE-2024/CVE-2024-470xx/CVE-2024-47028.json) (`2024-10-25T17:35:05.147`)
- [CVE-2024-47029](CVE-2024/CVE-2024-470xx/CVE-2024-47029.json) (`2024-10-25T16:35:07.850`)
- [CVE-2024-47033](CVE-2024/CVE-2024-470xx/CVE-2024-47033.json) (`2024-10-25T17:35:05.913`)
- [CVE-2024-47034](CVE-2024/CVE-2024-470xx/CVE-2024-47034.json) (`2024-10-25T16:35:08.630`)
- [CVE-2024-47035](CVE-2024/CVE-2024-470xx/CVE-2024-47035.json) (`2024-10-25T16:35:09.407`)
- [CVE-2024-47041](CVE-2024/CVE-2024-470xx/CVE-2024-47041.json) (`2024-10-25T16:35:10.220`)
- [CVE-2024-48415](CVE-2024/CVE-2024-484xx/CVE-2024-48415.json) (`2024-10-25T16:55:26.083`)
- [CVE-2024-48540](CVE-2024/CVE-2024-485xx/CVE-2024-48540.json) (`2024-10-25T16:35:11.093`)
- [CVE-2024-48652](CVE-2024/CVE-2024-486xx/CVE-2024-48652.json) (`2024-10-25T16:51:57.013`)
- [CVE-2024-48926](CVE-2024/CVE-2024-489xx/CVE-2024-48926.json) (`2024-10-25T16:19:17.073`)
- [CVE-2024-48927](CVE-2024/CVE-2024-489xx/CVE-2024-48927.json) (`2024-10-25T16:15:13.327`)
- [CVE-2024-48929](CVE-2024/CVE-2024-489xx/CVE-2024-48929.json) (`2024-10-25T16:12:15.897`)
- [CVE-2024-8500](CVE-2024/CVE-2024-85xx/CVE-2024-8500.json) (`2024-10-25T16:43:24.040`)
- [CVE-2024-9583](CVE-2024/CVE-2024-95xx/CVE-2024-9583.json) (`2024-10-25T16:28:17.497`)
- [CVE-2024-9628](CVE-2024/CVE-2024-96xx/CVE-2024-9628.json) (`2024-10-25T16:15:10.160`)
- [CVE-2024-9829](CVE-2024/CVE-2024-98xx/CVE-2024-9829.json) (`2024-10-25T16:30:44.520`)
- [CVE-2024-9927](CVE-2024/CVE-2024-99xx/CVE-2024-9927.json) (`2024-10-25T16:29:27.300`)
- [CVE-2024-9947](CVE-2024/CVE-2024-99xx/CVE-2024-9947.json) (`2024-10-25T16:53:12.867`)
## Download and Usage

View File

@ -198413,7 +198413,15 @@ CVE-2022-3035,0,0,56f1fc89fb5d6992dffdef4a1f1866585697ecbd361910f27cf4eb74bef319
CVE-2022-30350,0,0,18d3001ce63cdc43cde8480b95b699a5a0a5ecb7deba51d4dc72c0d86c6408f8,2023-04-10T16:55:52.733000
CVE-2022-30351,0,0,2df1fcff158bfaa98e8e388cc82c7b76555d1068f7cfc1016565d9f0f49748dd,2023-04-10T16:42:49.510000
CVE-2022-30352,0,0,9c99852cab9cb3dba12ad494a32dc9a161c396d474ce4e7a613cf8447766b558,2022-06-10T02:33:25.820000
CVE-2022-30354,1,1,7cba051f8dce4545bb466640a9f5c05e0372bd088683a3405bf2a27c2cce1974,2024-10-25T16:15:08.663000
CVE-2022-30355,1,1,a63c222394726d2b71551b949ec5395a64f26fd11980591e88025dc69028c968,2024-10-25T16:15:08.733000
CVE-2022-30356,1,1,9308385fcbcb801d9c8b00db22c0630d9b3e8c8ae137f0fed3bf5630f60767fa,2024-10-25T17:15:03.387000
CVE-2022-30357,1,1,69ac61555cbd98d1a0a5e01a94a9884cf5cfab9c5fac56dd7704263164771904,2024-10-25T17:15:03.450000
CVE-2022-30358,1,1,09934a292607f0f0fec4c9584ccd370034b961e333a8196f11a9642776345e47,2024-10-25T17:15:03.507000
CVE-2022-30359,1,1,cd098a9a0befa2548cd8f1a5cc248bfe7beae08baa1c613c2049e59c36272bdf,2024-10-25T17:15:03.570000
CVE-2022-3036,0,0,c4abe10251774bed45d05e8655ab46440316bc2da3c56604182cb58b05d9789f,2022-09-21T15:01:39.933000
CVE-2022-30360,1,1,34569a3f641a3cdd7841c1c67f2a5aa99c1c300275cfc941611e517f8fba9cfc,2024-10-25T17:15:03.630000
CVE-2022-30361,1,1,db7f1efce552edea697a9c8209f404511683bc404219a3cf97df9f6f95f43d37,2024-10-25T17:15:03.700000
CVE-2022-30367,0,0,4ab429b852faf9723dbf506dba281ae94cd253e629be5b5f8d2fb2c552ccac49,2022-05-23T16:59:24.497000
CVE-2022-3037,0,0,c435799296f92b50e0bd30d245bc09441dcbbe40f6a0905fc66767266b6ff152,2023-11-07T03:50:43.193000
CVE-2022-30370,0,0,43e003e1eee0ff632ee04c0ec5c6be63af911ff9967992f449cf67592ab6166e,2022-05-23T16:49:37.360000
@ -212583,11 +212591,11 @@ CVE-2022-48967,0,0,9a4dff8791ae44e4087bbdddb5fbc68f8736e971375d2e967fe26661594f6
CVE-2022-48968,0,0,017a1d2b13f226f7bddbc210b2bd3cf757d1f0d39cf99f216cca9b576a19e95d,2024-10-23T15:13:25.583000
CVE-2022-48969,0,0,9d5e3023502dbcf73cf247c9ccac819ef4bcc5ebe125f185e7eeef2c89ccaf31,2024-10-23T15:13:25.583000
CVE-2022-4897,0,0,0a243664793293bb535173693d8b2bb850e8caf27eb71e5f98003bf4c293392a,2023-11-07T03:59:15.853000
CVE-2022-48970,0,1,40b192859836fb9e4b4ff740c2d192f1bd91b2f3915520635abf192612070d19,2024-10-25T15:24:22.060000
CVE-2022-48971,0,1,998975336af1feca0df2eeedd516faed136509784fd2222bb672c33e3083f72f,2024-10-25T15:23:38.807000
CVE-2022-48972,0,1,1b38bc5eab69345ffacf3735f7c4d7a21942b008815acccb4048e2196ca88ff8,2024-10-25T15:22:33.897000
CVE-2022-48973,0,1,976ef450614292c62923177c314a4b2aa5b18418ae239de605da93f276c749ea,2024-10-25T15:35:54.687000
CVE-2022-48974,0,1,665d9c03b3d3f1f2b3e7ecc5cabdfc4e26418e7914055dc95137c3a3c52dd1bf,2024-10-25T15:25:54.433000
CVE-2022-48970,0,0,40b192859836fb9e4b4ff740c2d192f1bd91b2f3915520635abf192612070d19,2024-10-25T15:24:22.060000
CVE-2022-48971,0,0,998975336af1feca0df2eeedd516faed136509784fd2222bb672c33e3083f72f,2024-10-25T15:23:38.807000
CVE-2022-48972,0,0,1b38bc5eab69345ffacf3735f7c4d7a21942b008815acccb4048e2196ca88ff8,2024-10-25T15:22:33.897000
CVE-2022-48973,0,0,976ef450614292c62923177c314a4b2aa5b18418ae239de605da93f276c749ea,2024-10-25T15:35:54.687000
CVE-2022-48974,0,0,665d9c03b3d3f1f2b3e7ecc5cabdfc4e26418e7914055dc95137c3a3c52dd1bf,2024-10-25T15:25:54.433000
CVE-2022-48975,0,0,5aa03611cf6147e6cbe4a65152583e0072aea2d5e51c8399c173faf09094d685,2024-10-23T15:13:25.583000
CVE-2022-48976,0,0,a64de68b36096327ba87788e46c4482923e9b464dece26a8aba3dd90cbbbdf36,2024-10-23T15:13:25.583000
CVE-2022-48977,0,0,22a1f9cacabe8dede59f80dc5c8e91dcb66c9e473ead5c6f5b52cff09106031d,2024-10-23T15:13:25.583000
@ -212597,20 +212605,20 @@ CVE-2022-4898,0,0,45b8fe73140eae686f75256e6a033fa7f76a1c506314cc4b83a596aba96b02
CVE-2022-48980,0,0,8d526640cbdfc2eac896bd10a04a158881a6eaf9b8c038323a974e23d54cd968,2024-10-23T15:13:25.583000
CVE-2022-48981,0,0,964b5764196aa475d717a98d105807ba1ba56de8f543da7fb2f4d00ef08bab19,2024-10-23T15:13:25.583000
CVE-2022-48982,0,0,2b231419453512dd11ff8c1000c255778689437792243f66ab1524a71b12fbdf,2024-10-23T15:13:25.583000
CVE-2022-48983,0,1,dfa67a553ef1fa3c57f719e3548ad9b975bf5a0f74df240dd01055c881443dcd,2024-10-25T15:58:02.297000
CVE-2022-48984,0,1,e51fd7e8de77f3a8cf163611cb2f09fc6b7014335c2a9168caf96cf9450b0b0f,2024-10-25T15:53:53.890000
CVE-2022-48983,0,0,dfa67a553ef1fa3c57f719e3548ad9b975bf5a0f74df240dd01055c881443dcd,2024-10-25T15:58:02.297000
CVE-2022-48984,0,0,e51fd7e8de77f3a8cf163611cb2f09fc6b7014335c2a9168caf96cf9450b0b0f,2024-10-25T15:53:53.890000
CVE-2022-48985,0,0,6cf11753a689d662f9255b9369c8210e89bb6def1b70b9ecf2bda7c020ae1116,2024-10-23T15:13:25.583000
CVE-2022-48986,0,0,6c9de2cdc1f05896064512205d6a856f3488acd470650f11d2c15464c4a320e4,2024-10-23T15:13:25.583000
CVE-2022-48987,0,0,7e41a00ba39093b717c7e7821e300a97872c374b14c3fe63fb5c52c9819075bf,2024-10-23T15:13:25.583000
CVE-2022-48988,0,0,13aee4cb90261ef632b8011d536d4f4d81a59bc5186a33e9a1bb37d07ce9e2c4,2024-10-23T15:13:25.583000
CVE-2022-48989,0,0,ec3acefd81e80f8987880bd73f4eb6f75823cd54c45158afed0c4749ffd0f34c,2024-10-23T15:13:25.583000
CVE-2022-48989,0,1,12f08708869bbe9ec063b7392e0e15042d70e2feeae860945b26c11deb45e931,2024-10-25T16:02:05.787000
CVE-2022-4899,0,0,64070b82b08d57aace9b84f3711bc30a23fda3b7a68f2b187d0af07aa5382f53,2023-11-07T03:59:16.090000
CVE-2022-48990,0,0,76b3abca04cda73be5b91a655a68e9ea48b8941272ce2e5ded70924fe2f52256,2024-10-23T15:13:25.583000
CVE-2022-48990,0,1,f3f5f9ba37039dd5bdebda25bf3b72aaf6156992a282b1be1c6dde6507784974,2024-10-25T16:03:41.527000
CVE-2022-48991,0,0,6a7cb21a3ac184136cd0ab4a861f7301f05b1785725a9d2367d58cd519d1b08f,2024-10-23T15:13:25.583000
CVE-2022-48992,0,1,8f56e9ce177d276837e828e603f41b46405afcc8129dce28e104445db61b74c5,2024-10-25T15:51:38.037000
CVE-2022-48992,0,0,8f56e9ce177d276837e828e603f41b46405afcc8129dce28e104445db61b74c5,2024-10-25T15:51:38.037000
CVE-2022-48993,0,0,ef216d3e2a04a71a8d804734065ba340ce4d331bb10df8d692bb266c02e77712,2024-10-23T09:15:02.593000
CVE-2022-48994,0,0,b4a7042332d16d435ad130f7c8d429b85afe54d674c86946aa6b2b6c75399002,2024-10-23T15:13:25.583000
CVE-2022-48995,0,1,6d50aef3372db06b6d495aa3016571870681b9327c2409bc5336d097bc2fa483,2024-10-25T15:52:51.117000
CVE-2022-48995,0,0,6d50aef3372db06b6d495aa3016571870681b9327c2409bc5336d097bc2fa483,2024-10-25T15:52:51.117000
CVE-2022-48996,0,0,0f669c5d177a55ab1de24ef7aebf7206e81a91803f760e8aa9a6146660e8c4e1,2024-10-23T15:13:25.583000
CVE-2022-48997,0,0,b7b9d54e465f5a467cd4544e1b3ea1f9aa1fa07b25224a4e924ef74e6000999e,2024-10-23T15:13:25.583000
CVE-2022-48998,0,0,b57fd57be2b9c4c0639652b977cb6f002cc2a4810b1a8b3ec1079b25ac9d83fc,2024-10-23T15:13:25.583000
@ -212618,13 +212626,13 @@ CVE-2022-48999,0,0,ec5be2b03e3b5b7d38590253ae9fa2814424968d957fec2c8bd6f94554050
CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075c4,2023-11-30T22:15:07.600000
CVE-2022-49000,0,0,66fc4f4f03879d9d446108a6269b018e290959a61a92a2a2ba3fb133109a0b85,2024-10-23T15:13:25.583000
CVE-2022-49001,0,0,a7ebb50038c6320990b6a4272aa8a293aee28015fce836d5217b5b7746259999,2024-10-23T15:13:25.583000
CVE-2022-49002,0,1,fad7889d4553e8099b0d53ab53b5daa8b36d6d338a8c65200d67fb3b44de9d3c,2024-10-25T14:24:12.620000
CVE-2022-49003,0,1,f8f764dbf52fdce662c912f1975da1ca6c961f4536dbe6925188461916d8623f,2024-10-25T14:12:59.897000
CVE-2022-49004,0,1,9c8dbf0cc81a830f0d0ecd035cf3bc42a715d008e6d3d287c61a14372514dd29,2024-10-25T14:21:21.593000
CVE-2022-49005,0,1,de8257fea0e0e9e525e4fda95dd143199b5ba5111c51aba2e22c48891a98b6a6,2024-10-25T14:17:56.817000
CVE-2022-49006,0,1,613ea51d8cb2b6449aca8bc74a817a49e50a168402a8a56f46fafcf943691389,2024-10-25T14:30:07.190000
CVE-2022-49007,0,1,33e96300d82fbe5750da700bd783cbe78b7a9540ce3d6802469853aa17e2a91c,2024-10-25T14:35:25.910000
CVE-2022-49008,0,1,db310da9fd926d3f79b0455eea90fafecd815ab721fa430fd567ca460419cada,2024-10-25T14:38:30.063000
CVE-2022-49002,0,0,fad7889d4553e8099b0d53ab53b5daa8b36d6d338a8c65200d67fb3b44de9d3c,2024-10-25T14:24:12.620000
CVE-2022-49003,0,0,f8f764dbf52fdce662c912f1975da1ca6c961f4536dbe6925188461916d8623f,2024-10-25T14:12:59.897000
CVE-2022-49004,0,0,9c8dbf0cc81a830f0d0ecd035cf3bc42a715d008e6d3d287c61a14372514dd29,2024-10-25T14:21:21.593000
CVE-2022-49005,0,0,de8257fea0e0e9e525e4fda95dd143199b5ba5111c51aba2e22c48891a98b6a6,2024-10-25T14:17:56.817000
CVE-2022-49006,0,0,613ea51d8cb2b6449aca8bc74a817a49e50a168402a8a56f46fafcf943691389,2024-10-25T14:30:07.190000
CVE-2022-49007,0,0,33e96300d82fbe5750da700bd783cbe78b7a9540ce3d6802469853aa17e2a91c,2024-10-25T14:35:25.910000
CVE-2022-49008,0,0,db310da9fd926d3f79b0455eea90fafecd815ab721fa430fd567ca460419cada,2024-10-25T14:38:30.063000
CVE-2022-49009,0,0,bd4572466d1414f52fbe7936b1a0c728ae05c93f9a35a8642cb3c09affa0841c,2024-10-24T18:59:25.877000
CVE-2022-4901,0,0,b216b364f33ab0ef7a0c7606c08559e2c099c064cab5e2ac5756fa24252b7a04,2023-03-09T01:06:23.703000
CVE-2022-49010,0,0,d80576c7b56f00013ea7b7dc864a80d590c14a16de91c0b1fdc858f0c8ef5805,2024-10-24T19:03:50.847000
@ -219829,6 +219837,7 @@ CVE-2023-26243,0,0,48cb445983df6e845460de44bcefe9b053ee215782ea6fb71062113286d3e
CVE-2023-26244,0,0,3e14139b3a5d244c793fcf72da7c9d561b05de05bc6b4a0cc6be5180c7f30def,2023-05-08T14:15:15.390000
CVE-2023-26245,0,0,755add3a1550f5f231ae6bc72bcb3689b3591a566d528b68a135543809ea17f8,2023-05-08T14:15:48.107000
CVE-2023-26246,0,0,3968ee2416178f3373b173158130de8333d79f4b30871ec73ef61f489c3ad845,2023-05-08T14:15:42.497000
CVE-2023-26248,1,1,1226826808b3a14467514cae889974b976a1cc373f34617329f41e9945ca0855,2024-10-25T16:15:09.500000
CVE-2023-26249,0,0,67d1d0c7cd14c3e554469121f96a8b736060705fef121074c7fbb5229e25b180,2023-03-02T23:20:03.390000
CVE-2023-2625,0,0,9986d8092e79a4b295b9781284b5a771179624be994dd8d9e9634af08ab34626,2023-07-06T16:10:43.413000
CVE-2023-26253,0,0,1ae34e99a0e17ae55380be2767abcad6c3e45c70e14babf83d8ba52ebd904367,2023-11-07T04:09:31.830000
@ -234998,7 +235007,7 @@ CVE-2023-46518,0,0,50a6b72c9eca27d9118865834eb8eeb2d6571605663676a98cbc4bc277ffc
CVE-2023-4652,0,0,5222738c738474475cc77f6118c2f194c8e026777ab00d0851e9cdbfda77bd35,2023-09-01T18:39:07.780000
CVE-2023-46520,0,0,6785302a5c9677ea2ec7e929767d096b2f5d09c9a984620f2dcaf9963a74132f,2024-09-11T16:35:15.170000
CVE-2023-46521,0,0,ba0fc3a8fc3510daceca92d9bd55661d2ae155990d59b773f724fdc9ba1fc058,2024-09-11T16:35:15.977000
CVE-2023-46522,0,0,49f48c40226ca0753877a1c334156524ccdf4358784d31971a51417f4a4f3fb8,2024-09-11T16:35:16.773000
CVE-2023-46522,0,1,75a62eb161b75a20276cda0b22a36582e143f545fbcc95881a2a51df6fa24c24,2024-10-25T17:15:03.790000
CVE-2023-46523,0,0,b32818064f5423969c5b5a7f2c46b5f76f2b50349f4ee7c69655f3693d2d7bac,2024-09-11T16:35:17.560000
CVE-2023-46525,0,0,536995641d0eae55a415097fbcf59d5e1023235e14ee48c525d45b6b231dab64,2024-09-11T16:35:18.350000
CVE-2023-46526,0,0,330f6130a88e73fcf05e8b87b6f746fc59d12c849d672aa5a5aad838ccd9b5c1,2024-09-11T16:35:19.150000
@ -236050,7 +236059,7 @@ CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09
CVE-2023-4807,0,0,3de0d677ebbf00153cefbfa374c0ecc381ecf722c89be68b57b7df074a7f14d7,2024-10-14T15:15:12.213000
CVE-2023-48078,0,0,0d9dcf5cb116c36b06b2365e4b759d1ca0ba54345b6daa32e108a2d9f4c48031,2024-08-14T19:35:13.890000
CVE-2023-4808,0,0,4a43f94f49b00a1ded4942c432a3569f5fcf99624dd900f508f8d30286fbcfa9,2023-11-27T16:33:33.237000
CVE-2023-48082,0,0,2dd1ea98e78ac8f4fee3666c96cae375bc8d13416b7ecf2bed32714606d28d3e,2024-10-15T15:35:14.013000
CVE-2023-48082,0,1,ea4291e271299bc9548bf3dbd598a1caf33674d80f8f961b04db68b3e8ba972b,2024-10-25T17:15:03.903000
CVE-2023-48084,0,0,459a90979a07550a284aa3e1863b171726a2debcb2ae1cda3b39790a2d652b29,2023-12-19T18:41:44.493000
CVE-2023-48085,0,0,ad24d46a2c7d3c2e30b77344324b90919c3f0291c86071ef906b236a00e55787,2023-12-19T18:41:59.183000
CVE-2023-48087,0,0,9729ddec6f348b3a3c6a59a1ffe393a6cd2fd40ee60944b2ab3b3e235f9546cb,2023-11-21T02:42:52.163000
@ -240826,7 +240835,7 @@ CVE-2023-6597,0,0,ac8c057de6d1c11d6944b0b9d92513a5893025dbfa0d30575569eb524fd5d8
CVE-2023-6598,0,0,44646d82b677b24aa988874a2f513c7a55374b6fc5e8239b526ea32f6db36822,2024-01-17T21:24:33.233000
CVE-2023-6599,0,0,87adfeaa904a3f0139fc2bf2ce135f454b340363d2ac212c6a95e9e2242d91ba,2023-12-12T17:22:17.503000
CVE-2023-6600,0,0,6558933adcd201cd8955c6c229da3bb8a7b6988f9263957fe0fdcc657ce47eed,2024-01-10T01:15:38.327000
CVE-2023-6606,0,0,d0bf3b7a096a78641d3877c08a19389818f809af3a05a5095fe5e5e50a9a608e,2024-09-14T00:15:13.730000
CVE-2023-6606,0,1,4cfdb26fdec003d889123845126cfb79253e8be899795563b1b4e029b0ad3ad6,2024-10-25T16:37:21.847000
CVE-2023-6607,0,0,81fceb5d2210d094481ebc286d221197231e631e432fc51c3654e75c6bb55dc3,2024-05-17T02:33:48.050000
CVE-2023-6608,0,0,5487174dec87235f3204bcb9adcbf0d2d725602df0e746e9cda4254f8d663296,2024-05-17T02:33:48.163000
CVE-2023-6609,0,0,c7bba61fa49512bdfc6e42061c9ccef0b9628ee7268c0dc198f2bd1bce9b1d84,2024-05-17T02:33:48.270000
@ -242433,13 +242442,13 @@ CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a1
CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000
CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
CVE-2024-10229,0,0,a7b204502d5cd273668671912d302bd3d0ee6cf96efb3658f24a856d63251728,2024-10-24T15:35:13.163000
CVE-2024-10229,0,1,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000
CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000
CVE-2024-10230,0,0,071efdf8dbe6f43ad8bdfc5cb0324a8f9b14590d6803d3d3f568746922ac2f52,2024-10-23T15:12:34.673000
CVE-2024-10231,0,0,c15e7dbf37700d38c3e757762d5346b89ebfa63b0f9c77dbe606c20e045e3b74,2024-10-23T15:35:19.003000
CVE-2024-10230,0,1,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000
CVE-2024-10231,0,1,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000
CVE-2024-10234,0,0,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000
CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000
CVE-2024-10250,0,0,49bdf987ce58c47efa88fef4edc3537a24e3f1da0e14345bbc53b304e24c9e72,2024-10-23T15:12:34.673000
CVE-2024-10250,0,1,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000
CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000
CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000
CVE-2024-10276,0,0,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000
@ -242506,6 +242515,8 @@ CVE-2024-10379,0,0,3c7753aa53a7f490ce21f7358197ba3a7c5845bca9dfc769528ab53d2e506
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
CVE-2024-10380,0,0,fbc6bdf17d1189e11e8b0a1f98f107dfa2f1f98f4113f4f2078dda76042f5da0,2024-10-25T13:15:17.547000
CVE-2024-10381,0,0,6ffe44cfcb0700d41680c7c9242cba169e32dff153adc942340c76d32ff0166c,2024-10-25T13:15:17.810000
CVE-2024-10386,1,1,620f9606b4947e68d786b63bc64226dc49af2c78c3961a92113a83d41fde8506,2024-10-25T17:15:03.987000
CVE-2024-10387,1,1,1d314c1f04eb0f6b0e625a4b66f38d6fe480b0f44899159cd155926983f5770f,2024-10-25T17:15:04.230000
CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000
CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000
CVE-2024-1041,0,0,991d5a9e7f9515845650bb9d6b0cbb707e5b40a6073b13e973f0804460a34ef9,2024-04-10T13:23:38.787000
@ -250840,11 +250851,11 @@ CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919ae
CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000
CVE-2024-3015,0,0,cf3ef36018f814f81d7c4b278b721ac941c52c0f1c0bedc65491406707b51ee6,2024-05-17T02:39:40.887000
CVE-2024-30156,0,0,3d53855c757ad6b4fdec1c866bc6a474f7a081008c29fdfc2556616a5702f89d,2024-03-25T01:51:01.223000
CVE-2024-30157,0,0,c1aa337642ad458cf39faaffb9afaab333b10ba0a44ac5220fb5b0de7c571a0e,2024-10-23T15:12:34.673000
CVE-2024-30158,0,0,5c31840124042c7dc8c794a9fc04b120cc40b06bb57135fe8916eaa30c0fb643,2024-10-23T15:12:34.673000
CVE-2024-30159,0,0,1b615975b979bc10b11a069b75bf0572c70c3d456f45ef1f417ec22ee73e229b,2024-10-23T15:12:34.673000
CVE-2024-30157,0,1,03c40ae2d6bb5fbe19cdcb81ee9473f77e02194f7cb98d03508973afcb5f65ab,2024-10-25T16:29:11.307000
CVE-2024-30158,0,1,1234308b996a92cbaf899b21ed405616cb44f1f3637c58c6a67ec8b7390e221e,2024-10-25T16:30:09.927000
CVE-2024-30159,0,1,c2f69c82c310c4c7d423021fb3a365e7918cd3a612018ed272a3cf1ea353956c,2024-10-25T16:30:47.127000
CVE-2024-3016,0,0,365b1d8bd40146c56247f165cad66ba9032ab62d7024128ecd437112ab8f9af3,2024-08-22T15:35:08.600000
CVE-2024-30160,0,0,1967d448aba9f951666052c9439ee52aac0084b8b4b6dda5bce07b851a006f2b,2024-10-23T15:12:34.673000
CVE-2024-30160,0,1,a5cbd8b397241e2bf3153583f5284054bbcdf44919115ac1136f24883a861194,2024-10-25T16:30:53.613000
CVE-2024-30161,0,0,1923ba0ba6f178ce866a1a8ca8f64984391bfd8920138b4d8c36e03ff657287b,2024-04-11T14:15:12.083000
CVE-2024-30162,0,0,bfc1b2dd1f9f0516f5fde509ec8f6b937e3d3043c9b38e8e614a15ddc80d79a3,2024-07-03T01:53:51.970000
CVE-2024-30163,0,0,a73a629b03deb6cd2f20f667428a8c95efd54363034c035eeeed31541b8e07f7,2024-08-08T21:25:19.010000
@ -251421,7 +251432,7 @@ CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d
CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000
CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000
CVE-2024-30872,0,0,f4c68436231336d4dfed85be3bb02cc34ef76405f018ff6a0b0b786c7062708e,2024-04-01T15:53:18.060000
CVE-2024-30875,0,0,4e3365f588106417ef86e7f08b8f3513aeb184481ae21be28ecb16a2229e582e,2024-10-18T20:35:01.980000
CVE-2024-30875,0,1,1cda1f7e96707733b42fb351c9353bb46bc4382d5324d37a18f42fe89fb4a47a,2024-10-25T16:15:09.693000
CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000
CVE-2024-30879,0,0,1301a0d53d8ce6102d32b653bb55ca8eae261084329d07814fddadd6bf631c71,2024-04-11T12:47:44.137000
CVE-2024-3088,0,0,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a7c,2024-08-27T18:35:09.493000
@ -258044,7 +258055,7 @@ CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a
CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000
CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000
CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
CVE-2024-40493,0,0,3bc280cc490a2ad40b207182dbb218bcfe50ed3c364fef5a0b9179bdf888cd2f,2024-10-23T16:35:08.327000
CVE-2024-40493,0,1,aaea0b22b1a9fd8ca62ceefb69cfb4d04acb9686bdbdbc9774da6bba4ba8925d,2024-10-25T17:01:22.433000
CVE-2024-40494,0,0,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000
CVE-2024-40495,0,0,0c92b9527f5126e4b4bbf0d1f0a16c194305be9e806244080172bf727ded6b6a,2024-08-01T13:57:31.037000
CVE-2024-40498,0,0,5810ed5aa59e12db14c51ce30325d1c0d70a5c997d2111b8b796a66ebc036219,2024-08-06T16:30:24.547000
@ -259811,8 +259822,8 @@ CVE-2024-43165,0,0,8125472d7e20e379acd67d29cc7075b43b03a71223ce60c46b14d0ffb4bd9
CVE-2024-43167,0,0,c4eae034ed90d957ee0d40ac6b75e1eb711889b4b8905f404c5783e222980273,2024-10-21T12:15:03.837000
CVE-2024-43168,0,0,ef0081344887975b429a2b0b7741a490ebb03d62e914345ff88e9fc7663b3374,2024-10-21T12:15:04.327000
CVE-2024-4317,0,0,2ab51635ebb5a78f9093ee7220532c2f98c47bcb30186dfa33cf412783a7fe8e,2024-05-14T16:11:39.510000
CVE-2024-43173,0,1,5fd3a7cd2e25eaa59bc7be29d2c1d5f9369e6e7564f4001a4cb0dbe8b47a7f52,2024-10-25T15:40:19.977000
CVE-2024-43177,0,0,3abc399faf2c0e72d4b29b578a8f0efca5fbe594cb17b0e330c46da3d5d7f655,2024-10-23T15:12:34.673000
CVE-2024-43173,0,0,5fd3a7cd2e25eaa59bc7be29d2c1d5f9369e6e7564f4001a4cb0dbe8b47a7f52,2024-10-25T15:40:19.977000
CVE-2024-43177,0,1,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae56467a,2024-10-25T16:05:15.777000
CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000
CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000
CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000
@ -260503,10 +260514,10 @@ CVE-2024-44094,0,0,745c42fe2d315a5bcee63bacf45ed85a137f90126e69b7519e917691efb99
CVE-2024-44095,0,0,b00dc9986da442410ed4230403c0d5027e748adf40134501c33f35c9b4d16312,2024-10-15T14:35:04.083000
CVE-2024-44096,0,0,9e10fae26ac71a12ed9f5239ac873ac3368309ebde15657c2661c84b3db39f54,2024-10-15T14:35:04.383000
CVE-2024-44097,0,0,965cf9d05fda49947baa77cde6164ca7e937d7f38563ab41cd3e9e9bd0e5a36b,2024-10-04T13:50:43.727000
CVE-2024-44098,0,0,d55f7d6bd704aecf5357deedbb173336a776dfe22ab649cebbc7df67a8e16592,2024-10-25T12:56:07.750000
CVE-2024-44098,0,1,1168004266a8f5e54e269c18ca4a45508b8876128dba4e929319900254f0936c,2024-10-25T17:35:01.100000
CVE-2024-44099,0,0,cef1b52b87cb045fe362229d573416685e664fe9a620a39f6e73878a28bd66a1,2024-10-25T12:56:07.750000
CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000
CVE-2024-44100,0,1,e9777f3823ca5f020625b7de7657f183ca0a32ff11566ee15e67030df4347240,2024-10-25T14:15:11.590000
CVE-2024-44100,0,0,e9777f3823ca5f020625b7de7657f183ca0a32ff11566ee15e67030df4347240,2024-10-25T14:15:11.590000
CVE-2024-44101,0,0,583f76d53afea6250ddef045f5c30668d9eb48e1e8827b0f170aa5034ba6581d,2024-10-25T12:56:07.750000
CVE-2024-44103,0,0,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000
CVE-2024-44104,0,0,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000
@ -260738,7 +260749,7 @@ CVE-2024-44807,0,0,62c2b8a7567d7a7c61c3dd691038c78c799cdde1b88696256483cc85f3e66
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
CVE-2024-4481,0,0,c2852db732c7c65c13524ea22e5406663429c55dff3bfe0d5bbffa299f48bbd3,2024-05-14T16:11:39.510000
CVE-2024-44812,0,0,58c5cf9640d27aaeb5d501aec11caa42847374dbca17391372c1e2e207ac31c0,2024-10-23T15:35:20.023000
CVE-2024-44812,0,1,26c90ab8a711eee71d3b78116577aa5e43694ec9f3cafc1dd7ab46be708a1d95,2024-10-25T16:56:11.150000
CVE-2024-44815,0,0,b542c0b8057471e724100a6582edd807f2b604eab9a88d4411aa24f995571f97,2024-09-25T19:17:02.237000
CVE-2024-44817,0,0,69deaa4e7ecbf919037754dfd86d6f5f34bcd33ff645863b7e5f14d08ab18721,2024-09-05T12:53:21.110000
CVE-2024-44818,0,0,d174c0799ffdbf965fa98c057c949d0dd19f8293fcbd2dc7f74d6c2c59752335,2024-09-05T12:53:21.110000
@ -261131,8 +261142,8 @@ CVE-2024-45323,0,0,c7408403154d2d18fc914b88a9df254c03b0863b353ec16a1e5cdd4039b8f
CVE-2024-45327,0,0,34cd0fc64fb19ec545d442f8caf6da026f7560c6302dd0f3b1f687d00148ed60,2024-09-11T16:26:11.920000
CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000
CVE-2024-45330,0,0,44d2ce461eeddbf3a7a44fe92b128e09d8c56d9b0bb9a6c4f9c38a59d262f5be,2024-10-19T00:41:09.717000
CVE-2024-45334,0,1,fbd6312b35c8dfb00b7b9cd224a77361e6b346b18836cc30a53c0b55e9ac4d31,2024-10-25T14:41:43.473000
CVE-2024-45335,0,1,b274212e48083a12503af1b1ddd8aa59b1b69e860bfecb2e94b0f481925a580c,2024-10-25T14:37:39.387000
CVE-2024-45334,0,0,fbd6312b35c8dfb00b7b9cd224a77361e6b346b18836cc30a53c0b55e9ac4d31,2024-10-25T14:41:43.473000
CVE-2024-45335,0,0,b274212e48083a12503af1b1ddd8aa59b1b69e860bfecb2e94b0f481925a580c,2024-10-25T14:37:39.387000
CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000
CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000
CVE-2024-45348,0,0,f8397568e636cad274a96a56fcdbc01af3feb6775d5986faa9442985588b0658,2024-09-26T13:32:55.343000
@ -261909,8 +261920,8 @@ CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113
CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000
CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
CVE-2024-46902,0,1,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000
CVE-2024-46903,0,1,7fee2b3212a25981cfa72a0710938cae175881af6a149713d86f5858d178110f,2024-10-25T14:47:28.607000
CVE-2024-46902,0,0,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000
CVE-2024-46903,0,0,7fee2b3212a25981cfa72a0710938cae175881af6a149713d86f5858d178110f,2024-10-25T14:47:28.607000
CVE-2024-46911,0,0,611952a6b1126b54cf024e9a99d67e12cb7d1e8ec93fd9b8c3fb7fb963b348cf,2024-10-15T12:57:46.880000
CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000
CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000
@ -261966,31 +261977,31 @@ CVE-2024-47010,0,0,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad
CVE-2024-47011,0,0,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000
CVE-2024-47012,0,0,48ee9c2e60f1c3fdbb797fe7506ae5bd29a96b346912b9784e7b5f21c1040cfe,2024-10-25T12:56:07.750000
CVE-2024-47013,0,0,190f11c14ed590e07e01ba9516bee238cab256108bd9f907d6f67a20bc3a2f78,2024-10-25T12:56:07.750000
CVE-2024-47014,0,1,517bfa885256428630aad0993b455784cae5e87712cb97182016a861f18bb976,2024-10-25T14:15:11.783000
CVE-2024-47015,0,1,ff96cfa0d9f88263fbfdd79733732a9ff330d97dcf8ab9375596378f10ba09df,2024-10-25T15:35:13.317000
CVE-2024-47016,0,1,5bb480ec0e9fd631ee64eb7e86f79fadf399ca14a987be83ebc334f12731b432,2024-10-25T15:35:14.487000
CVE-2024-47017,0,1,ec48a73c66b69cfdbd33128fb6e18b5a985fdcc5efbe00cd3212f49f8adb9439,2024-10-25T15:35:16.170000
CVE-2024-47018,0,1,eedb7d680d05336a47b7c5cec7b0ea60c4e37027081d33e82730e86796977626,2024-10-25T15:35:17.940000
CVE-2024-47019,0,1,d24bd2aac83874371574e3fdfb19f7aedd4a75be40a0b748ca8d115eb7cc0bbf,2024-10-25T15:35:19.497000
CVE-2024-47014,0,0,517bfa885256428630aad0993b455784cae5e87712cb97182016a861f18bb976,2024-10-25T14:15:11.783000
CVE-2024-47015,0,0,ff96cfa0d9f88263fbfdd79733732a9ff330d97dcf8ab9375596378f10ba09df,2024-10-25T15:35:13.317000
CVE-2024-47016,0,0,5bb480ec0e9fd631ee64eb7e86f79fadf399ca14a987be83ebc334f12731b432,2024-10-25T15:35:14.487000
CVE-2024-47017,0,0,ec48a73c66b69cfdbd33128fb6e18b5a985fdcc5efbe00cd3212f49f8adb9439,2024-10-25T15:35:16.170000
CVE-2024-47018,0,0,eedb7d680d05336a47b7c5cec7b0ea60c4e37027081d33e82730e86796977626,2024-10-25T15:35:17.940000
CVE-2024-47019,0,0,d24bd2aac83874371574e3fdfb19f7aedd4a75be40a0b748ca8d115eb7cc0bbf,2024-10-25T15:35:19.497000
CVE-2024-4702,0,0,bbb2ec3c513c4ef6cbdc2bf640b4bb7115c796c33db7b092e6fb7d12cf64fdd5,2024-05-15T16:40:19.330000
CVE-2024-47020,0,1,8cc56588fa67c6488d48725ca463b6e7c5121aa699e52d967ec763322c988e19,2024-10-25T14:15:11.833000
CVE-2024-47020,0,0,8cc56588fa67c6488d48725ca463b6e7c5121aa699e52d967ec763322c988e19,2024-10-25T14:15:11.833000
CVE-2024-47021,0,0,c76dc6b96a46993f8506ca6606d4ca47360f6031b2daa317a23260ae58f459eb,2024-10-25T12:56:07.750000
CVE-2024-47022,0,1,0021a56385b34320390d37d93b6b70f267a8ab1d92243aadd4981880ae362c7f,2024-10-25T14:15:11.877000
CVE-2024-47022,0,0,0021a56385b34320390d37d93b6b70f267a8ab1d92243aadd4981880ae362c7f,2024-10-25T14:15:11.877000
CVE-2024-47023,0,0,a160120633f566da41dca5c1d4166256c3ed06e850b8cbe662f2b94d506ea18c,2024-10-25T12:56:07.750000
CVE-2024-47024,0,0,c67aa502fb6dfb2b19cdbb6acf2c8bbce83a665eb81c15bcc8ab56c812d92bca,2024-10-25T12:56:07.750000
CVE-2024-47025,0,0,946f9819faab76c42319bdd62225fe3615065571c56c1933783aa59a60b0fcf4,2024-10-25T12:56:07.750000
CVE-2024-47026,0,0,6c02d4f4612dce56501f1b7426b722ddb31d01f70e8f1606b45d446a384a3115,2024-10-25T12:56:07.750000
CVE-2024-47027,0,0,7307605742347fbd6bba9ff648be91b743fed72589b08621d97210e5fa4f01a3,2024-10-25T12:56:07.750000
CVE-2024-47028,0,0,4be9ef6a15e8294398c5b238e53f40762716c84b35d14962a3f40612f0334a47,2024-10-25T12:56:07.750000
CVE-2024-47029,0,0,c00fe33e29576eb4c886220b0ad76f4efa65f92e37faeea50d09a11b493ebbe7,2024-10-25T12:56:07.750000
CVE-2024-47024,0,1,fdd8db96887c49e8c2dd0a2345448533fa22363bcdc70296d3714d8b8a1d05c9,2024-10-25T17:35:01.947000
CVE-2024-47025,0,1,cc755d2dfa83d9b00f84dc441cc05031865cf46bc6d4474051ebb8a299ce8934,2024-10-25T17:35:02.767000
CVE-2024-47026,0,1,0dd3b1d0ee282e446b5ffdb7f0e22e1a75573914f3e5e07cd15aeb5631127479,2024-10-25T17:35:03.593000
CVE-2024-47027,0,1,9176463edf9ab1fb44b78c2bf720fcfcc8a97ada3de811f156f19e6c5968310b,2024-10-25T17:35:04.390000
CVE-2024-47028,0,1,8e6ccd9449d1650f43ce21de8f3b71bac79f34933413bae4fdbe703e619e4a81,2024-10-25T17:35:05.147000
CVE-2024-47029,0,1,6ceacea7b31d9c08df562719f0aea3b0f5dcfad40eadbbbd9c8bcf984e54b881,2024-10-25T16:35:07.850000
CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000
CVE-2024-47030,0,1,3be2a305b27576be0e6560e95b9293dd29db11df97610966c4be76782dd4afda,2024-10-25T14:15:11.917000
CVE-2024-47031,0,1,b3e1a11628b63eb1d5c738aa227e8f278147c031544256d5366c807174523df5,2024-10-25T14:15:11.960000
CVE-2024-47033,0,0,57f4bccac57c0db5dc96d8abac1de80a1a6b39b09ce4859ef7c15ce36e29ec72,2024-10-25T12:56:07.750000
CVE-2024-47034,0,0,bda76592a61659a6539d837d0ade446de2ab3b52648b65516d8423c9a6ed08b8,2024-10-25T12:56:07.750000
CVE-2024-47035,0,0,0e72ef9028905a848055bc7b410f093c0da3a57b4981d99c0d27b3a65212ab53,2024-10-25T12:56:07.750000
CVE-2024-47030,0,0,3be2a305b27576be0e6560e95b9293dd29db11df97610966c4be76782dd4afda,2024-10-25T14:15:11.917000
CVE-2024-47031,0,0,b3e1a11628b63eb1d5c738aa227e8f278147c031544256d5366c807174523df5,2024-10-25T14:15:11.960000
CVE-2024-47033,0,1,9c2cd5b06235ca8b45a07f3d037aabc911bbc4d5c31162114495fe851d679b35,2024-10-25T17:35:05.913000
CVE-2024-47034,0,1,d59fd6f166a400963fc3af740fda9e91c610700fad7ee93dfce3994dca94702a,2024-10-25T16:35:08.630000
CVE-2024-47035,0,1,a3e48751355d497c6d8bf42ca7764bc77732d3fbfe4fec392271ffd450fa111b,2024-10-25T16:35:09.407000
CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
CVE-2024-47041,0,0,ecab1ebcf3f5b96075afee2c32f3cb4aa145bc04e04eaa902e50bfc451dffce0,2024-10-25T12:56:07.750000
CVE-2024-47041,0,1,badb113c52ad3f26fac9981faa6ebae8f0444af7e7657f49674083947f90d206,2024-10-25T16:35:10.220000
CVE-2024-47044,0,0,ee5fa186fb8ea19ca537298bbe2b5e712b21f44e9ac5aca4b5f7e41e68f91755,2024-10-17T02:15:02.840000
CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000
CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f687,2024-10-10T12:56:30.817000
@ -262506,7 +262517,7 @@ CVE-2024-47815,0,0,843559a4031eaee974816014150940c4f18b7f6d93739de5a1866ac2ce670
CVE-2024-47816,0,0,c0bf0d33ec35192d4154926a2f4d5d81b042bde4dbbd41d5e4618f5e20416892,2024-10-10T12:51:56.987000
CVE-2024-47817,0,0,e954b96b63862e883b53cd879b63811973adbf39f1f221652228e04e702c2294,2024-10-10T12:57:21.987000
CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a504,2024-10-10T12:57:21.987000
CVE-2024-47819,0,1,62c26271cc7e827b67a56b805c4044787ed1a2ccfbdbca2087660524d24c77f5,2024-10-25T14:24:36.823000
CVE-2024-47819,0,0,62c26271cc7e827b67a56b805c4044787ed1a2ccfbdbca2087660524d24c77f5,2024-10-25T14:24:36.823000
CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000
CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000
CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000
@ -262659,6 +262670,7 @@ CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f4
CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000
CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000
CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000
CVE-2024-48204,1,1,2d0833879720aba0f189d98abf08c386855c552d12207fd3da114e189cd9f34d,2024-10-25T16:15:09.873000
CVE-2024-48208,0,0,b02f86f1b335b3183358f07d84617fba93d01a0b465de0ef3561929c34125b92,2024-10-25T12:56:07.750000
CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000
CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000
@ -262688,14 +262700,14 @@ CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e
CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000
CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000
CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000
CVE-2024-48415,0,0,f0924ee00bd27af7c2e3b4df709006fd2e622c007a3785ddb6461472428a80bb,2024-10-23T16:35:09.317000
CVE-2024-48415,0,1,74b10390d002ade4800e5d7a55f6d3a4ceb198a0f7cd7077ee2455a630a69b9d,2024-10-25T16:55:26.083000
CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
CVE-2024-48423,0,0,8c282145a9dde1964a7595668e5968537e68f0c62ec8f7f792ca8b027908f113,2024-10-25T12:56:07.750000
CVE-2024-48424,0,0,ee533150d47efc3108cae9b82d77aeffc985ad6f31e1c299d1eaedfbcdbff2c3,2024-10-25T12:56:07.750000
CVE-2024-48425,0,0,df1f68bc528d6dfd39d403b8673e50b0c5a34729d3fbb1dc2fc99d2a9ef478e6,2024-10-25T12:56:07.750000
CVE-2024-48426,0,0,e81e85165a900ebe44b3c1b666ef9e10ab0bb6a4f34405cfc3b6695d78f79056,2024-10-25T12:56:07.750000
CVE-2024-48427,0,0,b7bd032e8bdf5711752138acdb68e40d7f3b7f526e0c14aa289eef0dcf1c40b3,2024-10-25T12:56:07.750000
CVE-2024-48428,1,1,445242dfb5fe2d8ffbd80ecefca24e9fb7c015e45d9fda28b70a454257506766,2024-10-25T15:15:18.827000
CVE-2024-48428,0,0,445242dfb5fe2d8ffbd80ecefca24e9fb7c015e45d9fda28b70a454257506766,2024-10-25T15:15:18.827000
CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000
CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000
CVE-2024-48440,0,0,5219db498a563dd1c6489094539901c4defdd8cd94636f8687a9af5fa80de2ee,2024-10-25T12:56:07.750000
@ -262703,6 +262715,7 @@ CVE-2024-48441,0,0,224bc247fd5f1747eb1e946da5b3115767d16a53740175a2dfcb73dea07b1
CVE-2024-48442,0,0,084bb62aa7e367eaa572c5f66b2188f35788a01f98625b5dbdc0959d7e2c72e8,2024-10-25T12:56:07.750000
CVE-2024-4845,0,0,f8e5a569577a931ed62905431d3e7dc57f80df89344697bf8fc7f196d4c6a1d9,2024-07-23T17:23:41.597000
CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000
CVE-2024-48459,1,1,a7d1ee8f457b4cb4b257b6751d2a0c81826e21b458157c0b6ac00441abd5283c,2024-10-25T17:15:04.703000
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
@ -262714,7 +262727,7 @@ CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6e
CVE-2024-48538,0,0,d00c6ae109958170edcc3a2c583c2ac0637abae567969e57f7b9a648e6c8cb40,2024-10-25T12:56:07.750000
CVE-2024-48539,0,0,1d5c8fdf188ef55366358121671809693c2ffcac98329c253bc948034dac981b,2024-10-25T12:56:07.750000
CVE-2024-4854,0,0,9d5d733c00183e47994464da1b76a252c7e4b8268459cd8a1634b1fda6297d73,2024-08-29T15:15:31.797000
CVE-2024-48540,0,0,327a775e6b8b1e591747f57b3720a69e7aefde49218f062c18de2406ab7c9fb8,2024-10-25T12:56:07.750000
CVE-2024-48540,0,1,d28fdb22fce9e3091e2d534ef960f29e698a35b76fafedab91937579287ab000,2024-10-25T16:35:11.093000
CVE-2024-48541,0,0,445987ffb9995efed065af6e947aa780367ff397aa0e6a5c5154f3922a65938e,2024-10-25T12:56:07.750000
CVE-2024-48542,0,0,3cd5de49086c2c00210e7dab5fa3a8eb1e801db273093814abbd4185d4a7eeaf,2024-10-25T12:56:07.750000
CVE-2024-48544,0,0,066e44948f9e780845364a134f83700eb451ac395786b145ae7dc4bd6c567b2e,2024-10-25T12:56:07.750000
@ -262726,7 +262739,10 @@ CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f8
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
CVE-2024-48570,0,0,a07030a76cd88cf2d077be21611e593db567eb3ed2799d5f3776bbda7ecbaf36,2024-10-23T15:12:34.673000
CVE-2024-48579,1,1,050bf08496731e9fa01ddddf10f6c383539d6e884fee1d3101c51c157c56909c,2024-10-25T16:15:09.940000
CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000
CVE-2024-48580,1,1,38c4000b35372237ef9186873e78fb7b43739235dd7422171df3719331b79af0,2024-10-25T16:15:09.993000
CVE-2024-48581,1,1,7e02d80033b3f21fbfe923c81e59e73fdce925d6814b23c4e7dbaf3d3da8d2ec,2024-10-25T16:15:10.047000
CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000
CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000
CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000
@ -262749,7 +262765,9 @@ CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860a
CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000
CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000
CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
CVE-2024-48652,0,0,49154ba7497ef192453221e4060c2b6cb066a0169e9fec9edb64b7bf9a759b2f,2024-10-23T16:35:10.103000
CVE-2024-48652,0,1,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000
CVE-2024-48654,1,1,e34310090447184f0e074f6a144ad626d589255dd6d7d0c385a44ba8bdec3cb5,2024-10-25T17:15:04.763000
CVE-2024-48655,1,1,01169986f94a33ed859c0940866e2417c4a2c0d0d0863258a06e31477c3e9a96,2024-10-25T17:15:04.817000
CVE-2024-48656,0,0,7991ecc43dfce32475e8e1d32ee086228d1cf510284114bf3bd76e22363c0bc1,2024-10-24T14:37:36.353000
CVE-2024-48657,0,0,92137caf7714ad77e1f5fbc8130edf53e1c7b0ac9e690fd892c8d5cb42ccb1b6,2024-10-24T14:38:41.620000
CVE-2024-48659,0,0,74eba10fd7e373cc2157a8c68b69a750c73226aa0e75d8a35ccb512ee7fa62b0,2024-10-23T15:12:34.673000
@ -262769,6 +262787,7 @@ CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d
CVE-2024-4872,0,0,c60d4ff9e5499bf7427bb540017644c2677aac5e300662a3bf0eae497fb13b4d,2024-09-05T09:15:03.743000
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-48743,1,1,990afaada28bfd6eaecf6c0573daeeeeb4ff3c6941fad6d144122478a8f4e339,2024-10-25T17:15:04.873000
CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000
CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000
CVE-2024-48758,0,0,a0017ffb6fab9626ea62b98de0c6903a7dbb8c74f73f1e588de68b4bc17a833d,2024-10-18T12:53:04.627000
@ -262834,10 +262853,10 @@ CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f1
CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000
CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000
CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000
CVE-2024-48925,0,1,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000
CVE-2024-48926,0,0,85f39ac2dcd7739b6ccfb6e70db444f1e5bc7351c40aca02df38e0890edc7565,2024-10-23T15:12:34.673000
CVE-2024-48927,0,0,01a9606e87c9d0fe295b7af78c12d3892f336c8d52386afeb159eacf9a03d0c7,2024-10-23T15:12:34.673000
CVE-2024-48929,0,0,8f42514e5e40293361141ad0a32c5cc2c18cee04cb42f38abe2f83b6fba170dd,2024-10-23T15:12:34.673000
CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000
CVE-2024-48926,0,1,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000
CVE-2024-48927,0,1,23a6232a362c7fb17e2b0c22da571a466ad2d8607917844c1edab564eae3beac,2024-10-25T16:15:13.327000
CVE-2024-48929,0,1,9634f8a920413f581a19c3b63c79c0b9d222c6607f7ac0361bee3f54dbad7500,2024-10-25T16:12:15.897000
CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000
CVE-2024-48930,0,0,c7b6cd0340da2631ccf07a7015b8cf581a1e5f29f6a6b1ff9f3168b16f8d9c48,2024-10-21T17:09:45.417000
CVE-2024-48931,0,0,cb76da7947433082044eb8eab7c26fb2f1f77c9a2e73af320a6686276ae68e56,2024-10-25T12:56:07.750000
@ -263028,9 +263047,9 @@ CVE-2024-49368,0,0,7653bacc44e12cb471d1297a98c3c2ed197407d61a2b90effa86f38f0c320
CVE-2024-49370,0,0,53182a6ce2637f054e6cf92c623239d8b52a4ad6590d2f00fca7214b8ca5b926,2024-10-25T12:56:36.827000
CVE-2024-49373,0,0,d6a9e6f6c722f791a40f83e3b6a0acb632418ab99ccc19489aebf72e45099e53,2024-10-23T15:12:34.673000
CVE-2024-49376,0,0,a2f1fc0c46eafede66ea4a7282a6bf439f386a3056e7dcea26e39b9eef5c8b0f,2024-10-25T13:15:17.957000
CVE-2024-49378,0,1,c97d9deb0f6c411dabfee329dafdb02e819b4bbc66d5e9b222f63c2e79056d30,2024-10-25T15:35:20.597000
CVE-2024-49380,1,1,1a56d17b0c1ca302fc6e774b0df6f0290a8aad0f38830efc984dd6e84ae08085,2024-10-25T15:35:20.800000
CVE-2024-49381,1,1,4cba5c0f0db0443e1841fe15174b2d945328a0c5767e5510734ec6866bcc833b,2024-10-25T14:15:12.160000
CVE-2024-49378,0,0,c97d9deb0f6c411dabfee329dafdb02e819b4bbc66d5e9b222f63c2e79056d30,2024-10-25T15:35:20.597000
CVE-2024-49380,0,0,1a56d17b0c1ca302fc6e774b0df6f0290a8aad0f38830efc984dd6e84ae08085,2024-10-25T15:35:20.800000
CVE-2024-49381,0,0,4cba5c0f0db0443e1841fe15174b2d945328a0c5767e5510734ec6866bcc833b,2024-10-25T14:15:12.160000
CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
@ -263132,9 +263151,9 @@ CVE-2024-4974,0,0,29381f582adec4042105cf6b841ea7b6d4575f99995b9ea6ba695d777207b6
CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c152070c,2024-06-04T19:20:56.337000
CVE-2024-49750,0,0,a7e8b2a926889afed7f90910ab6e5ec3cbfd5fe1c3a7f940d8c01d024ee8d1a6,2024-10-25T12:56:07.750000
CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000
CVE-2024-49753,1,1,4f2cf1543f68230174c4b54915801b1759d37d299845b94e1586784b44ef5f86,2024-10-25T14:15:12.280000
CVE-2024-49753,0,0,4f2cf1543f68230174c4b54915801b1759d37d299845b94e1586784b44ef5f86,2024-10-25T14:15:12.280000
CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000
CVE-2024-49757,1,1,c6362d09c2d574e1f0ce09934d73589118196613bc86ccad430e266a30927c0b,2024-10-25T15:15:18.957000
CVE-2024-49757,0,0,c6362d09c2d574e1f0ce09934d73589118196613bc86ccad430e266a30927c0b,2024-10-25T15:15:18.957000
CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000
CVE-2024-49760,0,0,73350c3c15eb518e634dec8ba3e2da01f8968eca1d80c5872e6dfc5d4ab4dd78,2024-10-25T12:56:07.750000
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
@ -263175,31 +263194,31 @@ CVE-2024-49877,0,0,d6737343e2e6d35b24e2372e9def747b4bc65b280702cdab9fa882c146701
CVE-2024-49878,0,0,b8c9bc38c52857d113170f626183012a77e29f98422a41470a6d55d4836a25af,2024-10-23T15:13:58.783000
CVE-2024-49879,0,0,4ba4f4e2755978e6b26e142493deaf8ac3f7043a28c24533d747809c633568d6,2024-10-24T19:59:12.897000
CVE-2024-4988,0,0,ff557f66f633c813e65ed42f6b56820b4233d3efc23d00548e6797ba166f3d35,2024-08-21T03:15:05.460000
CVE-2024-49880,0,1,09fe78431a330c18b67c01afff178e830e795e339c621997697590ac350f25d2,2024-10-25T14:42:58.203000
CVE-2024-49881,0,1,1ac9145b68c4c2f4b94a95036353c1fa0b7d91749fafecd38814d212a6b25661,2024-10-25T14:43:18.153000
CVE-2024-49880,0,0,09fe78431a330c18b67c01afff178e830e795e339c621997697590ac350f25d2,2024-10-25T14:42:58.203000
CVE-2024-49881,0,0,1ac9145b68c4c2f4b94a95036353c1fa0b7d91749fafecd38814d212a6b25661,2024-10-25T14:43:18.153000
CVE-2024-49882,0,0,e28c808ad906fdf2d8b42e0337e716f32ce905464511139ffb16f8cabedad72e,2024-10-23T15:13:58.783000
CVE-2024-49883,0,1,ec0c00eef433bb3796bed996ed868314c1b85ed97638d00f928723bc15db1673,2024-10-25T14:43:29.440000
CVE-2024-49884,0,1,56a97b328b797787713298030e345a1d9221c8bf304dc1e9b48c5401307c47fd,2024-10-25T14:37:00.070000
CVE-2024-49883,0,0,ec0c00eef433bb3796bed996ed868314c1b85ed97638d00f928723bc15db1673,2024-10-25T14:43:29.440000
CVE-2024-49884,0,0,56a97b328b797787713298030e345a1d9221c8bf304dc1e9b48c5401307c47fd,2024-10-25T14:37:00.070000
CVE-2024-49885,0,0,7454dd4079942ea8aa368264550142902e9d91264028a0091b5e06c3e31015df,2024-10-23T15:13:58.783000
CVE-2024-49886,0,0,d058b0110cc7ae718a3f90fe7bd717654f8b8374ccdac41e3166fd761799644f,2024-10-23T15:13:58.783000
CVE-2024-49887,0,0,e6db44b39cc00cffa6a621a85bfcf2139e4599af1b439fcb766e3952fb2c09b3,2024-10-23T15:13:58.783000
CVE-2024-49888,0,0,3f840da09cb58e8af69d24768fab0f04d52756c1cab879ffca1acbd8ff14327a,2024-10-23T15:13:58.783000
CVE-2024-49889,0,1,3c863e63fd48c3db3419430a21a4d8c911f6ac7efa3158f64cf41f494445bbca,2024-10-25T14:37:34.400000
CVE-2024-49890,0,1,585d995237d21981fb3b6b01c85816c0030dcc831f475278287062aff66de7b2,2024-10-25T14:41:41.680000
CVE-2024-49891,0,1,d4a8cbcb6210dfe0148e3c78f189f223e8712de66bdeaea637d3f10c8e45cc0d,2024-10-25T14:42:27.193000
CVE-2024-49892,0,1,de117843bce9902cbd5b0837be9e8525ced69404f709fcb10df4d4ee9a048442,2024-10-25T14:32:23.250000
CVE-2024-49893,0,1,3717b4ca8d6b80b2332e3b4380301399a14ffca1d81d79c6e015fddfeebdf47a,2024-10-25T14:32:44.987000
CVE-2024-49894,0,1,9eae7e9161fe1c02c7d95140789ecaced8a9c812472329ac2732c53169ffafcf,2024-10-25T14:32:58.803000
CVE-2024-49895,0,1,a3362f6bbc386ce7ac26fe74d5d3d062bbc81e580aa1a7c79c54383b794d854e,2024-10-25T14:35:35.013000
CVE-2024-49889,0,0,3c863e63fd48c3db3419430a21a4d8c911f6ac7efa3158f64cf41f494445bbca,2024-10-25T14:37:34.400000
CVE-2024-49890,0,0,585d995237d21981fb3b6b01c85816c0030dcc831f475278287062aff66de7b2,2024-10-25T14:41:41.680000
CVE-2024-49891,0,0,d4a8cbcb6210dfe0148e3c78f189f223e8712de66bdeaea637d3f10c8e45cc0d,2024-10-25T14:42:27.193000
CVE-2024-49892,0,0,de117843bce9902cbd5b0837be9e8525ced69404f709fcb10df4d4ee9a048442,2024-10-25T14:32:23.250000
CVE-2024-49893,0,0,3717b4ca8d6b80b2332e3b4380301399a14ffca1d81d79c6e015fddfeebdf47a,2024-10-25T14:32:44.987000
CVE-2024-49894,0,0,9eae7e9161fe1c02c7d95140789ecaced8a9c812472329ac2732c53169ffafcf,2024-10-25T14:32:58.803000
CVE-2024-49895,0,0,a3362f6bbc386ce7ac26fe74d5d3d062bbc81e580aa1a7c79c54383b794d854e,2024-10-25T14:35:35.013000
CVE-2024-49896,0,0,3f1380eb65a46fd6c140a7018d3ebab6411c8e058bdb4421ef2ac6f41502b6df,2024-10-24T03:44:44.747000
CVE-2024-49897,0,0,f31524e1efc8ee5a9e73df951a18e06d10291aa5962ae940870f2cbc30aa66d4,2024-10-23T15:13:25.583000
CVE-2024-49898,0,0,b092955f008db9bd659627d8317ec57437e56c320204da394d02abc43f25a786,2024-10-24T03:43:20.723000
CVE-2024-49899,0,1,93ca62dc4cb1f1b306f0d3b08db6fe171ff8e5656153ada772fdf9658d13299c,2024-10-25T14:35:52.620000
CVE-2024-49900,0,1,05109ec6c753a9a5c4fafd0be348a76583349efc8e0b705e507cf20b2298c450,2024-10-25T14:24:23.710000
CVE-2024-49901,0,1,4f68e53c02004eff12bd733174d930c7b48002facfffbf9a6968982a8338152e,2024-10-25T14:05:16.967000
CVE-2024-49899,0,0,93ca62dc4cb1f1b306f0d3b08db6fe171ff8e5656153ada772fdf9658d13299c,2024-10-25T14:35:52.620000
CVE-2024-49900,0,0,05109ec6c753a9a5c4fafd0be348a76583349efc8e0b705e507cf20b2298c450,2024-10-25T14:24:23.710000
CVE-2024-49901,0,0,4f68e53c02004eff12bd733174d930c7b48002facfffbf9a6968982a8338152e,2024-10-25T14:05:16.967000
CVE-2024-49902,0,0,3fe235ed65651ec18a8b1f6f0acf83e71c546f542c12b0c09828768c24b587f6,2024-10-23T15:13:25.583000
CVE-2024-49903,0,0,2539e5e120442e7cdfefdbc99ff64f4cc7dbf0fb64facc5f0a4d31d992b6f119,2024-10-25T13:40:06.810000
CVE-2024-49904,0,1,97945585b118f8c6be2209a6e9d3878cf1ef61a3baa5c195d66ae59f1158b386,2024-10-25T15:54:47.737000
CVE-2024-49904,0,0,97945585b118f8c6be2209a6e9d3878cf1ef61a3baa5c195d66ae59f1158b386,2024-10-25T15:54:47.737000
CVE-2024-49905,0,0,f4631ee47058363e32e11b4aea202efa20a8c8c9448ca3ac5797ac4437398718,2024-10-24T03:43:35.477000
CVE-2024-49906,0,0,91af29781076ace205124cb2e2712db1c968b1334d64667cfc3afb832aba98a7,2024-10-24T03:43:55.397000
CVE-2024-49907,0,0,b89d56fb72aebc43378e0219ffbfea754ad0b03b512db3e35c2523267519507f,2024-10-24T03:42:38.270000
@ -263215,32 +263234,32 @@ CVE-2024-49915,0,0,20ed63f989ef6a3325be01e3eba38436924669d497ab74a555eed1da2d1f8
CVE-2024-49916,0,0,2edac145765d8fc598aad9ff910680f77ffbb99e6c11576aa209b5351f4c9fea,2024-10-24T17:03:19.457000
CVE-2024-49917,0,0,569d41b05afb4d90d6e33110de7bd2003835815a26ed05b7e280217516be7449,2024-10-24T16:54:05.930000
CVE-2024-49918,0,0,5eae7ff331f8de48785ff962f1f32a8b776d3cdb2b236155202d9dbd16926f4f,2024-10-24T16:49:57.453000
CVE-2024-49919,0,1,6d02ad8c0190574f92e249fe7b9f0e422d5a33453dc5a05d96835abbf375e04f,2024-10-25T14:55:47.027000
CVE-2024-49919,0,0,6d02ad8c0190574f92e249fe7b9f0e422d5a33453dc5a05d96835abbf375e04f,2024-10-25T14:55:47.027000
CVE-2024-4992,0,0,e061228a83f2d41e21e64f404fd50aefb3a354b638438e4cf4870e41885d01e3,2024-05-16T13:03:05.353000
CVE-2024-49920,0,1,88bcc864c6e3784f6c0f5adcdacb9992c94c692ea7f226985fdc229936979b19,2024-10-25T14:56:32.303000
CVE-2024-49921,0,1,bb51ef53024220ee2e44a825027a51bf6c5ca654c7f83eb27ef904e27babde55,2024-10-25T15:01:21.077000
CVE-2024-49922,0,1,f7dbe3bddb75bb3ea2b5380d42f021bcf9f8034ec34fcdbbeecea2d0b58e774d,2024-10-25T14:56:06.057000
CVE-2024-49920,0,0,88bcc864c6e3784f6c0f5adcdacb9992c94c692ea7f226985fdc229936979b19,2024-10-25T14:56:32.303000
CVE-2024-49921,0,0,bb51ef53024220ee2e44a825027a51bf6c5ca654c7f83eb27ef904e27babde55,2024-10-25T15:01:21.077000
CVE-2024-49922,0,0,f7dbe3bddb75bb3ea2b5380d42f021bcf9f8034ec34fcdbbeecea2d0b58e774d,2024-10-25T14:56:06.057000
CVE-2024-49923,0,0,09ac36e1842b66b81133b68e0fa1454145946558f64c3262440b063666a332ca,2024-10-24T19:43:27.327000
CVE-2024-49924,0,1,a10707e355d814a05371bb2b400c5423dcf6365018716ac455fc54dabf6654c0,2024-10-25T15:21:40.623000
CVE-2024-49924,0,0,a10707e355d814a05371bb2b400c5423dcf6365018716ac455fc54dabf6654c0,2024-10-25T15:21:40.623000
CVE-2024-49925,0,0,6717452f4abf1a8f70ff5a0320447c3ada5e06f5537ce54743f004253e0476ee,2024-10-23T15:13:25.583000
CVE-2024-49926,0,0,c340907a54f3f82bc1267ccf326bdc9da10ebc5c7cb46a2ab73c0d413d3ff7bf,2024-10-23T15:13:25.583000
CVE-2024-49927,0,0,80092bd69a60e7db046e7721161bd2b361d15ecd0245c57dbfc59dd407a5dd94,2024-10-23T15:13:25.583000
CVE-2024-49928,0,1,8e84a2aa26c14268cca8858510196348b8604528002bd2f6ac4bef54b852d76f,2024-10-25T15:22:31.013000
CVE-2024-49929,0,1,409fff6f1c13ae1c406792ee7f9444fe8bf4ea113f439e03b8d1297690597cfc,2024-10-25T15:22:53.763000
CVE-2024-49928,0,0,8e84a2aa26c14268cca8858510196348b8604528002bd2f6ac4bef54b852d76f,2024-10-25T15:22:31.013000
CVE-2024-49929,0,0,409fff6f1c13ae1c406792ee7f9444fe8bf4ea113f439e03b8d1297690597cfc,2024-10-25T15:22:53.763000
CVE-2024-4993,0,0,e0839a9575413089a3f10a1147258f2a987a3e24cb291a41fcab67561670893d,2024-05-16T13:03:05.353000
CVE-2024-49930,0,1,4f6d566d38e98cfef81aa3c468e55508e5ddacca4ab92a3aa3e190b5b39ab22e,2024-10-25T15:23:14.283000
CVE-2024-49931,0,1,c64e6a507a81e93e0a0fbd52f6d868b83dce69bbf375c0c8265267d61314b728,2024-10-25T15:16:07.980000
CVE-2024-49930,0,0,4f6d566d38e98cfef81aa3c468e55508e5ddacca4ab92a3aa3e190b5b39ab22e,2024-10-25T15:23:14.283000
CVE-2024-49931,0,0,c64e6a507a81e93e0a0fbd52f6d868b83dce69bbf375c0c8265267d61314b728,2024-10-25T15:16:07.980000
CVE-2024-49932,0,0,e5188c7ee1c1972b05d3687d2846a4c04fb0ddad3d4fdc696a14fd6fd5b3f9da,2024-10-23T15:13:25.583000
CVE-2024-49933,0,0,19c189adea2c51f30368218900eaf8147078b0b49ef8fa469c43040d096ea648,2024-10-23T15:13:25.583000
CVE-2024-49934,0,0,e37c6ce2db6489d7950418452ae8950ea036544ab18fb721f3040d7c2ecacadd,2024-10-23T15:13:25.583000
CVE-2024-49935,0,0,47ec8d85e946423f2b5a7d6f760f5940e7dec7c60deca4cdde6ceadd824a68c0,2024-10-23T15:13:25.583000
CVE-2024-49936,0,1,53b60eee50934e6330711ceaf5c84de680cbe1bc85ba946b907431818ed4e720,2024-10-25T15:16:22.713000
CVE-2024-49936,0,0,53b60eee50934e6330711ceaf5c84de680cbe1bc85ba946b907431818ed4e720,2024-10-25T15:16:22.713000
CVE-2024-49937,0,0,fbe6451c8c5411e80e94bbe8a5b20cc7de2c60b897db9c68851607b7663313dd,2024-10-23T15:13:25.583000
CVE-2024-49938,0,0,b09fdb8ffc6d5bd9de59db6069511d5913a2762d8b413226026de2322576dd21,2024-10-23T15:13:25.583000
CVE-2024-49939,0,0,402d43d358a15010064d110767edefebd01db49ff6b25ef8d93e0a2b850281ad,2024-10-23T15:13:25.583000
CVE-2024-49940,0,0,2e190a7774264c10f5b4bfb57ed4ea08bed9643d1920281d3d935207593158d9,2024-10-23T15:13:25.583000
CVE-2024-49941,0,1,b3da1a021545935ffaca2b9847684775ba3cc9b8435719cbf248706bcb1aa694,2024-10-25T15:17:30.543000
CVE-2024-49942,0,1,29368c54b2560ed8564591b764785ef1f8b272b1a5154512293cafb7aaf5bb26,2024-10-25T14:56:59.397000
CVE-2024-49941,0,0,b3da1a021545935ffaca2b9847684775ba3cc9b8435719cbf248706bcb1aa694,2024-10-25T15:17:30.543000
CVE-2024-49942,0,0,29368c54b2560ed8564591b764785ef1f8b272b1a5154512293cafb7aaf5bb26,2024-10-25T14:56:59.397000
CVE-2024-49943,0,0,c3614511322770c16ab293e578f901ae8604118536f12a561f6871b2e4e64082,2024-10-23T15:13:25.583000
CVE-2024-49944,0,0,a5c39556d594e40e637b5d4bce6dabeb8fc6b6740ae1330c7d32ed8079defca7,2024-10-23T15:13:25.583000
CVE-2024-49945,0,0,8830ebf94239bc1c89548ddf5790035646bb82b6726d019b6557ea104bc21136,2024-10-23T15:13:25.583000
@ -263281,8 +263300,8 @@ CVE-2024-49978,0,0,d1d022627966490e425b664f8063a108568b0f5033ee2065467ad5efe1a2a
CVE-2024-49979,0,0,af031dedc92de72c54d427a92e62fc2853294f38d0fdf026f9d854688a1c6e3a,2024-10-23T15:13:25.583000
CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000
CVE-2024-49980,0,0,1b7f876e1e74006c4cbc36f26a364fbc1043d115c2b25809299afdde070e9fbd,2024-10-23T15:13:25.583000
CVE-2024-49981,0,1,be8906564b57b0b9a043fe42c3d38b8548c4c2cbb0858120a7fa2fad8e2b8ee7,2024-10-25T14:56:40.073000
CVE-2024-49982,0,1,1ae51728dfad6dc77da9a9af15e226c1ee61eeb30c84012b23419f82a91617a3,2024-10-25T15:08:03.790000
CVE-2024-49981,0,0,be8906564b57b0b9a043fe42c3d38b8548c4c2cbb0858120a7fa2fad8e2b8ee7,2024-10-25T14:56:40.073000
CVE-2024-49982,0,0,1ae51728dfad6dc77da9a9af15e226c1ee61eeb30c84012b23419f82a91617a3,2024-10-25T15:08:03.790000
CVE-2024-49983,0,0,a8ab82f4196f5cdde113b23acc0e392f7ce69758223b37afd8356b634ec56e89,2024-10-23T15:13:25.583000
CVE-2024-49984,0,0,52132884d98254bcf3670a6c5035fab9415ac6c1e9ca87fbf0878fa15bfb5d0a,2024-10-23T15:13:25.583000
CVE-2024-49985,0,0,6505f687f4eb9245242570ba51d30471acb035977a44ab969f22173c754f5a44,2024-10-23T15:13:25.583000
@ -263293,9 +263312,9 @@ CVE-2024-49989,0,0,b0266992e9e68cde51259a4c15d0630c79796c1acece427b6a30c5a2dc4e9
CVE-2024-4999,0,0,aeea1ad154336e8cbd739fb19642e978908300b067641ea9bc4ea587cb0b31ba,2024-05-16T15:44:44.683000
CVE-2024-49990,0,0,e1d70beb5c3ac0c9d76d00adce179924ec0e97ef68d2e89f39fbefb01b11d6b7,2024-10-23T15:13:25.583000
CVE-2024-49991,0,0,2fb930d0a7a3c2773f0499a4ac914a761eade3a99dfddc4271f3a9d058939c0f,2024-10-23T15:13:25.583000
CVE-2024-49992,0,1,552b9e8ee31b9d2986b015547bb9a5ad1516a945b66e9c2d1491a0c82371c9bc,2024-10-25T14:52:00.273000
CVE-2024-49993,0,1,173745e8fc0b2f51f6583b765f43b75fc7379f37eeab514e19093d1e0bbc2187,2024-10-25T14:52:19.167000
CVE-2024-49994,0,1,b259470c6938b01fe0b06a9ea53deb1f1b59fb7f77762cb60813754903d6329f,2024-10-25T14:52:32.877000
CVE-2024-49992,0,0,552b9e8ee31b9d2986b015547bb9a5ad1516a945b66e9c2d1491a0c82371c9bc,2024-10-25T14:52:00.273000
CVE-2024-49993,0,0,173745e8fc0b2f51f6583b765f43b75fc7379f37eeab514e19093d1e0bbc2187,2024-10-25T14:52:19.167000
CVE-2024-49994,0,0,b259470c6938b01fe0b06a9ea53deb1f1b59fb7f77762cb60813754903d6329f,2024-10-25T14:52:32.877000
CVE-2024-49995,0,0,b14274080bc6cde5e18285c4271101e0fd75dd4ad1b68ac92642bd34920a24f9,2024-10-23T15:13:25.583000
CVE-2024-49996,0,0,09919f5bd92b6ffa4ceeb00f48af54ba697342e221271cbab43696a2c7a40ce0,2024-10-23T15:13:25.583000
CVE-2024-49997,0,0,4f0d5cbc938668da4cca12e8619053d4fe51e93b90646e0ffb3c7559200d809e,2024-10-23T15:13:25.583000
@ -263322,31 +263341,31 @@ CVE-2024-50015,0,0,6d4bf18cde3e91eef710a5b6ca23cc98ba4179d8758cab4bc07f83164bcd0
CVE-2024-50016,0,0,150cc155a5101207172a6ab21de9b50c216ceecbad4a50f73bb2b1561ac16362,2024-10-23T15:13:25.583000
CVE-2024-50017,0,0,4fcef121f58bca52e096970b6b422944c415a23596af63574c5ac44a02eb4de0,2024-10-23T15:13:25.583000
CVE-2024-50018,0,0,0ab552b7de0854c620630fdbc4c5dd46fd08e7915ae706c165d1b10fd64bea68,2024-10-23T15:13:25.583000
CVE-2024-50019,0,1,d8994edc51fb202404bc99651a5a3068f2ced8d7ea559aa9a79a920af775bb92,2024-10-25T14:45:56.190000
CVE-2024-50019,0,0,d8994edc51fb202404bc99651a5a3068f2ced8d7ea559aa9a79a920af775bb92,2024-10-25T14:45:56.190000
CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf875190207207,2024-08-01T13:59:37.720000
CVE-2024-50020,0,1,6661d43351c3469f03e20f3e76c98c07a0ed5f6d6c8216674628fc4e4b1c99b7,2024-10-25T14:50:42.230000
CVE-2024-50021,0,1,57898aec5b1884b47d938a7c111f0959d068fd1db827ee35c06871b16a31f2f4,2024-10-25T14:52:13.890000
CVE-2024-50022,0,1,d347f317ab0388be7e02e3c067a725743f4f4a2ec5fe9c3616767a56611772d5,2024-10-25T15:05:57.403000
CVE-2024-50023,0,1,67f390b3621c869ad7858ff2cf441444955c6d93a2b1b8f79163356225513f54,2024-10-25T15:07:10.487000
CVE-2024-50024,0,1,60b10f77c40cd33e6bb0c36c232abbcb5b954e0ca64e6e3e63daeff17d1f716d,2024-10-25T15:08:58.293000
CVE-2024-50025,0,1,996c9003bb36be85d02a1f00c0b7117f395f6400ba523ac2e3036745eb98fc43,2024-10-25T15:12:00.453000
CVE-2024-50026,0,1,2ea88617c927e9b4efea5125e99e0520462e67a640d28198604f210d9ecb47e7,2024-10-25T15:13:04.783000
CVE-2024-50027,0,1,911e9c91ef791dfbec8fa7d37f12e0e3766dc424c106bb3bfff768993b582c21,2024-10-25T15:19:07.347000
CVE-2024-50028,0,1,0c515280c45f3dd7f31bd68af88438fbc3171240e30f91b92e80aff6248b67e3,2024-10-25T15:21:23.237000
CVE-2024-50029,0,1,c0c360b215c9e9abcd71b930acf9abae8a71f87537f3ed68d96671a274f6cdc8,2024-10-25T15:27:06.047000
CVE-2024-50020,0,0,6661d43351c3469f03e20f3e76c98c07a0ed5f6d6c8216674628fc4e4b1c99b7,2024-10-25T14:50:42.230000
CVE-2024-50021,0,0,57898aec5b1884b47d938a7c111f0959d068fd1db827ee35c06871b16a31f2f4,2024-10-25T14:52:13.890000
CVE-2024-50022,0,0,d347f317ab0388be7e02e3c067a725743f4f4a2ec5fe9c3616767a56611772d5,2024-10-25T15:05:57.403000
CVE-2024-50023,0,0,67f390b3621c869ad7858ff2cf441444955c6d93a2b1b8f79163356225513f54,2024-10-25T15:07:10.487000
CVE-2024-50024,0,0,60b10f77c40cd33e6bb0c36c232abbcb5b954e0ca64e6e3e63daeff17d1f716d,2024-10-25T15:08:58.293000
CVE-2024-50025,0,0,996c9003bb36be85d02a1f00c0b7117f395f6400ba523ac2e3036745eb98fc43,2024-10-25T15:12:00.453000
CVE-2024-50026,0,0,2ea88617c927e9b4efea5125e99e0520462e67a640d28198604f210d9ecb47e7,2024-10-25T15:13:04.783000
CVE-2024-50027,0,0,911e9c91ef791dfbec8fa7d37f12e0e3766dc424c106bb3bfff768993b582c21,2024-10-25T15:19:07.347000
CVE-2024-50028,0,0,0c515280c45f3dd7f31bd68af88438fbc3171240e30f91b92e80aff6248b67e3,2024-10-25T15:21:23.237000
CVE-2024-50029,0,0,c0c360b215c9e9abcd71b930acf9abae8a71f87537f3ed68d96671a274f6cdc8,2024-10-25T15:27:06.047000
CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000
CVE-2024-50030,0,1,03dbd5d823688fd0af763e471a3b418e54005c1e956fa6537490ce9e6a34ff8e,2024-10-25T14:06:40.707000
CVE-2024-50031,0,1,0b57c92713e63d7fe3c7a4dd4a9f3e5628c6fd6668da6ddb5ed55a8e13878ed1,2024-10-25T15:30:15.727000
CVE-2024-50032,0,1,637e150873829d1b7c3d3a118914d460721e34274ed685e063d54b031f3cb675,2024-10-25T15:34:22.353000
CVE-2024-50030,0,0,03dbd5d823688fd0af763e471a3b418e54005c1e956fa6537490ce9e6a34ff8e,2024-10-25T14:06:40.707000
CVE-2024-50031,0,0,0b57c92713e63d7fe3c7a4dd4a9f3e5628c6fd6668da6ddb5ed55a8e13878ed1,2024-10-25T15:30:15.727000
CVE-2024-50032,0,0,637e150873829d1b7c3d3a118914d460721e34274ed685e063d54b031f3cb675,2024-10-25T15:34:22.353000
CVE-2024-50033,0,0,31b01ea83bcca81918c070b63b5485c88672f34d727199970bc597721f06bb09,2024-10-24T19:56:04.097000
CVE-2024-50034,0,0,ef0ee6c054fa6d95d82a1cc5e3a063aef10790efa19e561bb55f1a0df403b297,2024-10-24T19:56:29.170000
CVE-2024-50035,0,0,9397571eb914efebc6686d6fee86d3765ca656654c3527a13621032f6dad372b,2024-10-24T19:54:01.987000
CVE-2024-50036,0,1,60a1a4b858213092d68cae7308e6acf0703fdf96f5ea416b5148c342d060a7b6,2024-10-25T15:41:31.273000
CVE-2024-50037,0,1,7b8bd0ced0d5a92e759859fc7f266b7f65512be91ea2b7830f75e01b13b64dae,2024-10-25T15:43:07.520000
CVE-2024-50038,0,1,5139188422bfac2a9578e368c33cca37aad41d76348b8b556e0dc9e15f35e6c4,2024-10-25T15:45:51.340000
CVE-2024-50039,0,1,7079ea2b935dafa93e7976f635f7aad3260c3b73e52698f049796deadf4fedf6,2024-10-25T15:47:04.950000
CVE-2024-50036,0,0,60a1a4b858213092d68cae7308e6acf0703fdf96f5ea416b5148c342d060a7b6,2024-10-25T15:41:31.273000
CVE-2024-50037,0,0,7b8bd0ced0d5a92e759859fc7f266b7f65512be91ea2b7830f75e01b13b64dae,2024-10-25T15:43:07.520000
CVE-2024-50038,0,0,5139188422bfac2a9578e368c33cca37aad41d76348b8b556e0dc9e15f35e6c4,2024-10-25T15:45:51.340000
CVE-2024-50039,0,0,7079ea2b935dafa93e7976f635f7aad3260c3b73e52698f049796deadf4fedf6,2024-10-25T15:47:04.950000
CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000
CVE-2024-50040,0,1,c600397ed5db675b91dfd477397420650cbf03346591e3d007a9232ee3d97f1e,2024-10-25T15:49:33.317000
CVE-2024-50040,0,0,c600397ed5db675b91dfd477397420650cbf03346591e3d007a9232ee3d97f1e,2024-10-25T15:49:33.317000
CVE-2024-50041,0,0,d48ad1d9e36b6ac3d6d954212f935345fcc28a78e693e8da5498dd1085259517,2024-10-24T19:31:39.373000
CVE-2024-50042,0,0,47d7a84ed9d469b00f4e210ab7562f73a18e6669a1c07a4576676ffef293e83f,2024-10-23T15:12:34.673000
CVE-2024-50043,0,0,2972cb53a30dd078fc2eb8fda442a65781870d0dbaebb36d8be92565bfd7f051,2024-10-24T19:32:21.480000
@ -265910,6 +265929,7 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e
CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000
CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000
CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000
CVE-2024-8036,1,1,73a83d7777d531c09b678c37584a8f8f23997d17ca11c3ed80d660a03af8ff47,2024-10-25T17:15:04.963000
CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000
CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000
CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000
@ -266243,7 +266263,7 @@ CVE-2024-8488,0,0,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f99
CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000
CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000
CVE-2024-8499,0,0,a066f12eb0db45b577c1044e88855b3e531b0d4e8e1575f5845b6487effebb39,2024-10-04T13:50:43.727000
CVE-2024-8500,0,0,b9ac05910a5b7e1a6e51770e5450f02754b11b55ccc3b4b83d62180b3722d198,2024-10-23T15:12:34.673000
CVE-2024-8500,0,1,4a6f945879b83f03905c3f0642d30c4c3935515f8d05579f7adc4234c4210fca,2024-10-25T16:43:24.040000
CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000
CVE-2024-8504,0,0,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000
CVE-2024-8505,0,0,1c04e90354babae2df3035dc354852183330b8445c04d1f2331a89a32b3e4a48,2024-10-07T19:26:53
@ -266893,7 +266913,7 @@ CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5
CVE-2024-9576,0,0,7a96a155cd09492144b259aa00c523497a7aeb66fdb84ed492d68f7654aa3880,2024-10-07T17:47:48.410000
CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000
CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000
CVE-2024-9583,0,0,96a827cbc19af74fe76ad020e867993041c429a8306e57b84a2f78dbfd5710d1,2024-10-23T15:12:34.673000
CVE-2024-9583,0,1,04369671dcdc0ba41b402439013a80918f2a6c5ddfb5fc47088dd1f892929f97,2024-10-25T16:28:17.497000
CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000
CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000
CVE-2024-9588,0,0,65aff2b1cd3b1280d8083f78d790697b85257a07a6c6e6516ccebd73625a92dc,2024-10-23T15:12:34.673000
@ -266917,7 +266937,7 @@ CVE-2024-9621,0,0,9e376b0f3dfa34027ae088e771a22694180917eee238e690ac2f4896caf46a
CVE-2024-9622,0,0,616f2c897f0ea8915fa743288697302d927eccd4a4b981ffaaf2224bd032869d,2024-10-10T12:56:30.817000
CVE-2024-9623,0,0,86dd85464498f6d194e548538328537f5fc627208085718de66c1a06e69de686,2024-10-16T16:59:36.817000
CVE-2024-9627,0,0,ab5726be759a332c53fc28be3ad1e688481f8077248af16a587354d8ff7a5b98,2024-10-23T15:12:34.673000
CVE-2024-9628,0,0,9a289d2b093f7ad1104b08b5588bde6d0b616dc229221247a006aeb46e0a265f,2024-10-25T12:56:07.750000
CVE-2024-9628,0,1,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000
CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000
CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000
CVE-2024-9647,0,0,6da0b5c2c888d90e6f29cb1f98cdc0c7a4315eaaa058e1c781c3c46d5b8615f9,2024-10-16T16:38:14.557000
@ -266984,7 +267004,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47
CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000
CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000
CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
CVE-2024-9829,0,0,29ca684ca29e3e308110c39b518fe6192e70d69bdef130a555a51f12503b47bb,2024-10-23T15:12:34.673000
CVE-2024-9829,0,1,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000
CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000
CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000
CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000
@ -267030,13 +267050,13 @@ CVE-2024-9922,0,0,5b3f4f94b058e10394fda050af76e1c62dd106f0eebadd14ac4c752deaa614
CVE-2024-9923,0,0,e0957ae0002d68f1b955241f204c0150727bb34721e8b9ed064776340efa0183,2024-10-24T13:24:23.430000
CVE-2024-9924,0,0,4d0aa49bc1047e2e0a23ab80e176dbdf70a0af5e82bea53f63a116cd5905286e,2024-10-15T12:57:46.880000
CVE-2024-9925,0,0,d9114846b6ab22497d9820c775f40ff778b3a4311afada5c7a947fe6aafbbadc,2024-10-17T18:09:40.537000
CVE-2024-9927,0,0,96920f248127734453deaf748492c280118aa5ea5b9c599a9138ad17f83910cb,2024-10-23T15:12:34.673000
CVE-2024-9927,0,1,247470617823bbc670f145b2243babfdfbfd8541e02092a27795136533b63780,2024-10-25T16:29:27.300000
CVE-2024-9936,0,0,9b9410743fe1ca2f5a844c24ad20043ec989ced54414fa626e93bdc74b6425ff,2024-10-15T12:57:46.880000
CVE-2024-9937,0,0,4e7ae54d6a9c5099857ac0a66ba44c96220fc2ab3e1844c918c371d4dbb6d38d,2024-10-16T16:38:14.557000
CVE-2024-9940,0,0,0591f213f2bec6924fef18017d23419024c9c5bdc4c598c1e0fd80a492ebb13b,2024-10-18T12:53:04.627000
CVE-2024-9943,0,0,2b1bd0bf17ad8265b1c648445115c5e7c1a49eb398158e5a8ef4b45ea9c6d38b,2024-10-25T12:56:07.750000
CVE-2024-9944,0,0,0b8e9f26d6b78f71e8a64eb7650f72f57e1c6a31a17ce0fafe5b6b8377b71371,2024-10-17T20:47:35.817000
CVE-2024-9947,0,0,6d7ad994cc9a7fac36825c8cc7c424fb9dcf9e1f8fd3a9311a9b488ef62fd2d0,2024-10-23T15:12:34.673000
CVE-2024-9947,0,1,88ec45aa6bd99a52db1c3f2ce1757c1650b55146fad6304733cc20a8df4a46b2,2024-10-25T16:53:12.867000
CVE-2024-9949,0,0,7baff7b9a9118e82abe3afe4a5ae476b8e56ff4f2cbd456d4ba563053750f9b6,2024-10-25T12:56:07.750000
CVE-2024-9951,0,0,5d941c75af8c4072e469beaa1d6ae2855b0ca23ecdce87314ecd326f6a54014a,2024-10-18T12:52:33.507000
CVE-2024-9952,0,0,d5c643eb1b76a39b13753ce231704557bf9fa9c82efce6d96f1e313e65eab479,2024-10-16T15:05:13.467000

Can't render this file because it is too large.