diff --git a/CVE-2019/CVE-2019-151xx/CVE-2019-15109.json b/CVE-2019/CVE-2019-151xx/CVE-2019-15109.json index 4f7404285fd..4cd6715d36c 100644 --- a/CVE-2019/CVE-2019-151xx/CVE-2019-15109.json +++ b/CVE-2019/CVE-2019-151xx/CVE-2019-15109.json @@ -2,7 +2,7 @@ "id": "CVE-2019-15109", "sourceIdentifier": "cve@mitre.org", "published": "2019-08-21T12:15:11.293", - "lastModified": "2019-09-04T16:58:07.003", + "lastModified": "2024-10-07T12:08:35.883", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tri:the_events_calendar:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:stellarwp:the_events_calendar:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "4.8.2", - "matchCriteriaId": "368EE15E-738A-4BAC-AB69-780728B204C4" + "matchCriteriaId": "78970E47-4975-4B34-8ECD-D5318D20F044" } ] } diff --git a/CVE-2020/CVE-2020-154xx/CVE-2020-15415.json b/CVE-2020/CVE-2020-154xx/CVE-2020-15415.json index a5c80f0b61e..b7d9b18c13a 100644 --- a/CVE-2020/CVE-2020-154xx/CVE-2020-15415.json +++ b/CVE-2020/CVE-2020-154xx/CVE-2020-15415.json @@ -2,8 +2,8 @@ "id": "CVE-2020-15415", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-30T14:15:11.953", - "lastModified": "2024-10-04T14:35:01.780", - "vulnStatus": "Modified", + "lastModified": "2024-10-07T13:58:27.617", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-09-30", "cisaActionDue": "2024-10-21", @@ -201,15 +201,14 @@ "url": "https://github.com/CLP-team/Vigor-Commond-Injection", "source": "cve@mitre.org", "tags": [ - "Exploit", - "Third Party Advisory" + "Exploit" ] }, { "url": "https://www.draytek.com/about/security-advisory", "source": "cve@mitre.org", "tags": [ - "Third Party Advisory" + "Vendor Advisory" ] } ] diff --git a/CVE-2023/CVE-2023-60xx/CVE-2023-6072.json b/CVE-2023/CVE-2023-60xx/CVE-2023-6072.json index c282dd7aa36..6fbff20c712 100644 --- a/CVE-2023/CVE-2023-60xx/CVE-2023-6072.json +++ b/CVE-2023/CVE-2023-60xx/CVE-2023-6072.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6072", "sourceIdentifier": "trellixpsirt@trellix.com", "published": "2024-02-13T10:15:08.227", - "lastModified": "2024-02-13T14:01:00.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-07T13:14:35.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "trellixpsirt@trellix.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trellix:central_management_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.1.3.97129", + "matchCriteriaId": "C2057976-9C08-4090-9939-06E1CE9FC3F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.trellix.com/bundle/cm_9-1-5_rn/page/UUID-fad8a50f-6f6f-e970-f418-06494a30932e.html", - "source": "trellixpsirt@trellix.com" + "source": "trellixpsirt@trellix.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6203.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6203.json index 85063c970dd..4a613a825a1 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6203.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6203.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6203", "sourceIdentifier": "contact@wpscan.com", "published": "2023-12-18T20:15:08.847", - "lastModified": "2023-12-21T19:31:59.690", + "lastModified": "2024-10-07T12:08:35.883", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -60,9 +60,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tri:the_events_calendar:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:stellarwp:the_events_calendar:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "6.2.8.1", - "matchCriteriaId": "FA9D5818-6605-4B0F-AA9E-CB3BA11A18DB" + "matchCriteriaId": "363026AC-BE1A-42BA-81FA-742250D190F0" } ] } diff --git a/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json b/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json index 0cda9b58247..36bf5d6b51e 100644 --- a/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json +++ b/CVE-2023/CVE-2023-65xx/CVE-2023-6557.json @@ -2,7 +2,7 @@ "id": "CVE-2023-6557", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-05T22:15:55.767", - "lastModified": "2024-02-12T20:49:00.610", + "lastModified": "2024-10-07T12:08:35.883", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:tri:the_events_calendar:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:stellarwp:the_events_calendar:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "6.2.8.2", - "matchCriteriaId": "FF63CBBA-6DC7-4A54-B391-C566E0C1A319" + "matchCriteriaId": "9915E86B-D73C-4392-9F2D-F1F64B99740B" } ] } diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json index bd0cd6c5db1..60dc679d6e3 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21357.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21357", "sourceIdentifier": "secure@microsoft.com", "published": "2024-02-13T18:15:52.373", - "lastModified": "2024-05-29T00:15:27.183", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-07T13:19:34.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +61,189 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20469", + "matchCriteriaId": "11175D86-F0D1-434C-811A-750CB5C17148" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20469", + "matchCriteriaId": "C62CCD10-636D-4979-A90F-CDBDE048518B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.6709", + "matchCriteriaId": "57927CA7-FE09-43AA-9F66-6E68EE3125D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.6709", + "matchCriteriaId": "6D84C15B-58BF-4124-A1AF-BE62B4259D2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "97FA2666-D83E-4645-AB34-B17DD82A705B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "9EF5A993-EF3B-4BE1-8325-62354DD7A7E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndIncluding": "10.0.17763.5458", + "matchCriteriaId": "8289EEEC-990C-4EF3-8673-1BBACB5A7EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.4046", + "matchCriteriaId": "8B1DD5BA-167A-45DB-8BD5-C231755B1A07" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.4046", + "matchCriteriaId": "0F566229-0130-4578-89CB-DBB8B6F658BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.4046", + "matchCriteriaId": "5815DF79-63B2-4690-AC2E-23EDE1BC9101" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.4046", + "matchCriteriaId": "9A6AFF70-FED0-4AF5-9D8F-5C90BF982941" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.4046", + "matchCriteriaId": "88085285-0229-4033-BEB6-0BF4AD5EA72A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.4046", + "matchCriteriaId": "A0B61E17-FC01-4FF3-BF96-37819033F412" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.2777", + "matchCriteriaId": "481C9CDC-7383-4D08-9608-BDA2F9FADB36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.2777", + "matchCriteriaId": "60E272E2-0D33-4342-92C3-5D66C89DE531" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.3155", + "matchCriteriaId": "3F8D8343-22E1-4C56-9918-9430326AB9BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.3155", + "matchCriteriaId": "16B1BAB4-91BD-4105-81CF-EAFD3800CB85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.3155", + "matchCriteriaId": "E2FB8ADD-663B-445B-B0F2-6B5E168D9E2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.3155", + "matchCriteriaId": "679CCD68-F014-452C-8D3F-F9D17329779C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", + "matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", + "matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.6709", + "matchCriteriaId": "14F86494-7001-40DB-A99E-34A9490F5B58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.5458", + "matchCriteriaId": "A9098F92-79E7-4762-A37C-99B4CFA8CDD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2322", + "matchCriteriaId": "5C8F0436-3AFE-48BD-AE92-8F8392DD0A1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.709", + "matchCriteriaId": "B6FCF1A0-6B8E-457A-AB6A-2DE939B9D18B" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21357", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json index 7c0bd70ce3e..2b3d971b795 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21403.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21403", "sourceIdentifier": "secure@microsoft.com", "published": "2024-02-13T18:15:58.773", - "lastModified": "2024-05-29T00:15:33.497", + "lastModified": "2024-10-07T13:51:23.630", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_cli:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.3.3", + "matchCriteriaId": "79A1070B-4FEA-4A4A-A6B2-2000E79FE659" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21403", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json new file mode 100644 index 00000000000..ae8780834de --- /dev/null +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21455", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:10.360", + "lastModified": "2024-10-07T13:15:10.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json new file mode 100644 index 00000000000..0ef5b603f23 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23369.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23369", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:10.683", + "lastModified": "2024-10-07T13:15:10.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when invalid length is provided from HLOS for FRS/UDS request/response buffers." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json new file mode 100644 index 00000000000..86f9bb924bd --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23370.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23370", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:10.927", + "lastModified": "2024-10-07T13:15:10.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json new file mode 100644 index 00000000000..b7e079dc150 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23374.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23374", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:11.173", + "lastModified": "2024-10-07T13:15:11.173", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json new file mode 100644 index 00000000000..be9001e5f93 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23375.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23375", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:11.400", + "lastModified": "2024-10-07T13:15:11.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption during the network scan request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json new file mode 100644 index 00000000000..6dca598cd9c --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23376.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23376", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:11.593", + "lastModified": "2024-10-07T13:15:11.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while sending the persist buffer command packet from the user-space to the kernel space through the IOCTL call." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json new file mode 100644 index 00000000000..9ee1a0a4c6b --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23378.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23378", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:11.800", + "lastModified": "2024-10-07T13:15:11.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while invoking IOCTL calls for MSM module from the user space during audio playback and record." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23379.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23379.json new file mode 100644 index 00000000000..cb089a505d9 --- /dev/null +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23379.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23379", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:12.003", + "lastModified": "2024-10-07T13:15:12.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while unmapping the fastrpc map when two threads can free the same map in concurrent scenario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27312.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27312.json index 3f99d57c050..a4e12e6bf1c 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27312.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27312.json @@ -2,13 +2,13 @@ "id": "CVE-2024-27312", "sourceIdentifier": "0fc0942c-577d-436f-ae8e-945763c79b02", "published": "2024-05-20T13:15:23.773", - "lastModified": "2024-06-07T09:15:11.640", + "lastModified": "2024-10-07T12:15:12.563", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Zoho ManageEngine PAM360 version 6601 is vulnerable to authorization vulnerability which\u00a0allows a low-privileged user to perform admin actions.\nNote: This vulnerability affects only the PAM360 6600\u00a0version. No other versions are applicable to this vulnerability." + "value": "Zohocorp ManageEngine PAM360 version 6601 is vulnerable to authorization vulnerability which allows a low-privileged user to perform admin actions. \nNote: This vulnerability affects only the PAM360 6600 version. No other versions are applicable to this vulnerability." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-863" } ] } diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33049.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33049.json new file mode 100644 index 00000000000..c933da99736 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33049.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33049", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:12.243", + "lastModified": "2024-10-07T13:15:12.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33064.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33064.json new file mode 100644 index 00000000000..2f77a2de095 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33064.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33064", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:12.510", + "lastModified": "2024-10-07T13:15:12.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure while parsing the multiple MBSSID IEs from the beacon." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33065.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33065.json new file mode 100644 index 00000000000..395d5bf63c4 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33065.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33065", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:12.710", + "lastModified": "2024-10-07T13:15:12.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while taking snapshot when an offset variable is set by camera driver." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33066.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33066.json new file mode 100644 index 00000000000..35c5c839bc4 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33066.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33066", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:12.917", + "lastModified": "2024-10-07T13:15:12.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while redirecting log file to any file location with any file name." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33069.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33069.json new file mode 100644 index 00000000000..b31601688b6 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33069.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33069", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:13.117", + "lastModified": "2024-10-07T13:15:13.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33070.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33070.json new file mode 100644 index 00000000000..a0eb8d16b22 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33070.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33070", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:13.323", + "lastModified": "2024-10-07T13:15:13.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS while parsing ESP IE from beacon/probe response frame." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33071.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33071.json new file mode 100644 index 00000000000..f9b814f3878 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33071.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33071", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:13.510", + "lastModified": "2024-10-07T13:15:13.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33073.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33073.json new file mode 100644 index 00000000000..65a91818bb6 --- /dev/null +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33073.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33073", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:13.703", + "lastModified": "2024-10-07T13:15:13.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38397.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38397.json new file mode 100644 index 00000000000..4cdc87e3112 --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38397.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38397", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:14.333", + "lastModified": "2024-10-07T13:15:14.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Transient DOS while parsing probe response and assoc response frame." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38399.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38399.json new file mode 100644 index 00000000000..400616502f9 --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38399.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38399", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:14.540", + "lastModified": "2024-10-07T13:15:14.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while processing user packets to generate page faults." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38425.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38425.json new file mode 100644 index 00000000000..595c925a10f --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38425.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38425", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:14.730", + "lastModified": "2024-10-07T13:15:14.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Information disclosure while sending implicit broadcast containing APP launch information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42027.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42027.json new file mode 100644 index 00000000000..7336a55956b --- /dev/null +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42027.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-42027", + "sourceIdentifier": "support@hackerone.com", + "published": "2024-10-07T13:15:15.020", + "lastModified": "2024-10-07T13:15:15.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The E2EE password entropy generated by Rocket.Chat Mobile prior to version 4.5.1 is insufficient, allowing attackers to crack it if they have the appropriate time and resources." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "support@hackerone.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "references": [ + { + "url": "https://hackerone.com/reports/2546437", + "source": "support@hackerone.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43047.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43047.json new file mode 100644 index 00000000000..5b8fc4f0a99 --- /dev/null +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43047.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43047", + "sourceIdentifier": "product-security@qualcomm.com", + "published": "2024-10-07T13:15:15.257", + "lastModified": "2024-10-07T13:15:15.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory corruption while maintaining memory maps of HLOS memory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@qualcomm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@qualcomm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html", + "source": "product-security@qualcomm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json new file mode 100644 index 00000000000..f2210bbfee1 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45153", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-10-07T13:15:15.603", + "lastModified": "2024-10-07T13:15:15.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46325.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46325.json new file mode 100644 index 00000000000..fd7ba35b24f --- /dev/null +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46325.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46325", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-07T13:15:15.873", + "lastModified": "2024-10-07T13:15:15.873", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TP-Link WR740N V6 has a stack overflow vulnerability via the ssid parameter in /userRpm/popupSiteSurveyRpm.htm url." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TP-LINK/WR740N/popupSiteSurveyRpm.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json index 3ca68044120..da566469598 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46453.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46453", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T21:15:03.350", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-07T13:53:04.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,81 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) en el componente /test/ de iq3xcite v2.31 a v3.05 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:honeywell:iq3xcite_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.31", + "versionEndExcluding": "3.11", + "matchCriteriaId": "7D0E85C4-E7E6-4969-A55F-1CBD5A64797F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:honeywell:iq3xcite:-:*:*:*:*:*:*:*", + "matchCriteriaId": "246E3A44-9CD1-4893-B348-4DB65C4C7113" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nosmo-gla/iq3xcite-XSS-2.31-3.05/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json index b19d44eeedf..5719022af1d 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47186.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47186", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-27T21:15:03.443", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-07T13:30:55.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:filamentphp:filament:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.2.115", + "matchCriteriaId": "06A709B0-893D-4B65-9C67-C40A560F08A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/filamentphp/filament/commit/df7989352464d08eda5837ef50f9997fad902316", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/filamentphp/filament/releases/tag/v3.2.115", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/filamentphp/filament/security/advisories/GHSA-9h9q-qhxg-89xr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7870.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7870.json index 73a6e3e3693..652ba135d58 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7870.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7870", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-04T09:15:04.660", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-07T12:29:19.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", @@ -51,22 +71,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixelyoursite:pixelyoursite:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "9.7.2", + "matchCriteriaId": "405803F7-6B73-42BA-8E5D-CF79776BDDAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pixelyoursite:pixelyoursite:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "10.4.3", + "matchCriteriaId": "0367FB8C-6A02-4620-A951-0CE1A36DF426" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/WordpressPluginDirectory/pixelyoursite/blob/main/pixelyoursite/includes/logger/class-pys-logger.php#L126", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/pixelyoursite/trunk/includes/class-pys.php#L114", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3143047/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fd7a515-6389-4152-8dac-d5497dd94f6d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8325.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8325.json index bc107f6377c..4276d962dcf 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8325.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8325.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8325", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-04T06:15:17.657", - "lastModified": "2024-09-04T13:05:36.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-07T12:37:58.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:blockspare:blockspare:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.5", + "matchCriteriaId": "9077F923-BF37-434A-B875-4DE743B27E3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3145729/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c23995c6-989e-48d2-ba60-b0bf7b750245?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json index cf8cf7f00db..c7db6cf6029 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9301", "sourceIdentifier": "security-report@netflix.com", "published": "2024-09-27T18:15:06.163", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-07T13:12:48.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security-report@netflix.com", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netflix:e2nest:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-09-05", + "matchCriteriaId": "29CDBBE8-9B23-43D7-BCF9-73F128C6878F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2024-004.md", - "source": "security-report@netflix.com" + "source": "security-report@netflix.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9566.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9566.json new file mode 100644 index 00000000000..065be0a5c06 --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9566.json @@ -0,0 +1,148 @@ +{ + "id": "CVE-2024-9566", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-07T13:15:16.077", + "lastModified": "2024-10-07T13:15:16.077", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in D-Link DIR-619L B1 2.06. This vulnerability affects the function formDeviceReboot of the file /goform/formDeviceReboot. The manipulation of the argument next_page leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "COMPLETE", + "integrityImpact": "COMPLETE", + "availabilityImpact": "COMPLETE", + "baseScore": 9.0 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 8.0, + "impactScore": 10.0, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formDeviceReboot.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279460", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279460", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.414541", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 42377e22dea..001ddfbf7cb 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-07T08:00:17.584290+00:00 +2024-10-07T14:00:47.100385+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-07T06:15:04.973000+00:00 +2024-10-07T13:58:27.617000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264710 +264734 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `24` -- [CVE-2024-47335](CVE-2024/CVE-2024-473xx/CVE-2024-47335.json) (`2024-10-07T06:15:04.617`) -- [CVE-2024-47344](CVE-2024/CVE-2024-473xx/CVE-2024-47344.json) (`2024-10-07T06:15:04.973`) +- [CVE-2024-21455](CVE-2024/CVE-2024-214xx/CVE-2024-21455.json) (`2024-10-07T13:15:10.360`) +- [CVE-2024-23369](CVE-2024/CVE-2024-233xx/CVE-2024-23369.json) (`2024-10-07T13:15:10.683`) +- [CVE-2024-23370](CVE-2024/CVE-2024-233xx/CVE-2024-23370.json) (`2024-10-07T13:15:10.927`) +- [CVE-2024-23374](CVE-2024/CVE-2024-233xx/CVE-2024-23374.json) (`2024-10-07T13:15:11.173`) +- [CVE-2024-23375](CVE-2024/CVE-2024-233xx/CVE-2024-23375.json) (`2024-10-07T13:15:11.400`) +- [CVE-2024-23376](CVE-2024/CVE-2024-233xx/CVE-2024-23376.json) (`2024-10-07T13:15:11.593`) +- [CVE-2024-23378](CVE-2024/CVE-2024-233xx/CVE-2024-23378.json) (`2024-10-07T13:15:11.800`) +- [CVE-2024-23379](CVE-2024/CVE-2024-233xx/CVE-2024-23379.json) (`2024-10-07T13:15:12.003`) +- [CVE-2024-33049](CVE-2024/CVE-2024-330xx/CVE-2024-33049.json) (`2024-10-07T13:15:12.243`) +- [CVE-2024-33064](CVE-2024/CVE-2024-330xx/CVE-2024-33064.json) (`2024-10-07T13:15:12.510`) +- [CVE-2024-33065](CVE-2024/CVE-2024-330xx/CVE-2024-33065.json) (`2024-10-07T13:15:12.710`) +- [CVE-2024-33066](CVE-2024/CVE-2024-330xx/CVE-2024-33066.json) (`2024-10-07T13:15:12.917`) +- [CVE-2024-33069](CVE-2024/CVE-2024-330xx/CVE-2024-33069.json) (`2024-10-07T13:15:13.117`) +- [CVE-2024-33070](CVE-2024/CVE-2024-330xx/CVE-2024-33070.json) (`2024-10-07T13:15:13.323`) +- [CVE-2024-33071](CVE-2024/CVE-2024-330xx/CVE-2024-33071.json) (`2024-10-07T13:15:13.510`) +- [CVE-2024-33073](CVE-2024/CVE-2024-330xx/CVE-2024-33073.json) (`2024-10-07T13:15:13.703`) +- [CVE-2024-38397](CVE-2024/CVE-2024-383xx/CVE-2024-38397.json) (`2024-10-07T13:15:14.333`) +- [CVE-2024-38399](CVE-2024/CVE-2024-383xx/CVE-2024-38399.json) (`2024-10-07T13:15:14.540`) +- [CVE-2024-38425](CVE-2024/CVE-2024-384xx/CVE-2024-38425.json) (`2024-10-07T13:15:14.730`) +- [CVE-2024-42027](CVE-2024/CVE-2024-420xx/CVE-2024-42027.json) (`2024-10-07T13:15:15.020`) +- [CVE-2024-43047](CVE-2024/CVE-2024-430xx/CVE-2024-43047.json) (`2024-10-07T13:15:15.257`) +- [CVE-2024-45153](CVE-2024/CVE-2024-451xx/CVE-2024-45153.json) (`2024-10-07T13:15:15.603`) +- [CVE-2024-46325](CVE-2024/CVE-2024-463xx/CVE-2024-46325.json) (`2024-10-07T13:15:15.873`) +- [CVE-2024-9566](CVE-2024/CVE-2024-95xx/CVE-2024-9566.json) (`2024-10-07T13:15:16.077`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `13` +- [CVE-2019-15109](CVE-2019/CVE-2019-151xx/CVE-2019-15109.json) (`2024-10-07T12:08:35.883`) +- [CVE-2020-15415](CVE-2020/CVE-2020-154xx/CVE-2020-15415.json) (`2024-10-07T13:58:27.617`) +- [CVE-2023-6072](CVE-2023/CVE-2023-60xx/CVE-2023-6072.json) (`2024-10-07T13:14:35.497`) +- [CVE-2023-6203](CVE-2023/CVE-2023-62xx/CVE-2023-6203.json) (`2024-10-07T12:08:35.883`) +- [CVE-2023-6557](CVE-2023/CVE-2023-65xx/CVE-2023-6557.json) (`2024-10-07T12:08:35.883`) +- [CVE-2024-21357](CVE-2024/CVE-2024-213xx/CVE-2024-21357.json) (`2024-10-07T13:19:34.817`) +- [CVE-2024-21403](CVE-2024/CVE-2024-214xx/CVE-2024-21403.json) (`2024-10-07T13:51:23.630`) +- [CVE-2024-27312](CVE-2024/CVE-2024-273xx/CVE-2024-27312.json) (`2024-10-07T12:15:12.563`) +- [CVE-2024-46453](CVE-2024/CVE-2024-464xx/CVE-2024-46453.json) (`2024-10-07T13:53:04.767`) +- [CVE-2024-47186](CVE-2024/CVE-2024-471xx/CVE-2024-47186.json) (`2024-10-07T13:30:55.640`) +- [CVE-2024-7870](CVE-2024/CVE-2024-78xx/CVE-2024-7870.json) (`2024-10-07T12:29:19.203`) +- [CVE-2024-8325](CVE-2024/CVE-2024-83xx/CVE-2024-8325.json) (`2024-10-07T12:37:58.740`) +- [CVE-2024-9301](CVE-2024/CVE-2024-93xx/CVE-2024-9301.json) (`2024-10-07T13:12:48.953`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bb1f158abb3..6e0385a3467 100644 --- a/_state.csv +++ b/_state.csv @@ -132963,7 +132963,7 @@ CVE-2019-15105,0,0,9346e1cd372d69f6ca564c8d9638bd6b1809f3300e11e08cfcb13a2d3514c CVE-2019-15106,0,0,cd10fcc8463fad399bf04a5b0aa4dd6bf7626fd084ab4cf5f6ac7a6b4e8d3d19,2020-08-24T17:37:01.140000 CVE-2019-15107,0,0,9bca4f839457ac4f3466377bd2e60b613763cfdb7a59f9528ba90688d72c191a,2023-02-28T15:23:31.427000 CVE-2019-15108,0,0,4c85dda8cfd6f6a4856eddfc621110588ea7fdd3e3b3fc3a433c7270d83d9670,2023-03-03T18:30:35.293000 -CVE-2019-15109,0,0,045d257292cb21868dc2d2567db3f0579c7eee678efb586fb506975875a8a8d4,2019-09-04T16:58:07.003000 +CVE-2019-15109,0,1,77e78bfbca6e00cf228647207d9479a2f81521382d38297a5be4137193355834,2024-10-07T12:08:35.883000 CVE-2019-1511,0,0,f4db294d68d79c4d5333a43de7154a5e20e9fc39a6710fd2feb8c52ae8238987,2023-11-07T03:08:17.280000 CVE-2019-15110,0,0,a0deb5ca51ec626bdfe8acf0490ddab86a79653ce5cc77b97fb00e145182cd72,2019-08-21T15:10:22.943000 CVE-2019-15111,0,0,0f2b79c2d1fdb0ecd4f8847484361c4e3f87eeabfb61e8fca04657016ca7057b,2020-08-24T17:37:01.140000 @@ -150147,7 +150147,7 @@ CVE-2020-15408,0,0,aecec6304f559275e1f60dead89ab4216605c4932e215706ba32899f5dfd9 CVE-2020-1541,0,0,f82de2ebe5cde8fd4413b90b845a53590f2c00b032e2334080d8be997a81ce80,2024-01-19T00:15:16.620000 CVE-2020-15411,0,0,2b8dcd90dd9291cc12ab60fcc590d8d32b8199797e9e84e9208030f3340cbed7,2021-07-21T11:39:23.747000 CVE-2020-15412,0,0,c4296a5e68c50d9edf68d9d92cb3c0bc020dfa997b94b1e02fbb7bf2e6474abc,2021-07-21T11:39:23.747000 -CVE-2020-15415,0,0,0f82e9f779b706ea9a0b46ebb668d08b599b4fb444aa4c869436d2c886b3adbe,2024-10-04T14:35:01.780000 +CVE-2020-15415,0,1,a8f1809706402a3cdf907ba7275886bbd53f4fc17a0721f4cea6c19482ec5970,2024-10-07T13:58:27.617000 CVE-2020-15416,0,0,8b122da68cbbc1921554e94b90b7655d3f775b2cab44a7a15a028a3ed1fea844,2020-07-30T16:53:50.423000 CVE-2020-15417,0,0,c38d5440e75f54747e435d0a02d67ccf9ebcb38f9445eb1f8e9648bc0aeaa48d,2020-07-30T16:53:08.047000 CVE-2020-15418,0,0,0c71a493b83961110f43f5f85de59b1fc5883a88ecd47fb2e732621c95ecfb0b,2020-08-03T14:59:20.143000 @@ -240190,7 +240190,7 @@ CVE-2023-6068,0,0,d391e7dc3baa4acb71147241680476a912bc4fc919e84d4d641716e0ce8de4 CVE-2023-6069,0,0,dbb658dc6007e5fd181fbb971fa33f46668ecab36c7bcee70c28c6c82a6c6274,2024-01-21T03:06:57.293000 CVE-2023-6070,0,0,94daca7bf405362d13e319969ccce2360c367db1b7eb8b88be12d5968a3dc9c5,2023-12-05T15:11:13.197000 CVE-2023-6071,0,0,1a2f1476968dccb371116e96718e88b9c9595fed8b71a4d987de70512b69dea0,2023-12-05T19:46:19.857000 -CVE-2023-6072,0,0,d4410b52b280ffcbefcea0ab9f6872a94092a28b37e63ddae646010b41d3170c,2024-02-13T14:01:00.987000 +CVE-2023-6072,0,1,5c8f44bdfe6cabc65c3ca6363a61b27e67d8b9d536b049f0288a3e8d83826b64,2024-10-07T13:14:35.497000 CVE-2023-6073,0,0,eea98c82f85be4ed57b0bf6c6ef46ca878aed23f0e84d933ff7fabaeaefcf87b,2023-11-18T03:21:23.573000 CVE-2023-6074,0,0,b5290f2057255a95d79069b994b5421ecb0bf97d3da4c5a89a446c9c212257f9,2024-05-17T02:33:30.473000 CVE-2023-6075,0,0,aa83caa86260745189ce39847546a8d8f8f7a816b6b6db614883f2bc0e166097,2024-05-17T02:33:30.577000 @@ -240306,7 +240306,7 @@ CVE-2023-6199,0,0,23ad76e9c7eb3ce3b9bb451263c23cb80d93030361009d0cfbf3d7d8012b83 CVE-2023-6200,0,0,05cea61f4c882b8d33445919a1a98a1cafc06eaf32c1abc5f20ea8c66d0135cd,2024-02-02T15:38:42.870000 CVE-2023-6201,0,0,012cf57cad49505652d1b26a4761cc477912064fa361bdddeb3ebec6c5de0fbd,2023-12-05T07:15:11.860000 CVE-2023-6202,0,0,0fbb9d8651487c6f3f6bb451b9c5ff3cc5c4bbb2b36bf89d6eae32084d732423,2023-12-01T21:40:49.863000 -CVE-2023-6203,0,0,1a6b54e7b8be35ef3874264f4bc88eaf7154eba876efab2803e50ad008d64a0f,2023-12-21T19:31:59.690000 +CVE-2023-6203,0,1,c8d6853c895a40003598251fb21f95b98f42fa820d9b312352178d3295cc87d0,2024-10-07T12:08:35.883000 CVE-2023-6204,0,0,e65541914d4bd177cbfa96050a585692cefe834ffeaf9779f1087f0bf0ff5e03,2023-11-30T16:15:10.803000 CVE-2023-6205,0,0,2104b7f8da2930ca516059d3f4527ca88d8f0e332d2324a542798b9137fe0047,2023-11-30T16:15:10.870000 CVE-2023-6206,0,0,6e185181078f90cc35079cd5b327246a3e79515419c1d0aba76399f43433ed5b,2023-11-30T16:15:10.940000 @@ -240612,7 +240612,7 @@ CVE-2023-6553,0,0,b5146d631beb06b07e5ca8b91ef438e8f5760824aa0920387c6fefb74ea914 CVE-2023-6554,0,0,2feb5ba088ff3e9dd4cf7fbd58c1eecc82f5eb18efcc3326d89df15d295f81d8,2024-01-18T17:35:46.637000 CVE-2023-6555,0,0,890817bd62ea338eef28fd02407604888209366b5c7cef6bfff46ee415a075b2,2024-01-11T19:59:47.223000 CVE-2023-6556,0,0,00fb00dd125ab196c260139bd9ebe4bb1e8b84fa3285f9b7bd0a71729744268d,2024-01-17T20:39:02.927000 -CVE-2023-6557,0,0,c5905a07857c19b097fdefc3d73eda897b0f6c0b5c02f5076cedf14a43e5fe79,2024-02-12T20:49:00.610000 +CVE-2023-6557,0,1,29caebeb2fe9b265405c7d4a17ccbf39ef6fd7cea6d08f11efbb67c66e7b486c,2024-10-07T12:08:35.883000 CVE-2023-6558,0,0,d3918147e27b649aca1efdac55f22566d9e7623f0277487dfbf700b18ccdcd4d,2024-01-17T20:25:15.397000 CVE-2023-6559,0,0,d0609a404f005b54bc7864d5c4edc5746794caa5cea42f15c28ea4eda9220624,2023-12-20T04:13:18.900000 CVE-2023-6560,0,0,11626ee35f2b5cf3ca3c2b3c7d2e56b24f89c2d006e7bf74cc1dbf7f7c67c676,2024-01-08T16:15:46.783000 @@ -244044,7 +244044,7 @@ CVE-2024-21353,0,0,75209ae3e8c4f957caeb7539e232153190351d797234b8772890d5e6f5bc0 CVE-2024-21354,0,0,46b0e09b1d5cc5193e76d3af9ed0cacd2750c473654b7e05b2ba202c171f6bf6,2024-05-29T00:15:26.367000 CVE-2024-21355,0,0,a1b01edc3e4dd606afaf0e522a1ef923b2b455a6a9536e862bcacd816faf1687,2024-05-29T00:15:26.503000 CVE-2024-21356,0,0,8c3c5aae10a04331b089f222fa2f4065fe17cf992ed7926b52590192e48f71bb,2024-05-29T00:15:26.757000 -CVE-2024-21357,0,0,3d781db33707dbad181dbe4e2e7acf58370f522cb786d68603e23422b96082cd,2024-05-29T00:15:27.183000 +CVE-2024-21357,0,1,ab83a05c6ace78270c8258f850d2f54269f55284ef9af48bcb4891d0c4f75932,2024-10-07T13:19:34.817000 CVE-2024-21358,0,0,15290dfdf347a2780b5c1e3034643603416c7945563ff2eed3d004720c0d4fbf,2024-05-29T00:15:27.653000 CVE-2024-21359,0,0,ceb6296e0289e77c90ea20068a6184a38b79836d6d7c9e831b4a52d0dbe47570,2024-05-29T00:15:27.790000 CVE-2024-2136,0,0,4665eec39c26aa0d316331386f0284104d0219b7b00507c554496e918e99a5fd,2024-03-07T13:52:27.110000 @@ -244095,7 +244095,7 @@ CVE-2024-2140,0,0,f13df4d472ba646e6aac958170cf967e223db17be65b98ce4a37e6d44e8080 CVE-2024-21400,0,0,da8277c9b07afba17ab7b2697668cebd1905952dc7d0b43230c5dd98b3c906f2,2024-04-11T20:15:29.170000 CVE-2024-21401,0,0,4b2a9c60547467c59f9b439a18da60452bb72bfbcd0f28b98d7478e2777b8310,2024-05-29T00:15:33.247000 CVE-2024-21402,0,0,30768b38d5acb186afa5a073ad3bf20aec4d542134aab6ee100b1ef4d75c9e65,2024-05-29T00:15:33.383000 -CVE-2024-21403,0,0,1b612c3500279514e1eb41502b3bfd8054452ecb452e349388298adb2aa456fb,2024-05-29T00:15:33.497000 +CVE-2024-21403,0,1,79a050e5e1d5ea7e4ac892d479c0455d35d5d024f83fbd1ef870770db6ae3d73,2024-10-07T13:51:23.630000 CVE-2024-21404,0,0,f6be165299a325b41c53968f28d89eba754563d7adc3a3556418d8b125204ac0,2024-05-29T00:15:33.610000 CVE-2024-21405,0,0,53406e6b69f28a01898073a33c8193c1acf8cd55aab1cbcadc27e232889ff213,2024-05-29T00:15:33.737000 CVE-2024-21406,0,0,408e224bae8e39c69489d7341236d5cf0a7b85940731d0bdaaadc3a297979078,2024-05-29T00:15:33.883000 @@ -244151,6 +244151,7 @@ CVE-2024-21451,0,0,fda859879476242f447364ed932f4e097d32ef677cea24910429c5be2e679 CVE-2024-21452,0,0,9f708d763548b34c7c49c3f0348df362d48fec38e955d6efb9dc3104c88d6865,2024-04-12T09:15:09.877000 CVE-2024-21453,0,0,da605aa15089d99be623e883beeca2f93e21f8fdda0997652a458a217ea7b701,2024-04-12T09:15:09.977000 CVE-2024-21454,0,0,bb3c6f4e967eb55a8c57e103a3dd8be0b010cb457fa764651101d90478af9307,2024-04-12T09:15:10.083000 +CVE-2024-21455,1,1,1948fbb13bec93f6e0e9571f529bc93a41a74813ac6a4a2b35be38f5854453ef,2024-10-07T13:15:10.360000 CVE-2024-21456,0,0,febed50af5286757c8cac18d43d41c241de675306b4f7eab1cf3e42fd902eaa8,2024-08-21T14:25:32.873000 CVE-2024-21457,0,0,0397b493f3a90fa8856b8c3877d0f328b647dc8423fd236ad4c3272a6eecd90f,2024-07-02T17:49:35.410000 CVE-2024-21458,0,0,f9498022a3fab8a9690b0ccfe79640e4fd1995291accc416b68050d29e4c1e40,2024-07-02T17:57:05.057000 @@ -245469,9 +245470,16 @@ CVE-2024-23363,0,0,f3bca7930119a168b01a4f3c6a543138a5f31bd5e8f14fd6e950dfaab71bf CVE-2024-23364,0,0,d335bfe8fa3d7a699b93e4031ef9a4b12c2c27a445d90d9a5a233dbae9b9707d,2024-09-03T12:59:02.453000 CVE-2024-23365,0,0,b549beaf46af95806279ede941b0b9df9f8e0ef8f9248b984c743f41e6969a1d,2024-09-03T12:59:02.453000 CVE-2024-23368,0,0,5726397ddc8ddada7ad85b481081c827980e0b31f00843d9c4a575a1cdcf7c17,2024-07-02T17:51:25.690000 +CVE-2024-23369,1,1,a41f4b8347a70a2f3fe51c91331bdccd82236327b441bd2882be865339730bd6,2024-10-07T13:15:10.683000 CVE-2024-2337,0,0,07544cbaaf25f2cf04c699ba032dfae130492c60bdcce260485571b3859c104c,2024-07-22T13:00:53.287000 +CVE-2024-23370,1,1,b580a792e94842fab2ed07d033a6b3e67707f3e968cce51bd2a3e3c5c52c0656,2024-10-07T13:15:10.927000 CVE-2024-23372,0,0,23b270a28eac6f2e33d3cc96090d40d8bd34b2e6172d17ba5be5b87ce6bb3571,2024-07-02T17:51:04.530000 CVE-2024-23373,0,0,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa906,2024-07-02T17:50:38.573000 +CVE-2024-23374,1,1,0b13e1e2d30f1511cff46d24f1ab245bad76339a68c1b0a0a11d7ba0e970d141,2024-10-07T13:15:11.173000 +CVE-2024-23375,1,1,d7ee06a972d8e5bfaffeb884eecfbc89229199db3baf4ecbb4ede196044b72a3,2024-10-07T13:15:11.400000 +CVE-2024-23376,1,1,be4cab3c556d17eb8fb1fc752a4fbe8b06156a2b19aefb27d5bade334e7d31f0,2024-10-07T13:15:11.593000 +CVE-2024-23378,1,1,b6107207240c445721736947e677f7e1a8c3da09cc6fb9bbea8d4441706654b9,2024-10-07T13:15:11.800000 +CVE-2024-23379,1,1,ec916ef8d291e70342410d994b0663bfa6157466c5295a82b673e1c16a21ff53,2024-10-07T13:15:12.003000 CVE-2024-2338,0,0,97ed9304e53653e5f2f6be84ec656ed42a5ae14786266fb81f31dd764d99c05c,2024-03-08T21:19:43.127000 CVE-2024-23380,0,0,bf0ce83ac3185ab9d5bec787958ddc81b954eccc336ea58dd24a5df8b6433ba9,2024-07-02T17:50:17.873000 CVE-2024-23381,0,0,c05f9cee58e223ab89c0d0d7ff884408a74aec6ab8924761148e9dbc59968126,2024-08-06T16:30:24.547000 @@ -248382,7 +248390,7 @@ CVE-2024-27309,0,0,18416b733d6ac4edeb2af296593281a1b6deae1e8a8956ba324c7cabf7f2e CVE-2024-2731,0,0,e2947075d94f67fb0f516acc3c39fdd257b6a53a447028317b4bd1e85304e9ee,2024-04-10T19:49:51.183000 CVE-2024-27310,0,0,b69733df4a6391ae6cbaee5b52a74a5bb085baede7f58b5d25b1ccd0db22f7c5,2024-06-07T09:15:11.247000 CVE-2024-27311,0,0,3441ff0e665052a7fb86a3589fae526973b499df9f488dcbbb9db7b9aaef9973,2024-07-18T14:09:40.923000 -CVE-2024-27312,0,0,5679d7053fa0bd24d93903a7d36eae1bf666d1c510eebbb175d9510db4771ea1,2024-06-07T09:15:11.640000 +CVE-2024-27312,0,1,6dcf45e70b4a491cb37b0fe8148947a4c13962093d3f0a4f91a958171446925f,2024-10-07T12:15:12.563000 CVE-2024-27313,0,0,f9f7791913eb1885e62d83245c35ccba6d007456c7c99efcf6385be05af20927,2024-06-07T09:15:11.917000 CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 CVE-2024-27315,0,0,db9af09723fb011b8182b6b5bab4f2fc859959fe0ca51aeffec2764eb351e8f1,2024-10-03T13:15:14.710000 @@ -252509,6 +252517,7 @@ CVE-2024-33043,0,0,e440b5c9b2a1727157025810ce1b92ddb45351842873f98e286f1378d612b CVE-2024-33045,0,0,c750be85f91783e59cd18e60c65725c2f8e2b0f2771fc29ca9f691ba1ec0dcfe,2024-09-04T17:20:55.297000 CVE-2024-33047,0,0,cb0eb88ac7f41a9c98cf0d3c8ebd2b1f66d8a5c56732d8ae21823446d39c74ab,2024-09-04T17:07:31.877000 CVE-2024-33048,0,0,f9f67875b847da24eb9cf137e9f097d769cd7f8f3d65d24eb4619818f972d900,2024-09-04T17:20:01.083000 +CVE-2024-33049,1,1,e4ccf905ee04fb81f8d1264e8441fffff5072148122182b40c04bdc76d313177,2024-10-07T13:15:12.243000 CVE-2024-3305,0,0,60cb4bdd6aab216e8dcee2531752f4a05622ff14e3e073fcab37d9212a2d0cdf,2024-09-19T14:44:28.980000 CVE-2024-33050,0,0,90923f1d1865d88057676c94e2b893aea7270f8731add142aed38ad6597070db,2024-09-04T17:07:13.930000 CVE-2024-33051,0,0,1fd409b2ba830a4d68baa6f497a6e4704a55e16bd6f855473d9753382be831b5,2024-09-04T17:18:10.950000 @@ -252517,7 +252526,14 @@ CVE-2024-33054,0,0,67fa57bf4b27f2520026aaaf6b13807e21cefd1307528e92c6c6a61d930ac CVE-2024-33057,0,0,fc38afeaa7486b0a5aebc4f1315319ab783e3abf0a4193027aaf853eaf32aed0,2024-09-04T17:06:24.843000 CVE-2024-3306,0,0,395196a450f14ac42a9c4c7d5b943f8723d96e3f07723d87dcdff36c939bae9a,2024-09-19T14:43:51.830000 CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b78e7,2024-09-04T17:06:08.407000 +CVE-2024-33064,1,1,8d87a24e577df3be77f079ce9055a8bb38b2ca2b8e54658d9c7fb6653040dfc9,2024-10-07T13:15:12.510000 +CVE-2024-33065,1,1,247343f6071480d42aea6c64783e3b9edfb4b4e7050727ee47a0ff6efadb50c1,2024-10-07T13:15:12.710000 +CVE-2024-33066,1,1,fd0c93b1b8ee89176edafdf68b6aa6542f2558a2be096cd630ed6fd1a5653a2b,2024-10-07T13:15:12.917000 +CVE-2024-33069,1,1,4e49c11309693449ca14b98367a503caf992afd8fbf2f99d8d0089018ebee1cb,2024-10-07T13:15:13.117000 CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000 +CVE-2024-33070,1,1,1bd41d464def984c327de4d82dfabfb5cba4c16d0b3a252ea3410a53713d26cd,2024-10-07T13:15:13.323000 +CVE-2024-33071,1,1,be1a75747f14ec40d74a273d2efe5289b7597ebddf5d96cc04265ff3bb674a9c,2024-10-07T13:15:13.510000 +CVE-2024-33073,1,1,69568d6c9a71e42d1ed549029d03c629e2b2bb021c167285d372a0682e269040,2024-10-07T13:15:13.703000 CVE-2024-33078,0,0,32899b4391f10b7cbfcaee5abff907eff95c8894218149b7342d82053a7e337b,2024-08-01T13:51:41.723000 CVE-2024-3308,0,0,b12c3c7359268120e478241aac0d965ee4975d5f2a92382c8de950e6d75610fc,2024-05-02T18:00:37.360000 CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176f0,2024-04-29T12:42:03.667000 @@ -256205,10 +256221,13 @@ CVE-2024-38391,0,0,20b04656bf618f5c1be614d3d82a6f2592410c65ddd3dee3dc7474add7c8b CVE-2024-38394,0,0,4144cb185c34fe25a28109cad04fb4f27c8fbde291d856b148c8ebd597877958,2024-08-02T04:17:26.447000 CVE-2024-38395,0,0,200f7eb17515a405ff37cc6fccc1c826c560846e0c0625cd687aedb08987a6c9,2024-07-03T02:04:58.833000 CVE-2024-38396,0,0,5f72717de89283d9d02d4a6b5fda996e5c7ff361cf439906862ebb83e84bfcdf,2024-07-03T02:04:59.670000 +CVE-2024-38397,1,1,17eeacfae5b8776eab4f765926dab2aa31d0f849290fc6d836b881271bc5082a,2024-10-07T13:15:14.333000 +CVE-2024-38399,1,1,c0acf3820c33394ba15170184d86dd800cb44beb5c0b89e0bdc6b781695fa73d,2024-10-07T13:15:14.540000 CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000 CVE-2024-38401,0,0,49e5f353e979551d81ba913b1959baf9c9c3b65372fddd5de7583edefa3b0302,2024-09-04T17:05:39.320000 CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41c81,2024-09-05T21:43:22.677000 CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000 +CVE-2024-38425,1,1,b32fea657b9f19333636bcf02c1e9223e77f8eac4583ed874b8bc6a300be1cb4,2024-10-07T13:15:14.730000 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000 CVE-2024-38429,0,0,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000 @@ -258383,6 +258402,7 @@ CVE-2024-42022,0,0,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce397 CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000 CVE-2024-42024,0,0,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000 CVE-2024-42025,0,0,8c1d228ed90571100df9823974eb0ba9e627f86789cc232c3042885df4b8d2fe,2024-09-28T18:35:02.277000 +CVE-2024-42027,1,1,b1909a04671f59c4d6a24e01be808e9d56e0beabab4871670150e67d9a210de1,2024-10-07T13:15:15.020000 CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000 CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000 CVE-2024-42030,0,0,59fa56f47f76e92b6c6c6a3fdcb37d68b092a6ac90822c136b288bb49e8250df,2024-08-20T16:55:16.100000 @@ -259059,6 +259079,7 @@ CVE-2024-43040,0,0,1da4fee0ec9b26a667b61884070b050a8f4bcf13a2b21e01185cd5279abd3 CVE-2024-43042,0,0,d94e46af540f49a4f3c40e5f52dafd9243317a2003df44ac76bccf484c7eed66,2024-09-19T21:01:24.137000 CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000 CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000 +CVE-2024-43047,1,1,fe622f06255346fe4d3b3b25d669a47935fe9d7882775d497955989226791353,2024-10-07T13:15:15.257000 CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000 CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000 @@ -260101,6 +260122,7 @@ CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb5 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 +CVE-2024-45153,1,1,1ebdbb6695c4c838075727aea17e78e96162e47b00e88fa825483ec620eda259,2024-10-07T13:15:15.603000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000 @@ -260534,6 +260556,7 @@ CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 CVE-2024-46313,0,0,0b29c605876b046853c74672dadf1c8118f0e83614058ed8950277f93a0b2b0a,2024-10-04T13:51:25.567000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 +CVE-2024-46325,1,1,54e85e411a451bc84e7214690f46896a17077905ff4d342849a3302f7027aa9a,2024-10-07T13:15:15.873000 CVE-2024-46327,0,0,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000 CVE-2024-46328,0,0,150e1d7b5fcc22f852cb919b13410447bdf1e8cb19cb878b6bbbd7be01f4269b,2024-09-30T12:46:20.237000 CVE-2024-46329,0,0,8c93b211ce727ef89bff0e17a07fc114c301812ff446c3d9b747d9a6ed124748,2024-09-30T12:46:20.237000 @@ -260568,7 +260591,7 @@ CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f63 CVE-2024-46441,0,0,4b4be1d9027655599991c0b9ab932c1005548268b9b4c663bc49101f1899dc44,2024-09-30T12:45:57.823000 CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000 CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000 -CVE-2024-46453,0,0,ff80e405e3b16a9d678437338a7564641a101ed0d4c9f688d9231ef50ab08f00,2024-09-30T12:45:57.823000 +CVE-2024-46453,0,1,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 @@ -260998,7 +261021,7 @@ CVE-2024-47180,0,0,657c5516ab8b6145e58c8aac2b3c60b2287f164333060e376b2fc3a8acbd6 CVE-2024-47182,0,0,e5cdb75305d71a5fc3653b4e9f8414538656f5f17a6a2cce9e83d34199d18380,2024-10-04T18:31:29.027000 CVE-2024-47183,0,0,02302ff11afc922cedfbc7277a7437b797846284f61ab5d3fecee6d7438d9bc9,2024-10-04T15:15:13.010000 CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce134,2024-10-04T18:19:26.240000 -CVE-2024-47186,0,0,1cccba8aa2ddc580854380ef50bac5bd799157ea676c879399c79c854aa1f475,2024-09-30T12:45:57.823000 +CVE-2024-47186,0,1,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47197,0,0,e4a1d8789bd0c967523f7418fe544ba10b0b511b96a39b8a241e5a1afb5230b4,2024-10-02T17:25:36.990000 CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000 @@ -261055,7 +261078,7 @@ CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf24 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 CVE-2024-47332,0,0,1df862aa82b6eae86cac273eca640bbfa7cc741acdfda1bccec05fcc431c9ece,2024-10-06T11:15:11.957000 CVE-2024-47333,0,0,e71ee4ed73a0217250e82dbb9f20e43aff2285627bab146687ff183b28b9b630,2024-10-06T11:15:12.170000 -CVE-2024-47335,1,1,a4a2664baa45778f92d8cd5d20d55e469bc0c735c285044cdec6e28f2e1f59c3,2024-10-07T06:15:04.617000 +CVE-2024-47335,0,0,a4a2664baa45778f92d8cd5d20d55e469bc0c735c285044cdec6e28f2e1f59c3,2024-10-07T06:15:04.617000 CVE-2024-47336,0,0,b14a6833d5e30cf1087b6fbf911ab25a74ddd0c54a17bed602dc88085f16eeb7,2024-10-06T11:15:12.393000 CVE-2024-47337,0,0,3f50b583aae71c6f8cadac0ae6ee64e91fb1dabd9a75ac191a842163ad487c42,2024-09-26T13:32:02.803000 CVE-2024-47338,0,0,d86d4fdd154b8adb4b67e8bb256527a4504d5eaecd8d00e0dc8d8b1f0a425a8a,2024-10-06T13:15:16.267000 @@ -261065,7 +261088,7 @@ CVE-2024-47340,0,0,4f61bbbfcda92b1ba4f9c77cee21b6d08186ed25a290baffd724f278078ba CVE-2024-47341,0,0,68d0ea6f863e0207756ae3ee7375f3f8f80f2e30176eae609a552cc14a36e69d,2024-10-06T11:15:12.980000 CVE-2024-47342,0,0,ed68f3a13fe48b9e02e00826873197baf611ad53b880bd2465019c1e876cb320,2024-10-06T11:15:13.180000 CVE-2024-47343,0,0,7d04c1d3dbc036c77ba16b9e22584923396bf4a750fd5dea263405439b359bf7,2024-10-06T11:15:13.370000 -CVE-2024-47344,1,1,7f3cd4058fe43380acf267a3749156f1983c94329122e6fd6e26dcbee4963896,2024-10-07T06:15:04.973000 +CVE-2024-47344,0,0,7f3cd4058fe43380acf267a3749156f1983c94329122e6fd6e26dcbee4963896,2024-10-07T06:15:04.973000 CVE-2024-47345,0,0,eaf8829ac5655f65337a7ddebefac52b230676fdb30a2fe892cb7d3845e6305f,2024-10-06T11:15:13.560000 CVE-2024-47346,0,0,eac2907dbd0b479d4e5f2041e42e58af3100598175c1d0f1fc2c1671d7e5f0a9,2024-10-06T11:15:13.760000 CVE-2024-47347,0,0,49102bd33d3ee523b336301781936cc58d61b6db80c197a91e09b4134f71d9ae,2024-10-06T11:15:13.963000 @@ -263800,7 +263823,7 @@ CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441b CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000 CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000 CVE-2024-7869,0,0,82563860e96b853488a742e0621cb13c9d5e162d563b05569e214e530009e5d5,2024-10-04T13:51:25.567000 -CVE-2024-7870,0,0,ff719683d174ab5036a1f14cf8c646553463b9f8a9cc32e20cbcb135f2e28385,2024-09-04T13:05:36.067000 +CVE-2024-7870,0,1,2836216d393e794b4828cb37dfdee043bfdf58d1b6ab4bb6d4918022aecdc961,2024-10-07T12:29:19.203000 CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000 CVE-2024-7878,0,0,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000 @@ -264106,7 +264129,7 @@ CVE-2024-8320,0,0,67cff6908a40f6de0a5d55f45cee63784fe7b54f56159b5877dcd792142b0c CVE-2024-8321,0,0,595129502821252825346a9a34e636ff1fd5806e1274bb50a0e529e9f41ab2d6,2024-09-12T21:53:22.677000 CVE-2024-8322,0,0,b55b95a67ef7974aa4139f663f04b216243350777f41a8ecf84d71c9fac2a097,2024-09-12T21:56:43.673000 CVE-2024-8324,0,0,6518d473c1aa4b475f6dfda0657752435a4222117c73b6cdc744a1f3e192bfb0,2024-10-04T13:51:25.567000 -CVE-2024-8325,0,0,b5bc10c641db975a4835994adbe18064ca82431f21cd201e1157772cc443938b,2024-09-04T13:05:36.067000 +CVE-2024-8325,0,1,7621afb4d5f72b3f894f792bb62b31b3ae60fff1ef7fb199ef11a396c0bd3fb4,2024-10-07T12:37:58.740000 CVE-2024-8327,0,0,6596679653e59e232d9a636653bb7ef76ebcd0b7674f3704360634000a96dff3,2024-09-04T17:11:23.533000 CVE-2024-8328,0,0,108819f537a57d4b33892521031f4d00462659f72abf40066992dd6f06ea1545,2024-09-04T17:11:19.827000 CVE-2024-8329,0,0,c2ccc2abc785644d7cb42c1d3d726bc8d097d2ab19b4380670524018890012be,2024-09-05T13:40:38.080000 @@ -264616,7 +264639,7 @@ CVE-2024-9297,0,0,9a7751e39bcdf8d82feb076f8314dad63877e84df2533ae0198fda134c5d36 CVE-2024-9298,0,0,e179dc30316d3f51823976ae1e224e806200bc4ae331001c4ddb8b975ec606c2,2024-10-01T13:37:52.373000 CVE-2024-9299,0,0,0e06149ad72b9bceed8023fce5d46e4c2d87e230ca1e26b3a70118742de53dd5,2024-10-01T13:36:06.977000 CVE-2024-9300,0,0,8cf4fd8be1a68079d9b09593a267df47fb69eec7140ede32d9eeb623680961c8,2024-10-01T13:34:58.760000 -CVE-2024-9301,0,0,07055a06bb4207f633a7d29c7cfd4519eef09a8d2cca409d83c23233179a85eb,2024-09-30T12:45:57.823000 +CVE-2024-9301,0,1,8bd5a6d252ad4356c723578db918b42e690d26a3308bebd8024d27b2807bcd16,2024-10-07T13:12:48.953000 CVE-2024-9304,0,0,f4e2b697051bb54ba85260a74446cf2ab04e7ed5a9a99551a585b1547839152d,2024-10-04T13:51:25.567000 CVE-2024-9306,0,0,c8859ae4f31fd9a0006087320a8c378196469fd682a39c8fee84f5eee69b53c2,2024-10-04T13:50:43.727000 CVE-2024-9313,0,0,8eab8e6a12fcb7dddda62f8c34fd34d547229d6ef4cec2e38f61189642da0e5f,2024-10-04T13:50:43.727000 @@ -264709,3 +264732,4 @@ CVE-2024-9562,0,0,4766621896d68d5ec09c83dd832c396be9eb1eb6e7926664ccf27962236d60 CVE-2024-9563,0,0,248e7f96012d360f5ca1c8bd22f68a33f5cdb4f47d1ac28671bac89e513ac6e9,2024-10-07T00:15:02.813000 CVE-2024-9564,0,0,cb620b0c4416c672d36b74953d03783bfa078e42257f95ad7c0855ccea27be4a,2024-10-07T01:15:14.697000 CVE-2024-9565,0,0,d5d075c95d405fd6033b8c1125f9fc528a63da102e561b30dfda733635129fee,2024-10-07T01:15:14.970000 +CVE-2024-9566,1,1,19be4051fcfa1de440d62b860dd355183456ba065973edc8da18e6c4ff0a1184,2024-10-07T13:15:16.077000