Auto-Update: 2024-10-31T21:00:20.265569+00:00

This commit is contained in:
cad-safe-bot 2024-10-31 21:03:20 +00:00
parent 05eb7a0990
commit b3844e60a5
70 changed files with 3459 additions and 335 deletions

View File

@ -2,10 +2,10 @@
"id": "CVE-2014-9804",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.170",
"lastModified": "2017-04-03T14:22:18.733",
"lastModified": "2024-10-31T19:52:55.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/835.html\">CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')</a>",
"evaluatorComment": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')",
"descriptions": [
{
"lang": "en",
@ -17,13 +17,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -86,8 +86,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9805",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.217",
"lastModified": "2017-04-04T15:31:36.767",
"lastModified": "2024-10-31T19:52:32.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9806",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.250",
"lastModified": "2017-04-04T15:33:36.053",
"lastModified": "2024-10-31T19:52:23.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9807",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.297",
"lastModified": "2017-04-04T15:34:05.697",
"lastModified": "2024-10-31T19:50:31.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9808",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.327",
"lastModified": "2017-04-04T15:34:30.633",
"lastModified": "2024-10-31T19:49:00.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9809",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.360",
"lastModified": "2017-04-04T15:35:18.700",
"lastModified": "2024-10-31T19:53:30.847",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9810",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.407",
"lastModified": "2017-04-04T15:35:52.280",
"lastModified": "2024-10-31T19:53:36.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9811",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.437",
"lastModified": "2017-04-04T15:36:27.390",
"lastModified": "2024-10-31T19:53:42.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9812",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.500",
"lastModified": "2017-04-04T15:36:56.970",
"lastModified": "2024-10-31T19:53:49.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9813",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.517",
"lastModified": "2017-04-04T15:40:29.073",
"lastModified": "2024-10-31T19:53:55.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9814",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.563",
"lastModified": "2017-04-04T15:40:49.197",
"lastModified": "2024-10-31T19:54:43.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9815",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.593",
"lastModified": "2017-04-04T15:37:35.503",
"lastModified": "2024-10-31T19:55:48.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9816",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.640",
"lastModified": "2017-04-04T15:41:53.687",
"lastModified": "2024-10-31T19:55:54.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9817",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.687",
"lastModified": "2017-04-04T15:42:20.873",
"lastModified": "2024-10-31T19:56:03.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9818",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.717",
"lastModified": "2017-04-04T15:43:36.660",
"lastModified": "2024-10-31T19:56:08.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9819",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.750",
"lastModified": "2017-04-04T15:44:17.503",
"lastModified": "2024-10-31T19:56:16.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9820",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.797",
"lastModified": "2017-04-04T15:44:40.317",
"lastModified": "2024-10-31T19:56:38.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9821",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.827",
"lastModified": "2017-04-04T15:45:03.570",
"lastModified": "2024-10-31T19:56:44.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9822",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.873",
"lastModified": "2017-04-04T15:45:25.163",
"lastModified": "2024-10-31T19:56:51.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9823",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.907",
"lastModified": "2017-04-06T13:13:37.330",
"lastModified": "2024-10-31T19:56:59.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2014-9824",
"sourceIdentifier": "cve@mitre.org",
"published": "2017-03-30T15:59:00.937",
"lastModified": "2017-04-06T12:56:39.363",
"lastModified": "2024-10-31T19:57:06.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -16,13 +16,13 @@
}
],
"metrics": {
"cvssMetricV30": [
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -85,8 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65"
"criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.4-0",
"matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49100",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T16:15:49.457",
"lastModified": "2024-02-22T19:07:27.197",
"lastModified": "2024-10-31T20:35:01.123",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Trusted Firmware-A (TF-A) anterior a 2.10 tiene una posible lectura fuera de los l\u00edmites en el servicio SDEI. El par\u00e1metro de entrada pasado en el registro x1 no est\u00e1 suficientemente validado en la funci\u00f3n sdei_interrupt_bind. El par\u00e1metro se pasa a una llamada a plat_ic_get_interrupt_type. Puede ser cualquier valor arbitrario que pase las comprobaciones en la funci\u00f3n plat_ic_is_sgi. Un Normal World (kernel de Linux) comprometido puede permitir que un atacante con privilegios de root emita llamadas SMC arbitrarias. Usando esta primitiva, puede controlar el contenido de los registros x0 a x6, que se utilizan para enviar par\u00e1metros a TF-A. Las direcciones fuera de los l\u00edmites se pueden leer en el contexto de TF-A (EL3). Debido a que el valor le\u00eddo nunca se devuelve a la memoria no segura o a los registros, no es posible ninguna fuga. Sin embargo, un atacante a\u00fan puede bloquear TF-A."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf0795ce641b6b4db5bc97e/services/std_svc/sdei/sdei_main.c#L708",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-52044",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:12.347",
"lastModified": "2024-10-31T19:15:12.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Studio-42 eLfinder 2.1.62 is vulnerable to Remote Code Execution (RCE) as there is no restriction for uploading files with the .php8 extension."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Studio-42/elFinder/issues/3615",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-52045",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:12.450",
"lastModified": "2024-10-31T19:15:12.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Studio-42 eLfinder 2.1.62 contains a filename restriction bypass leading to a persistent Cross-site Scripting (XSS) vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Studio-42/elFinder/issues/3617",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52613",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:08.477",
"lastModified": "2024-03-18T12:38:25.490",
"lastModified": "2024-10-31T20:35:02.680",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drivers/thermal/loongson2_thermal: corrige el juicio PTR_ERR() incorrecto. PTR_ERR() devuelve -ENODEV cuando las zonas t\u00e9rmicas no est\u00e1n definidas y necesitamos -ENODEV como el valor correcto para comparar. De lo contrario, tz-&gt;type es NULL cuando las zonas t\u00e9rmicas no est\u00e1n definidas, lo que genera el siguiente error: [12.290030] CPU 1 No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual ffffffffffffffff1, era == 900000000355f410, ra == 90000000031579b8 [ 12.302877] Ups [#1]: [ 12.305190] CPU: 1 PID: 181 Comm: systemd-udevd No contaminado 6.6.0-rc7+ #5385 [ 12.312304] pc 900000000355f410 ra 90000000031579b8 tp 90000001069e8000 sp 90000001069eba10 [ 12.320739] a0 0000000000000000 a1 ffffffffffffffff1 a2 0000000000000014 a3 0000000000000001 [ 12.329173] a4 90000001069eb990 a5 0000000000000001 a6 0000000000001001 a7 900000010003431c [ 12.337606] t0 ffffffffffffffff1 t1 54567fd5da9b 4fd4 t2 900000010614ec40 t3 00000000000dc901 [ 12.346041] t4 0000000000000000 t5 00000000000000004 t6 900000010614ee20 t7 900000000d00b 790 [ 12.354472] t8 00000000000dc901 u0 54567fd5da9b4fd4 s9 900000000402ae10 s0 900000010614ec40 [ 12.362916] s1 90000000039fced0 s2 ffffffffffffffff s3 ffffffffffffffff s4 9000000003acc000 [ 12.362931] s5 0000000000000004 s6 fffffffffffff000 s7 0000000000000490 s8 90000001028b2ec8 [ 12.362938] ra: 90000000031579b8 Thermal_add_hwmon_sysfs+0x258/0x300 [ 12.386411] ERA: 900000000355f410 strscpy+0xf0/0x160 [ 12.391626] CRMD: 00000 0b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) [ 12.397898] PRMD: 00000004 (PPLV0 +PIE -PWE) [ 12.403678] EUEN: 00000000 (-FPE -SXE -ASXE -BTE) [ 12.409859] ECFG: 00071c1c (LIE=2 -4,10-12 vs = 7) [12.415882] ESTAT: 00010000 [PIL] (IS = ECODE = 1 ESUBCODE = 0) [12.415907] BADV: FFFFFFFFFFFFFF1 [12.415911] PRID: 0014A000 (Loongson-64bit, Loongson-24000) [12.415917] M\u00f3dulos vinculados en: loongson2_thermal(+) vfat fat uio_pdrv_genirq uio fuse zram zsmalloc [12.415950] Proceso systemd-udevd (pid: 181, threadinfo=00000000358b9718, task=00000000ace72fe3) [ 12.415961] Pila: 0000000000000dc0 54567fd5da9b4fd4 900000000402ae10 9000000002df9358 [12.415982] ffffffffffffff 0000000000000004 9000000107a10aa8 90000001002a3410 [ 12.415999] ffffffffffffff ffffffffffffff 9000000107a11268 9000000003157ab0 [ 12.416016] 9000000107a10aa8 ffffff80020fc0c8 90000001002a3410 ffffffffffffffed [ 12.416032] 00000000000000024 ffffff80020cc1e8 900000000402b2 a0 9000000003acc000 [ 12.416048] 90000001002a3410 0000000000000000 ffffff80020f4030 90000001002a3410 [ 12.416065] 00000000000000000 9000000002df6808 90000001002a3410 0000000000000000 [ 12.416081] ffffff80020f4030 00000000000000000 90000001002a3410 9000000002df2ba 8 [ 12.416097] 00000000000000b4 90000001002a34f4 90000001002a3410 0000000000000002 [ 12.416114] ffffff80020f4030 ffffffffffffff0 90000001002a3410 9000000002df2f30 [ 12 .416131] ... [ 12.416138] Seguimiento de llamadas: [ 12.416142] [&lt;900000000355f410&gt;] strscpy+0xf0/0x160 [ 12.416167] [&lt;90000000031579b8&gt;] Thermal_add_hwmon_sysfs+0x258/0 x300 [12.416183 ] [&lt;9000000003157ab0&gt;] devm_thermal_add_hwmon_sysfs+0x50/0xe0 [ 12.416200] [] loongson2_thermal_probe+0x128/0x200 [loongson2_thermal] [ 12.416232] [&lt;9 000000002df6808&gt;] plataforma_probe+0x68/0x140 [ 12.416249] [&lt;9000000002df2ba8&gt;] realmente_probe+ 0xc8/0x3c0 [ 12.416269] [&lt;9000000002df2f30&gt;] __driver_probe_device+0x90/0x180 [ 12.416286] [&lt;9000000002df3058&gt;] driver_probe_device+0x38/0x160 [ 12.41630 2] [&lt;9000000002df33a8&gt;] __driver_attach+0xa8/0x200 [ 12.416314] [&lt;9000000002deffec&gt;] bus_for_each_dev+0x8c/0x120 [ 12.416330] [&lt;9000000002df198c&gt;] bus_add_driver+0x10c/0x2a0 [ 12.416346] [&lt;9000000002df46b4&gt;] driver_register+0x74/0x160 [ 12.41 6358] [&lt;90000000022201a4&gt;] do_one_initcall+0x84/0x220 [ 12.416372] [&lt;90000000022f3ab8 &gt;] do_init_module+0x58/0x2c0 [ ---truncado---"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/15ef92e9c41124ee9d88b01208364f3fe1f45f84",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52704",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T16:15:12.760",
"lastModified": "2024-05-21T16:53:56.550",
"lastModified": "2024-10-31T20:35:02.910",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL .Tetsuo-San not\u00f3 que la confirmaci\u00f3n f5d39b020809 (\"freezer,sched: Rewrite core freezer logic\") rompi\u00f3 call_usermodehelper_exec() para el caso KILLABLE. Espec\u00edficamente, se pas\u00f3 por alto que el segundo wait_for_completion() incondicional no era opcional y garantiza que la finalizaci\u00f3n en la pila no se utilice antes de salir del alcance."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/7f9f6c54da876b3f0bece2b569456ceb96965ed7",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-10573",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-10-31T19:15:12.540",
"lastModified": "2024-10-31T19:15:12.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-10573",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322980",
"source": "secalert@redhat.com"
},
{
"url": "https://mpg123.org/cgi-bin/news.cgi#2024-10-26",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20264",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T17:15:14.180",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:04:42.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,18 +81,119 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DAEC54E5-91D8-48AB-A890-5841A158839F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20269",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T17:15:14.610",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:35:03.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,18 +81,454 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20273",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T17:15:14.813",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:09:24.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,18 +81,454 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20298",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T17:15:15.710",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:25:31.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,18 +81,74 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20364",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:05.427",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:36:32.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,235 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3C86116B-8475-40A0-A507-D4A7947F5F2C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4D803EC9-26EE-4799-A435-C782C92739CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6EEF87CD-2335-4886-A65C-4E33775AEC52"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "953EB81A-1B53-4A57-9F59-D4A7D37E657E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CB534BC-3E4D-4484-AFD0-69524B1F07F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20415",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-10-23T18:15:09.713",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:17:54.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
@ -51,10 +81,480 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DB01FA17-68F7-47E6-9D94-AC3C290F62AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "08F0F58D-C859-400F-88D4-38C84584BACF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "73D28E1C-B26F-4BD8-8F21-2AFA1E1B881D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4DF3D576-7922-4FB4-9C8B-2E31E29A4FEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DE852669-316E-4710-A964-91B17CBA75FF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D64651BA-33A1-4DD9-B23C-577543D45534"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "E44687A2-D460-4CD7-91E1-4535B4A71698"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "4C312686-8739-4B48-9476-3D65200B3216"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "059D7FFF-94B6-400A-A939-498BDBB18FED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B4204464-BF24-4596-8AE2-4D98EC817234"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "DF0B67CC-FFEA-4A22-A79F-6DB1C826CECE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "13744A3B-7F48-49B1-8263-012456E27ACD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0E0CC829-ED28-435B-9826-6CDB4BB2F0EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1732AC85-09E3-43E2-B624-87E537EB6F03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "85986C19-4819-4F02-9873-A42D4277D3A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "11BEDD8B-DB02-4E8D-B2BF-2B7BE190AF6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E13E7F-BDA9-49DF-BA43-CB812BC0D384"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "47FDAAB6-EC1B-4759-8B8A-55748C39AFFC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "E3C97C0B-509E-4AE2-9EDB-BDC0436E05A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DA61E6F5-FFFD-4D4E-9AA3-94F827A79F4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "80EC515D-6051-472A-92F4-ED4385FEDEC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F7E83830-B9CA-425D-BFD3-7F8FD1114950"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "91F862F9-40FE-42E9-86B2-BD9350B118D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "857A0C11-1456-4F1A-A812-E93B829F13DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "93828989-2731-4DCE-9FBB-5ABB5A660A9D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "83B99522-B80A-4998-971B-F3C45EB104F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "F286FD7B-E588-4DCC-B41F-AD9E4A49B8ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3908BF04-0869-4F4D-9BC4-411F56AC8092"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "227799AC-75DF-4B3F-A7EF-063D8D8C2EC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FB72A64E-7B19-4A96-809C-287E391DFA44"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "4630DEB7-BEE7-4247-9536-C35887A807C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "2E7BC07A-1C33-46FB-9ABF-C98A46BE6AD3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "0F3B8077-2DD6-491F-9F0E-D977E7A4AB08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "CEAD4CD3-FBF1-43BC-A14F-6375E4B784AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "5662EBCF-13F5-4CE6-8E3D-B23B73AF4633"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "817E7CDB-5CDC-44A9-92D0-4364A08302BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9A95D8B6-2D90-4EA8-B468-356EB396A273"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDEF2CC-D485-4E66-9818-7C9740F37840"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "30AE7CB7-86F5-4B80-9179-1C2DF4E8E7B5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1931C431-3452-4FE1-870A-16700553BDAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "490C91AC-9437-43DA-99AF-0DF8A0E5EEB5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "22913221-9B69-451A-8442-C65091DFAFD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1488A64D-E0ED-4E88-92E9-D8E38A2CB080"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9FF58049-7F1B-425B-A2A7-5974080625F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4DA72515-66E1-4811-ADDA-B2F9B6A4B737"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "606C631F-5A30-4A07-A761-29B31D09C66A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA2A011-FAE4-4741-AA37-1F4F17471381"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B57A678-E534-472C-8B45-F6A1E027248C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2D748B16-1C2A-4E00-807F-647569C271D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "853866E2-1BCC-4A81-907A-ABA8648D8C57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9B0B5925-0336-4F56-9D9A-777687DF3B22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F406CDA3-08B9-4C13-B6F5-C83978239623"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "108BFA85-BB6B-420A-911D-B2731CB05289"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0FEE4092-0EAD-48DA-92EB-82DD4EB43E49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7B8DF2E2-848A-4616-AEF0-1EFE68A900C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "387E34BD-913B-4CB7-9230-81B283E92A9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FFE8B3DC-9865-4845-B989-FB41D6FE085E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC98B2C9-2F78-4DB5-97D7-78D584CEBE87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "44CEED06-6E18-4961-BD69-8BF3E7A6D59C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D815D562-D60A-4AD1-9243-8167B244882E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FA91AC4A-77D5-4C41-BD63-4E8F3BA4FF84"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A5808D1C-6D6E-403D-8904-147B66B50385"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FD9A750B-7C84-484C-94F3-FB66EF6296E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "62950A6C-8467-4215-BCD1-010B8C491714"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6D97494F-BA89-4E95-A01F-C2CE02505A27"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "21D28D33-2B3C-4695-9137-7C4AC6BA2D7D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3DCA8FE8-D0BC-4B6C-8E15-0DC5D0EF515F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "62213974-B025-4A76-87CD-025C84389A2B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A876A2A0-0973-481C-A63A-1A5761015308"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E6671431-4FE3-4D7D-9F46-445A1A6B7EEF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E2757987-7648-4BE1-AE91-99F1FC95C8C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "841C3C05-7289-46CC-A610-5A5BFC81FD42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "91599B30-27D5-450A-A565-A65BF940C30C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71802FFD-A173-4F21-87C8-495D8F95A176"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9CD6DE-EE1E-4FF4-8DF5-7F9DA36AFCFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E0EF1B4E-3E42-4C42-9981-2BC17F22BA2D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "30E26E7E-F6D8-4A89-85F7-42FCB0E37AD6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A7E707-6CBB-42E3-BE90-72E835156DB9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4BB537CA-0E37-471E-8DD3-7710A443224A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F9022BCA-EDBF-4FD1-B427-573CA07E5134"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "3B79ABCC-C95B-45AB-BE9D-454BD8174651"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A4FD7D25-704B-47EB-AF36-DC684AD07807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3D33E431-39F5-4F73-99A1-19A05A594C90"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7A6F69A3-E15F-43C9-8B9C-A30E057C4FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "602535DE-ED32-4805-85EF-940955459B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "17727E39-1612-4433-AC23-CBC852B392C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D5894CEC-AB1C-44F2-A977-FE74897A24A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "579DC0CE-1CEA-449F-BF76-AD7087573ACD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EB3E28C0-675B-4C30-B248-BE1EB5E961C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E"
}
]
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs",
"source": "ykramarz@cisco.com"
"source": "ykramarz@cisco.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21099",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:30.723",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-10-31T19:35:02.343",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24093",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-12T21:15:58.370",
"lastModified": "2024-03-13T12:33:51.697",
"lastModified": "2024-10-31T20:35:03.523",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en Code-projects Scholars Tracking System 1.0 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de informaci\u00f3n de actualizaci\u00f3n de informaci\u00f3n personal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/ASR511-OO7/CVE-2024-24093/blob/main/CVE-10",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27279",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-03-12T09:15:10.070",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-10-31T19:35:03.510",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Existe una vulnerabilidad de Directory traversal en a-blog cms Serie Ver.3.1.x Ver.3.1.9 y anteriores, Serie Ver.3.0.x Ver.3.0.30 y anteriores, Serie Ver.2.11.x Ver.2.11.59 y anteriores, Serie Ver.2.10.x Ver.2.10.51 y anteriores, y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con privilegios de editor o superiores que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor, incluidos archivos de contrase\u00f1as."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28303",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-19T19:15:06.913",
"lastModified": "2024-03-20T13:00:16.367",
"lastModified": "2024-10-31T19:35:06.587",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que Open Source Medicine Ordering System v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de fecha en /admin/reports/index.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/onurkarasalihoglu/vulnerability-disclosures/blob/main/omos-sql-injection.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3592",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-06-07T06:15:10.960",
"lastModified": "2024-06-07T14:56:05.647",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:40:34.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
@ -39,14 +59,50 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "9.0.2",
"matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3097878/quiz-master-next/trunk/php/admin/options-page-questions-tab.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc085413-db43-43e3-9b60-aeb341eed4e1?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37162",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-06-07T15:15:50.617",
"lastModified": "2024-06-07T19:24:09.243",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-31T19:43:26.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-209"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.3.3",
"matchCriteriaId": "4DDAA2C4-0E79-46B0-BE82-73B86D8B383A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39332",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:12.897",
"lastModified": "2024-10-31T19:15:12.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Webswing 23.2.2 allows remote attackers to modify client-side JavaScript code to achieve path traversal, likely leading to remote code execution via modification of shell scripts on the server."
}
],
"metrics": {},
"references": [
{
"url": "https://herolab.usd.de/security-advisories/usd-2024-0008/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39719",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T20:15:04.770",
"lastModified": "2024-10-31T20:15:04.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Ollama through 0.3.14. File existence disclosure can occur via api/create. When calling the CreateModel route with a path parameter that does not exist, it reflects the \"File does not exist\" error message to the attacker, providing a primitive for file existence on the server."
}
],
"metrics": {},
"references": [
{
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-39720",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T20:15:04.877",
"lastModified": "2024-10-31T20:15:04.877",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement pointing to the attacker-controlled blob file, the attacker can crash the application through the CreateModel route, leading to a segmentation fault (signal SIGSEGV: segmentation violation)."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ollama/ollama/compare/v0.1.45...v0.1.46#diff-782c2737eecfa83b7cb46a77c8bdaf40023e7067baccd4f806ac5517b4563131L417",
"source": "cve@mitre.org"
},
{
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-39721",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T20:15:04.993",
"lastModified": "2024-10-31T20:15:04.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client)."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ollama/ollama/blob/9164b0161bcb24e543cba835a8863b80af2c0c21/server/routes.go#L557",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/routes.go#L536",
"source": "cve@mitre.org"
},
{
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-39722",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T20:15:05.080",
"lastModified": "2024-10-31T20:15:05.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Ollama before 0.1.46. It exposes which files exist on the server on which it is deployed via path traversal in the api/push route."
}
],
"metrics": {},
"references": [
{
"url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40457",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-12T14:16:06.780",
"lastModified": "2024-10-24T17:35:07.660",
"lastModified": "2024-10-31T20:15:05.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -59,6 +59,10 @@
}
],
"references": [
{
"url": "https://github.com/jeppojeps/CVE-2024-40457-PoC",
"source": "cve@mitre.org"
},
{
"url": "https://www.noip.com/support/knowledgebase/install-linux-3-x-dynamic-update-client-duc",
"source": "cve@mitre.org"

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-42515",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:12.983",
"lastModified": "2024-10-31T19:15:12.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Glossarizer through 1.5.2 improperly tries to convert text into HTML. Even though the application itself escapes special characters (e.g., <>), the underlying library converts these encoded characters into legitimate HTML, thereby possibly causing stored XSS. Attackers can append a XSS payload to a word that has a corresponding glossary entry."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/PebbleRoad/glossarizer",
"source": "cve@mitre.org"
},
{
"url": "https://herolab.usd.de/security-advisories/usd-2024-0011/",
"source": "cve@mitre.org"
},
{
"url": "https://www.npmjs.com/package/glossarizer",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42835",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T14:15:05.610",
"lastModified": "2024-10-31T14:15:05.610",
"lastModified": "2024-10-31T19:35:08.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://github.com/langflow-ai/langflow/issues/2908",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42934",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T05:15:13.270",
"lastModified": "2024-10-10T12:51:56.987",
"lastModified": "2024-10-31T20:35:05.250",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "OpenIPMI anterior a 2.0.36 tiene un acceso a una matriz fuera de los l\u00edmites (para el tipo de autenticaci\u00f3n) en el simulador ipmi_sim, lo que resulta en una denegaci\u00f3n de servicio o (con muy baja probabilidad) en la omisi\u00f3n de la autenticaci\u00f3n o la ejecuci\u00f3n del c\u00f3digo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308375",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45165",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-22T04:15:22.310",
"lastModified": "2024-08-22T12:48:02.790",
"lastModified": "2024-10-31T19:35:08.327",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Los datos se env\u00edan entre el cliente y el servidor con cifrado. Sin embargo, la clave se deriva de la cadena \"(c)2007 UCI Software GmbH B.Boll\" (sin comillas). La clave es est\u00e1tica y est\u00e1 codificada. Con el acceso a los mensajes, esto da como resultado que un atacante descifre y cifre los mensajes. Por lo tanto, permite ataques de intermediario pasivos y activos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "http://download.uci.de/idol2/idol2Client_2_12.exe",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46544",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-23T11:15:10.563",
"lastModified": "2024-09-26T13:32:55.343",
"lastModified": "2024-10-31T20:35:06.390",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La vulnerabilidad de permisos predeterminados incorrectos en los conectores Apache Tomcat permite a los usuarios locales ver y modificar la memoria compartida que contiene la configuraci\u00f3n de mod_jk, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la denegaci\u00f3n de servicio. Este problema afecta a los conectores Apache Tomcat: desde la versi\u00f3n 1.2.9-beta hasta la 1.2.49. Solo se ve afectado mod_jk en sistemas tipo Unix. Ni el redirector ISAPI ni mod_jk en Windows se ven afectados. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.2.50, que soluciona el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48200",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.150",
"lastModified": "2024-10-31T19:15:13.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in MobaXterm v24.2 allows a local attacker to escalate privileges and execute arbitrary code via the remove function of the MobaXterm MSI is spawning one Administrative cmd (conhost.exe)"
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/ahmedsherif/ad56cd3a9ef86cdc05175fb591804c64",
"source": "cve@mitre.org"
},
{
"url": "https://mobaxterm.mobatek.net/download-home-edition.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48307",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T01:15:14.803",
"lastModified": "2024-10-31T01:15:14.803",
"lastModified": "2024-10-31T19:35:09.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que JeecgBoot v3.7.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /onlDragDatasetHead/getTotalData."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/jeecgboot",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48346",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-30T21:15:14.450",
"lastModified": "2024-10-30T21:15:14.450",
"lastModified": "2024-10-31T19:35:10.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "xtreme1 <= v0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the /api/data/upload path. The vulnerability is triggered through the fileUrl parameter, which allows an attacker to make arbitrary requests to internal or external systems."
},
{
"lang": "es",
"value": "xtreme1 &lt;= v0.9.1 contiene una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta /api/data/upload. La vulnerabilidad se activa a trav\u00e9s del par\u00e1metro fileUrl, que permite a un atacante realizar solicitudes arbitrarias a sistemas internos o externos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/xtreme1-io/xtreme1/issues/284",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-48359",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T20:15:05.340",
"lastModified": "2024-10-31T20:15:05.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OpenXP-Research/CVE-2024-48359",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48360",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T20:15:05.420",
"lastModified": "2024-10-31T20:15:05.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/OpenXP-Research/CVE-2024-48360",
"source": "cve@mitre.org"
},
{
"url": "https://www.qualitor.com.br/qualitor-8-20",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48735",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-30T21:15:14.620",
"lastModified": "2024-10-30T21:15:14.620",
"lastModified": "2024-10-31T20:35:06.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory Traversal in /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} in SAS Studio 9.4 allows remote attacker to access internal files by manipulating default path during file download."
},
{
"lang": "es",
"value": "Directory Traversal en /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} en SAS Studio 9.4 permite a un atacante remoto acceder a archivos internos manipulando la ruta predeterminada durante la descarga de archivos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://sas.com",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-48955",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T18:15:05.690",
"lastModified": "2024-10-30T15:35:22.063",
"lastModified": "2024-10-31T20:15:05.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In NetAdmin 4.0.30319, an attacker can steal a valid session cookie and inject it into another device, granting unauthorized access. This type of attack is commonly referred to as session hijacking."
"value": "Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that \"assembles\" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50356",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-31T18:15:05.750",
"lastModified": "2024-10-31T18:15:05.750",
"lastModified": "2024-10-31T20:35:07.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 0.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50801",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.313",
"lastModified": "2024-10-31T19:15:13.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/collections.php. The vulnerability is exploitable via the id parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/abantecart/abantecart-src",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50802",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.413",
"lastModified": "2024-10-31T19:15:13.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/email_templates.php. The vulnerability is exploitable via the id parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/abantecart/abantecart-src",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51060",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.500",
"lastModified": "2024-10-31T19:15:13.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Projectworlds Online Admission System v1 is vulnerable to SQL Injection in index.php via the 'a_id' parameter."
}
],
"metrics": {},
"references": [
{
"url": "http://projectworld.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51060",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51063",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.610",
"lastModified": "2024-10-31T19:15:13.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection in add-teacher.php via the mobile number or email parameter."
}
],
"metrics": {},
"references": [
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51063",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51064",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.700",
"lastModified": "2024-10-31T19:15:13.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection via the tid parameter to admin/queries.php."
}
],
"metrics": {},
"references": [
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51064",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51065",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.780",
"lastModified": "2024-10-31T19:15:13.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Phpgurukul Beauty Parlour Management System v1.1 is vulnerable to SQL Injection in admin/index.php via the the username parameter."
}
],
"metrics": {},
"references": [
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51065",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51066",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T19:15:13.860",
"lastModified": "2024-10-31T19:15:13.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Insecure Direct Object Reference (IDOR) vulnerability in appointment-detail.php in Phpgurukul's Beauty Parlour Management System v1.1 allows unauthorized access to the Personally Identifiable Information (PII) of other customers."
}
],
"metrics": {},
"references": [
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51066",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51255",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T16:15:06.033",
"lastModified": "2024-10-31T16:15:06.033",
"lastModified": "2024-10-31T19:35:10.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51259",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T14:15:06.260",
"lastModified": "2024-10-31T14:15:06.260",
"lastModified": "2024-10-31T19:35:11.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51260",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-31T16:15:06.113",
"lastModified": "2024-10-31T16:15:06.113",
"lastModified": "2024-10-31T19:35:12.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-31T19:00:20.333660+00:00
2024-10-31T21:00:20.265569+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-31T18:48:20.883000+00:00
2024-10-31T20:35:07.840000+00:00
```
### Last Data Feed Release
@ -33,51 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
267742
267761
```
### CVEs added in the last Commit
Recently added CVEs: `7`
Recently added CVEs: `19`
- [CVE-2024-50347](CVE-2024/CVE-2024-503xx/CVE-2024-50347.json) (`2024-10-31T18:15:05.600`)
- [CVE-2024-50356](CVE-2024/CVE-2024-503xx/CVE-2024-50356.json) (`2024-10-31T18:15:05.750`)
- [CVE-2024-51430](CVE-2024/CVE-2024-514xx/CVE-2024-51430.json) (`2024-10-31T17:15:13.403`)
- [CVE-2024-51478](CVE-2024/CVE-2024-514xx/CVE-2024-51478.json) (`2024-10-31T17:15:13.500`)
- [CVE-2024-51481](CVE-2024/CVE-2024-514xx/CVE-2024-51481.json) (`2024-10-31T17:15:13.723`)
- [CVE-2024-51482](CVE-2024/CVE-2024-514xx/CVE-2024-51482.json) (`2024-10-31T18:15:05.997`)
- [CVE-2024-7883](CVE-2024/CVE-2024-78xx/CVE-2024-7883.json) (`2024-10-31T17:15:14.013`)
- [CVE-2023-52044](CVE-2023/CVE-2023-520xx/CVE-2023-52044.json) (`2024-10-31T19:15:12.347`)
- [CVE-2023-52045](CVE-2023/CVE-2023-520xx/CVE-2023-52045.json) (`2024-10-31T19:15:12.450`)
- [CVE-2024-10573](CVE-2024/CVE-2024-105xx/CVE-2024-10573.json) (`2024-10-31T19:15:12.540`)
- [CVE-2024-39332](CVE-2024/CVE-2024-393xx/CVE-2024-39332.json) (`2024-10-31T19:15:12.897`)
- [CVE-2024-39719](CVE-2024/CVE-2024-397xx/CVE-2024-39719.json) (`2024-10-31T20:15:04.770`)
- [CVE-2024-39720](CVE-2024/CVE-2024-397xx/CVE-2024-39720.json) (`2024-10-31T20:15:04.877`)
- [CVE-2024-39721](CVE-2024/CVE-2024-397xx/CVE-2024-39721.json) (`2024-10-31T20:15:04.993`)
- [CVE-2024-39722](CVE-2024/CVE-2024-397xx/CVE-2024-39722.json) (`2024-10-31T20:15:05.080`)
- [CVE-2024-42515](CVE-2024/CVE-2024-425xx/CVE-2024-42515.json) (`2024-10-31T19:15:12.983`)
- [CVE-2024-48200](CVE-2024/CVE-2024-482xx/CVE-2024-48200.json) (`2024-10-31T19:15:13.150`)
- [CVE-2024-48359](CVE-2024/CVE-2024-483xx/CVE-2024-48359.json) (`2024-10-31T20:15:05.340`)
- [CVE-2024-48360](CVE-2024/CVE-2024-483xx/CVE-2024-48360.json) (`2024-10-31T20:15:05.420`)
- [CVE-2024-50801](CVE-2024/CVE-2024-508xx/CVE-2024-50801.json) (`2024-10-31T19:15:13.313`)
- [CVE-2024-50802](CVE-2024/CVE-2024-508xx/CVE-2024-50802.json) (`2024-10-31T19:15:13.413`)
- [CVE-2024-51060](CVE-2024/CVE-2024-510xx/CVE-2024-51060.json) (`2024-10-31T19:15:13.500`)
- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2024-10-31T19:15:13.610`)
- [CVE-2024-51064](CVE-2024/CVE-2024-510xx/CVE-2024-51064.json) (`2024-10-31T19:15:13.700`)
- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2024-10-31T19:15:13.780`)
- [CVE-2024-51066](CVE-2024/CVE-2024-510xx/CVE-2024-51066.json) (`2024-10-31T19:15:13.860`)
### CVEs modified in the last Commit
Recently modified CVEs: `44`
Recently modified CVEs: `49`
- [CVE-2024-34002](CVE-2024/CVE-2024-340xx/CVE-2024-34002.json) (`2024-10-31T18:35:12.750`)
- [CVE-2024-34537](CVE-2024/CVE-2024-345xx/CVE-2024-34537.json) (`2024-10-31T17:15:12.903`)
- [CVE-2024-35989](CVE-2024/CVE-2024-359xx/CVE-2024-35989.json) (`2024-10-31T18:35:12.980`)
- [CVE-2024-37763](CVE-2024/CVE-2024-377xx/CVE-2024-37763.json) (`2024-10-31T18:35:13.207`)
- [CVE-2024-40680](CVE-2024/CVE-2024-406xx/CVE-2024-40680.json) (`2024-10-31T17:15:12.990`)
- [CVE-2024-40681](CVE-2024/CVE-2024-406xx/CVE-2024-40681.json) (`2024-10-31T17:15:13.143`)
- [CVE-2024-4468](CVE-2024/CVE-2024-44xx/CVE-2024-4468.json) (`2024-10-31T18:40:45.817`)
- [CVE-2024-46528](CVE-2024/CVE-2024-465xx/CVE-2024-46528.json) (`2024-10-31T17:15:13.250`)
- [CVE-2024-4661](CVE-2024/CVE-2024-46xx/CVE-2024-4661.json) (`2024-10-31T18:21:43.683`)
- [CVE-2024-47640](CVE-2024/CVE-2024-476xx/CVE-2024-47640.json) (`2024-10-31T17:39:28.907`)
- [CVE-2024-48213](CVE-2024/CVE-2024-482xx/CVE-2024-48213.json) (`2024-10-31T18:35:14.040`)
- [CVE-2024-48569](CVE-2024/CVE-2024-485xx/CVE-2024-48569.json) (`2024-10-31T18:35:14.873`)
- [CVE-2024-48646](CVE-2024/CVE-2024-486xx/CVE-2024-48646.json) (`2024-10-31T18:35:15.693`)
- [CVE-2024-48647](CVE-2024/CVE-2024-486xx/CVE-2024-48647.json) (`2024-10-31T18:35:16.527`)
- [CVE-2024-48648](CVE-2024/CVE-2024-486xx/CVE-2024-48648.json) (`2024-10-31T17:35:03.713`)
- [CVE-2024-49643](CVE-2024/CVE-2024-496xx/CVE-2024-49643.json) (`2024-10-31T18:48:20.883`)
- [CVE-2024-49645](CVE-2024/CVE-2024-496xx/CVE-2024-49645.json) (`2024-10-31T17:59:25.867`)
- [CVE-2024-50074](CVE-2024/CVE-2024-500xx/CVE-2024-50074.json) (`2024-10-31T18:23:21.567`)
- [CVE-2024-5087](CVE-2024/CVE-2024-50xx/CVE-2024-5087.json) (`2024-10-31T18:26:54.500`)
- [CVE-2024-5613](CVE-2024/CVE-2024-56xx/CVE-2024-5613.json) (`2024-10-31T18:31:30.757`)
- [CVE-2024-5638](CVE-2024/CVE-2024-56xx/CVE-2024-5638.json) (`2024-10-31T18:38:33.640`)
- [CVE-2024-5823](CVE-2024/CVE-2024-58xx/CVE-2024-5823.json) (`2024-10-31T18:05:00.637`)
- [CVE-2024-7042](CVE-2024/CVE-2024-70xx/CVE-2024-7042.json) (`2024-10-31T18:36:30.140`)
- [CVE-2024-7472](CVE-2024/CVE-2024-74xx/CVE-2024-7472.json) (`2024-10-31T18:46:32.497`)
- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-10-31T17:15:14.250`)
- [CVE-2024-20264](CVE-2024/CVE-2024-202xx/CVE-2024-20264.json) (`2024-10-31T19:04:42.863`)
- [CVE-2024-20269](CVE-2024/CVE-2024-202xx/CVE-2024-20269.json) (`2024-10-31T19:35:03.420`)
- [CVE-2024-20273](CVE-2024/CVE-2024-202xx/CVE-2024-20273.json) (`2024-10-31T19:09:24.687`)
- [CVE-2024-20298](CVE-2024/CVE-2024-202xx/CVE-2024-20298.json) (`2024-10-31T19:25:31.523`)
- [CVE-2024-20364](CVE-2024/CVE-2024-203xx/CVE-2024-20364.json) (`2024-10-31T19:36:32.277`)
- [CVE-2024-20415](CVE-2024/CVE-2024-204xx/CVE-2024-20415.json) (`2024-10-31T19:17:54.273`)
- [CVE-2024-21099](CVE-2024/CVE-2024-210xx/CVE-2024-21099.json) (`2024-10-31T19:35:02.343`)
- [CVE-2024-24093](CVE-2024/CVE-2024-240xx/CVE-2024-24093.json) (`2024-10-31T20:35:03.523`)
- [CVE-2024-27279](CVE-2024/CVE-2024-272xx/CVE-2024-27279.json) (`2024-10-31T19:35:03.510`)
- [CVE-2024-28303](CVE-2024/CVE-2024-283xx/CVE-2024-28303.json) (`2024-10-31T19:35:06.587`)
- [CVE-2024-3592](CVE-2024/CVE-2024-35xx/CVE-2024-3592.json) (`2024-10-31T19:40:34.747`)
- [CVE-2024-37162](CVE-2024/CVE-2024-371xx/CVE-2024-37162.json) (`2024-10-31T19:43:26.800`)
- [CVE-2024-40457](CVE-2024/CVE-2024-404xx/CVE-2024-40457.json) (`2024-10-31T20:15:05.173`)
- [CVE-2024-42835](CVE-2024/CVE-2024-428xx/CVE-2024-42835.json) (`2024-10-31T19:35:08.113`)
- [CVE-2024-42934](CVE-2024/CVE-2024-429xx/CVE-2024-42934.json) (`2024-10-31T20:35:05.250`)
- [CVE-2024-45165](CVE-2024/CVE-2024-451xx/CVE-2024-45165.json) (`2024-10-31T19:35:08.327`)
- [CVE-2024-46544](CVE-2024/CVE-2024-465xx/CVE-2024-46544.json) (`2024-10-31T20:35:06.390`)
- [CVE-2024-48307](CVE-2024/CVE-2024-483xx/CVE-2024-48307.json) (`2024-10-31T19:35:09.203`)
- [CVE-2024-48346](CVE-2024/CVE-2024-483xx/CVE-2024-48346.json) (`2024-10-31T19:35:10.023`)
- [CVE-2024-48735](CVE-2024/CVE-2024-487xx/CVE-2024-48735.json) (`2024-10-31T20:35:06.767`)
- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-31T20:15:05.530`)
- [CVE-2024-50356](CVE-2024/CVE-2024-503xx/CVE-2024-50356.json) (`2024-10-31T20:35:07.840`)
- [CVE-2024-51255](CVE-2024/CVE-2024-512xx/CVE-2024-51255.json) (`2024-10-31T19:35:10.837`)
- [CVE-2024-51259](CVE-2024/CVE-2024-512xx/CVE-2024-51259.json) (`2024-10-31T19:35:11.680`)
- [CVE-2024-51260](CVE-2024/CVE-2024-512xx/CVE-2024-51260.json) (`2024-10-31T19:35:12.607`)
## Download and Usage

View File

@ -73275,27 +73275,27 @@ CVE-2014-9800,0,0,5a5a4caa864f170145d3d3c2cef91d6a105d9c27e5979024bb27b2243fcae0
CVE-2014-9801,0,0,1632540904b59372b0937a913ed314f49f06e11045ff36a91a4ed621725d10dd,2016-11-28T19:15:01.527000
CVE-2014-9802,0,0,c812564621033150916f42aac79f2698926d15b085312424d75021440bbff317,2016-11-28T19:15:03.480000
CVE-2014-9803,0,0,a2478c6d1e6f3041773bb070f3f3b9904a1d7b690d9a97506297f13ed8f70f2f,2016-07-12T13:52:16.203000
CVE-2014-9804,0,0,ad4dedba68bd3053f066b8b1f0d89c444bfdf38c3b7a5ea4946f4d3bb2d7650e,2017-04-03T14:22:18.733000
CVE-2014-9805,0,0,330da34b38d54ee62f8d3cf6a2a933971ddb744855dc603f2fa7d443a4de7e11,2017-04-04T15:31:36.767000
CVE-2014-9806,0,0,e21b133a5eac0a80ab22760c2f60c3237696daddf986c70e40d2f09bb85fb286,2017-04-04T15:33:36.053000
CVE-2014-9807,0,0,df1f9a731df9a13615d1544ecfe138c76866a45dbda1835a7cff07f4c28d11e6,2017-04-04T15:34:05.697000
CVE-2014-9808,0,0,b34a941f4ade405a5d28b62c2ee38a379b9f94272673d9dc2423a7d5c20d1d2e,2017-04-04T15:34:30.633000
CVE-2014-9809,0,0,12677cc5ad11f3e1a5e13fe7ad563d74722dc9a2b15c4669d8de1739e5fead6b,2017-04-04T15:35:18.700000
CVE-2014-9810,0,0,95525fdf158239b5a029c5300907655548f37d93c1b1fc4b23537e6b265d799a,2017-04-04T15:35:52.280000
CVE-2014-9811,0,0,64870a14f9f7c3edcc13df1686d77917831b067b8c431bdfe2eb4e32b35287a6,2017-04-04T15:36:27.390000
CVE-2014-9812,0,0,c25870f3a844dc9effe98495014f545d0b9e0fe6e63fff3d54bf1afa828cc885,2017-04-04T15:36:56.970000
CVE-2014-9813,0,0,24e9e4082bdca46e8bfe4a98b1b5fadba694bb215207ff49458b5e75500141d4,2017-04-04T15:40:29.073000
CVE-2014-9814,0,0,b85f938833a829768ab481fc9b95f84115a9026ee4b5b37ad1756bf9a83706c3,2017-04-04T15:40:49.197000
CVE-2014-9815,0,0,a56dac9e5a9de69a8bd722e3a4a89dfba5ee981ca5c6a51444121f7dc5e8ee49,2017-04-04T15:37:35.503000
CVE-2014-9816,0,0,adeeabc78eebb947eb6dc904a2c2e4e1a255d94259978f9334f024d244d0a7ef,2017-04-04T15:41:53.687000
CVE-2014-9817,0,0,85a51fcd6a6ba0cee57abe66363e64849bfd4a278b8bd53b020f2a0b7b5961ef,2017-04-04T15:42:20.873000
CVE-2014-9818,0,0,de2c45f22182a9991941376d08025f771ba33ce1e8ec37c2b37592ab70084179,2017-04-04T15:43:36.660000
CVE-2014-9819,0,0,364c6cf57238651521357ba73a0f336d71e2c3d85553482f8934f8338ef3707b,2017-04-04T15:44:17.503000
CVE-2014-9820,0,0,492552a29d67be31a426d74eb0bd40cb53b39064400431f5bfb7975015e1a0b5,2017-04-04T15:44:40.317000
CVE-2014-9821,0,0,1758f5d664083d79525847eb41480da5bf9118e3b80e8fe8a0450868cf2993f2,2017-04-04T15:45:03.570000
CVE-2014-9822,0,0,4aa3bd1a0fb69395bf79bbac626bcfc39d0b3f5497821d8e063fceeb00c3a0c8,2017-04-04T15:45:25.163000
CVE-2014-9823,0,0,ddea5c479e0c8d1d994d5d9a2b99250d4536b667e5a3f79f06ec846411bb65c4,2017-04-06T13:13:37.330000
CVE-2014-9824,0,0,0e30988fe3dcfc6859693e222c8b97c18513bdd5803e04b361fbef882073ebaa,2017-04-06T12:56:39.363000
CVE-2014-9804,0,1,e91abc5317f3dd6a61d112140713bda18190887b23301502361db203e46f2fab,2024-10-31T19:52:55.157000
CVE-2014-9805,0,1,8d799c79b4e98651438a627176de8797474805e051d27113e738c202cfc04ae5,2024-10-31T19:52:32.510000
CVE-2014-9806,0,1,8f6683f5e43c1382008fefcd38f8207c37702af514d92e32647e90d503827408,2024-10-31T19:52:23.440000
CVE-2014-9807,0,1,acdcdb0ba1d877ac849da63c95f360a3e65ef13f63c8f66cd7665ef51028adf4,2024-10-31T19:50:31.553000
CVE-2014-9808,0,1,3c866a8f8f5402b2b473b204e6ea72eae1bace3708bdc9b228029e8be3a19348,2024-10-31T19:49:00.877000
CVE-2014-9809,0,1,e8edd4040de62a49eeca10486192e0abc4a4e1fbfb79000c3b5d730fe0dcdd19,2024-10-31T19:53:30.847000
CVE-2014-9810,0,1,a86ff86bbf2c4dce78f36c2647f40c802873f4e9cefb05b5ea585a36b18e46d0,2024-10-31T19:53:36.977000
CVE-2014-9811,0,1,62917c172530c17be604a34be9376a3c8e6cc75283d4fc8f7cd41ef43c8717e7,2024-10-31T19:53:42.617000
CVE-2014-9812,0,1,4d17d93ae70bd0f61ebab65bfcaf28a9cb8429747704dcef47ad7aecaa91b626,2024-10-31T19:53:49.987000
CVE-2014-9813,0,1,d2267edf875d3e0bdff891b5d576381d4d47e20482ad1aa00ebe9e4312faffdb,2024-10-31T19:53:55.630000
CVE-2014-9814,0,1,473ecd328284cb333a1d54bf92d641f8df49a55a689505600aa001a90e5782c9,2024-10-31T19:54:43.970000
CVE-2014-9815,0,1,366903ea62fc4fc1cdc40c7cd554f2e23f25655b223404cbf14bf0d3a26ba32b,2024-10-31T19:55:48.687000
CVE-2014-9816,0,1,b5594db52659d9a21d2cc7fcd8fbd17bec3a74fdbcf5fc7c35a6091f2e08ecbe,2024-10-31T19:55:54.603000
CVE-2014-9817,0,1,10c6f791006f3a8ac3773bc23ec6540b11d82c81f3f8828b8bc8db0cd43fac6d,2024-10-31T19:56:03.530000
CVE-2014-9818,0,1,dc423dfd595b96cbfa7a1ebd05ea5b0a421ac36bd0a24e14e9c6b4502c52f798,2024-10-31T19:56:08.477000
CVE-2014-9819,0,1,473793bf658321322268d488fa2c67a6b33786ace725e10e292edfbb2698f7a2,2024-10-31T19:56:16.343000
CVE-2014-9820,0,1,315f84d6e11a761cad3cb3d42be0d251c84b1b2c5aa2677bf149d91cb2996bae,2024-10-31T19:56:38.033000
CVE-2014-9821,0,1,a10b48c2cb08a38b661a78e7ffe89d9338aaea4c031262e788484d74d6c19610,2024-10-31T19:56:44.357000
CVE-2014-9822,0,1,1b7a686e93975c0ed2ea9590e1f4a4becfcc480eb5e7c0da7b10f83a3454a55b,2024-10-31T19:56:51.983000
CVE-2014-9823,0,1,5b4f713b1aa371727f052d1e24491ccb5acf554c78179b76d7033ebe478b1155,2024-10-31T19:56:59.013000
CVE-2014-9824,0,1,a381cf0247b001d2b073d67346571aa1dc1560c09759e173df27875b30a4c9c9,2024-10-31T19:57:06.380000
CVE-2014-9825,0,0,8237657f1bc545991336e8373e80d977dec8ae49fdc4a04e44914118dadb3791,2017-04-10T22:31:05.007000
CVE-2014-9826,0,0,860ab0020773466be74236a4548947dce8cf843f8de8cac7e27b4d6c73bb939a,2017-04-04T15:09:57.817000
CVE-2014-9827,0,0,ca945600dc5be9a5edda22d9a67746fe77c869edcce014d962be9a7759e736ab,2017-08-08T16:22:13.923000
@ -153325,7 +153325,7 @@ CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3e
CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000
CVE-2020-22539,0,0,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000
CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000
CVE-2020-22540,0,1,2fb8725f767918adecfe8cb48c4fc4a0c7e6d2066fd5ddbbd756e7f2dae8c28d,2024-10-31T18:35:00.647000
CVE-2020-22540,0,0,2fb8725f767918adecfe8cb48c4fc4a0c7e6d2066fd5ddbbd756e7f2dae8c28d,2024-10-31T18:35:00.647000
CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000
CVE-2020-22550,0,0,b2541e5db171a2b4b2a6b543f805ad79596e468be356d0e2f4c25df75af7bda5,2021-01-06T20:18:38.987000
CVE-2020-22552,0,0,448e4b0e2dc89c0747016e9852b20e9a1bad400b91a89d483e626626c874899c,2024-02-14T01:17:43.863000
@ -187361,7 +187361,7 @@ CVE-2021-47435,0,0,d063dc53db995430cfda65e2466747fb8cd69b46d7ca5747554bea3cb1814
CVE-2021-47436,0,0,b07b3ca60638009afe7b8ad03ab6f8c7f867d2b372ffcdb5a5c46b33ba8a7bbb,2024-05-22T12:46:53.887000
CVE-2021-47437,0,0,c5633153b363975c954f650a3f16f0487d2c2be89412326f4804204a77330d89,2024-05-22T12:46:53.887000
CVE-2021-47438,0,0,8fc8c2f554fc412ce79ea1489c7728dd7270136493967e52dca18fb315318ceb,2024-05-22T12:46:53.887000
CVE-2021-47439,0,1,deb4030b8ddd9f57e2809b987e15ae912806fd170e3bd972e39b8f64188da933,2024-10-31T18:35:01.573000
CVE-2021-47439,0,0,deb4030b8ddd9f57e2809b987e15ae912806fd170e3bd972e39b8f64188da933,2024-10-31T18:35:01.573000
CVE-2021-47440,0,0,8f56806f540953d7423426b7ab25880635b68c589690247fc00393ff0efa2ea0,2024-05-22T12:46:53.887000
CVE-2021-47441,0,0,0f3b983feef84ab521b403aca7907c792115b545aee8b57acd22e8325593d7f9,2024-07-03T01:37:55.917000
CVE-2021-47442,0,0,ea327f347d948a1a55388d77debcd85955a3e437785ae68f3946bb6c997710a7,2024-05-22T12:46:53.887000
@ -230475,7 +230475,7 @@ CVE-2023-40100,0,0,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b
CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000
CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000
CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000
CVE-2023-40105,0,1,341bc94e60af694de4a4f122a999c4e6272d2c33c08a679715c8c4adab940e4b,2024-10-31T17:35:01.983000
CVE-2023-40105,0,0,341bc94e60af694de4a4f122a999c4e6272d2c33c08a679715c8c4adab940e4b,2024-10-31T17:35:01.983000
CVE-2023-40106,0,0,0475b08be04d4153a33f08c726f5ef91351480d0fc8d62866c8273b0b5a46d11,2024-08-27T19:35:06.100000
CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000
CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000
@ -234579,7 +234579,7 @@ CVE-2023-45911,0,0,54489a6451274c125be8c762d8cc98dd3a8a21909c6da94287975a7cc96d5
CVE-2023-45912,0,0,b0bca1440f9e631c57e26e1e5113ad8d18938fc54eb7d0e4574e0ea800836ce0,2023-10-25T13:49:52.877000
CVE-2023-45913,0,0,2d4a210c00002764f5901b52e62a4b6fa406024d19769e4d12ade6afd30659cc,2024-08-02T21:15:46.620000
CVE-2023-45916,0,0,834ea3e5a22f0efcea772023be38e172d408424245dbd32ed5dbd163255ec8e0,2024-01-29T09:15:42.327000
CVE-2023-45918,0,1,8cd030886569abe4c5bac597ccc443fb96b747b0a3c95e3a0ae15b024b62b623,2024-10-31T18:35:03.080000
CVE-2023-45918,0,0,8cd030886569abe4c5bac597ccc443fb96b747b0a3c95e3a0ae15b024b62b623,2024-10-31T18:35:03.080000
CVE-2023-45919,0,0,eddc98d70c2ada443cead3f2c0b843b797378561c0ad845479dc9591db603015,2024-08-02T21:15:46.747000
CVE-2023-4592,0,0,ceac01107db2a306b25bb0c94e7b73f947e2ed1609e834ceaf5b2024be55f03b,2023-11-13T18:46:52.950000
CVE-2023-45920,0,0,bfbc186b7f8b580702dc2e2c120be4b3adcaf65a26e1af7f9e78ba083c35fb83,2024-08-02T21:15:46.837000
@ -236898,7 +236898,7 @@ CVE-2023-49097,0,0,56a490d001ba2f79efb1ede445c5d17ca49ddb338a58b3ec14e52c3204d09
CVE-2023-49098,0,0,b47da9d751d1c4be45c45f01dbd7d6f779e951f94b7a99f9a01abbc3ccfe09b8,2024-01-25T15:44:43.440000
CVE-2023-49099,0,0,301fa9c02d1a71b653baa225e03f055435f4d6d084453b84ad6cc6bb2b096548,2024-01-25T15:32:52.503000
CVE-2023-4910,0,0,6d05c75a9e17e3ccd981e8ee7bf1e2ab24479ee1803438deab4de1edd175eda3,2023-12-13T08:15:51.190000
CVE-2023-49100,0,0,4342e3e7d8dd4345e0c20aeab7fe640a8d12b302cf8c05308020afa470c9f95d,2024-02-22T19:07:27.197000
CVE-2023-49100,0,1,4f3418882c9e26f673e47663df91cae8ea633910906ff7513c6422262cb91044,2024-10-31T20:35:01.123000
CVE-2023-49101,0,0,cdb3a0b6538f74622160c1a1e285d5c5fd7fe14c11635bb1fd24e2fb54c0dcca,2024-02-15T16:00:44.567000
CVE-2023-49102,0,0,395e472a244baf1edeece4e64436ae0c9e04ac589e63b4e437cc5efd790f937f,2024-08-02T22:15:58.190000
CVE-2023-49103,0,0,2ae024b709386837fb69f63c039bd694c6f8061cfc7156b399598900d8cede10,2024-09-05T13:30:10.023000
@ -238811,6 +238811,8 @@ CVE-2023-52040,0,0,762939d11515580f100465151a16fe161b0f305136b11d8c988a24ca3b912
CVE-2023-52041,0,0,d822171150327a12062651891084a07154ed2e15efb3b51e285b66f24f49d7e8,2024-01-19T20:39:37.587000
CVE-2023-52042,0,0,d63c4bc544afb86a58bb15680099cbb76d2fb1c561f2e9993a893dae4d480107,2024-08-30T19:35:04.953000
CVE-2023-52043,0,0,2598b3da2f921eccbd3a41321ff24953e0fd67e0dc8e0987c81c7b871cbfaaa7,2024-09-06T17:35:03.427000
CVE-2023-52044,1,1,7aa317278ff2994366571ddbcb030926a3e9d6311257c49404418e0c4b474d29,2024-10-31T19:15:12.347000
CVE-2023-52045,1,1,9c9e6d02e7b026eab5e1d09490bba1de7042dd5d02a944639d1c3f465bd37801,2024-10-31T19:15:12.450000
CVE-2023-52046,0,0,9b8f5c0f61db55c891d556798c9c9da378945fb25af6cd3feea31d7ec4cb7ccf,2024-02-13T16:05:49.580000
CVE-2023-52047,0,0,0a58a1c6d75330480a1c8c9c493c63f296c64ed482e86c7d753ecc6c013c567f,2024-08-13T20:35:05.050000
CVE-2023-52048,0,0,e51406b0a7e0f54ab5f0d8fcca043edf25903f6ec066c183786088e2dc13a5e3,2024-02-29T13:49:47.277000
@ -239233,7 +239235,7 @@ CVE-2023-52539,0,0,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92
CVE-2023-5254,0,0,5f7cee797c6f86eb738b8a7c6816dfcd5a4e6f8647e76dd5bd92cb5b95399be3,2023-11-07T04:23:40.643000
CVE-2023-52540,0,0,6043f7b2833db7ef103b97561cb4ef82751086dbea7d4957ecb9ee6908b9f107,2024-04-08T18:48:40.217000
CVE-2023-52541,0,0,05a922d703fe178ffe3ffcc50d7254491f88bf17e762cb3f58c17de2d7f44cb8,2024-10-31T15:35:12.207000
CVE-2023-52542,0,1,bc3b88aa47baacfeee22c5097944807475e5f67a82e59ee630b579b0961a4395,2024-10-31T18:35:03.870000
CVE-2023-52542,0,0,bc3b88aa47baacfeee22c5097944807475e5f67a82e59ee630b579b0961a4395,2024-10-31T18:35:03.870000
CVE-2023-52543,0,0,41aac44c8931668192d5fa3c95aa2b64b2f3c224e1cf1305a133dfd5df96c932,2024-04-08T18:48:40.217000
CVE-2023-52544,0,0,27963c836572979af4e49300b2561228946c4d3cae999b213a50ec0f6bccbf4e,2024-04-08T18:48:40.217000
CVE-2023-52545,0,0,7c866bf49e9ed6314cdc69e05703bc4aa26b629aa7be4fc7e540db613309f921,2024-08-26T17:35:01.777000
@ -239311,7 +239313,7 @@ CVE-2023-5261,0,0,71874624632ecec272a9360963ac2693f66de572bbfd95d6dcec21b319e84b
CVE-2023-52610,0,0,b7b80996cd5faeb262b37131a8e9fe77951e34c0a9446ba895663b1f4c9aec48,2024-03-18T12:38:25.490000
CVE-2023-52611,0,0,0229496230b0e92530b8865128ce3370378ae8dd4f4713dcc80fb1771ff668a8,2024-03-18T12:38:25.490000
CVE-2023-52612,0,0,c40e760ea5d1e6955be22b3c2c70cf6597bf643feaac02231bf846e9b5d11e3a,2024-06-27T13:15:53.470000
CVE-2023-52613,0,0,4dcb86489bae6af27d6a3a92a58c01948ee7bd34d4b1aadf14a7de570d57fa1c,2024-03-18T12:38:25.490000
CVE-2023-52613,0,1,778078997a00f1311f0c70b13d6d85511c04605ce3d0b8faa02d02da19118ca4,2024-10-31T20:35:02.680000
CVE-2023-52614,0,0,8ee84d07fbe93a723185433e1f443e071e1b6576f617cf55d35e50f3e317f3db,2024-06-25T22:15:15.793000
CVE-2023-52615,0,0,124e1995c8a6a67390ea92195fefeeb05b7cfb8e05fddbb368a599eb724339a6,2024-06-27T12:15:15.583000
CVE-2023-52616,0,0,8ddda269abaeba5f1aed89367ae82d93cda73f0a5b631176a7ef3aaa8dc137fc,2024-06-25T22:15:15.973000
@ -239411,7 +239413,7 @@ CVE-2023-52700,0,0,cc55aed5c1d15adca3cae6d82533e785ba818e8d7784f9796166d9eb880ee
CVE-2023-52701,0,0,677100564637bdf0af06f27033c00966698848f746d9ec1a45da915d615f9d0e,2024-05-21T16:53:56.550000
CVE-2023-52702,0,0,b2e8f62250efb7d825a81d0942184d9e9d88d741263380f5b5947ac07366415b,2024-05-21T16:53:56.550000
CVE-2023-52703,0,0,9a5f1701acfe47b75bd2aae3b80b45b36bdc1bef661725a649671bd38d55592d,2024-05-21T16:53:56.550000
CVE-2023-52704,0,0,2e831189e023e362d3dfdedd4eea45d5198c1c9b6d32543c6826da9f9ef9b7b1,2024-05-21T16:53:56.550000
CVE-2023-52704,0,1,9a1e560d3f3d9d43bfcff569880a48160a561d854512da83fb51353297122af4,2024-10-31T20:35:02.910000
CVE-2023-52705,0,0,e0e7e3d50f6a0ba6a1fa2b6f11b4a84fb685696b90642bf7cc71cd16ca5855b0,2024-05-21T16:53:56.550000
CVE-2023-52706,0,0,8b37f3ec912d4dd819fdbc4c9acfa204e7a0af66839e63b9ecf7fb3314fc2625,2024-05-21T16:53:56.550000
CVE-2023-52707,0,0,0ebfb049bafb9ad593bae37805df61fafd234e39ccd40c877b5cd08f88684ffe,2024-05-21T16:53:56.550000
@ -242615,10 +242617,10 @@ CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b3662384
CVE-2024-10454,0,0,00a532df7fc763ef532ba53fc65d3c8c542dd62967499eae25b9ca1ff4ccf09a,2024-10-31T13:15:14.580000
CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000
CVE-2024-10456,0,0,4e8313f83dd74eaf01a85b0e2c8241c892546e7f6f740c8d60482cb697257f25,2024-10-30T18:15:05.123000
CVE-2024-10458,0,1,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000
CVE-2024-10459,0,1,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000
CVE-2024-10458,0,0,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000
CVE-2024-10459,0,0,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000
CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000
CVE-2024-10460,0,1,1e6ac243751ca3e1851b6072183d5e5d23cf85f0aea7a57550ac0919c45e3382,2024-10-31T18:35:05.703000
CVE-2024-10460,0,0,1e6ac243751ca3e1851b6072183d5e5d23cf85f0aea7a57550ac0919c45e3382,2024-10-31T18:35:05.703000
CVE-2024-10461,0,0,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000
CVE-2024-10462,0,0,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000
CVE-2024-10463,0,0,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000
@ -242661,6 +242663,7 @@ CVE-2024-10559,0,0,b15c5cef48b19793cc135dcefcd31a7ae1cf1d0b293c280fd67bc092c8b80
CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000
CVE-2024-10561,0,0,adc1b5788a7e287d410d5756cb2c8086d994832c36b5729249aa613428559544,2024-10-31T02:15:03.680000
CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000
CVE-2024-10573,1,1,b38ef3f6c3eadff638aac2b1e2e94dea1b67cb67b399073de7c8b41bfb551c32,2024-10-31T19:15:12.540000
CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000
CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000
CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000
@ -243681,17 +243684,17 @@ CVE-2024-20260,0,0,e1fb5372ebeb2821531f3a082b09e7e0c81c08aa5e7c68ae16a7295e0b5db
CVE-2024-20261,0,0,5c65061910678ae58b328f6a0e37c321fe1bf57a9d47085baeb418960297a3d6,2024-05-22T18:59:20.240000
CVE-2024-20262,0,0,d20e355bf64045bb726321c22659f6c213d6a34b5f8360db4262a3c1acced6db,2024-03-13T18:15:58.530000
CVE-2024-20263,0,0,a03c106a8ca3bb4647e4caa99728a3814edbbe0073eadd982e4b8d15f1108007,2024-02-06T19:23:20.600000
CVE-2024-20264,0,0,5609462932f15c597bbf504d3d594975ad6434ea487e9719e65ddd4489d8efe2,2024-10-25T12:56:36.827000
CVE-2024-20264,0,1,854619aca0dd20e60ee9b3dc419e3ad96f086a2fd7fe0b996bc5b7f02f0f3673,2024-10-31T19:04:42.863000
CVE-2024-20265,0,0,405f08c8e7e8849163f2eb6a8e5eb3eed5d428c9d5f1700fe4a57c86124fbf2c,2024-03-27T17:48:21.140000
CVE-2024-20266,0,0,6dbb5ce45980d47bf7eb6b4f22011bf963dd46d368a6ae781e4da8879de7a610,2024-03-13T18:15:58.530000
CVE-2024-20267,0,0,49082794ba6fffb4cd0ccafc96537e8303023b31c83143a02b2c16e741876cc2,2024-03-04T22:45:43.893000
CVE-2024-20268,0,0,7759be7dd4a356ca6b6a1b7455ca1dbb1f9d36388e26159b0a01ddd63697ab84,2024-10-25T12:56:36.827000
CVE-2024-20269,0,0,88cd558963686c8b9cab30a70eeb1a0bd7a6f2c656c08d7e9d1afca9fd10068d,2024-10-25T12:56:36.827000
CVE-2024-20269,0,1,18ed918c88bc4666e37665fe708c91bfd217fd78c72c1d9a5647d5c25c8f9909,2024-10-31T19:35:03.420000
CVE-2024-2027,0,0,8a6da780f00ef83adadf5b93e79e41584ae4ce15f32aba2548f6552eaa755565,2024-04-10T13:23:38.787000
CVE-2024-20270,0,0,eb515a12dde6cc2ab0dfdeee187efe297a3536ebbda30c8e847c7138ffa84d0d,2024-02-02T16:15:54.227000
CVE-2024-20271,0,0,9bce8a64e9296ad22ee19fd2c64f9f191014f0d9052b00608129f7da079ff720,2024-03-27T17:48:21.140000
CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bbea6,2024-02-02T16:15:54.683000
CVE-2024-20273,0,0,8b112f4b02470eba863801e1e42e3a98c5ae162f3044482e8541663023d9c97c,2024-10-25T12:56:36.827000
CVE-2024-20273,0,1,26c3c26c607841698dc1cf329a5a133b83df05d5a153dcbaa4eb0f4ddb7caa4e,2024-10-31T19:09:24.687000
CVE-2024-20274,0,0,25e605d9d54d4da58104cfd092dd6dbcffc594540622946f0085313336b1d18e,2024-10-25T12:56:36.827000
CVE-2024-20275,0,0,d642880c67354f21dd660d8005bc15eea0945814b36b39237dce1aa9d5118339,2024-10-25T12:56:36.827000
CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000
@ -243717,7 +243720,7 @@ CVE-2024-20294,0,0,742861094e87571e845203e831bfb7a087118860ed05792647beba51da9e1
CVE-2024-20295,0,0,440a3fe735baf91af4ba8e7f15eaba3890b664a180f3cc6b1b84c3c2ae93a20b,2024-04-25T13:18:20.370000
CVE-2024-20296,0,0,40bbd38e07d81658299d895ad9afa6a2a8c553e04b04f72d9f3dda0ddd6b036f,2024-07-18T12:28:43.707000
CVE-2024-20297,0,0,76d14dfa0f9509c5a289050d83c9a1077f8a1eeb56a70f5510a545859db5b18f,2024-10-25T12:56:36.827000
CVE-2024-20298,0,0,d7b78fb64fa5c6dd7ebb9f35d881d018ce49ab3417e1e31c1e9af7349e826844,2024-10-25T12:56:36.827000
CVE-2024-20298,0,1,01695f1182050adcd993e50d5c7f72e0f5795d1ad885d2ade8480d82ecdc8b98,2024-10-31T19:25:31.523000
CVE-2024-20299,0,0,ea63fdda38ab3c5e4dfbc8dc2825b521c61b9797c2ccf660e32cd8336c48d5df,2024-10-25T12:56:36.827000
CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bbc1,2024-03-13T18:15:58.530000
CVE-2024-20300,0,0,2c6145cb8a8bdce4d25bc4fb0d9158de2182f6c4b0288358081ef17d8ec8c1e8,2024-10-25T12:56:36.827000
@ -243788,7 +243791,7 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e
CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000
CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000
CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000
CVE-2024-20364,0,0,f39734b291125d567a56f80d651e614675a81ffedf7761321cf4d60c9969f754,2024-10-25T12:56:36.827000
CVE-2024-20364,0,1,a47617c767c4786facdb367d77b019465e9a2bf635bd17c71b1a524f335a7780,2024-10-31T19:36:32.277000
CVE-2024-20365,0,0,b941e81c62a5622fb3207cd284578983abbf20cf62d6c3be738ab76890047c8c,2024-10-08T14:28:42.727000
CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000
CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000
@ -243840,7 +243843,7 @@ CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67c
CVE-2024-20412,0,0,98fe7a5862ce0435e94f459cc380f6731f224b2de6aaf35729ca1e7ed37af631,2024-10-25T12:56:36.827000
CVE-2024-20413,0,0,eef91fa550f9bdcbf9b050eb11a257fdd75cd91f9c74286f67575b2cf9d8093e,2024-08-29T13:25:27.537000
CVE-2024-20414,0,0,18adcabc3ea83c021e3e42e80805abb0da254bdf76c23740c5471d9c9fa12ab4,2024-10-02T20:02:22.740000
CVE-2024-20415,0,0,ace1385581011ed019184aa3fb43120119a465cbfa23a70765745569ce25b180,2024-10-25T12:56:36.827000
CVE-2024-20415,0,1,877e94faab6d2266c2faaa313bee5ba7676639f7c6928a7d38493bfe98132d17,2024-10-31T19:17:54.273000
CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000
CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000
CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000
@ -244419,7 +244422,7 @@ CVE-2024-21095,0,0,71837bbaf2bea328402990b14e523963606d49d2731911e5f425e34df69f4
CVE-2024-21096,0,0,6aea65a83e2d5b0b6b2c176040905d4617084dd4a49f2855ae52e067c47fcfb6,2024-06-18T02:15:09.823000
CVE-2024-21097,0,0,180e09f8ab03fa9202c965312463df6de0d343b6920ea63f93e36f9d95609d57,2024-04-17T12:48:31.863000
CVE-2024-21098,0,0,6d4c7c29d84d44117c2ddddd591dc940d4aab6a0b106a5d85613f57420b56b9f,2024-04-17T12:48:31.863000
CVE-2024-21099,0,0,eef26a141d604a9279a80dedd8237a72c532b1ff86bc60304cf5993304ffbb22,2024-04-17T12:48:31.863000
CVE-2024-21099,0,1,18ee7f90aec4d9c34bf08ab839549123e62f8937c0d3b02741d81fa2e6dfe88e,2024-10-31T19:35:02.343000
CVE-2024-2110,0,0,1270b7a979206100ed725d968c0cf72fd1f82b851f2f2372b42faaa8d203e40d,2024-03-28T12:42:56.150000
CVE-2024-21100,0,0,a46a163d2ef0a0b6b1fddd7395d7d5cb51902aea83a18389f53792a38f659f53,2024-04-17T12:48:31.863000
CVE-2024-21101,0,0,91755928d5ed81eb1c0b6d3faaf85c7a1a9acb13a679b76992a144a90a15ac62,2024-04-26T09:15:11.750000
@ -244456,7 +244459,7 @@ CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192d
CVE-2024-21130,0,0,13e5e480b47df9c035f480a63cbeba0c6ce05798db1fa3dc667fa306c070c11b,2024-10-17T16:58:22.037000
CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000
CVE-2024-21132,0,0,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000
CVE-2024-21133,0,1,a9876891a6c2a6c3d77b30af6f76ad94e03c5c4618a7edf1f3af119bbca64cb8,2024-10-31T18:35:06.540000
CVE-2024-21133,0,0,a9876891a6c2a6c3d77b30af6f76ad94e03c5c4618a7edf1f3af119bbca64cb8,2024-10-31T18:35:06.540000
CVE-2024-21134,0,0,8b2526b0e292ceacbf0cc57aaf65cf091a298a6098fd630f182d8f8af262d4ce,2024-10-17T16:58:38.650000
CVE-2024-21135,0,0,ba0250ef42fd2872339c049bf92d12e0db71762fc207c75bb73b68f494e9f6b5,2024-10-17T16:58:53.687000
CVE-2024-21136,0,0,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000
@ -245968,7 +245971,7 @@ CVE-2024-23227,0,0,76df15f6bc2ca6b12012309a52c71fb5a4f3228c7f6483628fc9bf7ed873f
CVE-2024-23228,0,0,cc53be31cb9d833cc5f783d1b1a5baa2ef8daadab372d7bfd86c3142f74dcac9,2024-07-03T01:47:38.910000
CVE-2024-23229,0,0,561351da6f91af092533ed5801a4de12d08e4fb8a08cae5fec6b16d788979c5a,2024-10-30T20:35:08.097000
CVE-2024-23230,0,0,0ce355c026a81eb330cd3a55adfdd58c7b28ad2193d6045812672f59d130ef9d,2024-10-31T15:35:27.513000
CVE-2024-23231,0,1,0e1f04616cdf41b71be7b9218a6fca56d6aa4937cf846479ddbe6f0c5832b513,2024-10-31T18:35:07.310000
CVE-2024-23231,0,0,0e1f04616cdf41b71be7b9218a6fca56d6aa4937cf846479ddbe6f0c5832b513,2024-10-31T18:35:07.310000
CVE-2024-23232,0,0,9e7b49448cac16c45fbeaf042c9f71b2d8db550fb449e33aa9abdc891de85b63,2024-03-13T21:15:56.087000
CVE-2024-23233,0,0,313670ac068b12d9fa516d4a3c082e80e45b5e5dbe4efd3c4e89ac3ce5144465,2024-03-13T21:15:56.140000
CVE-2024-23234,0,0,cf9cee47c5ddf4443c90581bef409e0907a72ec2106ee4166332684023ebc090,2024-08-27T16:35:08.620000
@ -246022,7 +246025,7 @@ CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000
CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000
CVE-2024-23280,0,1,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
CVE-2024-23281,0,0,ebcc57daef885f64cd010edceca3c55445d6724dba570bb6546aefcf9b9ee767,2024-03-13T21:15:58.150000
CVE-2024-23282,0,0,489c27c47de53736ddacfdf8fc0d1e5b925b36d05a9df8057651dd26f3053be5,2024-10-30T20:35:10.147000
CVE-2024-23283,0,0,7718a2900f8b37b1392ccbf676493a05796a6de981b49f31d382de7bc4b9d364,2024-10-27T14:35:04.903000
@ -246656,7 +246659,7 @@ CVE-2024-2408,0,0,e2c01a5c34540ebb0aeec1f86c6fa49f65e11bad86d0e423ba6a7c8c1306c7
CVE-2024-2409,0,0,40134401d2d9db58f61c794cf0f4f791968f8a191847ffa4ae84dc193442f258,2024-03-29T12:45:02.937000
CVE-2024-24091,0,0,5abca135be2b48f97a9b4ee4284b135e3c993507c7ae94228dbfeca849094700,2024-09-05T12:57:51.890000
CVE-2024-24092,0,0,85255eb7350c088041b14db17806ac0275bf0f870c5dc0846dac7ef708da600c,2024-08-05T14:35:03.843000
CVE-2024-24093,0,0,14e5230c16c4af460c68647fa9203bde6e56c21bc1a3208cb017e8bb36864636,2024-03-13T12:33:51.697000
CVE-2024-24093,0,1,fb5ed7dd5447f2f3646a43ede6e27e58ea7347516d0a38f6974af6473303761c,2024-10-31T20:35:03.523000
CVE-2024-24095,0,0,a293063a01db5092273515cc6c1fbe86e89299406200e6a2f03c1a4a2a21fbc6,2024-02-27T14:20:06.637000
CVE-2024-24096,0,0,be98bfd34c594b5bc2f148848abf51a12eec4301e64123b58bf793ff254827e3,2024-02-27T14:20:06.637000
CVE-2024-24097,0,0,fac0898f527625e2c3336ba1bc4bf6bd2a8e244bb9d5499d446769299fde892b,2024-03-13T12:33:51.697000
@ -247416,7 +247419,7 @@ CVE-2024-25316,0,0,dc0ffcbd049ed752bddaf4851795a99ca233f2e28b2566ba55c9e2779a3d0
CVE-2024-25318,0,0,816caedc6e45e8daf872d525cbac5de4c424378189abd90933e824060204bf71,2024-02-12T21:37:44.753000
CVE-2024-2532,0,0,dbd2e90a8b9f0e6a244b6c6163b20f8979fc7a3177b780d02e1509ee97c26b6a,2024-05-17T02:38:17.753000
CVE-2024-25320,0,0,3f240c7b2117cfbcf6abd7fcdad0bf99eb1b4e31e2d00516b72afdecb9c7c27c,2024-08-20T19:35:02.513000
CVE-2024-25325,0,1,d37e96d75312f2e4bcc77f54d4abb9879ca7992c01d4a551d01083c5bf6ed837,2024-10-31T18:35:07.527000
CVE-2024-25325,0,0,d37e96d75312f2e4bcc77f54d4abb9879ca7992c01d4a551d01083c5bf6ed837,2024-10-31T18:35:07.527000
CVE-2024-25327,0,0,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000
CVE-2024-2533,0,0,6520d041e2b7ba39d1700487d120781106e9a9e9b41da5c3ad12ec52a81a1e5b,2024-05-17T02:38:17.843000
CVE-2024-25331,0,0,4f27830f39927c3895bcf33b02286589a44e6189e721c70e2368b6ca05c425b4,2024-08-05T15:35:11.043000
@ -247883,7 +247886,7 @@ CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503
CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000
CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000
CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000
CVE-2024-26018,0,1,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000
CVE-2024-26018,0,0,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000
CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000
CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000
CVE-2024-26020,0,0,72caf6bcbf6e85532315d41141700a256acdb0b9130ff5b3cf9c47d5b4a216d7,2024-09-11T14:53:51.013000
@ -248454,7 +248457,7 @@ CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c
CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000
CVE-2024-26743,0,0,324882ef91c0c28f79351ba6298feb9fe20c713336fb2f56a3a9c16ca464e41a,2024-06-25T22:15:21.600000
CVE-2024-26744,0,0,f902dd3c251462aa381ae89d57defec93703dfa0c7e8a0c7eb1bbbb723405b07,2024-06-27T12:15:20.400000
CVE-2024-26745,0,1,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000
CVE-2024-26747,0,0,41706fd8dc5e74253554934fe0898878e3cbaaff07076ca69a602b3caff1d7d4,2024-06-25T22:15:21.727000
CVE-2024-26748,0,0,281d1dba5fb38f324f1cb82b7adebdd7a556b7307a202c472b084466cdd8b3ba,2024-06-25T21:15:58.480000
@ -248812,7 +248815,7 @@ CVE-2024-27069,0,0,a22027ac3b10d55994fd9ee439f06fab2d3cfb6ef2219ded791dee150a4b9
CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd3649,2024-05-17T02:38:26.230000
CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000
CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000
CVE-2024-27072,0,1,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
CVE-2024-27073,0,0,aa56aa24ed3402425b89f05f26a164f223361d7a41c480cd79d50873842fdafb,2024-06-25T23:15:29.397000
CVE-2024-27074,0,0,072997e51d8edffff051f12b48b4b43375560402b726f9e882d033665b9beae3,2024-06-27T12:15:24.360000
CVE-2024-27075,0,0,c2d1c4caa012ebbe4b9cc25a1abce424572ea3928a347ee6dda4b1356be42ff1,2024-06-27T12:15:24.443000
@ -249008,7 +249011,7 @@ CVE-2024-27273,0,0,1883394ce1d8806bd11210fe51eb11ce8dfd12292901a019c597affe48b40
CVE-2024-27275,0,0,d9b1bd93ca49fd30306bdac7c9fca8c9103b11d35bbca79555aa44d5c5b40d20,2024-08-03T12:15:16.637000
CVE-2024-27277,0,0,f7c03e6067da94f951cda60e6021ff6f9b34cbe0c7b10bf24b9533f86379c99e,2024-03-21T19:47:03.943000
CVE-2024-27278,0,0,7e076b94bb346aa71a90c33bb12c519e49b2bf85e0c9c8c5e64524bb6308a9a5,2024-03-06T15:18:08.093000
CVE-2024-27279,0,0,25e76b48db9e541084b8b1f041be7e5bed145e75da72a0fa7da4b1fa0a0fcfeb,2024-03-12T12:40:13.500000
CVE-2024-27279,0,1,45d9cf9b4657f679bfdecf614626efcef42c4497cc06c2cffcb81cc8aeefa06e,2024-10-31T19:35:03.510000
CVE-2024-2728,0,0,894b3321a99e458969cde3c150a59b05eb4a60d79495148d5d2320daac930a32,2024-03-22T15:34:43.663000
CVE-2024-27280,0,0,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000
CVE-2024-27281,0,0,7f2b0f122766f676aed91ef9250b5865f45069fd8c6cab642c57fb3b624ebb3f,2024-08-20T14:35:05.757000
@ -249530,7 +249533,7 @@ CVE-2024-2797,0,0,3ecce6a8722880a2243bbe9b30e433c013fbca5e6e5042e5546c00d6fc1c8e
CVE-2024-27970,0,0,8fa01250d8db9eeb3b212337b9d1be29c16b8c201ca0f2959158cd129e92a4db,2024-04-11T12:47:44.137000
CVE-2024-27971,0,0,4e59811e16516bf26b4f57d974f22c7799182d070eb9cc6b599373a1878a2735,2024-05-17T18:36:05.263000
CVE-2024-27972,0,0,e344ab228b851967a3812eb892a2a3bb991b85dd672139f09da75b3b6d47f2b6,2024-04-03T12:38:04.840000
CVE-2024-27974,0,1,6b89cdde751f959824cfee213190c11e47af5cb911873e94ab60379407af0911,2024-10-31T18:35:09.403000
CVE-2024-27974,0,0,6b89cdde751f959824cfee213190c11e47af5cb911873e94ab60379407af0911,2024-10-31T18:35:09.403000
CVE-2024-27975,0,0,628fa6593d5d98fbf43326e7307f982b7a57304446d55cc554f5b8b82b744b9b,2024-07-03T01:51:20.333000
CVE-2024-27976,0,0,f6d7730a29882f81108291258e14f13d29a2159cf5abda97fb8b7490244dab5e,2024-07-03T01:51:21.030000
CVE-2024-27977,0,0,09cebd1c563d6c711f33424e2c16188d6c5dfd54056f5a0f51dbb6772ec18b17,2024-07-03T01:51:21.727000
@ -249793,7 +249796,7 @@ CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f6
CVE-2024-28297,0,0,a4b240f33a30c881b1a926a2c492c4fd59edb741a84b1b986f2bad529bc90472,2024-08-05T12:41:45.957000
CVE-2024-28298,0,0,3bc67ac88076195fad9cdc6e8b44ccb13643ba94f3e6354bb8ca3a126daef414,2024-09-11T14:54:30.973000
CVE-2024-2830,0,0,8c004c1c8fc1f8388803620250a49c9771d371ad920b272b660e7e2337499741,2024-04-04T12:48:41.700000
CVE-2024-28303,0,0,a65712a928f1b4a2335837c36c349f7d018e1f7b9e70b27cb7f99f12d8cf7ee1,2024-03-20T13:00:16.367000
CVE-2024-28303,0,1,af4aa568624893c6edae905ba1ab7c2b6062f8fdb400c84636436a5bb0b395f2,2024-10-31T19:35:06.587000
CVE-2024-2831,0,0,643c5a916b3e7dd2e502ec8b69ecf4eaeb51af43509d8dd9dee1849a2f658d24,2024-05-02T18:00:37.360000
CVE-2024-28318,0,0,f72243df63cfb9dbefaca38a7feaf78eb687b6b96d16642d331d371362d80952,2024-08-29T20:36:35.373000
CVE-2024-28319,0,0,e2ecd3b9d2b64cdb4e4a7ac8ae7f5ebb928d0580b7f60b7a323aa1f0897ead1a,2024-08-19T20:35:09.997000
@ -249869,7 +249872,7 @@ CVE-2024-2848,0,0,f7b0b78cfc60ee643c1f8f38f0fd87579fa7a84e7f638d990edaa8c649bd1e
CVE-2024-2849,0,0,7ddd80bf2dddeeb49b4f7c75b1bb53734965b8214d690d5f80f092578b7cf001,2024-05-17T02:38:33.723000
CVE-2024-2850,0,0,aa087e8105e87f804b43529eb18757f7a4acf7dbdd8f4604dc208cac4ea95437,2024-05-17T02:38:33.820000
CVE-2024-2851,0,0,5b5b2abe0cec799e0c475c24a1ca157de3540e7eb560494a6cfd6aff8f806a99,2024-05-17T02:38:34.107000
CVE-2024-28515,0,1,d06ae9a8ead8315626cdf61b8978f26a9ce985b41fd2a3e04591cf3fbd5fd73d,2024-10-31T18:35:10.233000
CVE-2024-28515,0,0,d06ae9a8ead8315626cdf61b8978f26a9ce985b41fd2a3e04591cf3fbd5fd73d,2024-10-31T18:35:10.233000
CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000
CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000
CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000
@ -253400,7 +253403,7 @@ CVE-2024-33454,0,0,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e1
CVE-2024-3346,0,0,5fe2388e7081d85802d7eeef70ad8fdaa632fc14126ef86b4921587d73e76418,2024-06-04T19:20:19.553000
CVE-2024-33465,0,0,7dc8798fe71a3f778010ed5d146c9c87c91ee3709364cd2f1c6196073e9c2579,2024-08-01T13:51:59.690000
CVE-2024-3347,0,0,9b199e7d34c12b794e3fcb3e483a1e015cb7f912cd5ad3bc6b26d3e5c6f61a14,2024-05-17T02:39:51.303000
CVE-2024-33470,0,1,771c577f183751e6420d1c6480af6691c3e4a28f80f7d3d238fdff0f7f6bae54,2024-10-31T18:35:11.050000
CVE-2024-33470,0,0,771c577f183751e6420d1c6480af6691c3e4a28f80f7d3d238fdff0f7f6bae54,2024-10-31T18:35:11.050000
CVE-2024-33471,0,0,9cda120795d2cb05432987cf2342b219933f08e34a97af932899d7da68c284f6,2024-05-28T12:39:42.673000
CVE-2024-3348,0,0,97ca04a7554d65fa257eb4c451e7902d3ec9ae4405cb6edeb14744741600e6d7,2024-05-17T02:39:51.403000
CVE-2024-33485,0,0,545a3ddb2c081ca34ecb0c2a68c90fa3f095f3607dce687f15a518e34a732453,2024-07-03T01:58:17.873000
@ -253687,7 +253690,7 @@ CVE-2024-33865,0,0,391ace89bfab037aeb96ecc08885288ffa4894e995837787f29e0c72dd461
CVE-2024-33866,0,0,d5c0ae9c1054b27c6d97a10401ff0b5290f4f00dd396ff666764314ce3a33269,2024-05-14T19:17:55.627000
CVE-2024-33867,0,0,0f6e6b0818e1248c04a728bd3994286d3ee2c473217dff20f3ca244eaa919d7a,2024-07-03T01:59:03.697000
CVE-2024-33868,0,0,a040237e401755b6e7cf08ea98d144311aa33b6e7bad9424eb98907745e6b269,2024-09-15T19:35:03.093000
CVE-2024-33869,0,1,85f56872fe381951ae3590fbe2dc88998bde5846ab8de98f9d97e4f171cb53af,2024-10-31T18:35:11.883000
CVE-2024-33869,0,0,85f56872fe381951ae3590fbe2dc88998bde5846ab8de98f9d97e4f171cb53af,2024-10-31T18:35:11.883000
CVE-2024-3387,0,0,5fff34d5a94da2ef9e974ff962e10f544b17f2456fda9d5054eee7f811dd1ba7,2024-04-10T19:49:51.183000
CVE-2024-33870,0,0,6aab1c2dce9666081caef7bc83c709784103f6ae03f40bf6f9b61a08ab839221,2024-07-05T12:55:51.367000
CVE-2024-33871,0,0,6ef1078e0ab851992d6f76ec41fcc0f1160d67fe72b7159cf03aaec7c63364be,2024-07-08T14:18:32.130000
@ -253810,7 +253813,7 @@ CVE-2024-33999,0,0,9ff412930445f4c469385132086f7d2514cfafda5bf0ca410efabaa361c1a
CVE-2024-3400,0,0,ac7236e657f4c64879864508ce5e161ec2ccd4c7e837c165c57bf7e10fe0f424,2024-05-29T16:00:24.093000
CVE-2024-34000,0,0,fb3f0c7c5c0722f41326f2a505dd1954bc7a0d5fa27bb17709829c52d90f5034,2024-06-03T14:46:24.250000
CVE-2024-34001,0,0,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfafaf,2024-07-03T01:59:15.240000
CVE-2024-34002,0,1,7d5aad854779b78532969fe54f5cfd243c35b0bc72cafa02f18bbd3a15fadf2f,2024-10-31T18:35:12.750000
CVE-2024-34002,0,0,7d5aad854779b78532969fe54f5cfd243c35b0bc72cafa02f18bbd3a15fadf2f,2024-10-31T18:35:12.750000
CVE-2024-34003,0,0,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000
CVE-2024-34004,0,0,24178f5485fdf0519088f22aa01cad458eacee6bf779a59579fc437dca127b5c,2024-06-03T14:46:24.250000
CVE-2024-34005,0,0,3cc41e8d5cf47efd2659de94be11f3633627e887af28aa45c65ebef356741180,2024-08-01T13:52:13.690000
@ -254205,7 +254208,7 @@ CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957
CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682bfc,2024-07-03T02:00:33.137000
CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000
CVE-2024-34535,0,0,83aae08bc421f9eef8621f242b24214806a581d0b260711ffa707015c3215f8f,2024-10-04T13:50:43.727000
CVE-2024-34537,0,1,aa8d887b54254363340bc9478cf814aad60caefe8559038d897113fab5bc7ce3,2024-10-31T17:15:12.903000
CVE-2024-34537,0,0,aa8d887b54254363340bc9478cf814aad60caefe8559038d897113fab5bc7ce3,2024-10-31T17:15:12.903000
CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000
CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000
CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000
@ -255193,7 +255196,7 @@ CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a
CVE-2024-35917,0,0,ef28657905524f9b7f229abe3cf11569c21934c08ac9147215aa72d97ba1ce78,2024-05-20T13:00:04.957000
CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000
CVE-2024-35919,0,0,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000
CVE-2024-3592,0,0,06f19b0f4030aa5db1e2c8d8139272dad226c0945ae251432ae728d2bb8e4467,2024-06-07T14:56:05.647000
CVE-2024-3592,0,1,a467a0becb7a7c1893912c4a012a5ba189ea79070fd21967dce0459666c03be8,2024-10-31T19:40:34.747000
CVE-2024-35920,0,0,e038127788e84b65006b7bac3b3d638e07acf776aced57ca59ab8396cc9131a0,2024-05-20T13:00:04.957000
CVE-2024-35921,0,0,86f3f43aed64babe95e54be060b922943333fbafaebdf08ad2eaefa3d9aa11af,2024-05-20T13:00:04.957000
CVE-2024-35922,0,0,a3848c52df3a62f38c8911dc80247747492d0166db32c357f2fbfaf1c915f7b2,2024-06-27T12:15:26.323000
@ -255269,7 +255272,7 @@ CVE-2024-35985,0,0,6a0ec59d3e51fdf53bb1ddc338ad85428352a8c3d8fca537814e3edb294fd
CVE-2024-35986,0,0,233bf34b93f6b6b3cb174407b52ced003b0cd3d3120afc7209f6ec63dacd4e33,2024-10-29T20:35:23.230000
CVE-2024-35987,0,0,6cfebc44336088901ce4a0eaab623f6c781664328e18b6c07774b9d25b96510a,2024-05-20T13:00:04.957000
CVE-2024-35988,0,0,9e4aa3541b4f8c9746b0897daa431b666a7015d508272fc87df5f96bb5f44395,2024-06-25T23:15:31.573000
CVE-2024-35989,0,1,e4a6f65f2b8a28629768c5c72c5f7751ef9aa532d3cf28f68cbe11794178c21b,2024-10-31T18:35:12.980000
CVE-2024-35989,0,0,e4a6f65f2b8a28629768c5c72c5f7751ef9aa532d3cf28f68cbe11794178c21b,2024-10-31T18:35:12.980000
CVE-2024-3599,0,0,6f9a87b43db25a2abff9773940ab4f1d2aba1d6b675d22095616527a9cc731b0,2024-05-02T18:00:37.360000
CVE-2024-35990,0,0,cf5bd99b0200a582d3ca9c6976894c42986b8f909be16ec7492dbf916bda46ba,2024-06-25T22:15:34.330000
CVE-2024-35991,0,0,95c2d74b3c18b9eb777211ce3882aff6b10bc936ddb3cc6ba231cd94286d1648,2024-05-20T13:00:04.957000
@ -256080,7 +256083,7 @@ CVE-2024-37159,0,0,29983f96449420557db1b3112a95ba2589dbf1f20f2491176bacc2d05dea9
CVE-2024-3716,0,0,645c39d852b6d0900252700ce7c6aa7da7b0e8e8528414b76049b939646330f6,2024-06-18T18:53:28.927000
CVE-2024-37160,0,0,244bd54ee6562bb7c87780ac681fb6725c85e3313649f8ee9d22f3f6a28cc85a,2024-06-11T18:22:50.097000
CVE-2024-37161,0,0,2a94f421c449e5230ce5f6bf577049502e74931a566a6f5900713655d6199d0d,2024-06-13T18:36:45.417000
CVE-2024-37162,0,0,322a3e89c574071625f48e86e0af7a8ea0c5c421b1ad849d66b531a5ef4a0395,2024-06-07T19:24:09.243000
CVE-2024-37162,0,1,d187b793c58199cbc2898a7a072f3ac3c5ef9e78e8300197de9218f7bf28c884,2024-10-31T19:43:26.800000
CVE-2024-37163,0,0,e299ba511d4c0e736a670743e9375ac75a6321837800583d9d327792c0552ded,2024-06-07T19:24:09.243000
CVE-2024-37164,0,0,9bb663a219137e8dd0a97eda1376d9c5548e255ee1c6292d4793648cf6ed6f5f,2024-06-13T18:35:19.777000
CVE-2024-37165,0,0,6480a9385974854bcbb243b4e0731864b039fe2224efee48b2a5f08ca4ebe426,2024-09-11T13:52:20.730000
@ -256462,7 +256465,7 @@ CVE-2024-3775,0,0,b7d2a473bac9537035a8d6df6a365ee3b93ba49aa9ce7163db0aba168893a5
CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000
CVE-2024-3776,0,0,5922bebf01d008693e127ff3a5039fdad8dc9d22a230cf3268767563dfe95a49,2024-04-15T13:15:31.997000
CVE-2024-37762,0,0,cd5f303513eb0960063d0e2c99c901a56ff1296cae29c33693c5d7fa45ee86e8,2024-07-09T16:22:43.123000
CVE-2024-37763,0,1,c5847d0bf810662fadf186aeecdc436730aa2d2ec83ee9913c6e6a93f68b6126,2024-10-31T18:35:13.207000
CVE-2024-37763,0,0,c5847d0bf810662fadf186aeecdc436730aa2d2ec83ee9913c6e6a93f68b6126,2024-10-31T18:35:13.207000
CVE-2024-37764,0,0,bfe8048822739aebe754250a3774cdfd451761171493fc8c02a0e45a49f5a4e6,2024-07-03T02:04:42.317000
CVE-2024-37765,0,0,746df602d2e258f449976f05b63742f035e40ff54b364ebcd32658a0b67b7135,2024-08-01T13:54:14.823000
CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e5c5,2024-07-08T15:49:22.437000
@ -257580,6 +257583,7 @@ CVE-2024-39329,0,0,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a39
CVE-2024-3933,0,0,92b73bce365e98fcc06e62daf24ff5ae07fa4b0e34a70b4d4c68931454994bbe,2024-05-28T12:39:28.377000
CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000
CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000
CVE-2024-39332,1,1,02c815ccdcead4ab9a75b85b431c56edd6baeae5a003187d7f3998feda147758,2024-10-31T19:15:12.897000
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000
@ -257926,7 +257930,11 @@ CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b047459
CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000
CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000
CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000
CVE-2024-39719,1,1,55c0fe4231ea450fd9f9bd61b34566b93becc23a462714378436cabf84a325c3,2024-10-31T20:15:04.770000
CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000
CVE-2024-39720,1,1,5d12fc2ee7e4d9b3dc0b31df402e7f9ab521670e316e8f3b2d06befa43297f5c,2024-10-31T20:15:04.877000
CVE-2024-39721,1,1,21c376a4118d478bd951a487fcc6c37edc42d010d1757ffc540bbeeccc034e6b,2024-10-31T20:15:04.993000
CVE-2024-39722,1,1,fa0eccacaad1353a36670c74071a2f5eaaad1233da2ab863fd98dc8f49b574fe,2024-10-31T20:15:05.080000
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000
@ -258194,7 +258202,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b
CVE-2024-40453,0,0,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000
CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000
CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000
CVE-2024-40457,0,0,c48d41bd96fb4d23a817f2df64b770558b35704c52871238cdfde186fa28f2e5,2024-10-24T17:35:07.660000
CVE-2024-40457,0,1,cf5d2fb5573b78b24a73103f4faaeb1de1b6bbe985b93c5ecbdd9bf464b5504d,2024-10-31T20:15:05.173000
CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000
CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33
CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000
@ -258323,8 +258331,8 @@ CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bd
CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000
CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000
CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000
CVE-2024-40680,0,1,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000
CVE-2024-40681,0,1,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000
CVE-2024-40680,0,0,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000
CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000
CVE-2024-40689,0,0,d72047a797aad87fd24dc95664d6dde0e77455bde7da3b63cb978ce1844a86ec,2024-10-19T00:30:36.680000
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000
@ -259652,6 +259660,7 @@ CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb50912492
CVE-2024-42508,0,0,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7cd6,2024-10-29T17:38:49.330000
CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000
CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000
CVE-2024-42515,1,1,d9febc8d36f1e0fec5b8c3628e4df89ea40dc83420c169fad7a81aebf15f35af,2024-10-31T19:15:12.983000
CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000
CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000
CVE-2024-42523,0,0,e7f13531824456b37c381b164195bec4f01c74ddaa27da31139f6cf4c536fef0,2024-08-23T18:35:03.563000
@ -259835,7 +259844,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95
CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000
CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000
CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000
CVE-2024-42835,0,0,be8a15032d8b7e2767c06844b2c610cc3d4f02c091e6e878f9c0ddb188a4332c,2024-10-31T14:15:05.610000
CVE-2024-42835,0,1,62c3bb1040503fe108596a1c1ad34679c80451382f26381de785bebf9971f9b2,2024-10-31T19:35:08.113000
CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000
CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000
CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000
@ -259866,7 +259875,7 @@ CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198a
CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000
CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000
CVE-2024-42930,0,0,784a232fe23e7bbafc9832760208fa74cd8fc994e46ea9d1216f27649a38c7a5,2024-10-30T21:35:04.850000
CVE-2024-42934,0,0,5b485bf0fdf98b0bf0cffd2e2fdf9041db2ed703f1341f5eedd90fef284d1734,2024-10-10T12:51:56.987000
CVE-2024-42934,0,1,cce541bdc57df7c6b631cc18206bacac2c59fa39a67506fa82352f8df4b8ac0e,2024-10-31T20:35:05.250000
CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000
CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000
CVE-2024-42940,0,0,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000
@ -260947,7 +260956,7 @@ CVE-2024-44674,0,0,78532ab5feb22da158d1ca77bfa4a9481318fd90b7728fb7942741a2fe563
CVE-2024-44676,0,0,b0f0617031a60967a8b797cadadb8c5f870cf4ed39d40d10e892a55bec1fea8b,2024-09-25T19:20:25.073000
CVE-2024-44677,0,0,b3010270d0be534cbe0fd14032547bfe302a60106c2515252734805cedbdf65e,2024-09-25T19:19:24.007000
CVE-2024-44678,0,0,6e57560ccb7f7726a96b187fa0940b079eab34be5f5aa788f0964af3dd2ca471,2024-09-26T14:35:14.687000
CVE-2024-4468,0,1,23515c86973ba697e8140aba7b457c632f3ea3f82a64c6f661f01b74003b55b7,2024-10-31T18:40:45.817000
CVE-2024-4468,0,0,23515c86973ba697e8140aba7b457c632f3ea3f82a64c6f661f01b74003b55b7,2024-10-31T18:40:45.817000
CVE-2024-44682,0,0,5c1099c9946a7bbad39157bc8cb36499b7070c93884284356ba775c02b16ef60,2024-09-04T16:38:36.817000
CVE-2024-44683,0,0,3331119c07881f90997c72dc65301a112931dc9af3d318f7996e768fd590a104,2024-09-04T16:41:01.467000
CVE-2024-44684,0,0,3eb9301d11d089b3ca5e5bb482a6ce2aed822a3ab4934c267af6f311a660b8c1,2024-09-04T16:42:01.137000
@ -261255,7 +261264,7 @@ CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4
CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000
CVE-2024-45160,0,0,5448512f93e2c872a5532bb6e7925e6443ae5601b38aa00ad59c4de27ffce9e0,2024-10-10T12:51:56.987000
CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000
CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000
CVE-2024-45165,0,1,c95c37e8403c42b6535ee3db172ebed1de2af8ddabba72579971a9771877b8f5,2024-10-31T19:35:08.327000
CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000
CVE-2024-45167,0,0,6f3847a892b75be18a24e1374ef352424a8d56284d9550373f08d0a52ea49aa9,2024-08-22T20:35:24.417000
CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000
@ -261861,7 +261870,7 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0
CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000
CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000
CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000
CVE-2024-46528,0,1,4d04b74cf43234afd60aee245e40ab967d12ed0a23a16922ce62a9e56a7cfb68,2024-10-31T17:15:13.250000
CVE-2024-46528,0,0,4d04b74cf43234afd60aee245e40ab967d12ed0a23a16922ce62a9e56a7cfb68,2024-10-31T17:15:13.250000
CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000
CVE-2024-46531,0,0,878a7e01df4c686cd7cdf931908bd2db34d00b16932fa7e72aa7bf69654762d4,2024-10-31T16:35:16.453000
CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000
@ -261870,7 +261879,7 @@ CVE-2024-46538,0,0,dfc9741b1ceb0c2e645ed8952810cc1343c34577d0526c0ae91f23ea6649c
CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000
CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000
CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000
CVE-2024-46544,0,0,7c690592f3c3aad53f638c9c118a2efde53f0542c00b3644e612a6801f3cf547,2024-09-26T13:32:55.343000
CVE-2024-46544,0,1,b18ab032b67182bdfd9cf5b4990f62b6cf345d5567b676ce2f4c2b86a93274c5,2024-10-31T20:35:06.390000
CVE-2024-46548,0,0,a76db6350fd9cf17eb17ea692a21b280803fa9cd2f4c425127b2376fbb1ea301,2024-10-04T13:51:25.567000
CVE-2024-46549,0,0,a58dc99fbe7a6733f6bee128f5732a51ff2defe2296e61fdd35f50a9a237365d,2024-10-04T13:51:25.567000
CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000
@ -261919,7 +261928,7 @@ CVE-2024-46605,0,0,cd741604be9f1b11329c686e775aac657866e26a3c66d9c2707d0c286f14f
CVE-2024-46606,0,0,8a59186f6e37a35a98df2212faf251342d973be335e26a6de0511db920fb3694,2024-10-18T12:53:04.627000
CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000
CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000
CVE-2024-4661,0,1,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000
CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000
CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
@ -262605,7 +262614,7 @@ CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986a
CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000
CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000
CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000
CVE-2024-47640,0,1,a1e01ed5a492a5aded34eda294dc6bd58a5227b3728268dbd61f0874f5c8395b,2024-10-31T17:39:28.907000
CVE-2024-47640,0,0,a1e01ed5a492a5aded34eda294dc6bd58a5227b3728268dbd61f0874f5c8395b,2024-10-31T17:39:28.907000
CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f553,2024-10-04T13:51:25.567000
CVE-2024-47642,0,0,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000
CVE-2024-47643,0,0,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000
@ -262937,12 +262946,13 @@ CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168
CVE-2024-48195,0,0,624eed9854f46ef9dafc813bcbfebca0bf2ab48de4eb64a4aa5f0a1ddeec9a89,2024-10-30T18:35:14.433000
CVE-2024-48196,0,0,06085a08add8a4f4e1622d4b148953be486d5c8e3772fc9fb5febed91d95829e,2024-10-30T18:35:15.220000
CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000
CVE-2024-48200,1,1,d522cdb51427320f6247dedfc0f6e6c39b657ec64c121a0c5e19815e9e23a09f,2024-10-31T19:15:13.150000
CVE-2024-48202,0,0,6a991d4260ecb620082a50303e3e09368ecc201c8b57a4ee048562622acb1335,2024-10-31T15:35:38.390000
CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000
CVE-2024-48206,0,0,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000
CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000
CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000
CVE-2024-48213,0,1,5f8713bffe18994daa14febc6bb0ad9b0b79a213338e08da6c4d569a2dd47e80,2024-10-31T18:35:14.040000
CVE-2024-48213,0,0,5f8713bffe18994daa14febc6bb0ad9b0b79a213338e08da6c4d569a2dd47e80,2024-10-31T18:35:14.040000
CVE-2024-48214,0,0,78cdef8b5cf77a590137f1180c767a14d73d8882d8f7bf7b4722d04546484757,2024-10-31T16:35:17.260000
CVE-2024-48218,0,0,4b803b4002b5edc5abb8b754e173e0e42c64b19814d1d2b7448b5a518c468f92,2024-10-31T15:44:18.777000
CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000
@ -262984,14 +262994,16 @@ CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b9
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
CVE-2024-48307,0,0,df3a00e7bacafe2786ff0786147fc98c044a5f54c62a06ecd6885c5296cde834,2024-10-31T01:15:14.803000
CVE-2024-48307,0,1,81ecd37001e0e72c6ea88f5f6ed123050a0306524d9298167287539fbf37725b,2024-10-31T19:35:09.203000
CVE-2024-48311,0,0,d7c0370dd0b10cfc270efb9e368b85a66e3d825eb9e86a9a918e49a33499f4e2,2024-10-31T16:35:19.993000
CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000
CVE-2024-48346,0,0,e9ae7cc0b0e1a356f05a97d8deeb8d9dc84f4c9c61fc4af7c52397b9719f02d9,2024-10-30T21:15:14.450000
CVE-2024-48346,0,1,685dc3b8b4a0617d3bba24133a1b9cfcfa941dbeb1368f1bd1acdbd1ea270b87,2024-10-31T19:35:10.023000
CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000
CVE-2024-48356,0,0,d61948bf2095cc3d150baaa31fe05023f5cd4e2dab12daf4f3dc83771432fb5f,2024-10-30T17:35:12.420000
CVE-2024-48357,0,0,dba1c026ce12a35ee6a885944cea646b76fb79069c0e7307a1deb45a88532ca1,2024-10-30T17:35:13.203000
CVE-2024-48359,1,1,f826addd6d537acf42a92e0cbf0efa9eb4e62d83f789d88f644862fda35249dd,2024-10-31T20:15:05.340000
CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000
CVE-2024-48360,1,1,1b5a1633c2541f80a1d590704a304549571b2ffc5dedb093276c0fb3a82b0781,2024-10-31T20:15:05.420000
CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000
CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000
CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000
@ -263040,7 +263052,7 @@ CVE-2024-48547,0,0,9db332cc676278e21a081b803d57f1c54b011fe5dd42093550c345ebe0949
CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c173,2024-10-25T12:56:07.750000
CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000
CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000
CVE-2024-48569,0,1,363defbdf09420190878aeae0a2fca5d0c5aa0c8ac5165dd56ab5fe6856327cb,2024-10-31T18:35:14.873000
CVE-2024-48569,0,0,363defbdf09420190878aeae0a2fca5d0c5aa0c8ac5165dd56ab5fe6856327cb,2024-10-31T18:35:14.873000
CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000
CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000
CVE-2024-48572,0,0,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000
@ -263071,9 +263083,9 @@ CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07
CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000
CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000
CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000
CVE-2024-48646,0,1,2c72755711774d9ce5210ca99838e837ec7f18163059771ae42741fa88e99c51,2024-10-31T18:35:15.693000
CVE-2024-48647,0,1,92cd0668411b861dcce5bb2a87a5095ba9c782585782d8cbac588c674c005357,2024-10-31T18:35:16.527000
CVE-2024-48648,0,1,56cc0d5ae63142abad3a70ff465753bf85416d54651366afa742cc2bf17f0169,2024-10-31T17:35:03.713000
CVE-2024-48646,0,0,2c72755711774d9ce5210ca99838e837ec7f18163059771ae42741fa88e99c51,2024-10-31T18:35:15.693000
CVE-2024-48647,0,0,92cd0668411b861dcce5bb2a87a5095ba9c782585782d8cbac588c674c005357,2024-10-31T18:35:16.527000
CVE-2024-48648,0,0,56cc0d5ae63142abad3a70ff465753bf85416d54651366afa742cc2bf17f0169,2024-10-31T17:35:03.713000
CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000
CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000
CVE-2024-48654,0,0,b1175c42eb9b6ad703f77f6cacd261d0eb5f65c9d2e13e20c8b31a8501988240,2024-10-28T13:58:09.230000
@ -263099,7 +263111,7 @@ CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f20
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
CVE-2024-48733,0,0,e873e270c7250d836beb5a5d9d75c5d243594eecb9071602bcc17cc41d90fc1f,2024-10-30T21:15:14.507000
CVE-2024-48734,0,0,95db6671e3d0be41a6b06bc9e7fabfe49fbe14fcdbfc14f9c0975bea17995851,2024-10-30T21:15:14.563000
CVE-2024-48735,0,0,e72a9afea9ee46bb4bcc6f4f09600aed5e7e8192111e03331a7e65ffe3fdfe1d,2024-10-30T21:15:14.620000
CVE-2024-48735,0,1,5dee0ec0e0374b22f065cb26fb1b8c24e4784dd8a396c35339c7279fbec892bb,2024-10-31T20:35:06.767000
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000
CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000
@ -263190,7 +263202,7 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5
CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000
CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000
CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000
CVE-2024-48955,0,0,6a753515eadee4efaaa9ce7d086aaac0fd1d1f88a870f6a34578f374c110a15f,2024-10-30T15:35:22.063000
CVE-2024-48955,0,1,0a2a2b978cdc62d5d96adf19c8bb21d2cc19e4c4b5bc967c351e4b9474bfeb45,2024-10-31T20:15:05.530000
CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000
CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000
CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000
@ -263448,8 +263460,8 @@ CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68b
CVE-2024-49640,0,0,becbe9cd8e4562101ae9f0fd4aeb9f5d80e9d81b9046f0c79b66a78a4ae5a7e8,2024-10-31T16:04:01.113000
CVE-2024-49641,0,0,0c76c83cf503f374bc615797049759b6f98944a9c823b145687554c637514560,2024-10-31T16:05:44.353000
CVE-2024-49642,0,0,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000
CVE-2024-49643,0,1,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000
CVE-2024-49645,0,1,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000
CVE-2024-49643,0,0,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000
CVE-2024-49645,0,0,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000
CVE-2024-49646,0,0,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000
CVE-2024-49647,0,0,e60b9143544a8c8127edc259fcd544ebde14e3b3a21fa4bf3041175f98777227,2024-10-29T14:34:04.427000
CVE-2024-49648,0,0,882728f062a6477fd5d5596cbadd02c75634cd7d8a2e421ad711333bc5f1d005,2024-10-29T14:34:04.427000
@ -263761,7 +263773,7 @@ CVE-2024-50070,0,0,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d
CVE-2024-50071,0,0,ca95de15815d680369f3146cc2915571a1b4f1c26211b6f5790ba4ff0facd2a6,2024-10-30T17:02:34.740000
CVE-2024-50072,0,0,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000
CVE-2024-50073,0,0,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000
CVE-2024-50074,0,1,5fea9fa631fbe2046f51821253354eac87649cdd334e0aa7bed64a71b94bc645,2024-10-31T18:23:21.567000
CVE-2024-50074,0,0,5fea9fa631fbe2046f51821253354eac87649cdd334e0aa7bed64a71b94bc645,2024-10-31T18:23:21.567000
CVE-2024-50075,0,0,f254549f01ba2f5ee239dee6fc0e7ecbe8fe1b2c6da566e1dc2c41565299fc49,2024-10-29T14:34:04.427000
CVE-2024-50076,0,0,960b5306eb9d7d5b99e64da9813531f1a11820802abfb99e23dd9c044d60901e,2024-10-29T14:34:04.427000
CVE-2024-50077,0,0,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299d1e,2024-10-29T14:34:04.427000
@ -263803,12 +263815,12 @@ CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7
CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
CVE-2024-50344,0,0,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000
CVE-2024-50347,1,1,ed16d14b70cf3d7686a2254299d7869880decc6158040c4e8ffd6c4d37591aca,2024-10-31T18:15:05.600000
CVE-2024-50347,0,0,ed16d14b70cf3d7686a2254299d7869880decc6158040c4e8ffd6c4d37591aca,2024-10-31T18:15:05.600000
CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000
CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000
CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000
CVE-2024-50354,0,0,1f20ca590c38e43a7f364e4a76d630df65540096d85e4f8894633db095556fa8,2024-10-31T16:15:05.763000
CVE-2024-50356,1,1,1fef0c6d5035aacf7f26a2c53b0d2c6111ad3896b8b9aa474c64b30562d696cd,2024-10-31T18:15:05.750000
CVE-2024-50356,0,1,1c3aa41523b3d8fc957ae37821a636851ed23c168cf4d4bfeac1115b833bd28d,2024-10-31T20:35:07.840000
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
@ -263972,11 +263984,13 @@ CVE-2024-5076,0,0,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b
CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000
CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000
CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000
CVE-2024-50801,1,1,b8874f741b3ac3d4e0411e961bf871ceba705f8f639471838bd72ebc36785c6d,2024-10-31T19:15:13.313000
CVE-2024-50802,1,1,f24e292e6e8704f5d40bd8576e7700ff6bc9c2fbf554c1d2d83e9f06d65c1a14,2024-10-31T19:15:13.413000
CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000
CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000
CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000
CVE-2024-5086,0,0,cace1182cf9be3136b0c613ecdabc086a9a0b40661f04ebd6e230acc3565cbb0,2024-05-29T13:02:09.280000
CVE-2024-5087,0,1,1746857b68833d8900979ac8a67f81e6079dce1463e5a3122487cb2b7b074692,2024-10-31T18:26:54.500000
CVE-2024-5087,0,0,1746857b68833d8900979ac8a67f81e6079dce1463e5a3122487cb2b7b074692,2024-10-31T18:26:54.500000
CVE-2024-5088,0,0,cba5e9039c2295e22c8cb155a75af3aef347c6e9813c2bf0c73f71f25ef00106,2024-05-20T13:00:34.807000
CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000
CVE-2024-5090,0,0,be816c3666262b2758beb88ae86bd9e45d3334ddca99a5e32c28feea44799dd8,2024-06-11T13:54:12.057000
@ -263996,6 +264010,11 @@ CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df
CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000
CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000
CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000
CVE-2024-51060,1,1,6954fe4f4c979bac5ff347a737765282b77d34b22daafc7cbe923362e4a739b4,2024-10-31T19:15:13.500000
CVE-2024-51063,1,1,83d14fce1e9aba85cc79c57d7ea6b3af3164f1724c2fc0eca657961c44180c77,2024-10-31T19:15:13.610000
CVE-2024-51064,1,1,aede5da59a3b7d23cb6f435a779455219269bdbc5b84078b53f3427c0165d351,2024-10-31T19:15:13.700000
CVE-2024-51065,1,1,2e7b751ebd5e167556d945b03efd6c3f054ad6056d4c14633dc247533df24b1c,2024-10-31T19:15:13.780000
CVE-2024-51066,1,1,ee9694dead26536b4b5b9f9e8adea8e7ec593b9553bbcff0acf6476edcf63459,2024-10-31T19:15:13.860000
CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000
CVE-2024-51075,0,0,552465fb7c055ecfb398f22c9432551758d85e6dc6767f3b187c510f15761dd9,2024-10-29T20:35:35.130000
CVE-2024-51076,0,0,3a12fe30660d75d0270cdd7bd56ceece76ba34d3765c2f273f497b6ff97fc1c5,2024-10-29T20:35:35.890000
@ -264021,12 +264040,12 @@ CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed49927
CVE-2024-51242,0,0,12f705da9022a8e38ebd9ee7e7e6ac01dfd058f24c1a03edec744b643eba3520,2024-10-31T16:35:20.873000
CVE-2024-51243,0,0,800270ed7103621b26b8eae536fb3a8968dff426a0791be494e93fac6c2df32a,2024-10-31T15:35:40.967000
CVE-2024-51254,0,0,f20ab585f3fe372c65595856805921bb8d2b22af7824679356ebca594f108d37,2024-10-31T15:35:41.800000
CVE-2024-51255,0,0,e1cbafeb091e663b926de7b59cdcd9a21fea2bea834bdd892b0fb1b83916d910,2024-10-31T16:15:06.033000
CVE-2024-51255,0,1,235a83f99ee2b484c839d657b09596aa17973f52fcb5a6a16e0bbd6f5eafb8de,2024-10-31T19:35:10.837000
CVE-2024-51257,0,0,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000
CVE-2024-51258,0,0,8552984991114543bb72db401d789b000ecda7ab1e49c15b21f3ab9c1d4b407b,2024-10-30T18:35:17.040000
CVE-2024-51259,0,0,6d702cbaf70c10cfdda0a7abce448d3145a25d2256f8a60137d2335418de4f22,2024-10-31T14:15:06.260000
CVE-2024-51259,0,1,6ece1df8b0d21af9bb887582666dedab51f593b9a20998980ded2314d5db896a,2024-10-31T19:35:11.680000
CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000
CVE-2024-51260,0,0,671bfb7984aca048f642929131c3bdfc6798158fd3f798eefbd06d5d50e126ba,2024-10-31T16:15:06.113000
CVE-2024-51260,0,1,586901ac7a360d1796cf0d0876f6961325f47aad5a0d2fd09476e3b6ab8c144d,2024-10-31T19:35:12.607000
CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000
CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000
CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000
@ -264054,14 +264073,14 @@ CVE-2024-51425,0,0,833bdc625e1a738ada7ad7d5f55c83a7b1c7a93226be1681295fc3cb6fe3b
CVE-2024-51426,0,0,e6101206ecf4337bb6318e551c0f2f3f51553eecbb2541547a51b5d27151fe70,2024-10-31T15:35:43.373000
CVE-2024-51427,0,0,fcfe3e7677db4a7b336b2247c857e7519564993e67b9bed1d6a6e1e171a8c15f,2024-10-31T15:35:44.180000
CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000
CVE-2024-51430,1,1,3157d8015fa87efc2891316f9d6d859c0d52a688a574b364f2c6e2727bcd1cc2,2024-10-31T17:35:04.600000
CVE-2024-51430,0,0,3157d8015fa87efc2891316f9d6d859c0d52a688a574b364f2c6e2727bcd1cc2,2024-10-31T17:35:04.600000
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000
CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000
CVE-2024-51478,1,1,acd4bb31c48b5a4cf83924eba9a0379b0f9346e05b21361d2a15e88f0862bf56,2024-10-31T17:15:13.500000
CVE-2024-51478,0,0,acd4bb31c48b5a4cf83924eba9a0379b0f9346e05b21361d2a15e88f0862bf56,2024-10-31T17:15:13.500000
CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000
CVE-2024-51481,1,1,f2651a488920fe3fdbbcf0e515a1d10e5430b723396d938341b75258b7a7411d,2024-10-31T17:15:13.723000
CVE-2024-51482,1,1,5178c636b46c83fa7b2098922ca9a091994ec1b35ba1dadca37cf3d150c89227,2024-10-31T18:15:05.997000
CVE-2024-51481,0,0,f2651a488920fe3fdbbcf0e515a1d10e5430b723396d938341b75258b7a7411d,2024-10-31T17:15:13.723000
CVE-2024-51482,0,0,5178c636b46c83fa7b2098922ca9a091994ec1b35ba1dadca37cf3d150c89227,2024-10-31T18:15:05.997000
CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000
CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000
CVE-2024-51506,0,0,aeb585d1723ff2c89aafbc7f5be7b06442a99eb384784bc9840750395f547af1,2024-10-29T19:35:28.723000
@ -264487,7 +264506,7 @@ CVE-2024-5608,0,0,91d3b8760217c3d2e17ddc8bd099d48bf3bda4341e3d053182f418df616ce5
CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000
CVE-2024-5611,0,0,257f707c49e1adeab5f30937de3668453c65dc87c2e8ac71cda38f1fe1bbc4e5,2024-06-17T12:42:04.623000
CVE-2024-5612,0,0,28ceb837b16c04d60c80c2106288728343a6af941bee1c42d1e76e6ac30c4a71,2024-10-29T18:05:42.823000
CVE-2024-5613,0,1,2286e4c53cf8b075a4bf811beabba10c7d0ce41c40591dd19c0ccb642bdd2197,2024-10-31T18:31:30.757000
CVE-2024-5613,0,0,2286e4c53cf8b075a4bf811beabba10c7d0ce41c40591dd19c0ccb642bdd2197,2024-10-31T18:31:30.757000
CVE-2024-5614,0,0,3235a098278ef12466faacc7eb682cba1cb99cc913b9ed567c082bb65c13d254,2024-07-29T14:12:08.783000
CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000
CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000
@ -264510,7 +264529,7 @@ CVE-2024-5634,0,0,00eb3cdc892a411ea249c0c861bb9c39f15a25ea90327bdcc836d54ed90e08
CVE-2024-5635,0,0,cc8d1362a9a889fd4ce6da7f46e39b1117534a16d1469408f00bcbe886f319fd,2024-06-11T16:47:04.413000
CVE-2024-5636,0,0,11453de0b2b9e33715d95748660a81de0651a58507f354b8a49561ef7d2587ac,2024-06-11T17:23:29.670000
CVE-2024-5637,0,0,eeb41901e681579a29d0676f0c70bb8e6e3be08e91c4d1d1a3396dc5dea508cd,2024-06-11T18:31:54.787000
CVE-2024-5638,0,1,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684f3,2024-10-31T18:38:33.640000
CVE-2024-5638,0,0,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684f3,2024-10-31T18:38:33.640000
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
@ -264672,7 +264691,7 @@ CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd
CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000
CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000
CVE-2024-5822,0,0,baf10ed90614f0ff900c6a4bdea84fcaae14f3f7ead2ea1122c706f066c79b96,2024-06-27T19:25:12.067000
CVE-2024-5823,0,1,50ef10262f89eb8063a87ceb928d6e6bd5e644a01c19f98e2fa47e0e16572aff,2024-10-31T18:05:00.637000
CVE-2024-5823,0,0,50ef10262f89eb8063a87ceb928d6e6bd5e644a01c19f98e2fa47e0e16572aff,2024-10-31T18:05:00.637000
CVE-2024-5824,0,0,a626487511d1e6b65da2c7fdc7f30939ba46505ead241212d2b122818200e9ab,2024-06-27T19:25:12.067000
CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000
CVE-2024-5826,0,0,ab74f2650ad7ec867beb938c7b9b39007cedba2567b06756b5e245e8edb717b0,2024-06-27T19:25:12.067000
@ -265705,7 +265724,7 @@ CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca450
CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000
CVE-2024-7038,0,0,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000
CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000
CVE-2024-7042,0,1,cb1e3b618862b496bd13b244398afe81ffff2552b15227836e0acd820bc3de3c,2024-10-31T18:36:30.140000
CVE-2024-7042,0,0,cb1e3b618862b496bd13b244398afe81ffff2552b15227836e0acd820bc3de3c,2024-10-31T18:36:30.140000
CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000
CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000
CVE-2024-7049,0,0,0a245acb222c9415b34bdd2b50731367d88750a93745ace19c048218b6b8c0be,2024-10-17T14:22:44.653000
@ -266048,7 +266067,7 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56
CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000
CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000
CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000
CVE-2024-7472,0,1,cfb9d72479737a220f88555f5248b8b3adcebcdf0dd499def604c090ee01833e,2024-10-31T18:46:32.497000
CVE-2024-7472,0,0,cfb9d72479737a220f88555f5248b8b3adcebcdf0dd499def604c090ee01833e,2024-10-31T18:46:32.497000
CVE-2024-7473,0,0,20168a95c050c826b36808d062806e3ad8c89fac510d32acafd85084e3f5514a,2024-10-31T15:11:45.557000
CVE-2024-7474,0,0,fd603ba5192c32c81661db241a24a16d96938f0a539e4ad024748791a7268266,2024-10-29T14:35:21.207000
CVE-2024-7475,0,0,2b037db3837162a776e57f7b2c7175870a05e0cd0e7064c84fd1c023e8b92b59,2024-10-29T14:35:21.403000
@ -266382,7 +266401,7 @@ CVE-2024-7870,0,0,2836216d393e794b4828cb37dfdee043bfdf58d1b6ab4bb6d4918022aecdc9
CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000
CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000
CVE-2024-7878,0,0,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000
CVE-2024-7883,1,1,a0d02461ab906696f5db8c8f3e3571e988cb43aab47f453d7c53bf3a19ae3b1f,2024-10-31T17:15:14.013000
CVE-2024-7883,0,0,a0d02461ab906696f5db8c8f3e3571e988cb43aab47f453d7c53bf3a19ae3b1f,2024-10-31T17:15:14.013000
CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000
CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70e9,2024-10-07T21:15:19.217000
CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000
@ -267573,7 +267592,7 @@ CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb776103
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
CVE-2024-9675,0,1,62113804dce80364e0c34f410a374324b1967014a2528b04188a6bdc38b497f9,2024-10-31T17:15:14.250000
CVE-2024-9675,0,0,62113804dce80364e0c34f410a374324b1967014a2528b04188a6bdc38b497f9,2024-10-31T17:15:14.250000
CVE-2024-9676,0,0,24ed9ba905e617fe373fd7817b3453536089b8c2e8edbf0e6624a0d55077f74d,2024-10-31T05:15:05.860000
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000

Can't render this file because it is too large.