diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9804.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9804.json index 422a80b287b..44c00c8df6c 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9804.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9804.json @@ -2,10 +2,10 @@ "id": "CVE-2014-9804", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.170", - "lastModified": "2017-04-03T14:22:18.733", + "lastModified": "2024-10-31T19:52:55.157", "vulnStatus": "Analyzed", "cveTags": [], - "evaluatorComment": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')", + "evaluatorComment": "CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop')", "descriptions": [ { "lang": "en", @@ -17,13 +17,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -86,8 +86,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9805.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9805.json index 93104eaa23b..3a98a3fb363 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9805.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9805.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9805", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.217", - "lastModified": "2017-04-04T15:31:36.767", + "lastModified": "2024-10-31T19:52:32.510", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9806.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9806.json index 53f426f17ee..00b5fc88ec6 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9806.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9806.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9806", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.250", - "lastModified": "2017-04-04T15:33:36.053", + "lastModified": "2024-10-31T19:52:23.440", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9807.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9807.json index 72dc63415fa..27f3e86ff6a 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9807.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9807.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9807", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.297", - "lastModified": "2017-04-04T15:34:05.697", + "lastModified": "2024-10-31T19:50:31.553", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9808.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9808.json index 4f0c134e6a2..7abd0b5d081 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9808.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9808.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9808", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.327", - "lastModified": "2017-04-04T15:34:30.633", + "lastModified": "2024-10-31T19:49:00.877", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9809.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9809.json index 462e89576bc..8eeb961f737 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9809.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9809.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9809", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.360", - "lastModified": "2017-04-04T15:35:18.700", + "lastModified": "2024-10-31T19:53:30.847", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9810.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9810.json index 3ca1e578fda..2f8eac0e599 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9810.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9810.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9810", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.407", - "lastModified": "2017-04-04T15:35:52.280", + "lastModified": "2024-10-31T19:53:36.977", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9811.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9811.json index 2ceb83813ee..21c4d661f54 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9811.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9811.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9811", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.437", - "lastModified": "2017-04-04T15:36:27.390", + "lastModified": "2024-10-31T19:53:42.617", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9812.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9812.json index e3a3e061a5b..1accc9cdfd9 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9812.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9812.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9812", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.500", - "lastModified": "2017-04-04T15:36:56.970", + "lastModified": "2024-10-31T19:53:49.987", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9813.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9813.json index 783dc8bbf5d..ec7e0f91b3f 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9813.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9813.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9813", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.517", - "lastModified": "2017-04-04T15:40:29.073", + "lastModified": "2024-10-31T19:53:55.630", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9814.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9814.json index 25dbe0c5baf..be12ce44f42 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9814.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9814.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9814", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.563", - "lastModified": "2017-04-04T15:40:49.197", + "lastModified": "2024-10-31T19:54:43.970", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9815.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9815.json index 5a6cb595c34..a6e1c13b2f1 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9815.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9815.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9815", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.593", - "lastModified": "2017-04-04T15:37:35.503", + "lastModified": "2024-10-31T19:55:48.687", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9816.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9816.json index 8eca8f44b22..7dbdea7e18f 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9816.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9816.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9816", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.640", - "lastModified": "2017-04-04T15:41:53.687", + "lastModified": "2024-10-31T19:55:54.603", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9817.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9817.json index d38dd431bca..24df22e0979 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9817.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9817.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9817", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.687", - "lastModified": "2017-04-04T15:42:20.873", + "lastModified": "2024-10-31T19:56:03.530", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9818.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9818.json index 66e888b365f..a21359b215b 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9818.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9818.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9818", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.717", - "lastModified": "2017-04-04T15:43:36.660", + "lastModified": "2024-10-31T19:56:08.477", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9819.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9819.json index cd7f2b1b58f..3372ed9f1c1 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9819.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9819.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9819", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.750", - "lastModified": "2017-04-04T15:44:17.503", + "lastModified": "2024-10-31T19:56:16.343", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9820.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9820.json index aa47d13b752..c77a77ec358 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9820.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9820.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9820", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.797", - "lastModified": "2017-04-04T15:44:40.317", + "lastModified": "2024-10-31T19:56:38.033", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9821.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9821.json index be291cd22ca..ed16eb63209 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9821.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9821.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9821", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.827", - "lastModified": "2017-04-04T15:45:03.570", + "lastModified": "2024-10-31T19:56:44.357", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9822.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9822.json index a9794111abc..00bf258b19a 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9822.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9822.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9822", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.873", - "lastModified": "2017-04-04T15:45:25.163", + "lastModified": "2024-10-31T19:56:51.983", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9823.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9823.json index ef39234ac59..f62e4bb16e0 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9823.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9823.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9823", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.907", - "lastModified": "2017-04-06T13:13:37.330", + "lastModified": "2024-10-31T19:56:59.013", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2014/CVE-2014-98xx/CVE-2014-9824.json b/CVE-2014/CVE-2014-98xx/CVE-2014-9824.json index 12e03a4e7d3..36dbd28dd1f 100644 --- a/CVE-2014/CVE-2014-98xx/CVE-2014-9824.json +++ b/CVE-2014/CVE-2014-98xx/CVE-2014-9824.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9824", "sourceIdentifier": "cve@mitre.org", "published": "2017-03-30T15:59:00.937", - "lastModified": "2017-04-06T12:56:39.363", + "lastModified": "2024-10-31T19:57:06.380", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -85,8 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:imagemagick:imagemagick:-:*:*:*:*:*:*:*", - "matchCriteriaId": "6E6BE7A5-6FF7-4916-B671-9EE11CA54F65" + "criteria": "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.9.4-0", + "matchCriteriaId": "CFC2C780-A54E-4426-9C52-46A20216339E" } ] } diff --git a/CVE-2023/CVE-2023-491xx/CVE-2023-49100.json b/CVE-2023/CVE-2023-491xx/CVE-2023-49100.json index 0e28fcc0431..8746d0fd143 100644 --- a/CVE-2023/CVE-2023-491xx/CVE-2023-49100.json +++ b/CVE-2023/CVE-2023-491xx/CVE-2023-49100.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49100", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T16:15:49.457", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-10-31T20:35:01.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Trusted Firmware-A (TF-A) anterior a 2.10 tiene una posible lectura fuera de los l\u00edmites en el servicio SDEI. El par\u00e1metro de entrada pasado en el registro x1 no est\u00e1 suficientemente validado en la funci\u00f3n sdei_interrupt_bind. El par\u00e1metro se pasa a una llamada a plat_ic_get_interrupt_type. Puede ser cualquier valor arbitrario que pase las comprobaciones en la funci\u00f3n plat_ic_is_sgi. Un Normal World (kernel de Linux) comprometido puede permitir que un atacante con privilegios de root emita llamadas SMC arbitrarias. Usando esta primitiva, puede controlar el contenido de los registros x0 a x6, que se utilizan para enviar par\u00e1metros a TF-A. Las direcciones fuera de los l\u00edmites se pueden leer en el contexto de TF-A (EL3). Debido a que el valor le\u00eddo nunca se devuelve a la memoria no segura o a los registros, no es posible ninguna fuga. Sin embargo, un atacante a\u00fan puede bloquear TF-A." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/ARM-software/arm-trusted-firmware/blob/a05414bedc9b1cc35cf0795ce641b6b4db5bc97e/services/std_svc/sdei/sdei_main.c#L708", diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json new file mode 100644 index 00000000000..3079955f907 --- /dev/null +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52044.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-52044", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:12.347", + "lastModified": "2024-10-31T19:15:12.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Studio-42 eLfinder 2.1.62 is vulnerable to Remote Code Execution (RCE) as there is no restriction for uploading files with the .php8 extension." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Studio-42/elFinder/issues/3615", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json new file mode 100644 index 00000000000..d3c798ac117 --- /dev/null +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52045.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-52045", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:12.450", + "lastModified": "2024-10-31T19:15:12.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Studio-42 eLfinder 2.1.62 contains a filename restriction bypass leading to a persistent Cross-site Scripting (XSS) vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Studio-42/elFinder/issues/3617", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52613.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52613.json index 7ef8a9848b0..74a6ab94f36 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52613.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52613.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52613", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:08.477", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-10-31T20:35:02.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drivers/thermal/loongson2_thermal: corrige el juicio PTR_ERR() incorrecto. PTR_ERR() devuelve -ENODEV cuando las zonas t\u00e9rmicas no est\u00e1n definidas y necesitamos -ENODEV como el valor correcto para comparar. De lo contrario, tz->type es NULL cuando las zonas t\u00e9rmicas no est\u00e1n definidas, lo que genera el siguiente error: [12.290030] CPU 1 No se puede manejar la solicitud de paginaci\u00f3n del kernel en la direcci\u00f3n virtual ffffffffffffffff1, era == 900000000355f410, ra == 90000000031579b8 [ 12.302877] Ups [#1]: [ 12.305190] CPU: 1 PID: 181 Comm: systemd-udevd No contaminado 6.6.0-rc7+ #5385 [ 12.312304] pc 900000000355f410 ra 90000000031579b8 tp 90000001069e8000 sp 90000001069eba10 [ 12.320739] a0 0000000000000000 a1 ffffffffffffffff1 a2 0000000000000014 a3 0000000000000001 [ 12.329173] a4 90000001069eb990 a5 0000000000000001 a6 0000000000001001 a7 900000010003431c [ 12.337606] t0 ffffffffffffffff1 t1 54567fd5da9b 4fd4 t2 900000010614ec40 t3 00000000000dc901 [ 12.346041] t4 0000000000000000 t5 00000000000000004 t6 900000010614ee20 t7 900000000d00b 790 [ 12.354472] t8 00000000000dc901 u0 54567fd5da9b4fd4 s9 900000000402ae10 s0 900000010614ec40 [ 12.362916] s1 90000000039fced0 s2 ffffffffffffffff s3 ffffffffffffffff s4 9000000003acc000 [ 12.362931] s5 0000000000000004 s6 fffffffffffff000 s7 0000000000000490 s8 90000001028b2ec8 [ 12.362938] ra: 90000000031579b8 Thermal_add_hwmon_sysfs+0x258/0x300 [ 12.386411] ERA: 900000000355f410 strscpy+0xf0/0x160 [ 12.391626] CRMD: 00000 0b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE) [ 12.397898] PRMD: 00000004 (PPLV0 +PIE -PWE) [ 12.403678] EUEN: 00000000 (-FPE -SXE -ASXE -BTE) [ 12.409859] ECFG: 00071c1c (LIE=2 -4,10-12 vs = 7) [12.415882] ESTAT: 00010000 [PIL] (IS = ECODE = 1 ESUBCODE = 0) [12.415907] BADV: FFFFFFFFFFFFFF1 [12.415911] PRID: 0014A000 (Loongson-64bit, Loongson-24000) [12.415917] M\u00f3dulos vinculados en: loongson2_thermal(+) vfat fat uio_pdrv_genirq uio fuse zram zsmalloc [12.415950] Proceso systemd-udevd (pid: 181, threadinfo=00000000358b9718, task=00000000ace72fe3) [ 12.415961] Pila: 0000000000000dc0 54567fd5da9b4fd4 900000000402ae10 9000000002df9358 [12.415982] ffffffffffffff 0000000000000004 9000000107a10aa8 90000001002a3410 [ 12.415999] ffffffffffffff ffffffffffffff 9000000107a11268 9000000003157ab0 [ 12.416016] 9000000107a10aa8 ffffff80020fc0c8 90000001002a3410 ffffffffffffffed [ 12.416032] 00000000000000024 ffffff80020cc1e8 900000000402b2 a0 9000000003acc000 [ 12.416048] 90000001002a3410 0000000000000000 ffffff80020f4030 90000001002a3410 [ 12.416065] 00000000000000000 9000000002df6808 90000001002a3410 0000000000000000 [ 12.416081] ffffff80020f4030 00000000000000000 90000001002a3410 9000000002df2ba 8 [ 12.416097] 00000000000000b4 90000001002a34f4 90000001002a3410 0000000000000002 [ 12.416114] ffffff80020f4030 ffffffffffffff0 90000001002a3410 9000000002df2f30 [ 12 .416131] ... [ 12.416138] Seguimiento de llamadas: [ 12.416142] [<900000000355f410>] strscpy+0xf0/0x160 [ 12.416167] [<90000000031579b8>] Thermal_add_hwmon_sysfs+0x258/0 x300 [12.416183 ] [<9000000003157ab0>] devm_thermal_add_hwmon_sysfs+0x50/0xe0 [ 12.416200] [] loongson2_thermal_probe+0x128/0x200 [loongson2_thermal] [ 12.416232] [<9 000000002df6808>] plataforma_probe+0x68/0x140 [ 12.416249] [<9000000002df2ba8>] realmente_probe+ 0xc8/0x3c0 [ 12.416269] [<9000000002df2f30>] __driver_probe_device+0x90/0x180 [ 12.416286] [<9000000002df3058>] driver_probe_device+0x38/0x160 [ 12.41630 2] [<9000000002df33a8>] __driver_attach+0xa8/0x200 [ 12.416314] [<9000000002deffec>] bus_for_each_dev+0x8c/0x120 [ 12.416330] [<9000000002df198c>] bus_add_driver+0x10c/0x2a0 [ 12.416346] [<9000000002df46b4>] driver_register+0x74/0x160 [ 12.41 6358] [<90000000022201a4>] do_one_initcall+0x84/0x220 [ 12.416372] [<90000000022f3ab8 >] do_init_module+0x58/0x2c0 [ ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/15ef92e9c41124ee9d88b01208364f3fe1f45f84", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52704.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52704.json index d3da21c6512..5132390ceae 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52704.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52704.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52704", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:12.760", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-10-31T20:35:02.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: freezer,umh: Fix call_usermode_helper_exec() vs SIGKILL .Tetsuo-San not\u00f3 que la confirmaci\u00f3n f5d39b020809 (\"freezer,sched: Rewrite core freezer logic\") rompi\u00f3 call_usermodehelper_exec() para el caso KILLABLE. Espec\u00edficamente, se pas\u00f3 por alto que el segundo wait_for_completion() incondicional no era opcional y garantiza que la finalizaci\u00f3n en la pila no se utilice antes de salir del alcance." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/7f9f6c54da876b3f0bece2b569456ceb96965ed7", diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json new file mode 100644 index 00000000000..42e00ba4adc --- /dev/null +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10573.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-10573", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-10-31T19:15:12.540", + "lastModified": "2024-10-31T19:15:12.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds write flaw was found in mpg123 when handling crafted streams. When decoding PCM, the libmpg123 may write past the end of a heap-located buffer. Consequently, heap corruption may happen, and arbitrary code execution is not discarded. The complexity required to exploit this flaw is considered high as the payload must be validated by the MPEG decoder and the PCM synth before execution. Additionally, to successfully execute the attack, the user must scan through the stream, making web live stream content (such as web radios) a very unlikely attack vector." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-10573", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2322980", + "source": "secalert@redhat.com" + }, + { + "url": "https://mpg123.org/cgi-bin/news.cgi#2024-10-26", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json index b03751b42fa..356821bb3fc 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20264", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T17:15:14.180", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:04:42.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,18 +81,119 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAEC54E5-91D8-48AB-A890-5841A158839F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json index 0ac30235efb..928812f39fc 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20269.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20269", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T17:15:14.610", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:35:03.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,18 +81,454 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", + "matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", + "matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", + "matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", + "matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*", + "matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json index ac0a0851419..bea85ff1d65 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20273", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T17:15:14.813", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:09:24.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,18 +81,454 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "6175407A-207E-4844-B150-EA0129C4CBBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "45B6E615-F42A-468F-8E40-AD28994B4B1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "C4B08264-DA65-4BFF-A973-FF733C7325B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "CE2A5330-8180-48CE-B22A-1CF24B7B1631" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "ACC1D72F-9542-4A62-AA90-C0E6B2095068" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E4F3A97A-3359-40C7-95B0-2AB41C067141" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "B68BA14B-1752-4F05-9331-D556247462C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "1DE72ABB-B573-43CC-A2AC-D81807970BD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "535E8ECF-5CE5-4E78-A9EF-6167F4C59C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "3AE3F1C4-8C7A-48AA-83E5-6F832FA94DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "C40B7DC8-220C-4C34-A370-F1EB4B3F9EF1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "5DB186DC-6C03-4868-8218-06BEFC0CE400" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "B29670B8-F2D3-46D7-8F34-F44B320DD6FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "2F04DDF5-2058-4208-A608-3673872450EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "C9A483AC-A8CF-439C-9009-4DFAB0484BCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "94E7D836-46E5-4CD5-8BDC-4697D915FE05" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "06220CB8-7F16-4D3C-A835-558D5F4D97ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.17:*:*:*:*:*:*:*", + "matchCriteriaId": "82917F5C-CF20-4D97-A981-FE3F8476CCFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "47E42025-1D1E-4390-AC21-9A1B0FBE8D82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "52651664-CA65-4812-8226-E104E1BE7864" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "64E0FDB2-D5A4-4749-A182-B0B145DC00D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "23B58490-C403-44D5-BDB9-88FAD19ABC2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DE33A280-84E4-4B5B-AB31-7A78754413F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "BA3F9410-02E1-4FE9-9A4B-E504515F4615" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8AAAF924-1ADE-4267-9957-DF060D1D3538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "4D02863A-1355-4FFE-A6BD-C912697774A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "704E4D3D-D1D2-48D8-A68C-227CC92A1C1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "80A3D0F1-DA29-4A66-A698-082DB0CFA4B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "C6B9B536-ADF9-4CE1-86EC-07BCDD65FB92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "1755E718-C726-442B-B203-E9536C546DF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "AB80FC39-0FCE-49F7-9A28-CE733DBB3572" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.12:*:*:*:*:*:*:*", + "matchCriteriaId": "F61496C8-9ADE-4A4E-9788-447050691727" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.13:*:*:*:*:*:*:*", + "matchCriteriaId": "E0780AD6-4F38-4400-AA63-E41879F74B68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "86BA5BA6-1F79-4C89-A3F4-A56E2B664AED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "52C7994F-AA17-467B-919E-A49F0CC9DB47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.16:*:*:*:*:*:*:*", + "matchCriteriaId": "9F007F6B-1EAA-468C-8159-78B020DF1E58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.4.0.17:*:*:*:*:*:*:*", + "matchCriteriaId": "C9053FDE-A6BE-4535-AE36-A323F8B7ACA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "81F9AF68-70BD-46DE-B7F2-97C9BD5182A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D1D808CD-B030-4334-A286-9B3A1D35C61D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0DFE9115-3E32-4A55-AB5A-83513322FE97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "09BD6616-B2B9-49B1-AD20-9B13D93C8F2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "35A9634E-FCF4-4C67-A463-6BA5F63DD2A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "2D8CF5AA-7B41-4E98-8E7E-A399AAA510B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8452BA9A-F56C-48E0-BDBA-9095AF78F521" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B2CE3B06-353C-4623-9EF4-78814DCB0D7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "FD968EA0-616D-4A22-A15D-C66918E71761" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BE45FF20-1E52-46B6-9B38-07E5A6D6FD6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.6.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "249F9108-758A-4118-94C1-BAC747AF45ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json b/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json index d93e5492f31..80e95e4f435 100644 --- a/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json +++ b/CVE-2024/CVE-2024-202xx/CVE-2024-20298.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20298", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T17:15:15.710", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:25:31.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,18 +81,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-M446vbEO", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75300", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json index 7515eebf814..ffd6d1d558a 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20364.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20364", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T18:15:05.427", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:36:32.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,235 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "978284EE-8BE8-43ED-ADA0-B90151D83EA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA140F9-4706-4B05-826E-962A277E625A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "5E7D3C93-B0FC-475E-9CCA-AA8A2101781D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:6.7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "270CA092-1AF1-48D4-8695-E7DB694969C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DFA94312-376E-4785-888F-3C07612E1DF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "29E73FBF-2579-4660-AFFA-7F9607004226" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "87FAAFFB-0589-441B-8289-8B8A6E18F705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "73B92119-793D-4A43-A056-24DB6826E759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "093A0BC2-037C-463F-AFC5-EF11C2954EAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C4F434FC-CAA4-4DBB-8094-C4ECC28B31E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "68C70BB3-33B3-4E7E-99D5-FF76D4ED96AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "B881B8DF-A96D-4B64-B98A-71F0D3388641" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "F6A97625-D39C-42D5-89E4-415A868A0972" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "5E4D83B4-9697-4071-AC9F-7ADC86A6B529" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8F81F708-ACED-4E42-8CA9-116B5C4F5141" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3C86116B-8475-40A0-A507-D4A7947F5F2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A58A2DA5-3EE7-408D-AAFA-82330F0325B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7FA98EEC-2059-4CA9-92F1-72C1E0BB7EC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F4C51EE7-866B-410C-B75E-EF260D5062B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5F1FFD07-B874-4D3C-8E2C-9A204F1E994E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5ACB9E-86AF-4EC1-9F36-A202429CD0F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1E4527-AAE2-4DA9-AFDA-6375839F7843" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2F0AF047-EAE9-4C77-BCEF-5CB26F84C742" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2ED03874-4071-4382-8A46-8B3A59E601FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "BF84E043-DF3C-4A95-8FDA-B0FDCD795377" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B9498087-9642-4A86-B3EE-1513C55A86E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "36C229AB-2851-48D4-815A-63AAB4462A24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DA4BCFC-8237-4F5C-9863-523EE7D8619B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "07693A92-7D84-45A1-ACD6-D83AE41D504B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2C78050A-A5FB-427B-BF0D-0353B240A4FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "85E76AE7-12AC-4419-AE66-43730B173B4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "4D803EC9-26EE-4799-A435-C782C92739CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "6EEF87CD-2335-4886-A65C-4E33775AEC52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "953EB81A-1B53-4A57-9F59-D4A7D37E657E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.2.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1CB534BC-3E4D-4484-AFD0-69524B1F07F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5D401072-6709-4921-8918-720F28D61E24" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C0EA3467-4205-4C41-AF24-689330F7396B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9BE94E38-5F29-4AE1-8129-7F7582C2CC75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "FEF603AD-D69B-4DD8-A7F4-6BEFD355EF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D6BD1665-7824-4D98-A930-432CBDA4EAD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F8056E69-22FA-4935-A576-916805D90C62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:secure_firewall_management_center:7.4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6A80BBBE-DB5E-460A-8621-6E28D2BD6E44" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json index ee953967aff..405c4cbabab 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20415.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20415", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T18:15:09.713", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:17:54.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -51,10 +81,480 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DB01FA17-68F7-47E6-9D94-AC3C290F62AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "08F0F58D-C859-400F-88D4-38C84584BACF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "73D28E1C-B26F-4BD8-8F21-2AFA1E1B881D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "4DF3D576-7922-4FB4-9C8B-2E31E29A4FEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DE852669-316E-4710-A964-91B17CBA75FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D64651BA-33A1-4DD9-B23C-577543D45534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "E44687A2-D460-4CD7-91E1-4535B4A71698" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "4C312686-8739-4B48-9476-3D65200B3216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "059D7FFF-94B6-400A-A939-498BDBB18FED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "B4204464-BF24-4596-8AE2-4D98EC817234" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "DF0B67CC-FFEA-4A22-A79F-6DB1C826CECE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "13744A3B-7F48-49B1-8263-012456E27ACD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "0E0CC829-ED28-435B-9826-6CDB4BB2F0EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "1732AC85-09E3-43E2-B624-87E537EB6F03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "85986C19-4819-4F02-9873-A42D4277D3A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "11BEDD8B-DB02-4E8D-B2BF-2B7BE190AF6D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "B0E13E7F-BDA9-49DF-BA43-CB812BC0D384" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.17:*:*:*:*:*:*:*", + "matchCriteriaId": "47FDAAB6-EC1B-4759-8B8A-55748C39AFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.2.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "E3C97C0B-509E-4AE2-9EDB-BDC0436E05A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DA61E6F5-FFFD-4D4E-9AA3-94F827A79F4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "80EC515D-6051-472A-92F4-ED4385FEDEC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F7E83830-B9CA-425D-BFD3-7F8FD1114950" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "91F862F9-40FE-42E9-86B2-BD9350B118D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "857A0C11-1456-4F1A-A812-E93B829F13DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "93828989-2731-4DCE-9FBB-5ABB5A660A9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "83B99522-B80A-4998-971B-F3C45EB104F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "F286FD7B-E588-4DCC-B41F-AD9E4A49B8ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3908BF04-0869-4F4D-9BC4-411F56AC8092" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "227799AC-75DF-4B3F-A7EF-063D8D8C2EC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "FB72A64E-7B19-4A96-809C-287E391DFA44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "4630DEB7-BEE7-4247-9536-C35887A807C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.12:*:*:*:*:*:*:*", + "matchCriteriaId": "2E7BC07A-1C33-46FB-9ABF-C98A46BE6AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0F3B8077-2DD6-491F-9F0E-D977E7A4AB08" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "CEAD4CD3-FBF1-43BC-A14F-6375E4B784AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "5662EBCF-13F5-4CE6-8E3D-B23B73AF4633" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.16:*:*:*:*:*:*:*", + "matchCriteriaId": "817E7CDB-5CDC-44A9-92D0-4364A08302BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.17:*:*:*:*:*:*:*", + "matchCriteriaId": "9A95D8B6-2D90-4EA8-B468-356EB396A273" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.4.0.18:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDEF2CC-D485-4E66-9818-7C9740F37840" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "30AE7CB7-86F5-4B80-9179-1C2DF4E8E7B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1931C431-3452-4FE1-870A-16700553BDAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "490C91AC-9437-43DA-99AF-0DF8A0E5EEB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "22913221-9B69-451A-8442-C65091DFAFD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "1488A64D-E0ED-4E88-92E9-D8E38A2CB080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "9FF58049-7F1B-425B-A2A7-5974080625F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4DA72515-66E1-4811-ADDA-B2F9B6A4B737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "606C631F-5A30-4A07-A761-29B31D09C66A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "0DA2A011-FAE4-4741-AA37-1F4F17471381" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0B57A678-E534-472C-8B45-F6A1E027248C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.6.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "2D748B16-1C2A-4E00-807F-647569C271D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "853866E2-1BCC-4A81-907A-ABA8648D8C57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9B0B5925-0336-4F56-9D9A-777687DF3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F406CDA3-08B9-4C13-B6F5-C83978239623" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:6.7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "108BFA85-BB6B-420A-911D-B2731CB05289" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0FEE4092-0EAD-48DA-92EB-82DD4EB43E49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8DF2E2-848A-4616-AEF0-1EFE68A900C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "387E34BD-913B-4CB7-9230-81B283E92A9B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FFE8B3DC-9865-4845-B989-FB41D6FE085E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "BC98B2C9-2F78-4DB5-97D7-78D584CEBE87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "44CEED06-6E18-4961-BD69-8BF3E7A6D59C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "D815D562-D60A-4AD1-9243-8167B244882E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FA91AC4A-77D5-4C41-BD63-4E8F3BA4FF84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "A5808D1C-6D6E-403D-8904-147B66B50385" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "FD9A750B-7C84-484C-94F3-FB66EF6296E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "62950A6C-8467-4215-BCD1-010B8C491714" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.0.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "6D97494F-BA89-4E95-A01F-C2CE02505A27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "21D28D33-2B3C-4695-9137-7C4AC6BA2D7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3DCA8FE8-D0BC-4B6C-8E15-0DC5D0EF515F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "62213974-B025-4A76-87CD-025C84389A2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "A876A2A0-0973-481C-A63A-1A5761015308" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E6671431-4FE3-4D7D-9F46-445A1A6B7EEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E2757987-7648-4BE1-AE91-99F1FC95C8C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "841C3C05-7289-46CC-A610-5A5BFC81FD42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "91599B30-27D5-450A-A565-A65BF940C30C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "71802FFD-A173-4F21-87C8-495D8F95A176" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8B9CD6DE-EE1E-4FF4-8DF5-7F9DA36AFCFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E0EF1B4E-3E42-4C42-9981-2BC17F22BA2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "30E26E7E-F6D8-4A89-85F7-42FCB0E37AD6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E2A7E707-6CBB-42E3-BE90-72E835156DB9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "4BB537CA-0E37-471E-8DD3-7710A443224A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F9022BCA-EDBF-4FD1-B427-573CA07E5134" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "23BA0BE4-B06D-45AE-9C9D-280F1BFA7EDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "3B79ABCC-C95B-45AB-BE9D-454BD8174651" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A4FD7D25-704B-47EB-AF36-DC684AD07807" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.2.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3D33E431-39F5-4F73-99A1-19A05A594C90" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7A6F69A3-E15F-43C9-8B9C-A30E057C4FD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "602535DE-ED32-4805-85EF-940955459B34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "17727E39-1612-4433-AC23-CBC852B392C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D5894CEC-AB1C-44F2-A977-FE74897A24A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "579DC0CE-1CEA-449F-BF76-AD7087573ACD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB3E28C0-675B-4C30-B248-BE1EB5E961C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_management_center:7.4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2C7E7A89-A9CA-45DA-8378-A50B1F9D260E" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-dhJxQYZs", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21099.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21099.json index 4aced42933a..872aa728e28 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21099.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21099.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21099", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:30.723", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-10-31T19:35:02.343", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json b/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json index 41144839f1d..89b30010659 100644 --- a/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json +++ b/CVE-2024/CVE-2024-240xx/CVE-2024-24093.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24093", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-12T21:15:58.370", - "lastModified": "2024-03-13T12:33:51.697", + "lastModified": "2024-10-31T20:35:03.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en Code-projects Scholars Tracking System 1.0 permite a atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de informaci\u00f3n de actualizaci\u00f3n de informaci\u00f3n personal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2024-24093/blob/main/CVE-10", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27279.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27279.json index 9e42fcc3867..53591bee9f1 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27279.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27279.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27279", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-12T09:15:10.070", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-10-31T19:35:03.510", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de Directory traversal en a-blog cms Serie Ver.3.1.x Ver.3.1.9 y anteriores, Serie Ver.3.0.x Ver.3.0.30 y anteriores, Serie Ver.2.11.x Ver.2.11.59 y anteriores, Serie Ver.2.10.x Ver.2.10.51 y anteriores, y Ver.2.9 y versiones anteriores. Si se explota esta vulnerabilidad, un usuario con privilegios de editor o superiores que pueda iniciar sesi\u00f3n en el producto puede obtener archivos arbitrarios en el servidor, incluidos archivos de contrase\u00f1as." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://developer.a-blogcms.jp/blog/news/JVN-48443978.html", diff --git a/CVE-2024/CVE-2024-283xx/CVE-2024-28303.json b/CVE-2024/CVE-2024-283xx/CVE-2024-28303.json index 10cbba7e0eb..915bb9b220c 100644 --- a/CVE-2024/CVE-2024-283xx/CVE-2024-28303.json +++ b/CVE-2024/CVE-2024-283xx/CVE-2024-28303.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28303", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-19T19:15:06.913", - "lastModified": "2024-03-20T13:00:16.367", + "lastModified": "2024-10-31T19:35:06.587", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Open Source Medicine Ordering System v1.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro de fecha en /admin/reports/index.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/onurkarasalihoglu/vulnerability-disclosures/blob/main/omos-sql-injection.md", diff --git a/CVE-2024/CVE-2024-35xx/CVE-2024-3592.json b/CVE-2024/CVE-2024-35xx/CVE-2024-3592.json index 882cf0fbe19..7b0fadcf387 100644 --- a/CVE-2024/CVE-2024-35xx/CVE-2024-3592.json +++ b/CVE-2024/CVE-2024-35xx/CVE-2024-3592.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3592", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T06:15:10.960", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:40:34.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.0.2", + "matchCriteriaId": "57725447-AB0A-4B25-BB23-9292AFA5FB01" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3097878/quiz-master-next/trunk/php/admin/options-page-questions-tab.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc085413-db43-43e3-9b60-aeb341eed4e1?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37162.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37162.json index da83ba929d2..91296cba28d 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37162.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37162.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37162", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-07T15:15:50.617", - "lastModified": "2024-06-07T19:24:09.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-31T19:43:26.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:idopesok:zsa:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.3.3", + "matchCriteriaId": "4DDAA2C4-0E79-46B0-BE82-73B86D8B383A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/IdoPesok/zsa/commit/86b86b282bde6780963f62406cc8bc65f2c86f3a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/IdoPesok/zsa/security/advisories/GHSA-wjmj-h3xc-hxp8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json new file mode 100644 index 00000000000..b3af7eeee7f --- /dev/null +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39332.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39332", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:12.897", + "lastModified": "2024-10-31T19:15:12.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Webswing 23.2.2 allows remote attackers to modify client-side JavaScript code to achieve path traversal, likely leading to remote code execution via modification of shell scripts on the server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://herolab.usd.de/security-advisories/usd-2024-0008/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json new file mode 100644 index 00000000000..7114ff58c26 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39719.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39719", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T20:15:04.770", + "lastModified": "2024-10-31T20:15:04.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Ollama through 0.3.14. File existence disclosure can occur via api/create. When calling the CreateModel route with a path parameter that does not exist, it reflects the \"File does not exist\" error message to the attacker, providing a primitive for file existence on the server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json new file mode 100644 index 00000000000..e7747d410cf --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39720.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-39720", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T20:15:04.877", + "lastModified": "2024-10-31T20:15:04.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Ollama before 0.1.46. An attacker can use two HTTP requests to upload a malformed GGUF file containing just 4 bytes starting with the GGUF custom magic header. By leveraging a custom Modelfile that includes a FROM statement pointing to the attacker-controlled blob file, the attacker can crash the application through the CreateModel route, leading to a segmentation fault (signal SIGSEGV: segmentation violation)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ollama/ollama/compare/v0.1.45...v0.1.46#diff-782c2737eecfa83b7cb46a77c8bdaf40023e7067baccd4f806ac5517b4563131L417", + "source": "cve@mitre.org" + }, + { + "url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json new file mode 100644 index 00000000000..58a0e68da92 --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39721.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-39721", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T20:15:04.993", + "lastModified": "2024-10-31T20:15:04.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Ollama before 0.1.34. The CreateModelHandler function uses os.Open to read a file until completion. The req.Path parameter is user-controlled and can be set to /dev/random, which is blocking, causing the goroutine to run infinitely (even after the HTTP request is aborted by the client)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ollama/ollama/blob/9164b0161bcb24e543cba835a8863b80af2c0c21/server/routes.go#L557", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ollama/ollama/blob/adeb40eaf29039b8964425f69a9315f9f1694ba8/server/routes.go#L536", + "source": "cve@mitre.org" + }, + { + "url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json new file mode 100644 index 00000000000..d0959f88eeb --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39722.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39722", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T20:15:05.080", + "lastModified": "2024-10-31T20:15:05.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Ollama before 0.1.46. It exposes which files exist on the server on which it is deployed via path traversal in the api/push route." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://oligosecurity.webflow.io/blog/more-models-more-probllms", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40457.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40457.json index a4ed22656a7..d81119a9927 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40457.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40457.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40457", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-12T14:16:06.780", - "lastModified": "2024-10-24T17:35:07.660", + "lastModified": "2024-10-31T20:15:05.173", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -59,6 +59,10 @@ } ], "references": [ + { + "url": "https://github.com/jeppojeps/CVE-2024-40457-PoC", + "source": "cve@mitre.org" + }, { "url": "https://www.noip.com/support/knowledgebase/install-linux-3-x-dynamic-update-client-duc", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json new file mode 100644 index 00000000000..544ca288281 --- /dev/null +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42515.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-42515", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:12.983", + "lastModified": "2024-10-31T19:15:12.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Glossarizer through 1.5.2 improperly tries to convert text into HTML. Even though the application itself escapes special characters (e.g., <>), the underlying library converts these encoded characters into legitimate HTML, thereby possibly causing stored XSS. Attackers can append a XSS payload to a word that has a corresponding glossary entry." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/PebbleRoad/glossarizer", + "source": "cve@mitre.org" + }, + { + "url": "https://herolab.usd.de/security-advisories/usd-2024-0011/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.npmjs.com/package/glossarizer", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json index 73400f4c647..2e0738a125b 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42835.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42835", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T14:15:05.610", - "lastModified": "2024-10-31T14:15:05.610", + "lastModified": "2024-10-31T19:35:08.113", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "langflow v1.0.12 was discovered to contain a remote code execution (RCE) vulnerability via the PythonCodeTool component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://github.com/langflow-ai/langflow/issues/2908", diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json index c0f81c8ff8d..1ff96121fdf 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42934.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42934", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T05:15:13.270", - "lastModified": "2024-10-10T12:51:56.987", + "lastModified": "2024-10-31T20:35:05.250", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "OpenIPMI anterior a 2.0.36 tiene un acceso a una matriz fuera de los l\u00edmites (para el tipo de autenticaci\u00f3n) en el simulador ipmi_sim, lo que resulta en una denegaci\u00f3n de servicio o (con muy baja probabilidad) en la omisi\u00f3n de la autenticaci\u00f3n o la ejecuci\u00f3n del c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2308375", diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45165.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45165.json index 1872b280ab4..2b1f87be602 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45165.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45165.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45165", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-22T04:15:22.310", - "lastModified": "2024-08-22T12:48:02.790", + "lastModified": "2024-10-31T19:35:08.327", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en UCI IDOL 2 (tambi\u00e9n conocido como uciIDOL o IDOL2) hasta 2.12. Los datos se env\u00edan entre el cliente y el servidor con cifrado. Sin embargo, la clave se deriva de la cadena \"(c)2007 UCI Software GmbH B.Boll\" (sin comillas). La clave es est\u00e1tica y est\u00e1 codificada. Con el acceso a los mensajes, esto da como resultado que un atacante descifre y cifre los mensajes. Por lo tanto, permite ataques de intermediario pasivos y activos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "http://download.uci.de/idol2/idol2Client_2_12.exe", diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46544.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46544.json index 39f96d931ed..1f4224eac5e 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46544.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46544.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46544", "sourceIdentifier": "security@apache.org", "published": "2024-09-23T11:15:10.563", - "lastModified": "2024-09-26T13:32:55.343", + "lastModified": "2024-10-31T20:35:06.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La vulnerabilidad de permisos predeterminados incorrectos en los conectores Apache Tomcat permite a los usuarios locales ver y modificar la memoria compartida que contiene la configuraci\u00f3n de mod_jk, lo que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la denegaci\u00f3n de servicio. Este problema afecta a los conectores Apache Tomcat: desde la versi\u00f3n 1.2.9-beta hasta la 1.2.49. Solo se ve afectado mod_jk en sistemas tipo Unix. Ni el redirector ISAPI ni mod_jk en Windows se ven afectados. Se recomienda a los usuarios que actualicen a la versi\u00f3n 1.2.50, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json new file mode 100644 index 00000000000..44f7fc0bac3 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48200.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48200", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.150", + "lastModified": "2024-10-31T19:15:13.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in MobaXterm v24.2 allows a local attacker to escalate privileges and execute arbitrary code via the remove function of the MobaXterm MSI is spawning one Administrative cmd (conhost.exe)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/ahmedsherif/ad56cd3a9ef86cdc05175fb591804c64", + "source": "cve@mitre.org" + }, + { + "url": "https://mobaxterm.mobatek.net/download-home-edition.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json index dd563cf2004..8c2740aa0d4 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48307.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48307", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T01:15:14.803", - "lastModified": "2024-10-31T01:15:14.803", + "lastModified": "2024-10-31T19:35:09.203", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que JeecgBoot v3.7.1 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente /onlDragDatasetHead/getTotalData." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/jeecgboot", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json index 5f59a7484ec..650a2570a36 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48346.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48346", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.450", - "lastModified": "2024-10-30T21:15:14.450", + "lastModified": "2024-10-31T19:35:10.023", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "xtreme1 <= v0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability in the /api/data/upload path. The vulnerability is triggered through the fileUrl parameter, which allows an attacker to make arbitrary requests to internal or external systems." + }, + { + "lang": "es", + "value": "xtreme1 <= v0.9.1 contiene una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta /api/data/upload. La vulnerabilidad se activa a trav\u00e9s del par\u00e1metro fileUrl, que permite a un atacante realizar solicitudes arbitrarias a sistemas internos o externos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/xtreme1-io/xtreme1/issues/284", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json new file mode 100644 index 00000000000..fcf98dcf1d0 --- /dev/null +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48359.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48359", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T20:15:05.340", + "lastModified": "2024-10-31T20:15:05.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Qualitor v8.24 was discovered to contain a remote code execution (RCE) vulnerability via the gridValoresPopHidden parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OpenXP-Research/CVE-2024-48359", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json new file mode 100644 index 00000000000..0c4ade49371 --- /dev/null +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48360.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48360", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T20:15:05.420", + "lastModified": "2024-10-31T20:15:05.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OpenXP-Research/CVE-2024-48360", + "source": "cve@mitre.org" + }, + { + "url": "https://www.qualitor.com.br/qualitor-8-20", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json index 7371a32b78a..41d9ea6d17a 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48735.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48735", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.620", - "lastModified": "2024-10-30T21:15:14.620", + "lastModified": "2024-10-31T20:35:06.767", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal in /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} in SAS Studio 9.4 allows remote attacker to access internal files by manipulating default path during file download." + }, + { + "lang": "es", + "value": "Directory Traversal en /SASStudio/sasexec/sessions/{sessionID}/workspace/{InternalPath} en SAS Studio 9.4 permite a un atacante remoto acceder a archivos internos manipulando la ruta predeterminada durante la descarga de archivos." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://sas.com", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json index 5c9a4237c26..57b66f12104 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json @@ -2,13 +2,13 @@ "id": "CVE-2024-48955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T18:15:05.690", - "lastModified": "2024-10-30T15:35:22.063", + "lastModified": "2024-10-31T20:15:05.530", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In NetAdmin 4.0.30319, an attacker can steal a valid session cookie and inject it into another device, granting unauthorized access. This type of attack is commonly referred to as session hijacking." + "value": "Broken access control in NetAdmin 4.030319 returns data with functionalities on the endpoint that \"assembles\" the functionalities menus, the return of this call is not encrypted and as the system does not validate the session authorization, an attacker can copy the content of the browser of a user with greater privileges having access to the functionalities of the user that the code was copied." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json index 948d43e588e..75664b99e1e 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50356.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50356", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-31T18:15:05.750", - "lastModified": "2024-10-31T18:15:05.750", + "lastModified": "2024-10-31T20:35:07.840", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 0.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json new file mode 100644 index 00000000000..ac32b8ad5ed --- /dev/null +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50801", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.313", + "lastModified": "2024-10-31T19:15:13.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/collections.php. The vulnerability is exploitable via the id parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/abantecart/abantecart-src", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json new file mode 100644 index 00000000000..9a6052f8b56 --- /dev/null +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50802", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.413", + "lastModified": "2024-10-31T19:15:13.413", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/email_templates.php. The vulnerability is exploitable via the id parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/abantecart/abantecart-src", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json new file mode 100644 index 00000000000..e585648508a --- /dev/null +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51060.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51060", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.500", + "lastModified": "2024-10-31T19:15:13.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Projectworlds Online Admission System v1 is vulnerable to SQL Injection in index.php via the 'a_id' parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://projectworld.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51060", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json new file mode 100644 index 00000000000..fec0a2a5fa0 --- /dev/null +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51063.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51063", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.610", + "lastModified": "2024-10-31T19:15:13.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection in add-teacher.php via the mobile number or email parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://phpgurukul.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51063", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json new file mode 100644 index 00000000000..8da07cb5180 --- /dev/null +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51064.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51064", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.700", + "lastModified": "2024-10-31T19:15:13.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Phpgurukul Teachers Record Management System v2.1 is vulnerable to SQL Injection via the tid parameter to admin/queries.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://phpgurukul.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51064", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json new file mode 100644 index 00000000000..c83bbf42a9f --- /dev/null +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51065.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51065", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.780", + "lastModified": "2024-10-31T19:15:13.780", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Phpgurukul Beauty Parlour Management System v1.1 is vulnerable to SQL Injection in admin/index.php via the the username parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://phpgurukul.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51065", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json new file mode 100644 index 00000000000..bbb9e62c94a --- /dev/null +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51066.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51066", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-31T19:15:13.860", + "lastModified": "2024-10-31T19:15:13.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Insecure Direct Object Reference (IDOR) vulnerability in appointment-detail.php in Phpgurukul's Beauty Parlour Management System v1.1 allows unauthorized access to the Personally Identifiable Information (PII) of other customers." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://phpgurukul.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/0x1c1ph3r/CVEs/tree/main/CVE-2024-51066", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json index acc95a041ba..e1402dd8886 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51255.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51255", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T16:15:06.033", - "lastModified": "2024-10-31T16:15:06.033", + "lastModified": "2024-10-31T19:35:10.837", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the ruequest_certificate function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json index 548c36dcc3c..f942b326f12 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51259.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51259", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T14:15:06.260", - "lastModified": "2024-10-31T14:15:06.260", + "lastModified": "2024-10-31T19:35:11.680", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the setup_cacertificate function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json index 3f3b5b72fc4..76b3e88da13 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51260.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51260", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T16:15:06.113", - "lastModified": "2024-10-31T16:15:06.113", + "lastModified": "2024-10-31T19:35:12.607", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the acme_process function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/README.md b/README.md index d6e4a78feb0..617114efa40 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-31T19:00:20.333660+00:00 +2024-10-31T21:00:20.265569+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-31T18:48:20.883000+00:00 +2024-10-31T20:35:07.840000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267742 +267761 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `19` -- [CVE-2024-50347](CVE-2024/CVE-2024-503xx/CVE-2024-50347.json) (`2024-10-31T18:15:05.600`) -- [CVE-2024-50356](CVE-2024/CVE-2024-503xx/CVE-2024-50356.json) (`2024-10-31T18:15:05.750`) -- [CVE-2024-51430](CVE-2024/CVE-2024-514xx/CVE-2024-51430.json) (`2024-10-31T17:15:13.403`) -- [CVE-2024-51478](CVE-2024/CVE-2024-514xx/CVE-2024-51478.json) (`2024-10-31T17:15:13.500`) -- [CVE-2024-51481](CVE-2024/CVE-2024-514xx/CVE-2024-51481.json) (`2024-10-31T17:15:13.723`) -- [CVE-2024-51482](CVE-2024/CVE-2024-514xx/CVE-2024-51482.json) (`2024-10-31T18:15:05.997`) -- [CVE-2024-7883](CVE-2024/CVE-2024-78xx/CVE-2024-7883.json) (`2024-10-31T17:15:14.013`) +- [CVE-2023-52044](CVE-2023/CVE-2023-520xx/CVE-2023-52044.json) (`2024-10-31T19:15:12.347`) +- [CVE-2023-52045](CVE-2023/CVE-2023-520xx/CVE-2023-52045.json) (`2024-10-31T19:15:12.450`) +- [CVE-2024-10573](CVE-2024/CVE-2024-105xx/CVE-2024-10573.json) (`2024-10-31T19:15:12.540`) +- [CVE-2024-39332](CVE-2024/CVE-2024-393xx/CVE-2024-39332.json) (`2024-10-31T19:15:12.897`) +- [CVE-2024-39719](CVE-2024/CVE-2024-397xx/CVE-2024-39719.json) (`2024-10-31T20:15:04.770`) +- [CVE-2024-39720](CVE-2024/CVE-2024-397xx/CVE-2024-39720.json) (`2024-10-31T20:15:04.877`) +- [CVE-2024-39721](CVE-2024/CVE-2024-397xx/CVE-2024-39721.json) (`2024-10-31T20:15:04.993`) +- [CVE-2024-39722](CVE-2024/CVE-2024-397xx/CVE-2024-39722.json) (`2024-10-31T20:15:05.080`) +- [CVE-2024-42515](CVE-2024/CVE-2024-425xx/CVE-2024-42515.json) (`2024-10-31T19:15:12.983`) +- [CVE-2024-48200](CVE-2024/CVE-2024-482xx/CVE-2024-48200.json) (`2024-10-31T19:15:13.150`) +- [CVE-2024-48359](CVE-2024/CVE-2024-483xx/CVE-2024-48359.json) (`2024-10-31T20:15:05.340`) +- [CVE-2024-48360](CVE-2024/CVE-2024-483xx/CVE-2024-48360.json) (`2024-10-31T20:15:05.420`) +- [CVE-2024-50801](CVE-2024/CVE-2024-508xx/CVE-2024-50801.json) (`2024-10-31T19:15:13.313`) +- [CVE-2024-50802](CVE-2024/CVE-2024-508xx/CVE-2024-50802.json) (`2024-10-31T19:15:13.413`) +- [CVE-2024-51060](CVE-2024/CVE-2024-510xx/CVE-2024-51060.json) (`2024-10-31T19:15:13.500`) +- [CVE-2024-51063](CVE-2024/CVE-2024-510xx/CVE-2024-51063.json) (`2024-10-31T19:15:13.610`) +- [CVE-2024-51064](CVE-2024/CVE-2024-510xx/CVE-2024-51064.json) (`2024-10-31T19:15:13.700`) +- [CVE-2024-51065](CVE-2024/CVE-2024-510xx/CVE-2024-51065.json) (`2024-10-31T19:15:13.780`) +- [CVE-2024-51066](CVE-2024/CVE-2024-510xx/CVE-2024-51066.json) (`2024-10-31T19:15:13.860`) ### CVEs modified in the last Commit -Recently modified CVEs: `44` +Recently modified CVEs: `49` -- [CVE-2024-34002](CVE-2024/CVE-2024-340xx/CVE-2024-34002.json) (`2024-10-31T18:35:12.750`) -- [CVE-2024-34537](CVE-2024/CVE-2024-345xx/CVE-2024-34537.json) (`2024-10-31T17:15:12.903`) -- [CVE-2024-35989](CVE-2024/CVE-2024-359xx/CVE-2024-35989.json) (`2024-10-31T18:35:12.980`) -- [CVE-2024-37763](CVE-2024/CVE-2024-377xx/CVE-2024-37763.json) (`2024-10-31T18:35:13.207`) -- [CVE-2024-40680](CVE-2024/CVE-2024-406xx/CVE-2024-40680.json) (`2024-10-31T17:15:12.990`) -- [CVE-2024-40681](CVE-2024/CVE-2024-406xx/CVE-2024-40681.json) (`2024-10-31T17:15:13.143`) -- [CVE-2024-4468](CVE-2024/CVE-2024-44xx/CVE-2024-4468.json) (`2024-10-31T18:40:45.817`) -- [CVE-2024-46528](CVE-2024/CVE-2024-465xx/CVE-2024-46528.json) (`2024-10-31T17:15:13.250`) -- [CVE-2024-4661](CVE-2024/CVE-2024-46xx/CVE-2024-4661.json) (`2024-10-31T18:21:43.683`) -- [CVE-2024-47640](CVE-2024/CVE-2024-476xx/CVE-2024-47640.json) (`2024-10-31T17:39:28.907`) -- [CVE-2024-48213](CVE-2024/CVE-2024-482xx/CVE-2024-48213.json) (`2024-10-31T18:35:14.040`) -- [CVE-2024-48569](CVE-2024/CVE-2024-485xx/CVE-2024-48569.json) (`2024-10-31T18:35:14.873`) -- [CVE-2024-48646](CVE-2024/CVE-2024-486xx/CVE-2024-48646.json) (`2024-10-31T18:35:15.693`) -- [CVE-2024-48647](CVE-2024/CVE-2024-486xx/CVE-2024-48647.json) (`2024-10-31T18:35:16.527`) -- [CVE-2024-48648](CVE-2024/CVE-2024-486xx/CVE-2024-48648.json) (`2024-10-31T17:35:03.713`) -- [CVE-2024-49643](CVE-2024/CVE-2024-496xx/CVE-2024-49643.json) (`2024-10-31T18:48:20.883`) -- [CVE-2024-49645](CVE-2024/CVE-2024-496xx/CVE-2024-49645.json) (`2024-10-31T17:59:25.867`) -- [CVE-2024-50074](CVE-2024/CVE-2024-500xx/CVE-2024-50074.json) (`2024-10-31T18:23:21.567`) -- [CVE-2024-5087](CVE-2024/CVE-2024-50xx/CVE-2024-5087.json) (`2024-10-31T18:26:54.500`) -- [CVE-2024-5613](CVE-2024/CVE-2024-56xx/CVE-2024-5613.json) (`2024-10-31T18:31:30.757`) -- [CVE-2024-5638](CVE-2024/CVE-2024-56xx/CVE-2024-5638.json) (`2024-10-31T18:38:33.640`) -- [CVE-2024-5823](CVE-2024/CVE-2024-58xx/CVE-2024-5823.json) (`2024-10-31T18:05:00.637`) -- [CVE-2024-7042](CVE-2024/CVE-2024-70xx/CVE-2024-7042.json) (`2024-10-31T18:36:30.140`) -- [CVE-2024-7472](CVE-2024/CVE-2024-74xx/CVE-2024-7472.json) (`2024-10-31T18:46:32.497`) -- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-10-31T17:15:14.250`) +- [CVE-2024-20264](CVE-2024/CVE-2024-202xx/CVE-2024-20264.json) (`2024-10-31T19:04:42.863`) +- [CVE-2024-20269](CVE-2024/CVE-2024-202xx/CVE-2024-20269.json) (`2024-10-31T19:35:03.420`) +- [CVE-2024-20273](CVE-2024/CVE-2024-202xx/CVE-2024-20273.json) (`2024-10-31T19:09:24.687`) +- [CVE-2024-20298](CVE-2024/CVE-2024-202xx/CVE-2024-20298.json) (`2024-10-31T19:25:31.523`) +- [CVE-2024-20364](CVE-2024/CVE-2024-203xx/CVE-2024-20364.json) (`2024-10-31T19:36:32.277`) +- [CVE-2024-20415](CVE-2024/CVE-2024-204xx/CVE-2024-20415.json) (`2024-10-31T19:17:54.273`) +- [CVE-2024-21099](CVE-2024/CVE-2024-210xx/CVE-2024-21099.json) (`2024-10-31T19:35:02.343`) +- [CVE-2024-24093](CVE-2024/CVE-2024-240xx/CVE-2024-24093.json) (`2024-10-31T20:35:03.523`) +- [CVE-2024-27279](CVE-2024/CVE-2024-272xx/CVE-2024-27279.json) (`2024-10-31T19:35:03.510`) +- [CVE-2024-28303](CVE-2024/CVE-2024-283xx/CVE-2024-28303.json) (`2024-10-31T19:35:06.587`) +- [CVE-2024-3592](CVE-2024/CVE-2024-35xx/CVE-2024-3592.json) (`2024-10-31T19:40:34.747`) +- [CVE-2024-37162](CVE-2024/CVE-2024-371xx/CVE-2024-37162.json) (`2024-10-31T19:43:26.800`) +- [CVE-2024-40457](CVE-2024/CVE-2024-404xx/CVE-2024-40457.json) (`2024-10-31T20:15:05.173`) +- [CVE-2024-42835](CVE-2024/CVE-2024-428xx/CVE-2024-42835.json) (`2024-10-31T19:35:08.113`) +- [CVE-2024-42934](CVE-2024/CVE-2024-429xx/CVE-2024-42934.json) (`2024-10-31T20:35:05.250`) +- [CVE-2024-45165](CVE-2024/CVE-2024-451xx/CVE-2024-45165.json) (`2024-10-31T19:35:08.327`) +- [CVE-2024-46544](CVE-2024/CVE-2024-465xx/CVE-2024-46544.json) (`2024-10-31T20:35:06.390`) +- [CVE-2024-48307](CVE-2024/CVE-2024-483xx/CVE-2024-48307.json) (`2024-10-31T19:35:09.203`) +- [CVE-2024-48346](CVE-2024/CVE-2024-483xx/CVE-2024-48346.json) (`2024-10-31T19:35:10.023`) +- [CVE-2024-48735](CVE-2024/CVE-2024-487xx/CVE-2024-48735.json) (`2024-10-31T20:35:06.767`) +- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-31T20:15:05.530`) +- [CVE-2024-50356](CVE-2024/CVE-2024-503xx/CVE-2024-50356.json) (`2024-10-31T20:35:07.840`) +- [CVE-2024-51255](CVE-2024/CVE-2024-512xx/CVE-2024-51255.json) (`2024-10-31T19:35:10.837`) +- [CVE-2024-51259](CVE-2024/CVE-2024-512xx/CVE-2024-51259.json) (`2024-10-31T19:35:11.680`) +- [CVE-2024-51260](CVE-2024/CVE-2024-512xx/CVE-2024-51260.json) (`2024-10-31T19:35:12.607`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0c3ebed038d..f49fe65cbbb 100644 --- a/_state.csv +++ b/_state.csv @@ -73275,27 +73275,27 @@ CVE-2014-9800,0,0,5a5a4caa864f170145d3d3c2cef91d6a105d9c27e5979024bb27b2243fcae0 CVE-2014-9801,0,0,1632540904b59372b0937a913ed314f49f06e11045ff36a91a4ed621725d10dd,2016-11-28T19:15:01.527000 CVE-2014-9802,0,0,c812564621033150916f42aac79f2698926d15b085312424d75021440bbff317,2016-11-28T19:15:03.480000 CVE-2014-9803,0,0,a2478c6d1e6f3041773bb070f3f3b9904a1d7b690d9a97506297f13ed8f70f2f,2016-07-12T13:52:16.203000 -CVE-2014-9804,0,0,ad4dedba68bd3053f066b8b1f0d89c444bfdf38c3b7a5ea4946f4d3bb2d7650e,2017-04-03T14:22:18.733000 -CVE-2014-9805,0,0,330da34b38d54ee62f8d3cf6a2a933971ddb744855dc603f2fa7d443a4de7e11,2017-04-04T15:31:36.767000 -CVE-2014-9806,0,0,e21b133a5eac0a80ab22760c2f60c3237696daddf986c70e40d2f09bb85fb286,2017-04-04T15:33:36.053000 -CVE-2014-9807,0,0,df1f9a731df9a13615d1544ecfe138c76866a45dbda1835a7cff07f4c28d11e6,2017-04-04T15:34:05.697000 -CVE-2014-9808,0,0,b34a941f4ade405a5d28b62c2ee38a379b9f94272673d9dc2423a7d5c20d1d2e,2017-04-04T15:34:30.633000 -CVE-2014-9809,0,0,12677cc5ad11f3e1a5e13fe7ad563d74722dc9a2b15c4669d8de1739e5fead6b,2017-04-04T15:35:18.700000 -CVE-2014-9810,0,0,95525fdf158239b5a029c5300907655548f37d93c1b1fc4b23537e6b265d799a,2017-04-04T15:35:52.280000 -CVE-2014-9811,0,0,64870a14f9f7c3edcc13df1686d77917831b067b8c431bdfe2eb4e32b35287a6,2017-04-04T15:36:27.390000 -CVE-2014-9812,0,0,c25870f3a844dc9effe98495014f545d0b9e0fe6e63fff3d54bf1afa828cc885,2017-04-04T15:36:56.970000 -CVE-2014-9813,0,0,24e9e4082bdca46e8bfe4a98b1b5fadba694bb215207ff49458b5e75500141d4,2017-04-04T15:40:29.073000 -CVE-2014-9814,0,0,b85f938833a829768ab481fc9b95f84115a9026ee4b5b37ad1756bf9a83706c3,2017-04-04T15:40:49.197000 -CVE-2014-9815,0,0,a56dac9e5a9de69a8bd722e3a4a89dfba5ee981ca5c6a51444121f7dc5e8ee49,2017-04-04T15:37:35.503000 -CVE-2014-9816,0,0,adeeabc78eebb947eb6dc904a2c2e4e1a255d94259978f9334f024d244d0a7ef,2017-04-04T15:41:53.687000 -CVE-2014-9817,0,0,85a51fcd6a6ba0cee57abe66363e64849bfd4a278b8bd53b020f2a0b7b5961ef,2017-04-04T15:42:20.873000 -CVE-2014-9818,0,0,de2c45f22182a9991941376d08025f771ba33ce1e8ec37c2b37592ab70084179,2017-04-04T15:43:36.660000 -CVE-2014-9819,0,0,364c6cf57238651521357ba73a0f336d71e2c3d85553482f8934f8338ef3707b,2017-04-04T15:44:17.503000 -CVE-2014-9820,0,0,492552a29d67be31a426d74eb0bd40cb53b39064400431f5bfb7975015e1a0b5,2017-04-04T15:44:40.317000 -CVE-2014-9821,0,0,1758f5d664083d79525847eb41480da5bf9118e3b80e8fe8a0450868cf2993f2,2017-04-04T15:45:03.570000 -CVE-2014-9822,0,0,4aa3bd1a0fb69395bf79bbac626bcfc39d0b3f5497821d8e063fceeb00c3a0c8,2017-04-04T15:45:25.163000 -CVE-2014-9823,0,0,ddea5c479e0c8d1d994d5d9a2b99250d4536b667e5a3f79f06ec846411bb65c4,2017-04-06T13:13:37.330000 -CVE-2014-9824,0,0,0e30988fe3dcfc6859693e222c8b97c18513bdd5803e04b361fbef882073ebaa,2017-04-06T12:56:39.363000 +CVE-2014-9804,0,1,e91abc5317f3dd6a61d112140713bda18190887b23301502361db203e46f2fab,2024-10-31T19:52:55.157000 +CVE-2014-9805,0,1,8d799c79b4e98651438a627176de8797474805e051d27113e738c202cfc04ae5,2024-10-31T19:52:32.510000 +CVE-2014-9806,0,1,8f6683f5e43c1382008fefcd38f8207c37702af514d92e32647e90d503827408,2024-10-31T19:52:23.440000 +CVE-2014-9807,0,1,acdcdb0ba1d877ac849da63c95f360a3e65ef13f63c8f66cd7665ef51028adf4,2024-10-31T19:50:31.553000 +CVE-2014-9808,0,1,3c866a8f8f5402b2b473b204e6ea72eae1bace3708bdc9b228029e8be3a19348,2024-10-31T19:49:00.877000 +CVE-2014-9809,0,1,e8edd4040de62a49eeca10486192e0abc4a4e1fbfb79000c3b5d730fe0dcdd19,2024-10-31T19:53:30.847000 +CVE-2014-9810,0,1,a86ff86bbf2c4dce78f36c2647f40c802873f4e9cefb05b5ea585a36b18e46d0,2024-10-31T19:53:36.977000 +CVE-2014-9811,0,1,62917c172530c17be604a34be9376a3c8e6cc75283d4fc8f7cd41ef43c8717e7,2024-10-31T19:53:42.617000 +CVE-2014-9812,0,1,4d17d93ae70bd0f61ebab65bfcaf28a9cb8429747704dcef47ad7aecaa91b626,2024-10-31T19:53:49.987000 +CVE-2014-9813,0,1,d2267edf875d3e0bdff891b5d576381d4d47e20482ad1aa00ebe9e4312faffdb,2024-10-31T19:53:55.630000 +CVE-2014-9814,0,1,473ecd328284cb333a1d54bf92d641f8df49a55a689505600aa001a90e5782c9,2024-10-31T19:54:43.970000 +CVE-2014-9815,0,1,366903ea62fc4fc1cdc40c7cd554f2e23f25655b223404cbf14bf0d3a26ba32b,2024-10-31T19:55:48.687000 +CVE-2014-9816,0,1,b5594db52659d9a21d2cc7fcd8fbd17bec3a74fdbcf5fc7c35a6091f2e08ecbe,2024-10-31T19:55:54.603000 +CVE-2014-9817,0,1,10c6f791006f3a8ac3773bc23ec6540b11d82c81f3f8828b8bc8db0cd43fac6d,2024-10-31T19:56:03.530000 +CVE-2014-9818,0,1,dc423dfd595b96cbfa7a1ebd05ea5b0a421ac36bd0a24e14e9c6b4502c52f798,2024-10-31T19:56:08.477000 +CVE-2014-9819,0,1,473793bf658321322268d488fa2c67a6b33786ace725e10e292edfbb2698f7a2,2024-10-31T19:56:16.343000 +CVE-2014-9820,0,1,315f84d6e11a761cad3cb3d42be0d251c84b1b2c5aa2677bf149d91cb2996bae,2024-10-31T19:56:38.033000 +CVE-2014-9821,0,1,a10b48c2cb08a38b661a78e7ffe89d9338aaea4c031262e788484d74d6c19610,2024-10-31T19:56:44.357000 +CVE-2014-9822,0,1,1b7a686e93975c0ed2ea9590e1f4a4becfcc480eb5e7c0da7b10f83a3454a55b,2024-10-31T19:56:51.983000 +CVE-2014-9823,0,1,5b4f713b1aa371727f052d1e24491ccb5acf554c78179b76d7033ebe478b1155,2024-10-31T19:56:59.013000 +CVE-2014-9824,0,1,a381cf0247b001d2b073d67346571aa1dc1560c09759e173df27875b30a4c9c9,2024-10-31T19:57:06.380000 CVE-2014-9825,0,0,8237657f1bc545991336e8373e80d977dec8ae49fdc4a04e44914118dadb3791,2017-04-10T22:31:05.007000 CVE-2014-9826,0,0,860ab0020773466be74236a4548947dce8cf843f8de8cac7e27b4d6c73bb939a,2017-04-04T15:09:57.817000 CVE-2014-9827,0,0,ca945600dc5be9a5edda22d9a67746fe77c869edcce014d962be9a7759e736ab,2017-08-08T16:22:13.923000 @@ -153325,7 +153325,7 @@ CVE-2020-22533,0,0,8cf73333b4ebcde6d608738a7182e3a0c8935887ec73faac29a965d055d3e CVE-2020-22535,0,0,3d39b81bb0c64f73d36642872de8b40a5e64321679c1a0ef90beeaf09e6bae1a,2021-07-13T18:58:42.140000 CVE-2020-22539,0,0,15bbe4ba3bc7be73f3da6475e511295156ebfd2ea390b950930b64bf8492d8d8,2024-08-22T19:35:00.877000 CVE-2020-2254,0,0,e7830526f9ccb1eacc81ed0b7e7bba867a9db0d3b245b1c38b997be50037937f,2023-10-25T18:16:39.377000 -CVE-2020-22540,0,1,2fb8725f767918adecfe8cb48c4fc4a0c7e6d2066fd5ddbbd756e7f2dae8c28d,2024-10-31T18:35:00.647000 +CVE-2020-22540,0,0,2fb8725f767918adecfe8cb48c4fc4a0c7e6d2066fd5ddbbd756e7f2dae8c28d,2024-10-31T18:35:00.647000 CVE-2020-2255,0,0,38e94953c094aa7fe06618634ee9c7f217363a9813b7dc4898775e41721a0fda,2023-10-25T18:16:39.430000 CVE-2020-22550,0,0,b2541e5db171a2b4b2a6b543f805ad79596e468be356d0e2f4c25df75af7bda5,2021-01-06T20:18:38.987000 CVE-2020-22552,0,0,448e4b0e2dc89c0747016e9852b20e9a1bad400b91a89d483e626626c874899c,2024-02-14T01:17:43.863000 @@ -187361,7 +187361,7 @@ CVE-2021-47435,0,0,d063dc53db995430cfda65e2466747fb8cd69b46d7ca5747554bea3cb1814 CVE-2021-47436,0,0,b07b3ca60638009afe7b8ad03ab6f8c7f867d2b372ffcdb5a5c46b33ba8a7bbb,2024-05-22T12:46:53.887000 CVE-2021-47437,0,0,c5633153b363975c954f650a3f16f0487d2c2be89412326f4804204a77330d89,2024-05-22T12:46:53.887000 CVE-2021-47438,0,0,8fc8c2f554fc412ce79ea1489c7728dd7270136493967e52dca18fb315318ceb,2024-05-22T12:46:53.887000 -CVE-2021-47439,0,1,deb4030b8ddd9f57e2809b987e15ae912806fd170e3bd972e39b8f64188da933,2024-10-31T18:35:01.573000 +CVE-2021-47439,0,0,deb4030b8ddd9f57e2809b987e15ae912806fd170e3bd972e39b8f64188da933,2024-10-31T18:35:01.573000 CVE-2021-47440,0,0,8f56806f540953d7423426b7ab25880635b68c589690247fc00393ff0efa2ea0,2024-05-22T12:46:53.887000 CVE-2021-47441,0,0,0f3b983feef84ab521b403aca7907c792115b545aee8b57acd22e8325593d7f9,2024-07-03T01:37:55.917000 CVE-2021-47442,0,0,ea327f347d948a1a55388d77debcd85955a3e437785ae68f3946bb6c997710a7,2024-05-22T12:46:53.887000 @@ -230475,7 +230475,7 @@ CVE-2023-40100,0,0,d865222f08aa85ede2d3681caf9207be6bcb8c87eca41307d9aef1926195b CVE-2023-40101,0,0,3ce51d90b0e7e589809d744dc88bb96b7c66c60685aebf47c83df3167c5dd843,2023-11-07T00:52:28.560000 CVE-2023-40103,0,0,450c3a391def7a8afcbefb17dfde1c695cebaffcfd18ba45db0f0094ffb67ee0,2024-02-02T03:14:29.707000 CVE-2023-40104,0,0,0cf270b8607bfa9d4e1d8714c505120c5fc75b5ddb276c75d9c23f91e95a9b08,2024-08-01T13:44:27.157000 -CVE-2023-40105,0,1,341bc94e60af694de4a4f122a999c4e6272d2c33c08a679715c8c4adab940e4b,2024-10-31T17:35:01.983000 +CVE-2023-40105,0,0,341bc94e60af694de4a4f122a999c4e6272d2c33c08a679715c8c4adab940e4b,2024-10-31T17:35:01.983000 CVE-2023-40106,0,0,0475b08be04d4153a33f08c726f5ef91351480d0fc8d62866c8273b0b5a46d11,2024-08-27T19:35:06.100000 CVE-2023-40107,0,0,9b5d8c411184c5b318513e2f9308b05cbf529a3dea80774c590446ec7489cece,2024-08-21T21:35:01.720000 CVE-2023-40109,0,0,418785915c5c782eaecea452fe3e0bcad27a28cd6d2cb7fa6c5725ebb93ef7e2,2024-08-16T16:35:00.740000 @@ -234579,7 +234579,7 @@ CVE-2023-45911,0,0,54489a6451274c125be8c762d8cc98dd3a8a21909c6da94287975a7cc96d5 CVE-2023-45912,0,0,b0bca1440f9e631c57e26e1e5113ad8d18938fc54eb7d0e4574e0ea800836ce0,2023-10-25T13:49:52.877000 CVE-2023-45913,0,0,2d4a210c00002764f5901b52e62a4b6fa406024d19769e4d12ade6afd30659cc,2024-08-02T21:15:46.620000 CVE-2023-45916,0,0,834ea3e5a22f0efcea772023be38e172d408424245dbd32ed5dbd163255ec8e0,2024-01-29T09:15:42.327000 -CVE-2023-45918,0,1,8cd030886569abe4c5bac597ccc443fb96b747b0a3c95e3a0ae15b024b62b623,2024-10-31T18:35:03.080000 +CVE-2023-45918,0,0,8cd030886569abe4c5bac597ccc443fb96b747b0a3c95e3a0ae15b024b62b623,2024-10-31T18:35:03.080000 CVE-2023-45919,0,0,eddc98d70c2ada443cead3f2c0b843b797378561c0ad845479dc9591db603015,2024-08-02T21:15:46.747000 CVE-2023-4592,0,0,ceac01107db2a306b25bb0c94e7b73f947e2ed1609e834ceaf5b2024be55f03b,2023-11-13T18:46:52.950000 CVE-2023-45920,0,0,bfbc186b7f8b580702dc2e2c120be4b3adcaf65a26e1af7f9e78ba083c35fb83,2024-08-02T21:15:46.837000 @@ -236898,7 +236898,7 @@ CVE-2023-49097,0,0,56a490d001ba2f79efb1ede445c5d17ca49ddb338a58b3ec14e52c3204d09 CVE-2023-49098,0,0,b47da9d751d1c4be45c45f01dbd7d6f779e951f94b7a99f9a01abbc3ccfe09b8,2024-01-25T15:44:43.440000 CVE-2023-49099,0,0,301fa9c02d1a71b653baa225e03f055435f4d6d084453b84ad6cc6bb2b096548,2024-01-25T15:32:52.503000 CVE-2023-4910,0,0,6d05c75a9e17e3ccd981e8ee7bf1e2ab24479ee1803438deab4de1edd175eda3,2023-12-13T08:15:51.190000 -CVE-2023-49100,0,0,4342e3e7d8dd4345e0c20aeab7fe640a8d12b302cf8c05308020afa470c9f95d,2024-02-22T19:07:27.197000 +CVE-2023-49100,0,1,4f3418882c9e26f673e47663df91cae8ea633910906ff7513c6422262cb91044,2024-10-31T20:35:01.123000 CVE-2023-49101,0,0,cdb3a0b6538f74622160c1a1e285d5c5fd7fe14c11635bb1fd24e2fb54c0dcca,2024-02-15T16:00:44.567000 CVE-2023-49102,0,0,395e472a244baf1edeece4e64436ae0c9e04ac589e63b4e437cc5efd790f937f,2024-08-02T22:15:58.190000 CVE-2023-49103,0,0,2ae024b709386837fb69f63c039bd694c6f8061cfc7156b399598900d8cede10,2024-09-05T13:30:10.023000 @@ -238811,6 +238811,8 @@ CVE-2023-52040,0,0,762939d11515580f100465151a16fe161b0f305136b11d8c988a24ca3b912 CVE-2023-52041,0,0,d822171150327a12062651891084a07154ed2e15efb3b51e285b66f24f49d7e8,2024-01-19T20:39:37.587000 CVE-2023-52042,0,0,d63c4bc544afb86a58bb15680099cbb76d2fb1c561f2e9993a893dae4d480107,2024-08-30T19:35:04.953000 CVE-2023-52043,0,0,2598b3da2f921eccbd3a41321ff24953e0fd67e0dc8e0987c81c7b871cbfaaa7,2024-09-06T17:35:03.427000 +CVE-2023-52044,1,1,7aa317278ff2994366571ddbcb030926a3e9d6311257c49404418e0c4b474d29,2024-10-31T19:15:12.347000 +CVE-2023-52045,1,1,9c9e6d02e7b026eab5e1d09490bba1de7042dd5d02a944639d1c3f465bd37801,2024-10-31T19:15:12.450000 CVE-2023-52046,0,0,9b8f5c0f61db55c891d556798c9c9da378945fb25af6cd3feea31d7ec4cb7ccf,2024-02-13T16:05:49.580000 CVE-2023-52047,0,0,0a58a1c6d75330480a1c8c9c493c63f296c64ed482e86c7d753ecc6c013c567f,2024-08-13T20:35:05.050000 CVE-2023-52048,0,0,e51406b0a7e0f54ab5f0d8fcca043edf25903f6ec066c183786088e2dc13a5e3,2024-02-29T13:49:47.277000 @@ -239233,7 +239235,7 @@ CVE-2023-52539,0,0,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92 CVE-2023-5254,0,0,5f7cee797c6f86eb738b8a7c6816dfcd5a4e6f8647e76dd5bd92cb5b95399be3,2023-11-07T04:23:40.643000 CVE-2023-52540,0,0,6043f7b2833db7ef103b97561cb4ef82751086dbea7d4957ecb9ee6908b9f107,2024-04-08T18:48:40.217000 CVE-2023-52541,0,0,05a922d703fe178ffe3ffcc50d7254491f88bf17e762cb3f58c17de2d7f44cb8,2024-10-31T15:35:12.207000 -CVE-2023-52542,0,1,bc3b88aa47baacfeee22c5097944807475e5f67a82e59ee630b579b0961a4395,2024-10-31T18:35:03.870000 +CVE-2023-52542,0,0,bc3b88aa47baacfeee22c5097944807475e5f67a82e59ee630b579b0961a4395,2024-10-31T18:35:03.870000 CVE-2023-52543,0,0,41aac44c8931668192d5fa3c95aa2b64b2f3c224e1cf1305a133dfd5df96c932,2024-04-08T18:48:40.217000 CVE-2023-52544,0,0,27963c836572979af4e49300b2561228946c4d3cae999b213a50ec0f6bccbf4e,2024-04-08T18:48:40.217000 CVE-2023-52545,0,0,7c866bf49e9ed6314cdc69e05703bc4aa26b629aa7be4fc7e540db613309f921,2024-08-26T17:35:01.777000 @@ -239311,7 +239313,7 @@ CVE-2023-5261,0,0,71874624632ecec272a9360963ac2693f66de572bbfd95d6dcec21b319e84b CVE-2023-52610,0,0,b7b80996cd5faeb262b37131a8e9fe77951e34c0a9446ba895663b1f4c9aec48,2024-03-18T12:38:25.490000 CVE-2023-52611,0,0,0229496230b0e92530b8865128ce3370378ae8dd4f4713dcc80fb1771ff668a8,2024-03-18T12:38:25.490000 CVE-2023-52612,0,0,c40e760ea5d1e6955be22b3c2c70cf6597bf643feaac02231bf846e9b5d11e3a,2024-06-27T13:15:53.470000 -CVE-2023-52613,0,0,4dcb86489bae6af27d6a3a92a58c01948ee7bd34d4b1aadf14a7de570d57fa1c,2024-03-18T12:38:25.490000 +CVE-2023-52613,0,1,778078997a00f1311f0c70b13d6d85511c04605ce3d0b8faa02d02da19118ca4,2024-10-31T20:35:02.680000 CVE-2023-52614,0,0,8ee84d07fbe93a723185433e1f443e071e1b6576f617cf55d35e50f3e317f3db,2024-06-25T22:15:15.793000 CVE-2023-52615,0,0,124e1995c8a6a67390ea92195fefeeb05b7cfb8e05fddbb368a599eb724339a6,2024-06-27T12:15:15.583000 CVE-2023-52616,0,0,8ddda269abaeba5f1aed89367ae82d93cda73f0a5b631176a7ef3aaa8dc137fc,2024-06-25T22:15:15.973000 @@ -239411,7 +239413,7 @@ CVE-2023-52700,0,0,cc55aed5c1d15adca3cae6d82533e785ba818e8d7784f9796166d9eb880ee CVE-2023-52701,0,0,677100564637bdf0af06f27033c00966698848f746d9ec1a45da915d615f9d0e,2024-05-21T16:53:56.550000 CVE-2023-52702,0,0,b2e8f62250efb7d825a81d0942184d9e9d88d741263380f5b5947ac07366415b,2024-05-21T16:53:56.550000 CVE-2023-52703,0,0,9a5f1701acfe47b75bd2aae3b80b45b36bdc1bef661725a649671bd38d55592d,2024-05-21T16:53:56.550000 -CVE-2023-52704,0,0,2e831189e023e362d3dfdedd4eea45d5198c1c9b6d32543c6826da9f9ef9b7b1,2024-05-21T16:53:56.550000 +CVE-2023-52704,0,1,9a1e560d3f3d9d43bfcff569880a48160a561d854512da83fb51353297122af4,2024-10-31T20:35:02.910000 CVE-2023-52705,0,0,e0e7e3d50f6a0ba6a1fa2b6f11b4a84fb685696b90642bf7cc71cd16ca5855b0,2024-05-21T16:53:56.550000 CVE-2023-52706,0,0,8b37f3ec912d4dd819fdbc4c9acfa204e7a0af66839e63b9ecf7fb3314fc2625,2024-05-21T16:53:56.550000 CVE-2023-52707,0,0,0ebfb049bafb9ad593bae37805df61fafd234e39ccd40c877b5cd08f88684ffe,2024-05-21T16:53:56.550000 @@ -242615,10 +242617,10 @@ CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b3662384 CVE-2024-10454,0,0,00a532df7fc763ef532ba53fc65d3c8c542dd62967499eae25b9ca1ff4ccf09a,2024-10-31T13:15:14.580000 CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 CVE-2024-10456,0,0,4e8313f83dd74eaf01a85b0e2c8241c892546e7f6f740c8d60482cb697257f25,2024-10-30T18:15:05.123000 -CVE-2024-10458,0,1,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000 -CVE-2024-10459,0,1,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000 +CVE-2024-10458,0,0,74ca3b5ff0d83b1a9172f91e6aeac1c2c334f5a37d9d050a2b4a8dbda73ae0a5,2024-10-31T18:35:04.080000 +CVE-2024-10459,0,0,41e5d3d1c5717bfbf938efdb318a0912b0d67ff5e837610ea3b33ef2a35c4dbe,2024-10-31T18:35:04.883000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 -CVE-2024-10460,0,1,1e6ac243751ca3e1851b6072183d5e5d23cf85f0aea7a57550ac0919c45e3382,2024-10-31T18:35:05.703000 +CVE-2024-10460,0,0,1e6ac243751ca3e1851b6072183d5e5d23cf85f0aea7a57550ac0919c45e3382,2024-10-31T18:35:05.703000 CVE-2024-10461,0,0,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000 CVE-2024-10462,0,0,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000 CVE-2024-10463,0,0,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000 @@ -242661,6 +242663,7 @@ CVE-2024-10559,0,0,b15c5cef48b19793cc135dcefcd31a7ae1cf1d0b293c280fd67bc092c8b80 CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,adc1b5788a7e287d410d5756cb2c8086d994832c36b5729249aa613428559544,2024-10-31T02:15:03.680000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 +CVE-2024-10573,1,1,b38ef3f6c3eadff638aac2b1e2e94dea1b67cb67b399073de7c8b41bfb551c32,2024-10-31T19:15:12.540000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000 @@ -243681,17 +243684,17 @@ CVE-2024-20260,0,0,e1fb5372ebeb2821531f3a082b09e7e0c81c08aa5e7c68ae16a7295e0b5db CVE-2024-20261,0,0,5c65061910678ae58b328f6a0e37c321fe1bf57a9d47085baeb418960297a3d6,2024-05-22T18:59:20.240000 CVE-2024-20262,0,0,d20e355bf64045bb726321c22659f6c213d6a34b5f8360db4262a3c1acced6db,2024-03-13T18:15:58.530000 CVE-2024-20263,0,0,a03c106a8ca3bb4647e4caa99728a3814edbbe0073eadd982e4b8d15f1108007,2024-02-06T19:23:20.600000 -CVE-2024-20264,0,0,5609462932f15c597bbf504d3d594975ad6434ea487e9719e65ddd4489d8efe2,2024-10-25T12:56:36.827000 +CVE-2024-20264,0,1,854619aca0dd20e60ee9b3dc419e3ad96f086a2fd7fe0b996bc5b7f02f0f3673,2024-10-31T19:04:42.863000 CVE-2024-20265,0,0,405f08c8e7e8849163f2eb6a8e5eb3eed5d428c9d5f1700fe4a57c86124fbf2c,2024-03-27T17:48:21.140000 CVE-2024-20266,0,0,6dbb5ce45980d47bf7eb6b4f22011bf963dd46d368a6ae781e4da8879de7a610,2024-03-13T18:15:58.530000 CVE-2024-20267,0,0,49082794ba6fffb4cd0ccafc96537e8303023b31c83143a02b2c16e741876cc2,2024-03-04T22:45:43.893000 CVE-2024-20268,0,0,7759be7dd4a356ca6b6a1b7455ca1dbb1f9d36388e26159b0a01ddd63697ab84,2024-10-25T12:56:36.827000 -CVE-2024-20269,0,0,88cd558963686c8b9cab30a70eeb1a0bd7a6f2c656c08d7e9d1afca9fd10068d,2024-10-25T12:56:36.827000 +CVE-2024-20269,0,1,18ed918c88bc4666e37665fe708c91bfd217fd78c72c1d9a5647d5c25c8f9909,2024-10-31T19:35:03.420000 CVE-2024-2027,0,0,8a6da780f00ef83adadf5b93e79e41584ae4ce15f32aba2548f6552eaa755565,2024-04-10T13:23:38.787000 CVE-2024-20270,0,0,eb515a12dde6cc2ab0dfdeee187efe297a3536ebbda30c8e847c7138ffa84d0d,2024-02-02T16:15:54.227000 CVE-2024-20271,0,0,9bce8a64e9296ad22ee19fd2c64f9f191014f0d9052b00608129f7da079ff720,2024-03-27T17:48:21.140000 CVE-2024-20272,0,0,9a8b431abc55ae18c0094ec2d1030d59c5263518a92577c729598443278bbea6,2024-02-02T16:15:54.683000 -CVE-2024-20273,0,0,8b112f4b02470eba863801e1e42e3a98c5ae162f3044482e8541663023d9c97c,2024-10-25T12:56:36.827000 +CVE-2024-20273,0,1,26c3c26c607841698dc1cf329a5a133b83df05d5a153dcbaa4eb0f4ddb7caa4e,2024-10-31T19:09:24.687000 CVE-2024-20274,0,0,25e605d9d54d4da58104cfd092dd6dbcffc594540622946f0085313336b1d18e,2024-10-25T12:56:36.827000 CVE-2024-20275,0,0,d642880c67354f21dd660d8005bc15eea0945814b36b39237dce1aa9d5118339,2024-10-25T12:56:36.827000 CVE-2024-20276,0,0,77220479d2c4e0a0ce7772faba7bb9374ec34b0cd2307655f714f3eba6dc1b93,2024-03-27T17:48:21.140000 @@ -243717,7 +243720,7 @@ CVE-2024-20294,0,0,742861094e87571e845203e831bfb7a087118860ed05792647beba51da9e1 CVE-2024-20295,0,0,440a3fe735baf91af4ba8e7f15eaba3890b664a180f3cc6b1b84c3c2ae93a20b,2024-04-25T13:18:20.370000 CVE-2024-20296,0,0,40bbd38e07d81658299d895ad9afa6a2a8c553e04b04f72d9f3dda0ddd6b036f,2024-07-18T12:28:43.707000 CVE-2024-20297,0,0,76d14dfa0f9509c5a289050d83c9a1077f8a1eeb56a70f5510a545859db5b18f,2024-10-25T12:56:36.827000 -CVE-2024-20298,0,0,d7b78fb64fa5c6dd7ebb9f35d881d018ce49ab3417e1e31c1e9af7349e826844,2024-10-25T12:56:36.827000 +CVE-2024-20298,0,1,01695f1182050adcd993e50d5c7f72e0f5795d1ad885d2ade8480d82ecdc8b98,2024-10-31T19:25:31.523000 CVE-2024-20299,0,0,ea63fdda38ab3c5e4dfbc8dc2825b521c61b9797c2ccf660e32cd8336c48d5df,2024-10-25T12:56:36.827000 CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bbc1,2024-03-13T18:15:58.530000 CVE-2024-20300,0,0,2c6145cb8a8bdce4d25bc4fb0d9158de2182f6c4b0288358081ef17d8ec8c1e8,2024-10-25T12:56:36.827000 @@ -243788,7 +243791,7 @@ CVE-2024-20360,0,0,b9376885f3bd33f8b376cfcd9d1a4c2997937c1a075603d8638d862812d3e CVE-2024-20361,0,0,8fc8c6bd1287a52550fd38650e66a5006a20e7eae1aa8f8c99b728af1c48ddd5,2024-05-22T18:59:20.240000 CVE-2024-20362,0,0,0fe85dbbc396fc356835f570820efb6142358d26355d59753469b06ab8b1d26f,2024-04-03T17:24:18.150000 CVE-2024-20363,0,0,fd62098992468346229d2c9f8f88c3a0bdc7312cacd90d8bf7a2b7925976c048,2024-07-03T01:46:06.070000 -CVE-2024-20364,0,0,f39734b291125d567a56f80d651e614675a81ffedf7761321cf4d60c9969f754,2024-10-25T12:56:36.827000 +CVE-2024-20364,0,1,a47617c767c4786facdb367d77b019465e9a2bf635bd17c71b1a524f335a7780,2024-10-31T19:36:32.277000 CVE-2024-20365,0,0,b941e81c62a5622fb3207cd284578983abbf20cf62d6c3be738ab76890047c8c,2024-10-08T14:28:42.727000 CVE-2024-20366,0,0,ce7e4ab0363f4b2934fc27a08480c4ec05827340dd08325d4de96e54b996f48f,2024-05-15T18:35:11.453000 CVE-2024-20367,0,0,0d59cd325b5448a23ac62ba4d011225bdec20c6d4a20e9044f14a66801d9654b,2024-04-03T17:24:18.150000 @@ -243840,7 +243843,7 @@ CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67c CVE-2024-20412,0,0,98fe7a5862ce0435e94f459cc380f6731f224b2de6aaf35729ca1e7ed37af631,2024-10-25T12:56:36.827000 CVE-2024-20413,0,0,eef91fa550f9bdcbf9b050eb11a257fdd75cd91f9c74286f67575b2cf9d8093e,2024-08-29T13:25:27.537000 CVE-2024-20414,0,0,18adcabc3ea83c021e3e42e80805abb0da254bdf76c23740c5471d9c9fa12ab4,2024-10-02T20:02:22.740000 -CVE-2024-20415,0,0,ace1385581011ed019184aa3fb43120119a465cbfa23a70765745569ce25b180,2024-10-25T12:56:36.827000 +CVE-2024-20415,0,1,877e94faab6d2266c2faaa313bee5ba7676639f7c6928a7d38493bfe98132d17,2024-10-31T19:17:54.273000 CVE-2024-20416,0,0,36fba5d0b9a663051d43c2072f34c721bf06b423d2ffa103fc7cf93ef9750d67,2024-07-18T12:28:43.707000 CVE-2024-20417,0,0,2b2621922f4e9896d58ad85f7dd970402245ce4da0539fb0012d7404735b7f45,2024-08-22T12:48:02.790000 CVE-2024-20419,0,0,0795f6e87845f9b46dc3400495c49fb48a047d8ed4e9d1842a04ff7724f0ad68,2024-08-13T17:15:22.787000 @@ -244419,7 +244422,7 @@ CVE-2024-21095,0,0,71837bbaf2bea328402990b14e523963606d49d2731911e5f425e34df69f4 CVE-2024-21096,0,0,6aea65a83e2d5b0b6b2c176040905d4617084dd4a49f2855ae52e067c47fcfb6,2024-06-18T02:15:09.823000 CVE-2024-21097,0,0,180e09f8ab03fa9202c965312463df6de0d343b6920ea63f93e36f9d95609d57,2024-04-17T12:48:31.863000 CVE-2024-21098,0,0,6d4c7c29d84d44117c2ddddd591dc940d4aab6a0b106a5d85613f57420b56b9f,2024-04-17T12:48:31.863000 -CVE-2024-21099,0,0,eef26a141d604a9279a80dedd8237a72c532b1ff86bc60304cf5993304ffbb22,2024-04-17T12:48:31.863000 +CVE-2024-21099,0,1,18ee7f90aec4d9c34bf08ab839549123e62f8937c0d3b02741d81fa2e6dfe88e,2024-10-31T19:35:02.343000 CVE-2024-2110,0,0,1270b7a979206100ed725d968c0cf72fd1f82b851f2f2372b42faaa8d203e40d,2024-03-28T12:42:56.150000 CVE-2024-21100,0,0,a46a163d2ef0a0b6b1fddd7395d7d5cb51902aea83a18389f53792a38f659f53,2024-04-17T12:48:31.863000 CVE-2024-21101,0,0,91755928d5ed81eb1c0b6d3faaf85c7a1a9acb13a679b76992a144a90a15ac62,2024-04-26T09:15:11.750000 @@ -244456,7 +244459,7 @@ CVE-2024-2113,0,0,d820f9174045c4a91c8de22b2f318d393b16e5183ad826479f5c93fd64192d CVE-2024-21130,0,0,13e5e480b47df9c035f480a63cbeba0c6ce05798db1fa3dc667fa306c070c11b,2024-10-17T16:58:22.037000 CVE-2024-21131,0,0,02165835cc6f0e203728409c02066c414e0700a6416e43c004ac7c1741f0e57f,2024-07-19T14:15:05.180000 CVE-2024-21132,0,0,683d4a8132332ad86fddc10cd15bb59076d052bf865226f7944ae794277a5d4e,2024-08-28T17:40:31.727000 -CVE-2024-21133,0,1,a9876891a6c2a6c3d77b30af6f76ad94e03c5c4618a7edf1f3af119bbca64cb8,2024-10-31T18:35:06.540000 +CVE-2024-21133,0,0,a9876891a6c2a6c3d77b30af6f76ad94e03c5c4618a7edf1f3af119bbca64cb8,2024-10-31T18:35:06.540000 CVE-2024-21134,0,0,8b2526b0e292ceacbf0cc57aaf65cf091a298a6098fd630f182d8f8af262d4ce,2024-10-17T16:58:38.650000 CVE-2024-21135,0,0,ba0250ef42fd2872339c049bf92d12e0db71762fc207c75bb73b68f494e9f6b5,2024-10-17T16:58:53.687000 CVE-2024-21136,0,0,0b3d31fd31b74b67777283c1c23811ac7b0b473c6d3e3e94fd2f66077b9a369c,2024-08-28T17:59:36.023000 @@ -245968,7 +245971,7 @@ CVE-2024-23227,0,0,76df15f6bc2ca6b12012309a52c71fb5a4f3228c7f6483628fc9bf7ed873f CVE-2024-23228,0,0,cc53be31cb9d833cc5f783d1b1a5baa2ef8daadab372d7bfd86c3142f74dcac9,2024-07-03T01:47:38.910000 CVE-2024-23229,0,0,561351da6f91af092533ed5801a4de12d08e4fb8a08cae5fec6b16d788979c5a,2024-10-30T20:35:08.097000 CVE-2024-23230,0,0,0ce355c026a81eb330cd3a55adfdd58c7b28ad2193d6045812672f59d130ef9d,2024-10-31T15:35:27.513000 -CVE-2024-23231,0,1,0e1f04616cdf41b71be7b9218a6fca56d6aa4937cf846479ddbe6f0c5832b513,2024-10-31T18:35:07.310000 +CVE-2024-23231,0,0,0e1f04616cdf41b71be7b9218a6fca56d6aa4937cf846479ddbe6f0c5832b513,2024-10-31T18:35:07.310000 CVE-2024-23232,0,0,9e7b49448cac16c45fbeaf042c9f71b2d8db550fb449e33aa9abdc891de85b63,2024-03-13T21:15:56.087000 CVE-2024-23233,0,0,313670ac068b12d9fa516d4a3c082e80e45b5e5dbe4efd3c4e89ac3ce5144465,2024-03-13T21:15:56.140000 CVE-2024-23234,0,0,cf9cee47c5ddf4443c90581bef409e0907a72ec2106ee4166332684023ebc090,2024-08-27T16:35:08.620000 @@ -246022,7 +246025,7 @@ CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724 CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000 CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000 CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000 -CVE-2024-23280,0,1,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000 +CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000 CVE-2024-23281,0,0,ebcc57daef885f64cd010edceca3c55445d6724dba570bb6546aefcf9b9ee767,2024-03-13T21:15:58.150000 CVE-2024-23282,0,0,489c27c47de53736ddacfdf8fc0d1e5b925b36d05a9df8057651dd26f3053be5,2024-10-30T20:35:10.147000 CVE-2024-23283,0,0,7718a2900f8b37b1392ccbf676493a05796a6de981b49f31d382de7bc4b9d364,2024-10-27T14:35:04.903000 @@ -246656,7 +246659,7 @@ CVE-2024-2408,0,0,e2c01a5c34540ebb0aeec1f86c6fa49f65e11bad86d0e423ba6a7c8c1306c7 CVE-2024-2409,0,0,40134401d2d9db58f61c794cf0f4f791968f8a191847ffa4ae84dc193442f258,2024-03-29T12:45:02.937000 CVE-2024-24091,0,0,5abca135be2b48f97a9b4ee4284b135e3c993507c7ae94228dbfeca849094700,2024-09-05T12:57:51.890000 CVE-2024-24092,0,0,85255eb7350c088041b14db17806ac0275bf0f870c5dc0846dac7ef708da600c,2024-08-05T14:35:03.843000 -CVE-2024-24093,0,0,14e5230c16c4af460c68647fa9203bde6e56c21bc1a3208cb017e8bb36864636,2024-03-13T12:33:51.697000 +CVE-2024-24093,0,1,fb5ed7dd5447f2f3646a43ede6e27e58ea7347516d0a38f6974af6473303761c,2024-10-31T20:35:03.523000 CVE-2024-24095,0,0,a293063a01db5092273515cc6c1fbe86e89299406200e6a2f03c1a4a2a21fbc6,2024-02-27T14:20:06.637000 CVE-2024-24096,0,0,be98bfd34c594b5bc2f148848abf51a12eec4301e64123b58bf793ff254827e3,2024-02-27T14:20:06.637000 CVE-2024-24097,0,0,fac0898f527625e2c3336ba1bc4bf6bd2a8e244bb9d5499d446769299fde892b,2024-03-13T12:33:51.697000 @@ -247416,7 +247419,7 @@ CVE-2024-25316,0,0,dc0ffcbd049ed752bddaf4851795a99ca233f2e28b2566ba55c9e2779a3d0 CVE-2024-25318,0,0,816caedc6e45e8daf872d525cbac5de4c424378189abd90933e824060204bf71,2024-02-12T21:37:44.753000 CVE-2024-2532,0,0,dbd2e90a8b9f0e6a244b6c6163b20f8979fc7a3177b780d02e1509ee97c26b6a,2024-05-17T02:38:17.753000 CVE-2024-25320,0,0,3f240c7b2117cfbcf6abd7fcdad0bf99eb1b4e31e2d00516b72afdecb9c7c27c,2024-08-20T19:35:02.513000 -CVE-2024-25325,0,1,d37e96d75312f2e4bcc77f54d4abb9879ca7992c01d4a551d01083c5bf6ed837,2024-10-31T18:35:07.527000 +CVE-2024-25325,0,0,d37e96d75312f2e4bcc77f54d4abb9879ca7992c01d4a551d01083c5bf6ed837,2024-10-31T18:35:07.527000 CVE-2024-25327,0,0,9be8a5c5832d3bb0b7e516f20a61af14feb4f1acbdf8b85612033608526c3789,2024-08-15T21:35:07.617000 CVE-2024-2533,0,0,6520d041e2b7ba39d1700487d120781106e9a9e9b41da5c3ad12ec52a81a1e5b,2024-05-17T02:38:17.843000 CVE-2024-25331,0,0,4f27830f39927c3895bcf33b02286589a44e6189e721c70e2368b6ca05c425b4,2024-08-05T15:35:11.043000 @@ -247883,7 +247886,7 @@ CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503 CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000 CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000 CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000 -CVE-2024-26018,0,1,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000 +CVE-2024-26018,0,0,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 CVE-2024-26020,0,0,72caf6bcbf6e85532315d41141700a256acdb0b9130ff5b3cf9c47d5b4a216d7,2024-09-11T14:53:51.013000 @@ -248454,7 +248457,7 @@ CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000 CVE-2024-26743,0,0,324882ef91c0c28f79351ba6298feb9fe20c713336fb2f56a3a9c16ca464e41a,2024-06-25T22:15:21.600000 CVE-2024-26744,0,0,f902dd3c251462aa381ae89d57defec93703dfa0c7e8a0c7eb1bbbb723405b07,2024-06-27T12:15:20.400000 -CVE-2024-26745,0,1,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000 +CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000 CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000 CVE-2024-26747,0,0,41706fd8dc5e74253554934fe0898878e3cbaaff07076ca69a602b3caff1d7d4,2024-06-25T22:15:21.727000 CVE-2024-26748,0,0,281d1dba5fb38f324f1cb82b7adebdd7a556b7307a202c472b084466cdd8b3ba,2024-06-25T21:15:58.480000 @@ -248812,7 +248815,7 @@ CVE-2024-27069,0,0,a22027ac3b10d55994fd9ee439f06fab2d3cfb6ef2219ded791dee150a4b9 CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd3649,2024-05-17T02:38:26.230000 CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000 CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000 -CVE-2024-27072,0,1,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000 +CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000 CVE-2024-27073,0,0,aa56aa24ed3402425b89f05f26a164f223361d7a41c480cd79d50873842fdafb,2024-06-25T23:15:29.397000 CVE-2024-27074,0,0,072997e51d8edffff051f12b48b4b43375560402b726f9e882d033665b9beae3,2024-06-27T12:15:24.360000 CVE-2024-27075,0,0,c2d1c4caa012ebbe4b9cc25a1abce424572ea3928a347ee6dda4b1356be42ff1,2024-06-27T12:15:24.443000 @@ -249008,7 +249011,7 @@ CVE-2024-27273,0,0,1883394ce1d8806bd11210fe51eb11ce8dfd12292901a019c597affe48b40 CVE-2024-27275,0,0,d9b1bd93ca49fd30306bdac7c9fca8c9103b11d35bbca79555aa44d5c5b40d20,2024-08-03T12:15:16.637000 CVE-2024-27277,0,0,f7c03e6067da94f951cda60e6021ff6f9b34cbe0c7b10bf24b9533f86379c99e,2024-03-21T19:47:03.943000 CVE-2024-27278,0,0,7e076b94bb346aa71a90c33bb12c519e49b2bf85e0c9c8c5e64524bb6308a9a5,2024-03-06T15:18:08.093000 -CVE-2024-27279,0,0,25e76b48db9e541084b8b1f041be7e5bed145e75da72a0fa7da4b1fa0a0fcfeb,2024-03-12T12:40:13.500000 +CVE-2024-27279,0,1,45d9cf9b4657f679bfdecf614626efcef42c4497cc06c2cffcb81cc8aeefa06e,2024-10-31T19:35:03.510000 CVE-2024-2728,0,0,894b3321a99e458969cde3c150a59b05eb4a60d79495148d5d2320daac930a32,2024-03-22T15:34:43.663000 CVE-2024-27280,0,0,06be16cf339e78f4b79ae71bca9b88fd97cb5e827ebeaaec64aef2e8ba93add4,2024-07-03T01:50:29.333000 CVE-2024-27281,0,0,7f2b0f122766f676aed91ef9250b5865f45069fd8c6cab642c57fb3b624ebb3f,2024-08-20T14:35:05.757000 @@ -249530,7 +249533,7 @@ CVE-2024-2797,0,0,3ecce6a8722880a2243bbe9b30e433c013fbca5e6e5042e5546c00d6fc1c8e CVE-2024-27970,0,0,8fa01250d8db9eeb3b212337b9d1be29c16b8c201ca0f2959158cd129e92a4db,2024-04-11T12:47:44.137000 CVE-2024-27971,0,0,4e59811e16516bf26b4f57d974f22c7799182d070eb9cc6b599373a1878a2735,2024-05-17T18:36:05.263000 CVE-2024-27972,0,0,e344ab228b851967a3812eb892a2a3bb991b85dd672139f09da75b3b6d47f2b6,2024-04-03T12:38:04.840000 -CVE-2024-27974,0,1,6b89cdde751f959824cfee213190c11e47af5cb911873e94ab60379407af0911,2024-10-31T18:35:09.403000 +CVE-2024-27974,0,0,6b89cdde751f959824cfee213190c11e47af5cb911873e94ab60379407af0911,2024-10-31T18:35:09.403000 CVE-2024-27975,0,0,628fa6593d5d98fbf43326e7307f982b7a57304446d55cc554f5b8b82b744b9b,2024-07-03T01:51:20.333000 CVE-2024-27976,0,0,f6d7730a29882f81108291258e14f13d29a2159cf5abda97fb8b7490244dab5e,2024-07-03T01:51:21.030000 CVE-2024-27977,0,0,09cebd1c563d6c711f33424e2c16188d6c5dfd54056f5a0f51dbb6772ec18b17,2024-07-03T01:51:21.727000 @@ -249793,7 +249796,7 @@ CVE-2024-28294,0,0,78f4f9cea2d4a1ca93d50c609f48582229009802769f67fd7dc526cc547f6 CVE-2024-28297,0,0,a4b240f33a30c881b1a926a2c492c4fd59edb741a84b1b986f2bad529bc90472,2024-08-05T12:41:45.957000 CVE-2024-28298,0,0,3bc67ac88076195fad9cdc6e8b44ccb13643ba94f3e6354bb8ca3a126daef414,2024-09-11T14:54:30.973000 CVE-2024-2830,0,0,8c004c1c8fc1f8388803620250a49c9771d371ad920b272b660e7e2337499741,2024-04-04T12:48:41.700000 -CVE-2024-28303,0,0,a65712a928f1b4a2335837c36c349f7d018e1f7b9e70b27cb7f99f12d8cf7ee1,2024-03-20T13:00:16.367000 +CVE-2024-28303,0,1,af4aa568624893c6edae905ba1ab7c2b6062f8fdb400c84636436a5bb0b395f2,2024-10-31T19:35:06.587000 CVE-2024-2831,0,0,643c5a916b3e7dd2e502ec8b69ecf4eaeb51af43509d8dd9dee1849a2f658d24,2024-05-02T18:00:37.360000 CVE-2024-28318,0,0,f72243df63cfb9dbefaca38a7feaf78eb687b6b96d16642d331d371362d80952,2024-08-29T20:36:35.373000 CVE-2024-28319,0,0,e2ecd3b9d2b64cdb4e4a7ac8ae7f5ebb928d0580b7f60b7a323aa1f0897ead1a,2024-08-19T20:35:09.997000 @@ -249869,7 +249872,7 @@ CVE-2024-2848,0,0,f7b0b78cfc60ee643c1f8f38f0fd87579fa7a84e7f638d990edaa8c649bd1e CVE-2024-2849,0,0,7ddd80bf2dddeeb49b4f7c75b1bb53734965b8214d690d5f80f092578b7cf001,2024-05-17T02:38:33.723000 CVE-2024-2850,0,0,aa087e8105e87f804b43529eb18757f7a4acf7dbdd8f4604dc208cac4ea95437,2024-05-17T02:38:33.820000 CVE-2024-2851,0,0,5b5b2abe0cec799e0c475c24a1ca157de3540e7eb560494a6cfd6aff8f806a99,2024-05-17T02:38:34.107000 -CVE-2024-28515,0,1,d06ae9a8ead8315626cdf61b8978f26a9ce985b41fd2a3e04591cf3fbd5fd73d,2024-10-31T18:35:10.233000 +CVE-2024-28515,0,0,d06ae9a8ead8315626cdf61b8978f26a9ce985b41fd2a3e04591cf3fbd5fd73d,2024-10-31T18:35:10.233000 CVE-2024-28519,0,0,8e20e3d590247971a9d8000bfa92fdfdad67e4416371af4c691b0cf99deea50c,2024-08-15T19:35:08.117000 CVE-2024-2852,0,0,ce3b26e82372ba3a1ea7a513f638a60f6b521dabbda2b7b15730e3be31569c45,2024-05-17T02:38:34.220000 CVE-2024-28520,0,0,0d1f20f1f11c459c615732a3ae08b6276ad3a3ce7691c30492f9301c8f89ba87,2024-08-01T14:35:07.467000 @@ -253400,7 +253403,7 @@ CVE-2024-33454,0,0,74b0a1930570ffdd0fe139f1c45084400e123a1a6e46097c3427b727b87e1 CVE-2024-3346,0,0,5fe2388e7081d85802d7eeef70ad8fdaa632fc14126ef86b4921587d73e76418,2024-06-04T19:20:19.553000 CVE-2024-33465,0,0,7dc8798fe71a3f778010ed5d146c9c87c91ee3709364cd2f1c6196073e9c2579,2024-08-01T13:51:59.690000 CVE-2024-3347,0,0,9b199e7d34c12b794e3fcb3e483a1e015cb7f912cd5ad3bc6b26d3e5c6f61a14,2024-05-17T02:39:51.303000 -CVE-2024-33470,0,1,771c577f183751e6420d1c6480af6691c3e4a28f80f7d3d238fdff0f7f6bae54,2024-10-31T18:35:11.050000 +CVE-2024-33470,0,0,771c577f183751e6420d1c6480af6691c3e4a28f80f7d3d238fdff0f7f6bae54,2024-10-31T18:35:11.050000 CVE-2024-33471,0,0,9cda120795d2cb05432987cf2342b219933f08e34a97af932899d7da68c284f6,2024-05-28T12:39:42.673000 CVE-2024-3348,0,0,97ca04a7554d65fa257eb4c451e7902d3ec9ae4405cb6edeb14744741600e6d7,2024-05-17T02:39:51.403000 CVE-2024-33485,0,0,545a3ddb2c081ca34ecb0c2a68c90fa3f095f3607dce687f15a518e34a732453,2024-07-03T01:58:17.873000 @@ -253687,7 +253690,7 @@ CVE-2024-33865,0,0,391ace89bfab037aeb96ecc08885288ffa4894e995837787f29e0c72dd461 CVE-2024-33866,0,0,d5c0ae9c1054b27c6d97a10401ff0b5290f4f00dd396ff666764314ce3a33269,2024-05-14T19:17:55.627000 CVE-2024-33867,0,0,0f6e6b0818e1248c04a728bd3994286d3ee2c473217dff20f3ca244eaa919d7a,2024-07-03T01:59:03.697000 CVE-2024-33868,0,0,a040237e401755b6e7cf08ea98d144311aa33b6e7bad9424eb98907745e6b269,2024-09-15T19:35:03.093000 -CVE-2024-33869,0,1,85f56872fe381951ae3590fbe2dc88998bde5846ab8de98f9d97e4f171cb53af,2024-10-31T18:35:11.883000 +CVE-2024-33869,0,0,85f56872fe381951ae3590fbe2dc88998bde5846ab8de98f9d97e4f171cb53af,2024-10-31T18:35:11.883000 CVE-2024-3387,0,0,5fff34d5a94da2ef9e974ff962e10f544b17f2456fda9d5054eee7f811dd1ba7,2024-04-10T19:49:51.183000 CVE-2024-33870,0,0,6aab1c2dce9666081caef7bc83c709784103f6ae03f40bf6f9b61a08ab839221,2024-07-05T12:55:51.367000 CVE-2024-33871,0,0,6ef1078e0ab851992d6f76ec41fcc0f1160d67fe72b7159cf03aaec7c63364be,2024-07-08T14:18:32.130000 @@ -253810,7 +253813,7 @@ CVE-2024-33999,0,0,9ff412930445f4c469385132086f7d2514cfafda5bf0ca410efabaa361c1a CVE-2024-3400,0,0,ac7236e657f4c64879864508ce5e161ec2ccd4c7e837c165c57bf7e10fe0f424,2024-05-29T16:00:24.093000 CVE-2024-34000,0,0,fb3f0c7c5c0722f41326f2a505dd1954bc7a0d5fa27bb17709829c52d90f5034,2024-06-03T14:46:24.250000 CVE-2024-34001,0,0,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfafaf,2024-07-03T01:59:15.240000 -CVE-2024-34002,0,1,7d5aad854779b78532969fe54f5cfd243c35b0bc72cafa02f18bbd3a15fadf2f,2024-10-31T18:35:12.750000 +CVE-2024-34002,0,0,7d5aad854779b78532969fe54f5cfd243c35b0bc72cafa02f18bbd3a15fadf2f,2024-10-31T18:35:12.750000 CVE-2024-34003,0,0,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000 CVE-2024-34004,0,0,24178f5485fdf0519088f22aa01cad458eacee6bf779a59579fc437dca127b5c,2024-06-03T14:46:24.250000 CVE-2024-34005,0,0,3cc41e8d5cf47efd2659de94be11f3633627e887af28aa45c65ebef356741180,2024-08-01T13:52:13.690000 @@ -254205,7 +254208,7 @@ CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957 CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682bfc,2024-07-03T02:00:33.137000 CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000 CVE-2024-34535,0,0,83aae08bc421f9eef8621f242b24214806a581d0b260711ffa707015c3215f8f,2024-10-04T13:50:43.727000 -CVE-2024-34537,0,1,aa8d887b54254363340bc9478cf814aad60caefe8559038d897113fab5bc7ce3,2024-10-31T17:15:12.903000 +CVE-2024-34537,0,0,aa8d887b54254363340bc9478cf814aad60caefe8559038d897113fab5bc7ce3,2024-10-31T17:15:12.903000 CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000 @@ -255193,7 +255196,7 @@ CVE-2024-35916,0,0,2804419c9273825473495dd74a79a9135bb83063013a6adcfc0c986f1e68a CVE-2024-35917,0,0,ef28657905524f9b7f229abe3cf11569c21934c08ac9147215aa72d97ba1ce78,2024-05-20T13:00:04.957000 CVE-2024-35918,0,0,b84a4a8eaff0e9aa0772539706471f0485db8b7ae1e504faf03291dd1bedbcb8,2024-07-30T05:15:09.763000 CVE-2024-35919,0,0,1e1ce71ee56e5a8256ab06fb6ff47a0c0719c60214f9cbd9c98efbe37f1c4237,2024-10-31T14:35:15.330000 -CVE-2024-3592,0,0,06f19b0f4030aa5db1e2c8d8139272dad226c0945ae251432ae728d2bb8e4467,2024-06-07T14:56:05.647000 +CVE-2024-3592,0,1,a467a0becb7a7c1893912c4a012a5ba189ea79070fd21967dce0459666c03be8,2024-10-31T19:40:34.747000 CVE-2024-35920,0,0,e038127788e84b65006b7bac3b3d638e07acf776aced57ca59ab8396cc9131a0,2024-05-20T13:00:04.957000 CVE-2024-35921,0,0,86f3f43aed64babe95e54be060b922943333fbafaebdf08ad2eaefa3d9aa11af,2024-05-20T13:00:04.957000 CVE-2024-35922,0,0,a3848c52df3a62f38c8911dc80247747492d0166db32c357f2fbfaf1c915f7b2,2024-06-27T12:15:26.323000 @@ -255269,7 +255272,7 @@ CVE-2024-35985,0,0,6a0ec59d3e51fdf53bb1ddc338ad85428352a8c3d8fca537814e3edb294fd CVE-2024-35986,0,0,233bf34b93f6b6b3cb174407b52ced003b0cd3d3120afc7209f6ec63dacd4e33,2024-10-29T20:35:23.230000 CVE-2024-35987,0,0,6cfebc44336088901ce4a0eaab623f6c781664328e18b6c07774b9d25b96510a,2024-05-20T13:00:04.957000 CVE-2024-35988,0,0,9e4aa3541b4f8c9746b0897daa431b666a7015d508272fc87df5f96bb5f44395,2024-06-25T23:15:31.573000 -CVE-2024-35989,0,1,e4a6f65f2b8a28629768c5c72c5f7751ef9aa532d3cf28f68cbe11794178c21b,2024-10-31T18:35:12.980000 +CVE-2024-35989,0,0,e4a6f65f2b8a28629768c5c72c5f7751ef9aa532d3cf28f68cbe11794178c21b,2024-10-31T18:35:12.980000 CVE-2024-3599,0,0,6f9a87b43db25a2abff9773940ab4f1d2aba1d6b675d22095616527a9cc731b0,2024-05-02T18:00:37.360000 CVE-2024-35990,0,0,cf5bd99b0200a582d3ca9c6976894c42986b8f909be16ec7492dbf916bda46ba,2024-06-25T22:15:34.330000 CVE-2024-35991,0,0,95c2d74b3c18b9eb777211ce3882aff6b10bc936ddb3cc6ba231cd94286d1648,2024-05-20T13:00:04.957000 @@ -256080,7 +256083,7 @@ CVE-2024-37159,0,0,29983f96449420557db1b3112a95ba2589dbf1f20f2491176bacc2d05dea9 CVE-2024-3716,0,0,645c39d852b6d0900252700ce7c6aa7da7b0e8e8528414b76049b939646330f6,2024-06-18T18:53:28.927000 CVE-2024-37160,0,0,244bd54ee6562bb7c87780ac681fb6725c85e3313649f8ee9d22f3f6a28cc85a,2024-06-11T18:22:50.097000 CVE-2024-37161,0,0,2a94f421c449e5230ce5f6bf577049502e74931a566a6f5900713655d6199d0d,2024-06-13T18:36:45.417000 -CVE-2024-37162,0,0,322a3e89c574071625f48e86e0af7a8ea0c5c421b1ad849d66b531a5ef4a0395,2024-06-07T19:24:09.243000 +CVE-2024-37162,0,1,d187b793c58199cbc2898a7a072f3ac3c5ef9e78e8300197de9218f7bf28c884,2024-10-31T19:43:26.800000 CVE-2024-37163,0,0,e299ba511d4c0e736a670743e9375ac75a6321837800583d9d327792c0552ded,2024-06-07T19:24:09.243000 CVE-2024-37164,0,0,9bb663a219137e8dd0a97eda1376d9c5548e255ee1c6292d4793648cf6ed6f5f,2024-06-13T18:35:19.777000 CVE-2024-37165,0,0,6480a9385974854bcbb243b4e0731864b039fe2224efee48b2a5f08ca4ebe426,2024-09-11T13:52:20.730000 @@ -256462,7 +256465,7 @@ CVE-2024-3775,0,0,b7d2a473bac9537035a8d6df6a365ee3b93ba49aa9ce7163db0aba168893a5 CVE-2024-37759,0,0,fcc8ead5df9d431db40c232755b8d406131bfe6bf2637fa79e9581b47deb8f46,2024-07-03T02:04:41.510000 CVE-2024-3776,0,0,5922bebf01d008693e127ff3a5039fdad8dc9d22a230cf3268767563dfe95a49,2024-04-15T13:15:31.997000 CVE-2024-37762,0,0,cd5f303513eb0960063d0e2c99c901a56ff1296cae29c33693c5d7fa45ee86e8,2024-07-09T16:22:43.123000 -CVE-2024-37763,0,1,c5847d0bf810662fadf186aeecdc436730aa2d2ec83ee9913c6e6a93f68b6126,2024-10-31T18:35:13.207000 +CVE-2024-37763,0,0,c5847d0bf810662fadf186aeecdc436730aa2d2ec83ee9913c6e6a93f68b6126,2024-10-31T18:35:13.207000 CVE-2024-37764,0,0,bfe8048822739aebe754250a3774cdfd451761171493fc8c02a0e45a49f5a4e6,2024-07-03T02:04:42.317000 CVE-2024-37765,0,0,746df602d2e258f449976f05b63742f035e40ff54b364ebcd32658a0b67b7135,2024-08-01T13:54:14.823000 CVE-2024-37767,0,0,7877c2515670214a904346d470123e251242a9f2784362e3de48ee06ec75e5c5,2024-07-08T15:49:22.437000 @@ -257580,6 +257583,7 @@ CVE-2024-39329,0,0,5aa2655955d12cfc04b5cd596dd516d231115449b8be168ee40469f865a39 CVE-2024-3933,0,0,92b73bce365e98fcc06e62daf24ff5ae07fa4b0e34a70b4d4c68931454994bbe,2024-05-28T12:39:28.377000 CVE-2024-39330,0,0,df282f57bb00a86772e9e77e51a445a51be95fedbc3011c51977bbb06b0f309e,2024-07-11T13:05:54.930000 CVE-2024-39331,0,0,e27921e016dec51173f86ad420de9e9174de4baa540da3f53e6e1157ef72adc9,2024-07-03T02:05:47.260000 +CVE-2024-39332,1,1,02c815ccdcead4ab9a75b85b431c56edd6baeae5a003187d7f3998feda147758,2024-10-31T19:15:12.897000 CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000 @@ -257926,7 +257930,11 @@ CVE-2024-39714,0,0,4056f55d0df430f8323fee2d9091569bd1a5c6627633d4c031ced4b047459 CVE-2024-39715,0,0,15f33b0904bec8d29ab0aa789fb7bca5f17b446aa8a06884e3c4dec4fda56438,2024-09-09T16:35:04.780000 CVE-2024-39717,0,0,5c727700f5fb9ffcdff7d74de82f8cc7669d0dbb9bbb395cb4e4ef77f2b2701c,2024-08-28T19:47:25.410000 CVE-2024-39718,0,0,116d4c704ecdda3f39d6049d166eceb718bb7e8447d879858815362938f8cf09,2024-09-09T13:03:38.303000 +CVE-2024-39719,1,1,55c0fe4231ea450fd9f9bd61b34566b93becc23a462714378436cabf84a325c3,2024-10-31T20:15:04.770000 CVE-2024-3972,0,0,0caddd7b34d493c3554c875afe72275890f23d83038241874e85ef811a9076b6,2024-08-01T13:56:47.637000 +CVE-2024-39720,1,1,5d12fc2ee7e4d9b3dc0b31df402e7f9ab521670e316e8f3b2d06befa43297f5c,2024-10-31T20:15:04.877000 +CVE-2024-39721,1,1,21c376a4118d478bd951a487fcc6c37edc42d010d1757ffc540bbeeccc034e6b,2024-10-31T20:15:04.993000 +CVE-2024-39722,1,1,fa0eccacaad1353a36670c74071a2f5eaaad1233da2ab863fd98dc8f49b574fe,2024-10-31T20:15:05.080000 CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000 CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000 CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000 @@ -258194,7 +258202,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b CVE-2024-40453,0,0,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000 CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000 -CVE-2024-40457,0,0,c48d41bd96fb4d23a817f2df64b770558b35704c52871238cdfde186fa28f2e5,2024-10-24T17:35:07.660000 +CVE-2024-40457,0,1,cf5d2fb5573b78b24a73103f4faaeb1de1b6bbe985b93c5ecbdd9bf464b5504d,2024-10-31T20:15:05.173000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33 CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000 @@ -258323,8 +258331,8 @@ CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bd CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000 -CVE-2024-40680,0,1,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000 -CVE-2024-40681,0,1,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000 +CVE-2024-40680,0,0,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000 +CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000 CVE-2024-40689,0,0,d72047a797aad87fd24dc95664d6dde0e77455bde7da3b63cb978ce1844a86ec,2024-10-19T00:30:36.680000 CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000 CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000 @@ -259652,6 +259660,7 @@ CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb50912492 CVE-2024-42508,0,0,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7cd6,2024-10-29T17:38:49.330000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000 +CVE-2024-42515,1,1,d9febc8d36f1e0fec5b8c3628e4df89ea40dc83420c169fad7a81aebf15f35af,2024-10-31T19:15:12.983000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000 CVE-2024-42523,0,0,e7f13531824456b37c381b164195bec4f01c74ddaa27da31139f6cf4c536fef0,2024-08-23T18:35:03.563000 @@ -259835,7 +259844,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95 CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000 CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000 CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000 -CVE-2024-42835,0,0,be8a15032d8b7e2767c06844b2c610cc3d4f02c091e6e878f9c0ddb188a4332c,2024-10-31T14:15:05.610000 +CVE-2024-42835,0,1,62c3bb1040503fe108596a1c1ad34679c80451382f26381de785bebf9971f9b2,2024-10-31T19:35:08.113000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 CVE-2024-42845,0,0,f506b40591f84fe588a1ebf10f79903d4e58b530d7a712a8d7ac529b24aba892,2024-08-28T16:35:23.650000 @@ -259866,7 +259875,7 @@ CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198a CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 CVE-2024-42930,0,0,784a232fe23e7bbafc9832760208fa74cd8fc994e46ea9d1216f27649a38c7a5,2024-10-30T21:35:04.850000 -CVE-2024-42934,0,0,5b485bf0fdf98b0bf0cffd2e2fdf9041db2ed703f1341f5eedd90fef284d1734,2024-10-10T12:51:56.987000 +CVE-2024-42934,0,1,cce541bdc57df7c6b631cc18206bacac2c59fa39a67506fa82352f8df4b8ac0e,2024-10-31T20:35:05.250000 CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000 CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000 CVE-2024-42940,0,0,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000 @@ -260947,7 +260956,7 @@ CVE-2024-44674,0,0,78532ab5feb22da158d1ca77bfa4a9481318fd90b7728fb7942741a2fe563 CVE-2024-44676,0,0,b0f0617031a60967a8b797cadadb8c5f870cf4ed39d40d10e892a55bec1fea8b,2024-09-25T19:20:25.073000 CVE-2024-44677,0,0,b3010270d0be534cbe0fd14032547bfe302a60106c2515252734805cedbdf65e,2024-09-25T19:19:24.007000 CVE-2024-44678,0,0,6e57560ccb7f7726a96b187fa0940b079eab34be5f5aa788f0964af3dd2ca471,2024-09-26T14:35:14.687000 -CVE-2024-4468,0,1,23515c86973ba697e8140aba7b457c632f3ea3f82a64c6f661f01b74003b55b7,2024-10-31T18:40:45.817000 +CVE-2024-4468,0,0,23515c86973ba697e8140aba7b457c632f3ea3f82a64c6f661f01b74003b55b7,2024-10-31T18:40:45.817000 CVE-2024-44682,0,0,5c1099c9946a7bbad39157bc8cb36499b7070c93884284356ba775c02b16ef60,2024-09-04T16:38:36.817000 CVE-2024-44683,0,0,3331119c07881f90997c72dc65301a112931dc9af3d318f7996e768fd590a104,2024-09-04T16:41:01.467000 CVE-2024-44684,0,0,3eb9301d11d089b3ca5e5bb482a6ce2aed822a3ab4934c267af6f311a660b8c1,2024-09-04T16:42:01.137000 @@ -261255,7 +261264,7 @@ CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 CVE-2024-45160,0,0,5448512f93e2c872a5532bb6e7925e6443ae5601b38aa00ad59c4de27ffce9e0,2024-10-10T12:51:56.987000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 -CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 +CVE-2024-45165,0,1,c95c37e8403c42b6535ee3db172ebed1de2af8ddabba72579971a9771877b8f5,2024-10-31T19:35:08.327000 CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000 CVE-2024-45167,0,0,6f3847a892b75be18a24e1374ef352424a8d56284d9550373f08d0a52ea49aa9,2024-08-22T20:35:24.417000 CVE-2024-45168,0,0,6124dea0f408bc63748f989f7ce4cf06d1deb9da69f42ab4bdcfa64b8daa0ab1,2024-08-22T14:35:13.957000 @@ -261861,7 +261870,7 @@ CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0 CVE-2024-46510,0,0,bb46a7737029f26392a246097a18ec9ca317101031432da9b686fbbec181f9e7,2024-10-04T13:51:25.567000 CVE-2024-46511,0,0,78cf785de24718da0c0ea71257e191470c834e4be61ca79ad4d72c264c3c4729,2024-10-04T13:51:25.567000 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 -CVE-2024-46528,0,1,4d04b74cf43234afd60aee245e40ab967d12ed0a23a16922ce62a9e56a7cfb68,2024-10-31T17:15:13.250000 +CVE-2024-46528,0,0,4d04b74cf43234afd60aee245e40ab967d12ed0a23a16922ce62a9e56a7cfb68,2024-10-31T17:15:13.250000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 CVE-2024-46531,0,0,878a7e01df4c686cd7cdf931908bd2db34d00b16932fa7e72aa7bf69654762d4,2024-10-31T16:35:16.453000 CVE-2024-46532,0,0,28e90e41b88b199c93bd44748203fc4edc0b214d52c53df9729e48aaafb51060,2024-10-16T18:35:05.480000 @@ -261870,7 +261879,7 @@ CVE-2024-46538,0,0,dfc9741b1ceb0c2e645ed8952810cc1343c34577d0526c0ae91f23ea6649c CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000 -CVE-2024-46544,0,0,7c690592f3c3aad53f638c9c118a2efde53f0542c00b3644e612a6801f3cf547,2024-09-26T13:32:55.343000 +CVE-2024-46544,0,1,b18ab032b67182bdfd9cf5b4990f62b6cf345d5567b676ce2f4c2b86a93274c5,2024-10-31T20:35:06.390000 CVE-2024-46548,0,0,a76db6350fd9cf17eb17ea692a21b280803fa9cd2f4c425127b2376fbb1ea301,2024-10-04T13:51:25.567000 CVE-2024-46549,0,0,a58dc99fbe7a6733f6bee128f5732a51ff2defe2296e61fdd35f50a9a237365d,2024-10-04T13:51:25.567000 CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000 @@ -261919,7 +261928,7 @@ CVE-2024-46605,0,0,cd741604be9f1b11329c686e775aac657866e26a3c66d9c2707d0c286f14f CVE-2024-46606,0,0,8a59186f6e37a35a98df2212faf251342d973be335e26a6de0511db920fb3694,2024-10-18T12:53:04.627000 CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000 CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000 -CVE-2024-4661,0,1,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000 +CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000 CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 @@ -262605,7 +262614,7 @@ CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986a CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 -CVE-2024-47640,0,1,a1e01ed5a492a5aded34eda294dc6bd58a5227b3728268dbd61f0874f5c8395b,2024-10-31T17:39:28.907000 +CVE-2024-47640,0,0,a1e01ed5a492a5aded34eda294dc6bd58a5227b3728268dbd61f0874f5c8395b,2024-10-31T17:39:28.907000 CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f553,2024-10-04T13:51:25.567000 CVE-2024-47642,0,0,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000 CVE-2024-47643,0,0,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000 @@ -262937,12 +262946,13 @@ CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168 CVE-2024-48195,0,0,624eed9854f46ef9dafc813bcbfebca0bf2ab48de4eb64a4aa5f0a1ddeec9a89,2024-10-30T18:35:14.433000 CVE-2024-48196,0,0,06085a08add8a4f4e1622d4b148953be486d5c8e3772fc9fb5febed91d95829e,2024-10-30T18:35:15.220000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 +CVE-2024-48200,1,1,d522cdb51427320f6247dedfc0f6e6c39b657ec64c121a0c5e19815e9e23a09f,2024-10-31T19:15:13.150000 CVE-2024-48202,0,0,6a991d4260ecb620082a50303e3e09368ecc201c8b57a4ee048562622acb1335,2024-10-31T15:35:38.390000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 CVE-2024-48206,0,0,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000 CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 -CVE-2024-48213,0,1,5f8713bffe18994daa14febc6bb0ad9b0b79a213338e08da6c4d569a2dd47e80,2024-10-31T18:35:14.040000 +CVE-2024-48213,0,0,5f8713bffe18994daa14febc6bb0ad9b0b79a213338e08da6c4d569a2dd47e80,2024-10-31T18:35:14.040000 CVE-2024-48214,0,0,78cdef8b5cf77a590137f1180c767a14d73d8882d8f7bf7b4722d04546484757,2024-10-31T16:35:17.260000 CVE-2024-48218,0,0,4b803b4002b5edc5abb8b754e173e0e42c64b19814d1d2b7448b5a518c468f92,2024-10-31T15:44:18.777000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 @@ -262984,14 +262994,16 @@ CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b9 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 -CVE-2024-48307,0,0,df3a00e7bacafe2786ff0786147fc98c044a5f54c62a06ecd6885c5296cde834,2024-10-31T01:15:14.803000 +CVE-2024-48307,0,1,81ecd37001e0e72c6ea88f5f6ed123050a0306524d9298167287539fbf37725b,2024-10-31T19:35:09.203000 CVE-2024-48311,0,0,d7c0370dd0b10cfc270efb9e368b85a66e3d825eb9e86a9a918e49a33499f4e2,2024-10-31T16:35:19.993000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 -CVE-2024-48346,0,0,e9ae7cc0b0e1a356f05a97d8deeb8d9dc84f4c9c61fc4af7c52397b9719f02d9,2024-10-30T21:15:14.450000 +CVE-2024-48346,0,1,685dc3b8b4a0617d3bba24133a1b9cfcfa941dbeb1368f1bd1acdbd1ea270b87,2024-10-31T19:35:10.023000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 CVE-2024-48356,0,0,d61948bf2095cc3d150baaa31fe05023f5cd4e2dab12daf4f3dc83771432fb5f,2024-10-30T17:35:12.420000 CVE-2024-48357,0,0,dba1c026ce12a35ee6a885944cea646b76fb79069c0e7307a1deb45a88532ca1,2024-10-30T17:35:13.203000 +CVE-2024-48359,1,1,f826addd6d537acf42a92e0cbf0efa9eb4e62d83f789d88f644862fda35249dd,2024-10-31T20:15:05.340000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 +CVE-2024-48360,1,1,1b5a1633c2541f80a1d590704a304549571b2ffc5dedb093276c0fb3a82b0781,2024-10-31T20:15:05.420000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e2b,2024-06-24T19:26:47.037000 @@ -263040,7 +263052,7 @@ CVE-2024-48547,0,0,9db332cc676278e21a081b803d57f1c54b011fe5dd42093550c345ebe0949 CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c173,2024-10-25T12:56:07.750000 CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 -CVE-2024-48569,0,1,363defbdf09420190878aeae0a2fca5d0c5aa0c8ac5165dd56ab5fe6856327cb,2024-10-31T18:35:14.873000 +CVE-2024-48569,0,0,363defbdf09420190878aeae0a2fca5d0c5aa0c8ac5165dd56ab5fe6856327cb,2024-10-31T18:35:14.873000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000 CVE-2024-48572,0,0,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000 @@ -263071,9 +263083,9 @@ CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07 CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000 CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000 CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000 -CVE-2024-48646,0,1,2c72755711774d9ce5210ca99838e837ec7f18163059771ae42741fa88e99c51,2024-10-31T18:35:15.693000 -CVE-2024-48647,0,1,92cd0668411b861dcce5bb2a87a5095ba9c782585782d8cbac588c674c005357,2024-10-31T18:35:16.527000 -CVE-2024-48648,0,1,56cc0d5ae63142abad3a70ff465753bf85416d54651366afa742cc2bf17f0169,2024-10-31T17:35:03.713000 +CVE-2024-48646,0,0,2c72755711774d9ce5210ca99838e837ec7f18163059771ae42741fa88e99c51,2024-10-31T18:35:15.693000 +CVE-2024-48647,0,0,92cd0668411b861dcce5bb2a87a5095ba9c782585782d8cbac588c674c005357,2024-10-31T18:35:16.527000 +CVE-2024-48648,0,0,56cc0d5ae63142abad3a70ff465753bf85416d54651366afa742cc2bf17f0169,2024-10-31T17:35:03.713000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000 CVE-2024-48654,0,0,b1175c42eb9b6ad703f77f6cacd261d0eb5f65c9d2e13e20c8b31a8501988240,2024-10-28T13:58:09.230000 @@ -263099,7 +263111,7 @@ CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f20 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-48733,0,0,e873e270c7250d836beb5a5d9d75c5d243594eecb9071602bcc17cc41d90fc1f,2024-10-30T21:15:14.507000 CVE-2024-48734,0,0,95db6671e3d0be41a6b06bc9e7fabfe49fbe14fcdbfc14f9c0975bea17995851,2024-10-30T21:15:14.563000 -CVE-2024-48735,0,0,e72a9afea9ee46bb4bcc6f4f09600aed5e7e8192111e03331a7e65ffe3fdfe1d,2024-10-30T21:15:14.620000 +CVE-2024-48735,0,1,5dee0ec0e0374b22f065cb26fb1b8c24e4784dd8a396c35339c7279fbec892bb,2024-10-31T20:35:06.767000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000 CVE-2024-48744,0,0,424c481c5fd1d12d1736019bf9f8804bc723e4ae30a5fde28dbb02cb380182de,2024-10-16T18:35:07.013000 @@ -263190,7 +263202,7 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5 CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000 CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 -CVE-2024-48955,0,0,6a753515eadee4efaaa9ce7d086aaac0fd1d1f88a870f6a34578f374c110a15f,2024-10-30T15:35:22.063000 +CVE-2024-48955,0,1,0a2a2b978cdc62d5d96adf19c8bb21d2cc19e4c4b5bc967c351e4b9474bfeb45,2024-10-31T20:15:05.530000 CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000 CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 @@ -263448,8 +263460,8 @@ CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68b CVE-2024-49640,0,0,becbe9cd8e4562101ae9f0fd4aeb9f5d80e9d81b9046f0c79b66a78a4ae5a7e8,2024-10-31T16:04:01.113000 CVE-2024-49641,0,0,0c76c83cf503f374bc615797049759b6f98944a9c823b145687554c637514560,2024-10-31T16:05:44.353000 CVE-2024-49642,0,0,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000 -CVE-2024-49643,0,1,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000 -CVE-2024-49645,0,1,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000 +CVE-2024-49643,0,0,6284c6900c7970034a8944b3460134452480aca131e8b373807c5239438cf826,2024-10-31T18:48:20.883000 +CVE-2024-49645,0,0,ca9e8de021aa76294f349f1480f6770ba9607afe63354f1726992ea9d42eab18,2024-10-31T17:59:25.867000 CVE-2024-49646,0,0,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000 CVE-2024-49647,0,0,e60b9143544a8c8127edc259fcd544ebde14e3b3a21fa4bf3041175f98777227,2024-10-29T14:34:04.427000 CVE-2024-49648,0,0,882728f062a6477fd5d5596cbadd02c75634cd7d8a2e421ad711333bc5f1d005,2024-10-29T14:34:04.427000 @@ -263761,7 +263773,7 @@ CVE-2024-50070,0,0,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d CVE-2024-50071,0,0,ca95de15815d680369f3146cc2915571a1b4f1c26211b6f5790ba4ff0facd2a6,2024-10-30T17:02:34.740000 CVE-2024-50072,0,0,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000 CVE-2024-50073,0,0,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000 -CVE-2024-50074,0,1,5fea9fa631fbe2046f51821253354eac87649cdd334e0aa7bed64a71b94bc645,2024-10-31T18:23:21.567000 +CVE-2024-50074,0,0,5fea9fa631fbe2046f51821253354eac87649cdd334e0aa7bed64a71b94bc645,2024-10-31T18:23:21.567000 CVE-2024-50075,0,0,f254549f01ba2f5ee239dee6fc0e7ecbe8fe1b2c6da566e1dc2c41565299fc49,2024-10-29T14:34:04.427000 CVE-2024-50076,0,0,960b5306eb9d7d5b99e64da9813531f1a11820802abfb99e23dd9c044d60901e,2024-10-29T14:34:04.427000 CVE-2024-50077,0,0,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299d1e,2024-10-29T14:34:04.427000 @@ -263803,12 +263815,12 @@ CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7 CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-50344,0,0,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000 -CVE-2024-50347,1,1,ed16d14b70cf3d7686a2254299d7869880decc6158040c4e8ffd6c4d37591aca,2024-10-31T18:15:05.600000 +CVE-2024-50347,0,0,ed16d14b70cf3d7686a2254299d7869880decc6158040c4e8ffd6c4d37591aca,2024-10-31T18:15:05.600000 CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000 CVE-2024-50354,0,0,1f20ca590c38e43a7f364e4a76d630df65540096d85e4f8894633db095556fa8,2024-10-31T16:15:05.763000 -CVE-2024-50356,1,1,1fef0c6d5035aacf7f26a2c53b0d2c6111ad3896b8b9aa474c64b30562d696cd,2024-10-31T18:15:05.750000 +CVE-2024-50356,0,1,1c3aa41523b3d8fc957ae37821a636851ed23c168cf4d4bfeac1115b833bd28d,2024-10-31T20:35:07.840000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 @@ -263972,11 +263984,13 @@ CVE-2024-5076,0,0,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000 CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000 CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000 +CVE-2024-50801,1,1,b8874f741b3ac3d4e0411e961bf871ceba705f8f639471838bd72ebc36785c6d,2024-10-31T19:15:13.313000 +CVE-2024-50802,1,1,f24e292e6e8704f5d40bd8576e7700ff6bc9c2fbf554c1d2d83e9f06d65c1a14,2024-10-31T19:15:13.413000 CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-5086,0,0,cace1182cf9be3136b0c613ecdabc086a9a0b40661f04ebd6e230acc3565cbb0,2024-05-29T13:02:09.280000 -CVE-2024-5087,0,1,1746857b68833d8900979ac8a67f81e6079dce1463e5a3122487cb2b7b074692,2024-10-31T18:26:54.500000 +CVE-2024-5087,0,0,1746857b68833d8900979ac8a67f81e6079dce1463e5a3122487cb2b7b074692,2024-10-31T18:26:54.500000 CVE-2024-5088,0,0,cba5e9039c2295e22c8cb155a75af3aef347c6e9813c2bf0c73f71f25ef00106,2024-05-20T13:00:34.807000 CVE-2024-5089,0,0,305706c4595c847ac9cbba52082727d9aefdb687316aa25305e2ea82257716b3,2024-06-06T09:15:14.897000 CVE-2024-5090,0,0,be816c3666262b2758beb88ae86bd9e45d3334ddca99a5e32c28feea44799dd8,2024-06-11T13:54:12.057000 @@ -263996,6 +264010,11 @@ CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000 CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 +CVE-2024-51060,1,1,6954fe4f4c979bac5ff347a737765282b77d34b22daafc7cbe923362e4a739b4,2024-10-31T19:15:13.500000 +CVE-2024-51063,1,1,83d14fce1e9aba85cc79c57d7ea6b3af3164f1724c2fc0eca657961c44180c77,2024-10-31T19:15:13.610000 +CVE-2024-51064,1,1,aede5da59a3b7d23cb6f435a779455219269bdbc5b84078b53f3427c0165d351,2024-10-31T19:15:13.700000 +CVE-2024-51065,1,1,2e7b751ebd5e167556d945b03efd6c3f054ad6056d4c14633dc247533df24b1c,2024-10-31T19:15:13.780000 +CVE-2024-51066,1,1,ee9694dead26536b4b5b9f9e8adea8e7ec593b9553bbcff0acf6476edcf63459,2024-10-31T19:15:13.860000 CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000 CVE-2024-51075,0,0,552465fb7c055ecfb398f22c9432551758d85e6dc6767f3b187c510f15761dd9,2024-10-29T20:35:35.130000 CVE-2024-51076,0,0,3a12fe30660d75d0270cdd7bd56ceece76ba34d3765c2f273f497b6ff97fc1c5,2024-10-29T20:35:35.890000 @@ -264021,12 +264040,12 @@ CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed49927 CVE-2024-51242,0,0,12f705da9022a8e38ebd9ee7e7e6ac01dfd058f24c1a03edec744b643eba3520,2024-10-31T16:35:20.873000 CVE-2024-51243,0,0,800270ed7103621b26b8eae536fb3a8968dff426a0791be494e93fac6c2df32a,2024-10-31T15:35:40.967000 CVE-2024-51254,0,0,f20ab585f3fe372c65595856805921bb8d2b22af7824679356ebca594f108d37,2024-10-31T15:35:41.800000 -CVE-2024-51255,0,0,e1cbafeb091e663b926de7b59cdcd9a21fea2bea834bdd892b0fb1b83916d910,2024-10-31T16:15:06.033000 +CVE-2024-51255,0,1,235a83f99ee2b484c839d657b09596aa17973f52fcb5a6a16e0bbd6f5eafb8de,2024-10-31T19:35:10.837000 CVE-2024-51257,0,0,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000 CVE-2024-51258,0,0,8552984991114543bb72db401d789b000ecda7ab1e49c15b21f3ab9c1d4b407b,2024-10-30T18:35:17.040000 -CVE-2024-51259,0,0,6d702cbaf70c10cfdda0a7abce448d3145a25d2256f8a60137d2335418de4f22,2024-10-31T14:15:06.260000 +CVE-2024-51259,0,1,6ece1df8b0d21af9bb887582666dedab51f593b9a20998980ded2314d5db896a,2024-10-31T19:35:11.680000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 -CVE-2024-51260,0,0,671bfb7984aca048f642929131c3bdfc6798158fd3f798eefbd06d5d50e126ba,2024-10-31T16:15:06.113000 +CVE-2024-51260,0,1,586901ac7a360d1796cf0d0876f6961325f47aad5a0d2fd09476e3b6ab8c144d,2024-10-31T19:35:12.607000 CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000 CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000 CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000 @@ -264054,14 +264073,14 @@ CVE-2024-51425,0,0,833bdc625e1a738ada7ad7d5f55c83a7b1c7a93226be1681295fc3cb6fe3b CVE-2024-51426,0,0,e6101206ecf4337bb6318e551c0f2f3f51553eecbb2541547a51b5d27151fe70,2024-10-31T15:35:43.373000 CVE-2024-51427,0,0,fcfe3e7677db4a7b336b2247c857e7519564993e67b9bed1d6a6e1e171a8c15f,2024-10-31T15:35:44.180000 CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000 -CVE-2024-51430,1,1,3157d8015fa87efc2891316f9d6d859c0d52a688a574b364f2c6e2727bcd1cc2,2024-10-31T17:35:04.600000 +CVE-2024-51430,0,0,3157d8015fa87efc2891316f9d6d859c0d52a688a574b364f2c6e2727bcd1cc2,2024-10-31T17:35:04.600000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000 CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000 -CVE-2024-51478,1,1,acd4bb31c48b5a4cf83924eba9a0379b0f9346e05b21361d2a15e88f0862bf56,2024-10-31T17:15:13.500000 +CVE-2024-51478,0,0,acd4bb31c48b5a4cf83924eba9a0379b0f9346e05b21361d2a15e88f0862bf56,2024-10-31T17:15:13.500000 CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000 -CVE-2024-51481,1,1,f2651a488920fe3fdbbcf0e515a1d10e5430b723396d938341b75258b7a7411d,2024-10-31T17:15:13.723000 -CVE-2024-51482,1,1,5178c636b46c83fa7b2098922ca9a091994ec1b35ba1dadca37cf3d150c89227,2024-10-31T18:15:05.997000 +CVE-2024-51481,0,0,f2651a488920fe3fdbbcf0e515a1d10e5430b723396d938341b75258b7a7411d,2024-10-31T17:15:13.723000 +CVE-2024-51482,0,0,5178c636b46c83fa7b2098922ca9a091994ec1b35ba1dadca37cf3d150c89227,2024-10-31T18:15:05.997000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 CVE-2024-51506,0,0,aeb585d1723ff2c89aafbc7f5be7b06442a99eb384784bc9840750395f547af1,2024-10-29T19:35:28.723000 @@ -264487,7 +264506,7 @@ CVE-2024-5608,0,0,91d3b8760217c3d2e17ddc8bd099d48bf3bda4341e3d053182f418df616ce5 CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,257f707c49e1adeab5f30937de3668453c65dc87c2e8ac71cda38f1fe1bbc4e5,2024-06-17T12:42:04.623000 CVE-2024-5612,0,0,28ceb837b16c04d60c80c2106288728343a6af941bee1c42d1e76e6ac30c4a71,2024-10-29T18:05:42.823000 -CVE-2024-5613,0,1,2286e4c53cf8b075a4bf811beabba10c7d0ce41c40591dd19c0ccb642bdd2197,2024-10-31T18:31:30.757000 +CVE-2024-5613,0,0,2286e4c53cf8b075a4bf811beabba10c7d0ce41c40591dd19c0ccb642bdd2197,2024-10-31T18:31:30.757000 CVE-2024-5614,0,0,3235a098278ef12466faacc7eb682cba1cb99cc913b9ed567c082bb65c13d254,2024-07-29T14:12:08.783000 CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000 CVE-2024-5616,0,0,5078c1aa917db98652cc6ffd2b310b244194da0fcbabfd9d4ed8ccf7b99de509,2024-07-08T15:49:22.437000 @@ -264510,7 +264529,7 @@ CVE-2024-5634,0,0,00eb3cdc892a411ea249c0c861bb9c39f15a25ea90327bdcc836d54ed90e08 CVE-2024-5635,0,0,cc8d1362a9a889fd4ce6da7f46e39b1117534a16d1469408f00bcbe886f319fd,2024-06-11T16:47:04.413000 CVE-2024-5636,0,0,11453de0b2b9e33715d95748660a81de0651a58507f354b8a49561ef7d2587ac,2024-06-11T17:23:29.670000 CVE-2024-5637,0,0,eeb41901e681579a29d0676f0c70bb8e6e3be08e91c4d1d1a3396dc5dea508cd,2024-06-11T18:31:54.787000 -CVE-2024-5638,0,1,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684f3,2024-10-31T18:38:33.640000 +CVE-2024-5638,0,0,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684f3,2024-10-31T18:38:33.640000 CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000 CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000 CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000 @@ -264672,7 +264691,7 @@ CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000 CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000 CVE-2024-5822,0,0,baf10ed90614f0ff900c6a4bdea84fcaae14f3f7ead2ea1122c706f066c79b96,2024-06-27T19:25:12.067000 -CVE-2024-5823,0,1,50ef10262f89eb8063a87ceb928d6e6bd5e644a01c19f98e2fa47e0e16572aff,2024-10-31T18:05:00.637000 +CVE-2024-5823,0,0,50ef10262f89eb8063a87ceb928d6e6bd5e644a01c19f98e2fa47e0e16572aff,2024-10-31T18:05:00.637000 CVE-2024-5824,0,0,a626487511d1e6b65da2c7fdc7f30939ba46505ead241212d2b122818200e9ab,2024-06-27T19:25:12.067000 CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000 CVE-2024-5826,0,0,ab74f2650ad7ec867beb938c7b9b39007cedba2567b06756b5e245e8edb717b0,2024-06-27T19:25:12.067000 @@ -265705,7 +265724,7 @@ CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca450 CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000 CVE-2024-7038,0,0,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000 CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000 -CVE-2024-7042,0,1,cb1e3b618862b496bd13b244398afe81ffff2552b15227836e0acd820bc3de3c,2024-10-31T18:36:30.140000 +CVE-2024-7042,0,0,cb1e3b618862b496bd13b244398afe81ffff2552b15227836e0acd820bc3de3c,2024-10-31T18:36:30.140000 CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000 CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000 CVE-2024-7049,0,0,0a245acb222c9415b34bdd2b50731367d88750a93745ace19c048218b6b8c0be,2024-10-17T14:22:44.653000 @@ -266048,7 +266067,7 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56 CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000 CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000 CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000 -CVE-2024-7472,0,1,cfb9d72479737a220f88555f5248b8b3adcebcdf0dd499def604c090ee01833e,2024-10-31T18:46:32.497000 +CVE-2024-7472,0,0,cfb9d72479737a220f88555f5248b8b3adcebcdf0dd499def604c090ee01833e,2024-10-31T18:46:32.497000 CVE-2024-7473,0,0,20168a95c050c826b36808d062806e3ad8c89fac510d32acafd85084e3f5514a,2024-10-31T15:11:45.557000 CVE-2024-7474,0,0,fd603ba5192c32c81661db241a24a16d96938f0a539e4ad024748791a7268266,2024-10-29T14:35:21.207000 CVE-2024-7475,0,0,2b037db3837162a776e57f7b2c7175870a05e0cd0e7064c84fd1c023e8b92b59,2024-10-29T14:35:21.403000 @@ -266382,7 +266401,7 @@ CVE-2024-7870,0,0,2836216d393e794b4828cb37dfdee043bfdf58d1b6ab4bb6d4918022aecdc9 CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 CVE-2024-7873,0,0,206d8282726d748a6a41b367b674a966213f9d6e3053dc261b740ef29ffe8ab7,2024-09-20T12:30:51.220000 CVE-2024-7878,0,0,1d855258734eb9301ec3064cb052aacfe2a08aa75ea8a20fdcb8aa8f30181ac0,2024-10-02T17:41:44.133000 -CVE-2024-7883,1,1,a0d02461ab906696f5db8c8f3e3571e988cb43aab47f453d7c53bf3a19ae3b1f,2024-10-31T17:15:14.013000 +CVE-2024-7883,0,0,a0d02461ab906696f5db8c8f3e3571e988cb43aab47f453d7c53bf3a19ae3b1f,2024-10-31T17:15:14.013000 CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000 CVE-2024-7885,0,0,e2150db115995e6873d7f6cbf78400b2118c17b58478683565f8b50d49fc70e9,2024-10-07T21:15:19.217000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 @@ -267573,7 +267592,7 @@ CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb776103 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 -CVE-2024-9675,0,1,62113804dce80364e0c34f410a374324b1967014a2528b04188a6bdc38b497f9,2024-10-31T17:15:14.250000 +CVE-2024-9675,0,0,62113804dce80364e0c34f410a374324b1967014a2528b04188a6bdc38b497f9,2024-10-31T17:15:14.250000 CVE-2024-9676,0,0,24ed9ba905e617fe373fd7817b3453536089b8c2e8edbf0e6624a0d55077f74d,2024-10-31T05:15:05.860000 CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000