diff --git a/CVE-2021/CVE-2021-279xx/CVE-2021-27917.json b/CVE-2021/CVE-2021-279xx/CVE-2021-27917.json index f26105add9f..4ab09e91c1d 100644 --- a/CVE-2021/CVE-2021-279xx/CVE-2021-27917.json +++ b/CVE-2021/CVE-2021-279xx/CVE-2021-27917.json @@ -2,8 +2,8 @@ "id": "CVE-2021-27917", "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T22:15:03.577", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:13:58.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@mautic.org", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@mautic.org", "type": "Secondary", @@ -51,10 +81,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", + "versionStartExcluding": "1.0.0", + "versionEndExcluding": "4.4.13", + "matchCriteriaId": "2F3CFAD0-A8EE-42B3-B30C-3D428E0DB029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "FC060988-1D0C-4CB2-A052-A0BCCD236381" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:-:*:*:*:*:*:*", + "matchCriteriaId": "99718D48-5C19-41C5-84E1-52E95F012830" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:beta4:*:*:*:*:*:*", + "matchCriteriaId": "4E35B0F0-9BF1-45FA-8954-B8BFB7389C4D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "213A9276-B9D1-4B4D-BBE9-FC42B6D63DE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "F366E4D8-1515-4E5F-8551-4C8D9E00D0D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "B4234B41-F219-45B7-83A1-8F0F652F2A8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:1.0.0:rc4:*:*:*:*:*:*", + "matchCriteriaId": "DA028F70-6020-47D6-BEC0-6FC0C7E18420" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mautic/mautic/security/advisories/GHSA-xpc5-rr39-v8v2", - "source": "security@mautic.org" + "source": "security@mautic.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json index 27b9c501572..5086687513c 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22862.json @@ -2,13 +2,13 @@ "id": "CVE-2023-22862", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-05T00:15:09.703", - "lastModified": "2023-06-09T22:54:45.870", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T15:15:13.980", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. IBM X-Force ID: 244107." + "value": "IBM Aspera Connect 4.2.5 and IBM Aspera Cargo 4.2.5 transmits authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval." }, { "lang": "es", @@ -61,17 +61,17 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-522" + "value": "CWE-523" } ] }, { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -106,14 +106,6 @@ } ], "references": [ - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/244107", - "source": "psirt@us.ibm.com", - "tags": [ - "VDB Entry", - "Vendor Advisory" - ] - }, { "url": "https://www.ibm.com/support/pages/node/7001053", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-289xx/CVE-2023-28956.json b/CVE-2023/CVE-2023-289xx/CVE-2023-28956.json index 410e7b224fe..207e89b23a5 100644 --- a/CVE-2023/CVE-2023-289xx/CVE-2023-28956.json +++ b/CVE-2023/CVE-2023-289xx/CVE-2023-28956.json @@ -2,13 +2,13 @@ "id": "CVE-2023-28956", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-06-22T02:15:48.717", - "lastModified": "2023-06-28T14:51:02.947", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T14:15:03.340", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Spectrum Protect Backup-Archive Client 8.1.0.0 through 8.1.17.2 may allow a local user to escalate their privileges due to improper access controls. IBM X-Force ID: 251767." + "value": "IBM Spectrum Protect Backup-Archive Client 8.1.0.0 through 8.1.17.2 may allow a local user to escalate their privileges due to improper access controls." } ], "metrics": { @@ -57,8 +57,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -99,14 +109,6 @@ } ], "references": [ - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/251767", - "source": "psirt@us.ibm.com", - "tags": [ - "VDB Entry", - "Vendor Advisory" - ] - }, { "url": "https://www.ibm.com/support/pages/node/7005519", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33850.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33850.json index 8ab93b06f7c..a954f27380d 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33850.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33850.json @@ -2,13 +2,13 @@ "id": "CVE-2023-33850", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-08-22T21:15:07.837", - "lastModified": "2024-09-19T16:15:04.047", + "lastModified": "2024-09-27T14:15:03.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 257132." + "value": "IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information." } ], "metrics": { @@ -218,14 +218,6 @@ } ], "references": [ - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/257132", - "source": "psirt@us.ibm.com", - "tags": [ - "VDB Entry", - "Vendor Advisory" - ] - }, { "url": "https://www.ibm.com/support/pages/node/7010369", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47140.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47140.json index 8e3aa6ac5e0..09e10fbf2b5 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47140.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47140.json @@ -2,13 +2,13 @@ "id": "CVE-2023-47140", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-08T03:15:13.283", - "lastModified": "2024-01-11T16:58:30.733", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-27T14:15:03.827", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM CICS Transaction Gateway 9.3 could allow a user to transfer or view files due to improper access controls. IBM X-Force ID: 270259." + "value": "IBM CICS Transaction Gateway 9.3 could allow a user to transfer or view files due to improper access controls." }, { "lang": "es", @@ -61,8 +61,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -89,14 +99,6 @@ } ], "references": [ - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270259", - "source": "psirt@us.ibm.com", - "tags": [ - "VDB Entry", - "Vendor Advisory" - ] - }, { "url": "https://https://www.ibm.com/support/pages/node/7105094", "source": "psirt@us.ibm.com", diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json index df6e970c1fa..e814d5ff106 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47152.json @@ -2,13 +2,13 @@ "id": "CVE-2023-47152", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-01-22T20:15:46.890", - "lastModified": "2024-03-07T17:15:11.063", + "lastModified": "2024-09-27T14:15:03.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an insecure cryptographic algorithm and to information disclosure in stack trace under exceptional conditions. IBM X-Force ID: 270730." + "value": "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 11.5 is vulnerable to an insecure cryptographic algorithm and to information disclosure in stack trace under exceptional conditions." }, { "lang": "es", @@ -61,8 +61,18 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "psirt@us.ibm.com", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, + { + "source": "nvd@nist.gov", + "type": "Secondary", "description": [ { "lang": "en", @@ -117,14 +127,6 @@ } ], "references": [ - { - "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/270730", - "source": "psirt@us.ibm.com", - "tags": [ - "VDB Entry", - "Vendor Advisory" - ] - }, { "url": "https://security.netapp.com/advisory/ntap-20240307-0001/", "source": "psirt@us.ibm.com" diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0001.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0001.json index b3971e6c89f..295ea74750d 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0001.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0001.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0001", "sourceIdentifier": "psirt@purestorage.com", "published": "2024-09-23T18:15:04.070", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:08:57.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -51,10 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.14", + "matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.10", + "matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145" + } + ] + } + ] + } + ], "references": [ { "url": "https://purestorage.com/security", - "source": "psirt@purestorage.com" + "source": "psirt@purestorage.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0002.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0002.json index e982c6e6c07..ac52bf1afc4 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0002.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0002", "sourceIdentifier": "psirt@purestorage.com", "published": "2024-09-23T18:15:04.410", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:13:24.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -51,10 +81,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.17", + "versionEndIncluding": "5.3.21", + "matchCriteriaId": "CC18D0BC-EB2B-421A-AB24-4D6BA574C214" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.7", + "versionEndIncluding": "6.0.9", + "matchCriteriaId": "1E1003E6-BED7-4DE7-9511-1348E0A90587" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.8", + "versionEndIncluding": "6.1.25", + "matchCriteriaId": "4B4EE750-7E14-4C4B-8C83-55F10ADC209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.17", + "matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.14", + "matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.10", + "matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://purestorage.com/security", - "source": "psirt@purestorage.com" + "source": "psirt@purestorage.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0003.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0003.json index 937fb23b1f0..89463fcea19 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0003.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0003", "sourceIdentifier": "psirt@purestorage.com", "published": "2024-09-23T18:15:04.697", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:23:58.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -51,10 +81,72 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.17", + "versionEndIncluding": "5.3.21", + "matchCriteriaId": "CC18D0BC-EB2B-421A-AB24-4D6BA574C214" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.7", + "versionEndIncluding": "6.0.9", + "matchCriteriaId": "1E1003E6-BED7-4DE7-9511-1348E0A90587" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.8", + "versionEndIncluding": "6.1.25", + "matchCriteriaId": "4B4EE750-7E14-4C4B-8C83-55F10ADC209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.17", + "matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.14", + "matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.10", + "matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://purestorage.com/security", - "source": "psirt@purestorage.com" + "source": "psirt@purestorage.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0004.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0004.json index 6d37e89f1f8..503c65d461a 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0004.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0004", "sourceIdentifier": "psirt@purestorage.com", "published": "2024-09-23T18:15:04.973", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:24:41.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -51,10 +81,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndIncluding": "5.0.11", + "matchCriteriaId": "DB4713BD-F013-4129-B3B8-0B95CE69D8A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1.0", + "versionEndIncluding": "5.1.17", + "matchCriteriaId": "D5C7A1D2-E2AE-4737-AF3D-B46AFA52DBD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2.0", + "versionEndIncluding": "5.2.7", + "matchCriteriaId": "FA0303FA-81E7-41F8-B8F4-AD571E2B8D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.0", + "versionEndIncluding": "5.3.21", + "matchCriteriaId": "A1077938-9AEC-446A-BF07-ECEF798889E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndIncluding": "6.0.9", + "matchCriteriaId": "DA37DE8B-32EB-4BDD-808B-0DDF18ADC33C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.0", + "versionEndIncluding": "6.1.25", + "matchCriteriaId": "C01E4DAE-CAA7-4EF9-B47D-B400E36B97F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.17", + "matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.14", + "matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.10", + "matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://purestorage.com/security", - "source": "psirt@purestorage.com" + "source": "psirt@purestorage.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0005.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0005.json index ce7a27e3031..7c112fefdd5 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0005.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0005.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0005", "sourceIdentifier": "psirt@purestorage.com", "published": "2024-09-23T18:15:05.233", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:25:40.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "psirt@purestorage.com", "type": "Secondary", @@ -51,10 +81,167 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndIncluding": "5.0.11", + "matchCriteriaId": "DB4713BD-F013-4129-B3B8-0B95CE69D8A6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1.0", + "versionEndIncluding": "5.1.17", + "matchCriteriaId": "D5C7A1D2-E2AE-4737-AF3D-B46AFA52DBD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.2.0", + "versionEndIncluding": "5.2.7", + "matchCriteriaId": "FA0303FA-81E7-41F8-B8F4-AD571E2B8D13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.3.0", + "versionEndIncluding": "5.3.21", + "matchCriteriaId": "A1077938-9AEC-446A-BF07-ECEF798889E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndIncluding": "6.0.9", + "matchCriteriaId": "DA37DE8B-32EB-4BDD-808B-0DDF18ADC33C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.0", + "versionEndIncluding": "6.1.25", + "matchCriteriaId": "C01E4DAE-CAA7-4EF9-B47D-B400E36B97F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2.0", + "versionEndIncluding": "6.2.17", + "matchCriteriaId": "3311847D-BE5E-4435-9B1B-DF8824DF55B4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.3.0", + "versionEndIncluding": "6.3.14", + "matchCriteriaId": "A81E5420-C4D6-42CD-93EB-0B0BCB01F918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4.0", + "versionEndIncluding": "6.4.10", + "matchCriteriaId": "07C73EC4-5F8C-422B-971F-0C8445E72145" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6B75DE0E-3A1F-401A-85B0-EB7B7C8248D9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fa:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4BDB3666-13AA-4908-9CB9-4426A7F6ED56" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndIncluding": "3.0.9", + "matchCriteriaId": "2A921EA5-4877-4CA2-AA23-801C56890632" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndIncluding": "3.1.5", + "matchCriteriaId": "06BC3E85-9263-4BA8-9B6B-2FCEC0620746" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2.0", + "versionEndIncluding": "3.2.10", + "matchCriteriaId": "8BD275B2-1F43-4B7B-9E68-49E0D07FA5B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.3.0", + "versionEndIncluding": "3.3.11", + "matchCriteriaId": "46E8FF81-4F41-4B5D-B602-5C32B1B57602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndIncluding": "4.0.6", + "matchCriteriaId": "6491F180-CB5E-4790-B7EF-618840C71E06" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndIncluding": "4.1.10", + "matchCriteriaId": "5B9D88CE-6331-4E11-B4C0-5DAD0B73911A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndIncluding": "4.2.3", + "matchCriteriaId": "202A85B4-5F81-4559-9326-12830063D99F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:4.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6F372AC2-12D1-4CD7-923E-C8650C102C6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:purestorage:purity\\/\\/fb:4.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D4CEF944-7552-41DF-993E-6D3B1463B548" + } + ] + } + ] + } + ], "references": [ { "url": "https://purestorage.com/security", - "source": "psirt@purestorage.com" + "source": "psirt@purestorage.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-33xx/CVE-2024-3373.json b/CVE-2024/CVE-2024-33xx/CVE-2024-3373.json new file mode 100644 index 00000000000..5e58c63d891 --- /dev/null +++ b/CVE-2024/CVE-2024-33xx/CVE-2024-3373.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-3373", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-09-27T15:15:14.577", + "lastModified": "2024-09-27T15:15:14.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RSM Design Website Template allows SQL Injection.This issue affects Website Template: before 1.2." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1563", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json index bdba40492cf..bc659bb2fb4 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36426.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36426", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-27T22:15:08.507", - "lastModified": "2024-07-03T02:03:11.237", + "lastModified": "2024-09-27T15:15:14.377", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://community.targit.com/hc/en-us/articles/12618082416028-Change-Log-On-prem", "source": "cve@mitre.org" }, + { + "url": "https://community.targit.com/hc/en-us/articles/16112758176156-Vulnerabilities", + "source": "cve@mitre.org" + }, { "url": "https://github.com/DMCERTCE/DecisionSuite_Token_in_Url", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json index 125cdd27959..edc7c36b759 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36427.json @@ -2,13 +2,13 @@ "id": "CVE-2024-36427", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-29T16:15:11.090", - "lastModified": "2024-07-03T02:03:12.033", + "lastModified": "2024-09-27T15:15:14.483", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The file-serving function in TARGIT Decision Suite 23.2.15007 allows authenticated attackers to read or write to server files via a crafted file request. This can allow code execution via a .xview file." + "value": "The file-serving function in TARGIT Decision Suite before 24.06.19002 (TARGIT Decision Suite 2024 \u2013 June) allows authenticated attackers to read or write to server files via a crafted file request. This can allow code execution via a .xview file." }, { "lang": "es", @@ -56,6 +56,10 @@ } ], "references": [ + { + "url": "https://community.targit.com/hc/en-us/articles/16112758176156-Vulnerabilities", + "source": "cve@mitre.org" + }, { "url": "https://github.com/DMCERTCE/DecisionSuite_Path_Traversal_SSRF", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json index cc00c85356d..ecc2a7ae47c 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36491", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-17T09:15:03.090", - "lastModified": "2024-08-01T13:52:56.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-27T14:05:54.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,407 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-1300_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.4.10", + "matchCriteriaId": "93E1B6BE-9BC9-42A1-BAAD-F3B77480E39E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-155\\/c_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "CB857995-8BB6-43D8-8312-A07A9B0406EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-610x_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.14.11c", + "matchCriteriaId": "DAE4D3F9-8AD2-4E7F-A775-C7F9CDB2AF86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g050_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.12.10", + "matchCriteriaId": "0A13E427-5D4C-438F-8138-32CFB0891B4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g060_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.15.6", + "matchCriteriaId": "201D26E0-8485-4BBD-B5CB-AFAB668A3BCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g100_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.23.11", + "matchCriteriaId": "4236D6DC-2190-4280-9667-DFF95C065800" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g110_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.7.32", + "matchCriteriaId": "1C488D0A-3B6E-4C8B-9C05-C68E67A26E51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g120_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.15.2c", + "matchCriteriaId": "10F93F4E-CFA1-4FE4-9FDB-D9C58B5967A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g200_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.12.16", + "matchCriteriaId": "7016BF10-A68A-489E-AEE8-92B7CE768190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_vxr-x64:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.7.32", + "matchCriteriaId": "C4218167-7FDF-4ED7-B776-724504E8E5AF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_vxr-x86:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.1.5", + "matchCriteriaId": "663661B7-9552-4E05-952F-3BD491B30B20" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-160\\/lw_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.8.4", + "matchCriteriaId": "A03D7A97-5D7B-4A10-A83E-07DDEBC5F1F2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-160\\/lw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87410133-A2F3-4592-A808-04AFA816953C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-230\\/c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.30.13", + "matchCriteriaId": "85AD66C6-DF0F-4BC1-B979-C2BB8F09CBC9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-230\\/c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8FE0C63-8CF3-485C-8E8E-7C39AA07006F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-350\\/c_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.30.9c", + "matchCriteriaId": "6A40EC07-7E1F-40F8-BE4B-DF03ED12E913" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-350\\/c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0B53442-E424-4FA2-9049-B66AF2B39200" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-530_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.11.14", + "matchCriteriaId": "CBB1B1A5-A8FF-47E4-B544-407D7EFD39D7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35845A42-42A5-4042-BCEA-8015F8CB5C37" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-650_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.16.2", + "matchCriteriaId": "DBFB68AA-BA4A-4DF6-916A-D2597C1B65AE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-650_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "52675FC8-8A10-4B7F-9581-E7E7A9A79002" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-g180\\/l-ca_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.7.28c", + "matchCriteriaId": "58FE55C1-3266-4183-8DD7-9F73F4B18446" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-g180\\/l-ca:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A0AEA14-2DF2-4E0E-AB16-49DC74F6CC78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-130\\/c_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "E78D5D52-53FD-4F1A-9B39-F43A6A718082" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-130\\/c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9AE2019-F134-4D0C-991E-613BED91BB7B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-125\\/cx_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B54CBE1A-E6E0-4C94-A187-B3B16BAF09A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-125\\/cx_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "B54CBE1A-E6E0-4C94-A187-B3B16BAF09A8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-120\\/c_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "955F9BBA-FDA1-46C5-ACD9-86661D7C6027" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-120\\/c:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF4A7DC-3DBB-4CCD-B8B0-F4BFB188C135" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_wxr-250_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "9F62ECC5-D4AA-4C75-AD1D-8C130E9C7118" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_wxr-250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44B45729-2265-4DB0-BD01-F133C7B2C857" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:centurysys:futurenet_nxr-1200_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "55D6BD64-221C-48A1-8A54-F41BDDE0A199" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:centurysys:futurenet_nxr-1200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70F6FF8E-4303-4213-9603-B81ACA9CEE8E" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU96424864/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-01.html", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.centurysys.co.jp/backnumber/nxr_common/20240716-03.html", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37779.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37779.json index 364b028291a..3efc2d6a575 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37779.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37779", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-23T20:15:04.637", - "lastModified": "2024-09-26T13:32:55.343", + "lastModified": "2024-09-27T14:35:03.517", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", - "attackVector": "ADJACENT_NETWORK", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "HIGH", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 5.7, - "baseSeverity": "MEDIUM" + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 0.9, - "impactScore": 4.7 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -44,6 +44,10 @@ "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ + { + "lang": "en", + "value": "CWE-75" + }, { "lang": "en", "value": "CWE-94" diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40509.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40509.json new file mode 100644 index 00000000000..5fe00379b4c --- /dev/null +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40509.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40509", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:14.740", + "lastModified": "2024-09-27T15:15:14.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMFinDev.asmx function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Jansen-C-Moreira/CVE-2024-40509", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/openpetra/openpetra", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40510.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40510.json new file mode 100644 index 00000000000..cff79d79ae1 --- /dev/null +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40510.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40510", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:14.820", + "lastModified": "2024-09-27T15:15:14.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMCommon.asmx function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Jansen-C-Moreira/CVE-2024-405010", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/openpetra/openpetra", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40511.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40511.json new file mode 100644 index 00000000000..05c8660d421 --- /dev/null +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40511.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-40511", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T14:15:04.343", + "lastModified": "2024-09-27T14:15:04.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMServerAdmin.asmx function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Jansen-C-Moreira/CVE-2024-40511", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/openpetra/openpetra", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40512.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40512.json new file mode 100644 index 00000000000..85ef0e3dc48 --- /dev/null +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40512.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40512", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T14:15:04.423", + "lastModified": "2024-09-27T14:15:04.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in openPetra v.2023.02 allows a remote attacker to obtain sensitive information via the serverMReporting.asmx function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Jansen-C-Moreira/CVE-2024-40512", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json index d19cfd4e9b7..31f1e617ac2 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44053.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44053", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:02.013", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:32:14.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mohammadarif:opor_ayam:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.8", + "matchCriteriaId": "91BB325B-6A20-4D42-83ED-284F10DE5F4E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/opor-ayam/wordpress-opor-ayam-theme-1-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json index d38edb056ce..5ffaa5e0b71 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44059", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T09:15:04.613", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:33:52.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mediaron:custom_query_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.3.1", + "matchCriteriaId": "E4B9DCA2-83A7-4C4E-B654-71E3753E53D9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/post-type-archive-mapping/wordpress-custom-query-blocks-plugin-5-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json index 1c3912cfd19..9986a048922 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44060", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:11.367", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:04:50.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jenniferhall:filmix:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "9681A64E-012D-485E-A0E6-3F4977F8C687" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/filmix/wordpress-filmix-theme-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json index 9280e3b5eff..8f7e83d6519 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44062", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:12.710", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:49:46.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpgogo:custom_field_template:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.6", + "matchCriteriaId": "DD78810F-0AAC-4987-AEF0-45F2981DF3CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-field-template/wordpress-custom-field-template-plugin-2-6-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json index 37518199aad..44c9d7094c3 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44063", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:12.940", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:31:05.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:happyforms:happyforms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.26.1", + "matchCriteriaId": "1E36425F-A1F9-4D54-BFA7-6ABF1F342DD7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/happyforms/wordpress-happyforms-plugin-1-26-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44910.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44910.json new file mode 100644 index 00000000000..dafecfa8469 --- /dev/null +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44910.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44910", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:14.907", + "lastModified": "2024-09-27T15:15:14.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the AOS subsystem (crypto_aos.c)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nasa/CryptoLib/issues/268", + "source": "cve@mitre.org" + }, + { + "url": "https://visionspace.com/crashing-cryptolib/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44911.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44911.json new file mode 100644 index 00000000000..00736db65dc --- /dev/null +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44911.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44911", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:14.990", + "lastModified": "2024-09-27T15:15:14.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the TC subsystem (crypto_aos.c)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nasa/CryptoLib/issues/268", + "source": "cve@mitre.org" + }, + { + "url": "https://visionspace.com/crashing-cryptolib/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44912.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44912.json new file mode 100644 index 00000000000..4a3871ce255 --- /dev/null +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44912.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44912", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:15.063", + "lastModified": "2024-09-27T15:15:15.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NASA CryptoLib v1.3.0 was discovered to contain an Out-of-Bounds read via the TM subsystem (crypto_tm.c)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nasa/CryptoLib/issues/268", + "source": "cve@mitre.org" + }, + { + "url": "https://visionspace.com/crashing-cryptolib/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json index bca6fceddc4..904e1714225 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45459.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45459", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.963", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:46:32.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pickplugins:product_slider_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.13.51", + "matchCriteriaId": "9ECBECF4-D49F-4F6C-B48E-62F8CE0C1CC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woocommerce-products-slider/wordpress-product-slider-for-woocommerce-by-pickplugins-plugin-1-13-50-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json index 461212a7306..ee311113779 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45460.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45460", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:14.173", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:51:08.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:info-d-74:flipping_cards:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.31", + "matchCriteriaId": "5C84EBBB-A08E-456D-B040-BBA02ED6D201" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/flipping-cards/wordpress-flipping-cards-plugin-1-30-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45773.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45773.json new file mode 100644 index 00000000000..006776aaa7b --- /dev/null +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45773.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-45773", + "sourceIdentifier": "cve-assign@fb.com", + "published": "2024-09-27T14:15:04.503", + "lastModified": "2024-09-27T15:35:02.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free vulnerability involving upgradeToRocket requests can cause the application to crash or potentially result in code execution or other undesirable effects. This issue affects Facebook Thrift prior to v2024.09.09.00." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.facebook.com/security/advisories/cve-2024-45773", + "source": "cve-assign@fb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45863.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45863.json new file mode 100644 index 00000000000..87b91dfbfa9 --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45863.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-45863", + "sourceIdentifier": "cve-assign@fb.com", + "published": "2024-09-27T14:15:04.567", + "lastModified": "2024-09-27T15:35:02.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A null-dereference vulnerability involving parsing requests specifying invalid protocols can cause the application to crash or potentially result in other undesirable effects. This issue affects Facebook Thrift from v2024.09.09.00 until v2024.09.23.00." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://www.facebook.com/security/advisories/cve-2024-45863", + "source": "cve-assign@fb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json index 34df7204075..e5be4d39d7a 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45989.json @@ -2,16 +2,55 @@ "id": "CVE-2024-45989", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-26T18:15:08.667", - "lastModified": "2024-09-26T18:15:08.667", + "lastModified": "2024-09-27T15:35:02.983", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Monica AI Assistant desktop application v2.3.0 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor. A prompt injection allows an attacker to modify chatbot answer with an unloaded image that exfiltrates the user's sensitive chat data of the current session to a malicious third-party or attacker-controlled server." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n de escritorio Monica AI Assistant v2.3.0 es vulnerable a la exposici\u00f3n de informaci\u00f3n confidencial a un actor no autorizado. Una inyecci\u00f3n r\u00e1pida permite a un atacante modificar la respuesta del chatbot con una imagen no cargada que filtra los datos confidenciales del chat del usuario de la sesi\u00f3n actual a un servidor malicioso de terceros o controlado por el atacante." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/soursec/CVEs/tree/main/CVE-2024-45989", diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46331.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46331.json new file mode 100644 index 00000000000..7283aa2abc0 --- /dev/null +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46331.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46331", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:15.200", + "lastModified": "2024-09-27T15:15:15.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ModStartCMS v8.8.0 was discovered to contain an open redirect vulnerability in the redirect parameter at /admin/login. This vulnerability allows attackers to redirect users to an arbitrary website via a crafted URL." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/whiteshark2k/ModStartCMS-OpenRedirect/blob/main/ModStartCMS-OpenRedirect.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46333.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46333.json new file mode 100644 index 00000000000..ce3d06c7930 --- /dev/null +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46333.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46333", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:15.283", + "lastModified": "2024-09-27T15:15:15.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated cross-site scripting (XSS) vulnerability in Piwigo v14.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Album Name parameter under the Add Album function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/whiteshark2k/Piwigo-XSS/blob/main/Piwigo-XSS.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json index a17b78fd591..0181517e23e 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46441.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46441", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-27T13:15:13.397", - "lastModified": "2024-09-27T13:15:13.397", + "lastModified": "2024-09-27T15:35:03.803", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An arbitrary file upload vulnerability in YPay 1.2.0 allows attackers to execute arbitrary code via a ZIP archive to themePutFile in app/common/util/Upload.php (called from app/admin/controller/ypay/Home.php). The file extension of an uncompressed file is not checked." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/kacins/YPay/issues/4", diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46470.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46470.json new file mode 100644 index 00000000000..ab929ff405d --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46470.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46470", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:15.393", + "lastModified": "2024-09-27T15:15:15.393", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in CodeAstro Membership Management System 1.0 allows attackers to run malicious JavaScript via the membership_type field in the edit-type.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://codeastro.com/membership-management-system-in-php-with-source-code/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/JonMoriSenpai/CVE-WriteUps/blob/main/CodeAstro%20-%20MembershipM-PHP/CVE-2024-46470/writeup.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46471.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46471.json new file mode 100644 index 00000000000..4473792abc5 --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46471.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46471", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:15.483", + "lastModified": "2024-09-27T15:15:15.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Directory Listing in /uploads/ Folder in CodeAstro Membership Management System 1.0 exposes the structure and contents of directories, potentially revealing sensitive information." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://codeastro.com/membership-management-system-in-php-with-source-code/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/JonMoriSenpai/CVE-WriteUps/blob/main/CodeAstro%20-%20MembershipM-PHP/CVE-2024-46471/writeup.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46472.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46472.json new file mode 100644 index 00000000000..d0061d6c67d --- /dev/null +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46472.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-46472", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-27T15:15:15.567", + "lastModified": "2024-09-27T15:15:15.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection via the parameter 'email' in the Login Page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://codeastro.com/membership-management-system-in-php-with-source-code/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/JonMoriSenpai/CVE-WriteUps/blob/main/CodeAstro%20-%20MembershipM-PHP/CVE-2024-46472/writeup.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json index bc6718dc4d1..f62d9dd7939 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46627.json @@ -2,16 +2,55 @@ "id": "CVE-2024-46627", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-26T17:15:04.190", - "lastModified": "2024-09-26T17:15:04.190", + "lastModified": "2024-09-27T15:35:04.583", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in BECN DATAGERRY v2.2 allows attackers to execute arbitrary commands via crafted web requests." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en BECN DATAGERRY v2.2 permite a los atacantes ejecutar comandos arbitrarios a trav\u00e9s de solicitudes web manipuladas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://daly.wtf/cve-2024-46627-incorrect-access-control-in-becn-datagerry-v2-2-allows-attackers-to-execute-arbitrary-commands-via-crafted-web-requests/", diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47050.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47050.json index fd5594a65b5..2dccbc08da1 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47050.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47050", "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T21:15:13.743", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:29:21.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security@mautic.org", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@mautic.org", "type": "Secondary", @@ -51,10 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.0", + "versionEndExcluding": "4.4.13", + "matchCriteriaId": "BE9F17BE-23A1-4088-9B04-27DE04CC756E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "FC060988-1D0C-4CB2-A052-A0BCCD236381" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mautic/mautic/security/advisories/GHSA-73gr-32wg-qhh7", - "source": "security@mautic.org" + "source": "security@mautic.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47058.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47058.json index d7fabd4911b..e3dfaf4c116 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47058.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47058", "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T21:15:13.923", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:31:30.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security@mautic.org", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@mautic.org", "type": "Secondary", @@ -51,10 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "4.4.13", + "matchCriteriaId": "E6555B3F-97C3-4192-BB29-BEDD3C63C4AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acquia:mautic:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "FC060988-1D0C-4CB2-A052-A0BCCD236381" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mautic/mautic/security/advisories/GHSA-xv68-rrmw-9xwf", - "source": "security@mautic.org" + "source": "security@mautic.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47182.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47182.json new file mode 100644 index 00000000000..c08be3c520d --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47182.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47182", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-27T14:15:04.620", + "lastModified": "2024-09-27T14:15:04.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dozzle is a realtime log viewer for docker containers. Before version 8.5.3, the app uses sha-256 as the hash for passwords, which leaves users susceptible to rainbow table attacks. The app switches to bcrypt, a more appropriate hash for passwords, in version 8.5.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-328" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/amir20/dozzle/commit/de79f03aa3dbe5bb1e154a7e8d3dccbd229f3ea3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/amir20/dozzle/security/advisories/GHSA-w7qr-q9fh-fj35", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47184.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47184.json new file mode 100644 index 00000000000..b96d18eb43c --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47184.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-47184", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-27T14:15:04.833", + "lastModified": "2024-09-27T14:15:04.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ampache is a web based audio/video streaming application and file manager. Prior to version 6.6.0, the Democratic Playlist Name is vulnerable to a stored cross-site scripting. Version 6.6.0 fixes this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ampache/ampache/blob/ff332c9810e493fd51b258f5e53119fad86c23bf/public/templates/show_democratic.inc.php#L36", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ampache/ampache/commit/7e64d140dafcbe0d61f1a07e94486f6ed67932d6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ampache/ampache/security/advisories/GHSA-f99r-gv34-v46f", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json index 803541b8a2b..9c66cc60173 100644 --- a/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6339.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6339", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-21T08:15:04.333", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:04:31.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,18 +61,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:averta:phlox:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.16.5", + "matchCriteriaId": "FE39DFDE-C634-4941-AFE2-B9E6A861B4DB" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/skmorshed75/ferdykorp/blob/9176d0782558ac2bd620777174e942cefc27fb21/wp-content/themes/phlox/templates/theme-parts/entry/search-advanced.php#L69", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://owasp.org/www-community/attacks/xss/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Technical Description" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b5ad113-f739-455a-9db6-b4f300b92837?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-71xx/CVE-2024-7149.json b/CVE-2024/CVE-2024-71xx/CVE-2024-7149.json new file mode 100644 index 00000000000..072af46ad32 --- /dev/null +++ b/CVE-2024/CVE-2024-71xx/CVE-2024-7149.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2024-7149", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-27T14:15:05.043", + "lastModified": "2024-09-27T14:15:05.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Event Manager, Events Calendar, Tickets, Registrations \u2013 Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.8 via multiple style parameters. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/events-tab/style/tab-1.php#L42", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/events/events.php#L754", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/schedule-list/schedule-list.php#L293", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/schedule/schedule.php#L368", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-event-solution/trunk/widgets/speakers/speakers.php#L483", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3157415/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/75537b61-5622-4b35-b80e-389526bd99f0?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8724.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8724.json index bfb4391cb7d..d29a4a4bf68 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8724.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8724.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8724", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-14T04:15:05.210", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:56:00.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xootix:waitlist_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.6", + "matchCriteriaId": "27DAA46C-B938-4473-B208-9E65695FB375" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/waitlist-woocommerce/trunk/admin/templates/xoo-wl-import-form.php#L8", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151186%40waitlist-woocommerce&new=3151186%40waitlist-woocommerce&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c298c87e-cf3c-4b72-bb0e-a01ca2dfe52f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8758.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8758.json index 0adc0618838..03f9e2aaecb 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8758.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8758.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8758", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-23T06:15:04.310", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-27T14:29:23.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "El complemento Quiz and Survey Master (QSM) de WordPress anterior a la versi\u00f3n 9.1.3 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:expresstech:quiz_and_survey_master:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "9.1.3", + "matchCriteriaId": "80FE4D50-5C5B-4EE9-BE6E-F2CC7CA7E814" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/d74ecae2-3a1e-4fc7-9dd3-04cef631ecd9/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8797.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8797.json index 34e384f21d2..b074849d971 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8797.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8797", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-14T06:15:10.317", - "lastModified": "2024-09-14T11:47:14.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T14:02:23.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbookingsystem:wp_booking_system:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.19.9", + "matchCriteriaId": "EAF5634D-A93B-49F2-A435-0EF0B563B767" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-booking-system/tags/2.0.19.10/includes/modules/update-checker/views/view-register-website.php#L21", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3150487%40wp-booking-system&new=3150487%40wp-booking-system&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1bea55b5-b2d7-4eaf-8868-d2645ce18619?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9033.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9033.json index ac7b62ec2c5..7815fbba6c8 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9033.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9033", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T15:15:18.037", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:56:35.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20project%20in%20php%20Stored%20Cross-Site%20Scripting(XSS)%20vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278203", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278203", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.410977", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9039.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9039.json index a480f8992fc..97f60a2ae11 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9039.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9039.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9039", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T16:15:06.153", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:58:22.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20signup%20time-based%20SQL%20Injection%20Vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278210", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.411471", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9040.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9040.json index d34d830ddd7..e99617ee49b 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9040.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9040", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T17:15:15.240", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:53:28.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -110,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,18 +150,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0E2D99E2-B236-4096-ACA2-8907C29756B6" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.278211", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278211", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9041.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9041.json index cd29e6de1b3..b06e46f5e01 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9041.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9041", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-20T17:15:15.507", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:57:55.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +150,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/para-paradise/webray.com.cn/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Best%20house%20rental%20management%20system%20update_account%20time-based%20SQL%20Injection%20Vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278212", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278212", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.411502", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9094.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9094.json index 06e70de68ec..79cd065d8f9 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9094.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9094", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-23T02:15:02.290", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-27T15:54:09.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ByKevin1/CVE/blob/main/sql1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.278272", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.278272", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.412254", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9283.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9283.json new file mode 100644 index 00000000000..2e773078da3 --- /dev/null +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9283.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-9283", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-27T14:15:05.330", + "lastModified": "2024-09-27T14:15:05.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in RelaxedJS ReLaXed up to 0.2.2. Affected is an unknown function of the component Pug to PDF Converter. The manipulation leads to cross site scripting. An attack has to be approached locally. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 1.7 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.1, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1Ll1dRwQds8987S-l5o2iJu4MQRG-p4-A/view?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278676", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278676", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.411185", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 7c00f1579c6..9dd98f6c374 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-27T14:00:19.191603+00:00 +2024-09-27T16:00:19.047040+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-27T13:58:36.483000+00:00 +2024-09-27T15:58:22.493000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264013 +264032 ``` ### CVEs added in the last Commit -Recently added CVEs: `77` +Recently added CVEs: `19` -- [CVE-2024-46853](CVE-2024/CVE-2024-468xx/CVE-2024-46853.json) (`2024-09-27T13:15:16.997`) -- [CVE-2024-46854](CVE-2024/CVE-2024-468xx/CVE-2024-46854.json) (`2024-09-27T13:15:17.063`) -- [CVE-2024-46855](CVE-2024/CVE-2024-468xx/CVE-2024-46855.json) (`2024-09-27T13:15:17.133`) -- [CVE-2024-46856](CVE-2024/CVE-2024-468xx/CVE-2024-46856.json) (`2024-09-27T13:15:17.210`) -- [CVE-2024-46857](CVE-2024/CVE-2024-468xx/CVE-2024-46857.json) (`2024-09-27T13:15:17.277`) -- [CVE-2024-46858](CVE-2024/CVE-2024-468xx/CVE-2024-46858.json) (`2024-09-27T13:15:17.353`) -- [CVE-2024-46859](CVE-2024/CVE-2024-468xx/CVE-2024-46859.json) (`2024-09-27T13:15:17.430`) -- [CVE-2024-46860](CVE-2024/CVE-2024-468xx/CVE-2024-46860.json) (`2024-09-27T13:15:17.493`) -- [CVE-2024-46861](CVE-2024/CVE-2024-468xx/CVE-2024-46861.json) (`2024-09-27T13:15:17.563`) -- [CVE-2024-46862](CVE-2024/CVE-2024-468xx/CVE-2024-46862.json) (`2024-09-27T13:15:17.627`) -- [CVE-2024-46863](CVE-2024/CVE-2024-468xx/CVE-2024-46863.json) (`2024-09-27T13:15:17.690`) -- [CVE-2024-46864](CVE-2024/CVE-2024-468xx/CVE-2024-46864.json) (`2024-09-27T13:15:17.747`) -- [CVE-2024-46865](CVE-2024/CVE-2024-468xx/CVE-2024-46865.json) (`2024-09-27T13:15:17.820`) -- [CVE-2024-46866](CVE-2024/CVE-2024-468xx/CVE-2024-46866.json) (`2024-09-27T13:15:17.887`) -- [CVE-2024-46867](CVE-2024/CVE-2024-468xx/CVE-2024-46867.json) (`2024-09-27T13:15:17.937`) -- [CVE-2024-46868](CVE-2024/CVE-2024-468xx/CVE-2024-46868.json) (`2024-09-27T13:15:18.007`) -- [CVE-2024-8607](CVE-2024/CVE-2024-86xx/CVE-2024-8607.json) (`2024-09-27T12:15:03.617`) -- [CVE-2024-8608](CVE-2024/CVE-2024-86xx/CVE-2024-8608.json) (`2024-09-27T12:15:03.823`) -- [CVE-2024-8609](CVE-2024/CVE-2024-86xx/CVE-2024-8609.json) (`2024-09-27T12:15:03.997`) -- [CVE-2024-8643](CVE-2024/CVE-2024-86xx/CVE-2024-8643.json) (`2024-09-27T12:15:04.210`) -- [CVE-2024-8644](CVE-2024/CVE-2024-86xx/CVE-2024-8644.json) (`2024-09-27T12:15:04.390`) -- [CVE-2024-9279](CVE-2024/CVE-2024-92xx/CVE-2024-9279.json) (`2024-09-27T12:15:04.857`) -- [CVE-2024-9280](CVE-2024/CVE-2024-92xx/CVE-2024-9280.json) (`2024-09-27T12:15:05.227`) -- [CVE-2024-9281](CVE-2024/CVE-2024-92xx/CVE-2024-9281.json) (`2024-09-27T13:15:18.153`) -- [CVE-2024-9282](CVE-2024/CVE-2024-92xx/CVE-2024-9282.json) (`2024-09-27T13:15:18.443`) +- [CVE-2024-3373](CVE-2024/CVE-2024-33xx/CVE-2024-3373.json) (`2024-09-27T15:15:14.577`) +- [CVE-2024-40509](CVE-2024/CVE-2024-405xx/CVE-2024-40509.json) (`2024-09-27T15:15:14.740`) +- [CVE-2024-40510](CVE-2024/CVE-2024-405xx/CVE-2024-40510.json) (`2024-09-27T15:15:14.820`) +- [CVE-2024-40511](CVE-2024/CVE-2024-405xx/CVE-2024-40511.json) (`2024-09-27T14:15:04.343`) +- [CVE-2024-40512](CVE-2024/CVE-2024-405xx/CVE-2024-40512.json) (`2024-09-27T14:15:04.423`) +- [CVE-2024-44910](CVE-2024/CVE-2024-449xx/CVE-2024-44910.json) (`2024-09-27T15:15:14.907`) +- [CVE-2024-44911](CVE-2024/CVE-2024-449xx/CVE-2024-44911.json) (`2024-09-27T15:15:14.990`) +- [CVE-2024-44912](CVE-2024/CVE-2024-449xx/CVE-2024-44912.json) (`2024-09-27T15:15:15.063`) +- [CVE-2024-45773](CVE-2024/CVE-2024-457xx/CVE-2024-45773.json) (`2024-09-27T14:15:04.503`) +- [CVE-2024-45863](CVE-2024/CVE-2024-458xx/CVE-2024-45863.json) (`2024-09-27T14:15:04.567`) +- [CVE-2024-46331](CVE-2024/CVE-2024-463xx/CVE-2024-46331.json) (`2024-09-27T15:15:15.200`) +- [CVE-2024-46333](CVE-2024/CVE-2024-463xx/CVE-2024-46333.json) (`2024-09-27T15:15:15.283`) +- [CVE-2024-46470](CVE-2024/CVE-2024-464xx/CVE-2024-46470.json) (`2024-09-27T15:15:15.393`) +- [CVE-2024-46471](CVE-2024/CVE-2024-464xx/CVE-2024-46471.json) (`2024-09-27T15:15:15.483`) +- [CVE-2024-46472](CVE-2024/CVE-2024-464xx/CVE-2024-46472.json) (`2024-09-27T15:15:15.567`) +- [CVE-2024-47182](CVE-2024/CVE-2024-471xx/CVE-2024-47182.json) (`2024-09-27T14:15:04.620`) +- [CVE-2024-47184](CVE-2024/CVE-2024-471xx/CVE-2024-47184.json) (`2024-09-27T14:15:04.833`) +- [CVE-2024-7149](CVE-2024/CVE-2024-71xx/CVE-2024-7149.json) (`2024-09-27T14:15:05.043`) +- [CVE-2024-9283](CVE-2024/CVE-2024-92xx/CVE-2024-9283.json) (`2024-09-27T14:15:05.330`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `36` -- [CVE-2018-20072](CVE-2018/CVE-2018-200xx/CVE-2018-20072.json) (`2024-09-27T13:46:14.200`) -- [CVE-2022-2654](CVE-2022/CVE-2022-26xx/CVE-2022-2654.json) (`2024-09-27T12:41:32.027`) -- [CVE-2022-2655](CVE-2022/CVE-2022-26xx/CVE-2022-2655.json) (`2024-09-27T12:41:32.027`) -- [CVE-2023-3410](CVE-2023/CVE-2023-34xx/CVE-2023-3410.json) (`2024-09-27T13:58:36.483`) -- [CVE-2023-37387](CVE-2023/CVE-2023-373xx/CVE-2023-37387.json) (`2024-09-27T12:41:32.027`) -- [CVE-2023-43667](CVE-2023/CVE-2023-436xx/CVE-2023-43667.json) (`2024-09-27T12:15:02.820`) -- [CVE-2024-0607](CVE-2024/CVE-2024-06xx/CVE-2024-0607.json) (`2024-09-27T13:15:12.057`) -- [CVE-2024-41605](CVE-2024/CVE-2024-416xx/CVE-2024-41605.json) (`2024-09-27T13:15:13.227`) -- [CVE-2024-6386](CVE-2024/CVE-2024-63xx/CVE-2024-6386.json) (`2024-09-27T13:25:43.077`) -- [CVE-2024-6482](CVE-2024/CVE-2024-64xx/CVE-2024-6482.json) (`2024-09-27T13:54:53.837`) -- [CVE-2024-7258](CVE-2024/CVE-2024-72xx/CVE-2024-7258.json) (`2024-09-27T13:05:06.930`) -- [CVE-2024-7351](CVE-2024/CVE-2024-73xx/CVE-2024-7351.json) (`2024-09-27T12:48:20.803`) -- [CVE-2024-7384](CVE-2024/CVE-2024-73xx/CVE-2024-7384.json) (`2024-09-27T13:15:28.443`) -- [CVE-2024-7836](CVE-2024/CVE-2024-78xx/CVE-2024-7836.json) (`2024-09-27T12:53:58.200`) -- [CVE-2024-7888](CVE-2024/CVE-2024-78xx/CVE-2024-7888.json) (`2024-09-27T13:45:33.030`) -- [CVE-2024-8432](CVE-2024/CVE-2024-84xx/CVE-2024-8432.json) (`2024-09-27T12:58:58.433`) -- [CVE-2024-8544](CVE-2024/CVE-2024-85xx/CVE-2024-8544.json) (`2024-09-27T12:57:21.617`) -- [CVE-2024-8657](CVE-2024/CVE-2024-86xx/CVE-2024-8657.json) (`2024-09-27T12:56:20.197`) -- [CVE-2024-8662](CVE-2024/CVE-2024-86xx/CVE-2024-8662.json) (`2024-09-27T12:54:36.160`) -- [CVE-2024-8664](CVE-2024/CVE-2024-86xx/CVE-2024-8664.json) (`2024-09-27T13:48:58.270`) -- [CVE-2024-8680](CVE-2024/CVE-2024-86xx/CVE-2024-8680.json) (`2024-09-27T13:53:47.910`) -- [CVE-2024-8770](CVE-2024/CVE-2024-87xx/CVE-2024-8770.json) (`2024-09-27T13:49:29.690`) -- [CVE-2024-9029](CVE-2024/CVE-2024-90xx/CVE-2024-9029.json) (`2024-09-27T13:15:18.060`) -- [CVE-2024-9276](CVE-2024/CVE-2024-92xx/CVE-2024-9276.json) (`2024-09-27T12:15:04.590`) -- [CVE-2024-9277](CVE-2024/CVE-2024-92xx/CVE-2024-9277.json) (`2024-09-27T12:15:04.733`) +- [CVE-2024-36426](CVE-2024/CVE-2024-364xx/CVE-2024-36426.json) (`2024-09-27T15:15:14.377`) +- [CVE-2024-36427](CVE-2024/CVE-2024-364xx/CVE-2024-36427.json) (`2024-09-27T15:15:14.483`) +- [CVE-2024-36491](CVE-2024/CVE-2024-364xx/CVE-2024-36491.json) (`2024-09-27T14:05:54.037`) +- [CVE-2024-37779](CVE-2024/CVE-2024-377xx/CVE-2024-37779.json) (`2024-09-27T14:35:03.517`) +- [CVE-2024-44053](CVE-2024/CVE-2024-440xx/CVE-2024-44053.json) (`2024-09-27T15:32:14.153`) +- [CVE-2024-44059](CVE-2024/CVE-2024-440xx/CVE-2024-44059.json) (`2024-09-27T15:33:52.013`) +- [CVE-2024-44060](CVE-2024/CVE-2024-440xx/CVE-2024-44060.json) (`2024-09-27T14:04:50.977`) +- [CVE-2024-44062](CVE-2024/CVE-2024-440xx/CVE-2024-44062.json) (`2024-09-27T15:49:46.487`) +- [CVE-2024-44063](CVE-2024/CVE-2024-440xx/CVE-2024-44063.json) (`2024-09-27T14:31:05.703`) +- [CVE-2024-45459](CVE-2024/CVE-2024-454xx/CVE-2024-45459.json) (`2024-09-27T14:46:32.483`) +- [CVE-2024-45460](CVE-2024/CVE-2024-454xx/CVE-2024-45460.json) (`2024-09-27T14:51:08.120`) +- [CVE-2024-45989](CVE-2024/CVE-2024-459xx/CVE-2024-45989.json) (`2024-09-27T15:35:02.983`) +- [CVE-2024-46441](CVE-2024/CVE-2024-464xx/CVE-2024-46441.json) (`2024-09-27T15:35:03.803`) +- [CVE-2024-46627](CVE-2024/CVE-2024-466xx/CVE-2024-46627.json) (`2024-09-27T15:35:04.583`) +- [CVE-2024-47050](CVE-2024/CVE-2024-470xx/CVE-2024-47050.json) (`2024-09-27T15:29:21.450`) +- [CVE-2024-47058](CVE-2024/CVE-2024-470xx/CVE-2024-47058.json) (`2024-09-27T15:31:30.917`) +- [CVE-2024-6339](CVE-2024/CVE-2024-63xx/CVE-2024-6339.json) (`2024-09-27T14:04:31.700`) +- [CVE-2024-8724](CVE-2024/CVE-2024-87xx/CVE-2024-8724.json) (`2024-09-27T15:56:00.073`) +- [CVE-2024-8758](CVE-2024/CVE-2024-87xx/CVE-2024-8758.json) (`2024-09-27T14:29:23.157`) +- [CVE-2024-8797](CVE-2024/CVE-2024-87xx/CVE-2024-8797.json) (`2024-09-27T14:02:23.700`) +- [CVE-2024-9033](CVE-2024/CVE-2024-90xx/CVE-2024-9033.json) (`2024-09-27T15:56:35.317`) +- [CVE-2024-9039](CVE-2024/CVE-2024-90xx/CVE-2024-9039.json) (`2024-09-27T15:58:22.493`) +- [CVE-2024-9040](CVE-2024/CVE-2024-90xx/CVE-2024-9040.json) (`2024-09-27T15:53:28.333`) +- [CVE-2024-9041](CVE-2024/CVE-2024-90xx/CVE-2024-9041.json) (`2024-09-27T15:57:55.073`) +- [CVE-2024-9094](CVE-2024/CVE-2024-90xx/CVE-2024-9094.json) (`2024-09-27T15:54:09.463`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 2ac0b6a675c..25237e21c54 100644 --- a/_state.csv +++ b/_state.csv @@ -119804,7 +119804,7 @@ CVE-2018-20069,0,0,11bc93eea8bb89572a3bd36663041753b964c1c6d0a90165ac577803d8a50 CVE-2018-2007,0,0,565467276fe44a3f15a91812729e4906725f8695b7cf0f77483bbe03d129ee49,2019-10-09T23:39:52.730000 CVE-2018-20070,0,0,03232b88ab51a82264c607ac6ddda028d6465275684647122ee5364cac67abd0,2023-11-07T02:56:10.180000 CVE-2018-20071,0,0,90965273047f10e0d8d69b9c814771631b60b51165a9de872bb0ed9ef11095f1,2023-11-07T02:56:10.587000 -CVE-2018-20072,0,1,66895fe5dbbefb976e51c639bf2287e2f7530704c434a3c39bb782fac3372a20,2024-09-27T13:46:14.200000 +CVE-2018-20072,0,0,66895fe5dbbefb976e51c639bf2287e2f7530704c434a3c39bb782fac3372a20,2024-09-27T13:46:14.200000 CVE-2018-20073,0,0,bc57833279c555f0e533969c7045cf9a8e9407b023f53f7ee293163f1ee32b6c,2023-11-07T02:56:11.007000 CVE-2018-2008,0,0,07a804601246a33e30397a194dbd639013dc206b3cb23cc4623aa0a99dd0630f,2019-06-21T08:15:09.263000 CVE-2018-2009,0,0,4c00f8e3d18d8dc4e0cbb9b0148327ad6c8a63123dc008abedfcc4523c43385e,2019-10-09T23:39:52.963000 @@ -172860,7 +172860,7 @@ CVE-2021-27913,0,0,167d05a43c4b8a3a9a5f9095ae1170cc5f9466459db5849cf91ef768c53d5 CVE-2021-27914,0,0,675b39026c04fc757a33b18eab7c2aa058775623331c1d7c9d085c842a052b1d,2022-06-08T18:45:22.737000 CVE-2021-27915,0,0,42170d064d1b01652cdc11eb30f626387eda85d27a5f861e99cddbeae26cfb9b,2024-09-20T12:30:51.220000 CVE-2021-27916,0,0,17a56e0b9e95a77b85369601e6daab8e12801e4f3a1e07f75ef096207d8313df,2024-09-20T12:30:51.220000 -CVE-2021-27917,0,0,91b2b1a67d397df9112f7f1e87e1fdf982c5590731c372073735b88709378af9,2024-09-20T12:30:17.483000 +CVE-2021-27917,0,1,5465a3d7f25a5154d30a82cd6f06e15430a49f302876406aa605d64d13a082bc,2024-09-27T15:13:58.927000 CVE-2021-27918,0,0,0518da32da0b62ea5fcb12a67bfb4a45de87702f6745ca2fb1540144faa372aa,2022-12-13T16:28:13.860000 CVE-2021-27919,0,0,ff72fa8dcdbe5235ea458afc8e87af812a5a4a7f37cb1ded6eeda83ce3037733,2023-11-07T03:32:02.603000 CVE-2021-27921,0,0,b11f4653b3d8f81de77297ff4168966513573360c29446471f5cf2f2df9fb5e0,2023-11-07T03:32:02.670000 @@ -195290,9 +195290,9 @@ CVE-2022-26532,0,0,ef1f53bec7cd938f0fc7efa86c052e137d736ccccadff52fb6a13546be412 CVE-2022-26533,0,0,bb92300777958a5a7510dcaeeef8ce7b67362c1a7a1b915428c93b3d7bb7e66f,2022-03-18T19:58:14.610000 CVE-2022-26534,0,0,7607f3f2030ed7a621be029b2845faa377ce78bdd1fde2d378108d5b725cf8e4,2022-03-28T16:54:25.937000 CVE-2022-26536,0,0,48cfdf45132d6db4b74c639dca3c8a127553777c461cb23d81065c74ca7e9e9d,2023-08-08T14:21:49.707000 -CVE-2022-2654,0,1,f396027d6b6cb31c17eecd41823687a0c5ff9b697f666b6aa2e725954f8ea619,2024-09-27T12:41:32.027000 +CVE-2022-2654,0,0,f396027d6b6cb31c17eecd41823687a0c5ff9b697f666b6aa2e725954f8ea619,2024-09-27T12:41:32.027000 CVE-2022-26546,0,0,70d97b0459ba7ac38ffb449469c101683bd6595e3838ee0f52b348a6ea3a0c10,2022-05-12T19:35:07.200000 -CVE-2022-2655,0,1,60e16880aa17bb9f0220460048bf959621589bcf00b392ee2c95e1531d9d2fe3,2024-09-27T12:41:32.027000 +CVE-2022-2655,0,0,60e16880aa17bb9f0220460048bf959621589bcf00b392ee2c95e1531d9d2fe3,2024-09-27T12:41:32.027000 CVE-2022-26555,0,0,6c5f8f57b2b5a4ade345ca0403b4cdd1b48ce7ee8309194cd709ddd0c76a598e,2022-03-28T19:06:36.367000 CVE-2022-2656,0,0,d353fd96bf9e318a4657ba3af12eec0f939fd7ca4776c9e36cc4e3bb543a712c,2022-08-10T13:49:53.237000 CVE-2022-26562,0,0,d2c5bef243485f583f5bb14c442b3fbd66b4dbfe5ec07ff1c48fc480990b11db,2023-05-11T16:15:09.383000 @@ -217028,7 +217028,7 @@ CVE-2023-22857,0,0,c355620e2479df747f0589cb26b3d2704bc4ddc70516b9d833a2fb3cdbb1b CVE-2023-22858,0,0,c51b1c58373447736b339979c0cd8eec35b38a042f18766d2b1fd49498a95aaf,2023-03-13T17:10:21.097000 CVE-2023-2286,0,0,1f3353a3a315adb845529330015e9ce8864f0158ed8ab4c7cb3d2cfcc0ca3389,2023-11-07T04:12:19.830000 CVE-2023-22860,0,0,e5e135b9674556a090cbecca9fa7c567b235bca14cbb34e3eb90aa72a2160933,2023-11-07T04:07:28.347000 -CVE-2023-22862,0,0,05449e51595973893d8a13c570399c0a2b9b1df6cf4a71fa04b4a2b53c158d53,2023-06-09T22:54:45.870000 +CVE-2023-22862,0,1,f7a792581d09834d560f331e1a7daa8fabe3535c3a2819a7176f525c510d8a7b,2024-09-27T15:15:13.980000 CVE-2023-22863,0,0,eef13872dcc72c29441a13e545d52e388fbbb82264278ec473965ca583f73a1e,2023-11-07T04:07:28.470000 CVE-2023-22868,0,0,fb313b905f7277fd22744805199c6cdc3dd75128e6089a55e506c1a8c3c89032,2023-11-07T04:07:28.557000 CVE-2023-22869,0,0,0b1c932385533c41094a23d57a51a60252be8b5ce8ca76a98f2df3005d5300d7,2024-04-19T16:19:49.043000 @@ -221922,7 +221922,7 @@ CVE-2023-28950,0,0,9133c3c97285d27a9c361338788bfba5bbe876a6ea55c9317154f247d2ab3 CVE-2023-28952,0,0,7bb7b02237cc68b28c2b8c1c921a60e0855068ce1576afd1477241c9719e30ef,2024-05-06T12:44:56.377000 CVE-2023-28953,0,0,9152bad62701af3dcb4a06b73561f371a642d3ba8e03588f162fd93ea98fb557,2023-08-14T19:15:10.920000 CVE-2023-28955,0,0,3e244298f322008056261d3880e4eb3494c2c0616dd04376eb8f67759d88a60b,2023-07-13T19:20:17.480000 -CVE-2023-28956,0,0,9fe9052f1d4ce9f854c1f204f10a7b1c11248ffad32bcc5e7ccc2468ef144211,2023-06-28T14:51:02.947000 +CVE-2023-28956,0,1,ab5cf6ffbd43159b44cd3913a21ecafe2bafd08c86ac8625b76025c7d3a630ce,2024-09-27T14:15:03.340000 CVE-2023-28958,0,0,66cbf0468ddb2f2a8a12cfed2cc67512ea0b7b40c244bf41465f6a2b8878dc1f,2023-07-13T19:19:02.813000 CVE-2023-28959,0,0,d676622adadbd13f5eba57f8812a68b3cef023f63ef7021b1b817ff8b42d220a,2023-04-28T14:28:28.117000 CVE-2023-2896,0,0,d0f59aeefb6d6075f87fd9ec981b25b7cfb33c39f420586df0cdc64d329fb811,2023-11-07T04:13:30.123000 @@ -225596,7 +225596,7 @@ CVE-2023-33847,0,0,82ca8aa0bc2d03362319c542ea5b2770d3d85f3edc1d48ee0a623bf42e800 CVE-2023-33848,0,0,8c230bcaf355a577515ed758441936574666148d6f8eb2c4fef9542b77704701,2023-06-15T15:08:53.457000 CVE-2023-33849,0,0,cee19490ece517fd373f4e7e8ed6adf35f850894b189fbcc578bbd8d63ec8305,2023-06-15T16:56:56.460000 CVE-2023-3385,0,0,9500094f984a4b5d1e66b5fa4a2c7e1b713d3f8f392f6fc06da408d890552a37,2023-08-04T19:19:04.697000 -CVE-2023-33850,0,0,fbba5b69c67c9acf3b1ad18d606a9ab31046ef79599a8260c291e9eb0693cf7e,2024-09-19T16:15:04.047000 +CVE-2023-33850,0,1,a1cb002652a06aa9677606001c5bee20afb631caa66fa206af330309abdf3d63,2024-09-27T14:15:03.540000 CVE-2023-33851,0,0,4ac32a90038a96c4290f8386bc4de44c14e956a2c207f0eac7a85d82111f6074,2024-02-12T19:54:23.117000 CVE-2023-33852,0,0,bc3c73250f73c64645e886b9ff4fe0ce89bb90d67afa464822661d78d1e66b51,2023-08-29T04:43:06.033000 CVE-2023-33855,0,0,aa3542d64ac11799927f1e76ad33cc287cefdca6570205fddaaa45ff2dc14b58,2024-03-26T17:09:53.043000 @@ -225826,7 +225826,7 @@ CVE-2023-34096,0,0,a7690eebb3bc64442760da7ed701080c41f77033ae0b34a6a91f6ad0d81a8 CVE-2023-34097,0,0,6b29394d3580120fb1a7c5a38fea249ce4a1b763c7ea32f4e7dbc5873a1f9df0,2023-06-13T17:20:19.417000 CVE-2023-34098,0,0,c5a8a91b34b516e94baaf6097a90812d9e70f98fadfec216f20d24e25a701dac,2023-07-05T16:25:47.773000 CVE-2023-34099,0,0,b1df5159c8920200f27f31c41b92b0fb6d8023282833687e4a7aa665b6253580,2023-07-06T15:58:20.110000 -CVE-2023-3410,0,1,7a4e36aeb0f5ba519d59cf68683fb0a867b4c08cc26e39d8889bb3dfa7187dc0,2024-09-27T13:58:36.483000 +CVE-2023-3410,0,0,7a4e36aeb0f5ba519d59cf68683fb0a867b4c08cc26e39d8889bb3dfa7187dc0,2024-09-27T13:58:36.483000 CVE-2023-34100,0,0,cc7ac8fd6507b425cd5f13b9db4c9315fd8649bbd1eef955b75034313ab8f832,2023-06-21T13:18:46.317000 CVE-2023-34101,0,0,67b3988a94e482e2776cf4a140651f0ee77d4af4cf7aa6a15d2f30b3cfc85f3d,2023-06-23T18:18:09.143000 CVE-2023-34102,0,0,1e279c26e0db6ec4921dd6d242f20193d8a0dd467559b3603450b2787a808fab,2023-06-12T16:46:32.247000 @@ -228126,7 +228126,7 @@ CVE-2023-37379,0,0,78500cde02bbf9b55e8b5c8dfb6567fbf086ee965c1c2974eaf1d329c52a5 CVE-2023-3738,0,0,1e174d3fc000c16581c450af71ca1e0c2e4f3d89e66d0141370d0b4640c69678,2024-01-31T17:15:13.183000 CVE-2023-37385,0,0,faa09cc1c20d2c90272c449bae45c1af3cc3f94697e33b3bf7810a9f5a76d274,2024-05-17T18:36:05.263000 CVE-2023-37386,0,0,6b236f6835dca11da0bfebd0cabb4f2d3c3f7825a7a624f305d68d874246e262,2023-07-26T01:10:16.190000 -CVE-2023-37387,0,1,2f9f52a5a7474d10b7dd4e8e9b63b149294317380b1c5af2b1d1a6ee616deec4,2024-09-27T12:41:32.027000 +CVE-2023-37387,0,0,2f9f52a5a7474d10b7dd4e8e9b63b149294317380b1c5af2b1d1a6ee616deec4,2024-09-27T12:41:32.027000 CVE-2023-37388,0,0,aa8b02c1e7a11675b29e2dd8328993b09354d84f97dc0b6a7de4f71d138538aa,2023-08-15T13:30:26.467000 CVE-2023-37389,0,0,51ea0ebe7e017bcc141a5b953abc2fbb91063ba4778be275c47f9aa6d140afeb,2024-05-17T18:36:05.263000 CVE-2023-3739,0,0,87992f652db7b0aba9cb9f1ba0e0b3ead5af9c97713db66047b7d2f338613d84,2023-08-15T16:03:21.510000 @@ -232926,7 +232926,7 @@ CVE-2023-43663,0,0,22e6dae31721c17c7a22b7251427578d93416b3c5e5d9d11fbbd99dcfbe39 CVE-2023-43664,0,0,58843f50c87eccbf59079d1647a1fc10e1aaf0357332e6c8c463e3435b87c5e7,2023-10-03T00:18:35.847000 CVE-2023-43665,0,0,a0ac86ce37cf036951caa34e565540e22f34be1bc3013e8a45f2054625777303,2024-05-01T17:15:25.800000 CVE-2023-43666,0,0,d15cdd2495edd9df805ffce79ff016e00c14d83e938e7c3f532542a7b47fceaf,2023-10-18T19:57:44.023000 -CVE-2023-43667,0,1,8d7062d5ac51a925790762e965fe8b66acce3cd0e28ce803d2ab3b08e3796698,2024-09-27T12:15:02.820000 +CVE-2023-43667,0,0,8d7062d5ac51a925790762e965fe8b66acce3cd0e28ce803d2ab3b08e3796698,2024-09-27T12:15:02.820000 CVE-2023-43668,0,0,864f92a41191db760a24be1e7c34a371ab625342ba8747fc974997cd53560bb2,2023-11-14T10:15:30.143000 CVE-2023-43669,0,0,bdcd0256bf304e8bba3cb8bfc3927b556ce767b960195089b0b7e15b33087673,2024-02-16T17:56:45.190000 CVE-2023-4367,0,0,6325c01bdaab0a12ddff714b2fa3b5c79f1212f60c2f63c3cb2e26b57df60642,2024-01-31T17:15:15.890000 @@ -235309,7 +235309,7 @@ CVE-2023-47130,0,0,99626e1381150c1e09884dff49fd6c2f723ae167bcc9874cd57b5ba796b23 CVE-2023-47131,0,0,1f17bcf165c617ab98fe27cd04d2840b3530e5c7f34a2f6195d222315c628fe3,2024-08-19T17:35:06.470000 CVE-2023-47132,0,0,22b04133394aba0611c16459db9562b2470a75c51e301523cdef08bb1020505d,2024-08-27T21:35:02.060000 CVE-2023-4714,0,0,88791e8df305497262c231049cee74da124b9dd8910a01ba3e741344ccddea8e,2024-05-17T02:31:44.550000 -CVE-2023-47140,0,0,27ac9d4e4f9c1df9620d5c2f8730221eb8cdfd60197a593e16c9afa644305be0,2024-01-11T16:58:30.733000 +CVE-2023-47140,0,1,0888970767b71c5c675a9658b2b738d4dce55ae6b99af51c76153c755f54d92b,2024-09-27T14:15:03.827000 CVE-2023-47141,0,0,ec41362211d80a8593662ce89c33cab67b4bbfc76d91426d6bca35fdc27513b3,2024-03-07T17:15:10.847000 CVE-2023-47142,0,0,057572cbe8eb0ff2516aa108fc6f46043b22f41eaf1d6810bf33d8b2c4a85ee9,2024-09-20T19:15:14.380000 CVE-2023-47143,0,0,4940703f7efc54194faeb4b79c3a01c8e24005ecbdd6e751e286a6df5a832415,2024-02-08T20:00:13.007000 @@ -235319,7 +235319,7 @@ CVE-2023-47146,0,0,86c1cd92289602e0efcf8321ace1ed61060cd5794976dfacbbea4121a4613 CVE-2023-47147,0,0,cce79f55aade00b43e6a51f7575242a88657b053b340c26a135a026254461808,2024-03-19T17:31:22.997000 CVE-2023-47148,0,0,7d5d9cb629db9cb7164701646ac2ea968a56247f3b4151536df386351785cd82,2024-02-08T19:58:30.023000 CVE-2023-47150,0,0,34e13c8facf7249357943371549813b834aff9a06467c895eea021e27b809159,2024-03-26T17:09:53.043000 -CVE-2023-47152,0,0,03afd452611f02dedef0b10863c2935da1bb8b1da61a69e81c9df56215e71f46,2024-03-07T17:15:11.063000 +CVE-2023-47152,0,1,9eea60faef287e4d902c8adce05bee6fc9f38fc588129cbaf0f698a6de3b8223,2024-09-27T14:15:03.993000 CVE-2023-47158,0,0,072bd65823b5631b33870dcfdff533993e7a31a255a5f570d9069f0a1b5d8be1,2024-03-07T17:15:11.147000 CVE-2023-4716,0,0,032ab074d8425fbc2edaf9c554205d201e67bbfa0c9d7ff9b3c43c4ca041abbe,2023-11-07T04:22:53.527000 CVE-2023-47161,0,0,3df147993872a3a8a7211af1c2c970c1494cb8aace730e0ec52cc75a7ff20d99,2023-12-27T18:41:28.277000 @@ -241233,11 +241233,11 @@ CVE-2023-7272,0,0,cc43888de86ffd529fd218a38f2e0a497e79588d2ca6b5dec5063052cab77d CVE-2023-7279,0,0,f98ffb9aa7111762ac351724f18f9d9ee505a1023f26a13d8e9efc5698c9c712,2024-09-05T21:59:17.957000 CVE-2023-7281,0,0,0790d4bfb469f439660a23ce8eab8f87d3be095fc643fdfe8eec46cdbb17ca3a,2024-09-26T13:32:55.343000 CVE-2023-7282,0,0,f4fc1de03735b00b3526c9c4836a11bcc7904328f1e64bbcb0646541be7349bd,2024-09-26T13:32:55.343000 -CVE-2024-0001,0,0,ec89b0250605194e4b2ffc00792fa942d3c0959950283e05683347ce9527983a,2024-09-26T13:32:55.343000 -CVE-2024-0002,0,0,ff04b358d00838ac4fe1d9a0ffa6c309e6e3b75c26bd3550690edfe55d2c5d3f,2024-09-26T13:32:55.343000 -CVE-2024-0003,0,0,6d193ce8b52ca5ce4204641471b1428620c8f28297b585f1c840544b8c7a473f,2024-09-26T13:32:55.343000 -CVE-2024-0004,0,0,d8297ccdd545cffce8beff6a82a70db71049faf18433ee6e437540b0593c8ea3,2024-09-26T13:32:55.343000 -CVE-2024-0005,0,0,35b5c0606d19acaa84ac05b5682675fc4c62c8263088a28ce1c1f8c256ec596e,2024-09-26T13:32:55.343000 +CVE-2024-0001,0,1,ddc97ec95f63469ba72943e3a1a3c2055a0f787a376d00af08b9e1c9de1e66b0,2024-09-27T14:08:57.327000 +CVE-2024-0002,0,1,8eba00d67fa29dcfc182e2e2367ab4a3c005649f9c2970e7f365907a3a42b06a,2024-09-27T14:13:24.427000 +CVE-2024-0003,0,1,46c85e4a496f19260982bccddc0ca5126276fd9fc3f3c6d4be9e905c5a7e34b8,2024-09-27T14:23:58.243000 +CVE-2024-0004,0,1,e06f06042c281ea249e16043f1b9aa83cc9542a4deac4ea3878afe1de9e34e4e,2024-09-27T14:24:41.277000 +CVE-2024-0005,0,1,2d1595c322868a34d9b757a1279fc9035613c2eca38df11db881a489dcaeda61,2024-09-27T15:25:40.980000 CVE-2024-0006,0,0,ad936d6110273ab63552e81bb6d0ac8ad8706e8706811fa2ef455d43c6091213,2024-07-22T13:00:53.287000 CVE-2024-0007,0,0,7ce6d28a77975ceb6f0211a30f9905d648e1a7e8a675821fe7be046691ac9f83,2024-02-15T06:23:39.303000 CVE-2024-0008,0,0,899bae3dea0b6932a6d046356f47764b32f025595d0eef60d8e0e433b2b04007,2024-02-15T06:23:39.303000 @@ -241757,7 +241757,7 @@ CVE-2024-0603,0,0,69da2959c58a849df80992399c0ae4fc3bb43bd0808c5e3baf757cc40a9113 CVE-2024-0604,0,0,372538ac2eac987cba4891011b719253c3d05cb7d3aa7347327f87d4259822b5,2024-02-29T13:49:29.390000 CVE-2024-0605,0,0,9df1cd483cbf4605667600542fb2bef389cd0397c4220c040adf3c7591da3c1c,2024-01-30T15:19:19.787000 CVE-2024-0606,0,0,d9c54d14c251870a0c63fc840686ca7ac32e21eeaf6c950c2eee47a3ad3f7670,2024-01-30T15:18:57.190000 -CVE-2024-0607,0,1,749ba8c44704f92cef5042d2ffb7f0b4165bad41cb70178b67e2df98a4d9f1df,2024-09-27T13:15:12.057000 +CVE-2024-0607,0,0,749ba8c44704f92cef5042d2ffb7f0b4165bad41cb70178b67e2df98a4d9f1df,2024-09-27T13:15:12.057000 CVE-2024-0608,0,0,0250a1da296ec5102313d6e452d7e96af5395bed49f3ec343ccec9d230952988,2024-03-29T12:45:02.937000 CVE-2024-0609,0,0,271096fa2c410e8a64d8fb61f1faad02d256c1e6f7a84686e9cec4830375dd33,2024-03-29T12:45:02.937000 CVE-2024-0610,0,0,3e87b17b6f7dd27279d67f3be868598345c1da5103c9935b1ce85e0f86843dbf,2024-02-20T19:50:53.960000 @@ -252781,6 +252781,7 @@ CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aa CVE-2024-33698,0,0,a8c5e7c040b3c6d1c0f9bc21543a8682893b5aa4922da330e8b0355256cea828,2024-09-10T12:09:50.377000 CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000 CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000 +CVE-2024-3373,1,1,e3f0b06cda529fba8bd3ac22f4f7ed89f090b30ded0d545b2ba52fbd4a5ce487,2024-09-27T15:15:14.577000 CVE-2024-3374,0,0,3ebd1bd07a69ff470e060c4c065f62c59313c2dfc13f260402ece495f026b11b,2024-05-14T19:17:55.627000 CVE-2024-33748,0,0,066f13e7dc76dff0529f136e64473f4bf178cc6b6f4c44f335cc233ab954b6f1,2024-07-03T01:58:38.810000 CVE-2024-33749,0,0,f9dfa03193fccdb082b9724eae52d9e0afc932b6dd471bafd143ead723900e53,2024-08-14T19:35:22.807000 @@ -254746,8 +254747,8 @@ CVE-2024-36421,0,0,6377f154589fbee582a888cb89fe433db93fc2d1b9f4ba90a9e9d6ff1a542 CVE-2024-36422,0,0,1c8e85fff4389539f30938d98dea0041c583b614c5e1956a8be795decf84cdf1,2024-07-03T15:38:24.297000 CVE-2024-36423,0,0,b453cf2ccb776ec471b0bfc211eaab3170432996cec7cbfa7fd53a528b83b04c,2024-08-21T14:35:42.877000 CVE-2024-36424,0,0,74bb0bee78ee748646a140004458defb2a792605f4f6efef89113a667494d3ff,2024-08-12T18:45:53.647000 -CVE-2024-36426,0,0,081cbabfe1f165d2e60c6bf5434c4cea5a1c1465246b1d9713d429b0a41c1ba0,2024-07-03T02:03:11.237000 -CVE-2024-36427,0,0,10c5dade9c11af5e52239a7a8c18438909a8ea6a201617061be6b7626f49e18c,2024-07-03T02:03:12.033000 +CVE-2024-36426,0,1,d13926b687beb94abe76e991d41f8690e5a62af7a6ef5a5fe751b1cbb4c88a0c,2024-09-27T15:15:14.377000 +CVE-2024-36427,0,1,198ab806d20d6a93856952e8ce7e03d21c8322dde85a2e49ab6efeee0fdec5c6,2024-09-27T15:15:14.483000 CVE-2024-36428,0,0,c6c858a7f32e69b919beda69f278db495ace99a22a3bcfe62f8ab10abf83409a,2024-08-20T16:35:17.923000 CVE-2024-3643,0,0,cd9af5d0727daadece3514e90acd0ed08b562b9573641923b7540cc5c91438f6,2024-08-12T19:35:11.607000 CVE-2024-36432,0,0,895a265ff42669ad3221f2038a917555b3971e37a0a09c0a293a796c0338c882,2024-08-01T13:52:48.333000 @@ -254795,7 +254796,7 @@ CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910 CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 CVE-2024-36489,0,0,2f34b177a387259c170db7b91a53518947ffa720aa7b598baba9b38f62a0e242,2024-09-09T13:32:13.087000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 -CVE-2024-36491,0,0,6efdbfe92fd7b110a7468fc85fb00858571ab2d21b32164f2daefb371e4e6cf2,2024-08-01T13:52:56.787000 +CVE-2024-36491,0,1,0594f931fd7fcba21d9716595a57f83c241ce75441ab3d963604c9fb9792c871,2024-09-27T14:05:54.037000 CVE-2024-36492,0,0,b0eb8123326503998f78707e30820b21ee51107ee551426ea35529c00e38520a,2024-08-23T14:51:08.580000 CVE-2024-36495,0,0,10404a83be52d267985f87debff962346c26dcdc9e1b293bd8df22829bd96214,2024-07-08T14:18:38.843000 CVE-2024-36496,0,0,9b0852e2079a2b8f81e66f1c652acdc8b58764ac010cd86aadd442eb8de70d88,2024-07-03T02:03:14.090000 @@ -255599,7 +255600,7 @@ CVE-2024-37768,0,0,870c2e3ce3bd390df1e2f6d00c0b12856feb7e2e88c5200a479a671bc3424 CVE-2024-37769,0,0,5d562468fe4e62bf5aa053de70325d9517e92227326a41659856d8da2dd29323,2024-08-01T13:54:15.670000 CVE-2024-3777,0,0,0856ef763b1edbec0747809f2f5f1e269fdce9f6160541c599d8c16e527540d3,2024-04-15T13:15:31.997000 CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 -CVE-2024-37779,0,0,990a40d8d014e97c2e1b665bc00b3d872a24e9aeec410c984b4ce15b677a4054,2024-09-26T13:32:55.343000 +CVE-2024-37779,0,1,6e59c8529157382fe2940395deacc91d059ba345fa934b0466ef9ccea286d30e,2024-09-27T14:35:03.517000 CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000 CVE-2024-3779,0,0,1a47972c633583c7bae072fbb56beacb2d6111c4ffff8b051890256727892c2f,2024-08-21T17:38:16.057000 CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000 @@ -257272,6 +257273,10 @@ CVE-2024-40505,0,0,7ece9bf9b6c0e4a275d20059391eb5add095153a9e53affa19425b4d1ec16 CVE-2024-40506,0,0,50ff1b9d534c58546140d019d524853625251e6e08a2d14d7d8fc96e336df5ec,2024-09-26T22:15:03.770000 CVE-2024-40507,0,0,613a1bd4f36a99780d11c648a9da0c130a6c3a3c4806b54e25f249d2a4df7639,2024-09-26T22:15:03.880000 CVE-2024-40508,0,0,875ef5f24d9ef2a983cc219f8e90c710f4d378b881c294f19d5c6ea699d3675f,2024-09-26T22:15:03.963000 +CVE-2024-40509,1,1,74f8efd95b2115305b501da3eb0874a04b66109dbae9307a118cb8796d72389c,2024-09-27T15:15:14.740000 +CVE-2024-40510,1,1,1cd8bae3c191b5c9c2bfb7f84e21a91a9f6f5b24548f0743b8a50e4f9c574a44,2024-09-27T15:15:14.820000 +CVE-2024-40511,1,1,cf861f5bd7da1a1dffef86e4238a859c655c22e97e9d86b705b0ee6519a75400,2024-09-27T14:15:04.343000 +CVE-2024-40512,1,1,9063a00c14b517d6f8560c2fe9504dab4d7ab492501c35d08135b5e7027aa03a,2024-09-27T14:15:04.423000 CVE-2024-40515,0,0,d91b9531ef5ed5978894d52371df8275215aaf629121566b57a4e661954c33e9,2024-08-01T13:57:33.567000 CVE-2024-40516,0,0,aed239a0d38ccfd87fd9b80e3f289cfeb35e1a0ac4b960ecd30c2aa738783f2c,2024-08-01T13:57:34.333000 CVE-2024-40518,0,0,bbc8a85aaa975d14f5cd2cd0045fd3aa844f2bf8933730369940256a4cf29a05,2024-08-01T13:57:35.120000 @@ -257944,7 +257949,7 @@ CVE-2024-41600,0,0,ddd05664b5ee0043272f1a43166002722a6b163ed847eae777be121e2c652 CVE-2024-41601,0,0,bbe6fd3c72d7dad8c522d892fc1c0f9bacbb178b64f66555395886f778d90253,2024-08-01T13:58:55.750000 CVE-2024-41602,0,0,3aaf8bd0d1359c5ef86792c331ff3b330f01dba788f9b1812b99e2f11e997bba,2024-08-01T13:58:56.507000 CVE-2024-41603,0,0,274738d202695ad4f9eeac726dd842b3cdc47fbabba17edb5ee76c87292d7f32,2024-08-01T13:58:57.330000 -CVE-2024-41605,0,1,9d6196c9cfebf8f4125967f18a39b43ec450c91ace7e30313c5ff6709c3251f8,2024-09-27T13:15:13.227000 +CVE-2024-41605,0,0,9d6196c9cfebf8f4125967f18a39b43ec450c91ace7e30313c5ff6709c3251f8,2024-09-27T13:15:13.227000 CVE-2024-4161,0,0,818606f25cf93cd94814d58a9247fa25de635b9142e537f83382fb857b8b71ef,2024-04-25T13:18:13.537000 CVE-2024-41610,0,0,26e6066451c8a71988f997449d51b2538a9517f154afbfa7718a4bd3d7e1adb9,2024-08-01T13:58:58.120000 CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d468a,2024-08-01T13:58:58.890000 @@ -259450,16 +259455,16 @@ CVE-2024-44049,0,0,a80b61b599be073262e16b82147c50606bc71e3542625749162e1fa755b6b CVE-2024-4405,0,0,45cc63f187ac8ca241b3f6f4ea8115546cfb9789c95e5b84e970d2850f40bb92,2024-05-02T18:00:37.360000 CVE-2024-44050,0,0,df862c86e0ba11454be8e25a71ae273061d57f333e47daa026b9e702db65954f,2024-09-24T22:04:14.633000 CVE-2024-44051,0,0,ce23f411efc73abf32e6098a6d2eb3393f97187dd35f7e27624ea488dc410be4,2024-09-24T22:03:20.933000 -CVE-2024-44053,0,0,83d8923ba60cf9279e6750cc431daaab1e1e350d146e3f688dad663630566e4b,2024-09-16T15:30:28.733000 +CVE-2024-44053,0,1,d6b445b5424b0f6829ecd038bfac9705759a6336fec3c16f9c24c9885fec6c0c,2024-09-27T15:32:14.153000 CVE-2024-44054,0,0,62964ae8ea338d235cf53912a006b7117e349fb8ebf31f281fb31ac1bdad9e2c,2024-09-23T14:23:19.573000 CVE-2024-44056,0,0,756ccfcb6ed9765bed856278bfa95937400729fefe1ccf6c82ec31b630a71046,2024-09-23T14:39:05.047000 CVE-2024-44057,0,0,3ef248c0f699cd939b749fb7953cfe71858b347a17cd1b9c323d49d28f2cd62d,2024-09-23T14:33:50.830000 CVE-2024-44058,0,0,2a31d13e7c34ecf4ce5a2c39e291bd8b424b5c5c23539a4a1d30676f56f1ca20,2024-09-23T14:28:34.860000 -CVE-2024-44059,0,0,e50caa564eb7444d516ed124abb6d0fea18607494c8e74465e2dd01a1df7712d,2024-09-16T15:30:28.733000 +CVE-2024-44059,0,1,3f6c3a8dc5dadae72dc0df667c364ac97c0b5812f742d2c5b5a2597b4b344930,2024-09-27T15:33:52.013000 CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef984,2024-05-02T18:00:37.360000 -CVE-2024-44060,0,0,ea289f0bdc9789c9ec67d1508aa08afeb9f803f52099e34e6af184526da44eb7,2024-09-16T15:30:28.733000 -CVE-2024-44062,0,0,14538aba5f6d0cee1fffe23d891617a033aae9a8c2411d6855777f0a1a7aba3c,2024-09-16T15:30:28.733000 -CVE-2024-44063,0,0,d642b3fb89950affe44ef0b88153cbec24d22c27c53a8da8ab9d205a291c0668,2024-09-16T15:30:28.733000 +CVE-2024-44060,0,1,6924c0c83b583f3e58aed5b3f0343601ab88a5f9325e897d35fa92b3431e95c6,2024-09-27T14:04:50.977000 +CVE-2024-44062,0,1,d6bef9112163640e773e122d40930de4ecec4777328c835263d4052bfb0847a1,2024-09-27T15:49:46.487000 +CVE-2024-44063,0,1,8ea7a84a37f53fc26574f2d48b688739bfe3dad8852d642a265a023b1a91cd34,2024-09-27T14:31:05.703000 CVE-2024-44064,0,0,4e74c010eb0f0db49dd4385b0641f0bed56c75cde28c530ba6b3d37d998a5b5d,2024-09-24T18:15:30.537000 CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000 CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000 @@ -259713,6 +259718,9 @@ CVE-2024-44893,0,0,635f24da6eb74b01d8797a39660e22d01234cd87632ab79dff33aeb2842ca CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000 CVE-2024-44902,0,0,803913154fc81eaf377836b68ca7807a5abb6fbb4b4d7ccd7271b82f1104776c,2024-09-20T14:55:38.087000 CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000 +CVE-2024-44910,1,1,f1f589ed97502e92f7c4f94eafa0ca86ec0ddff2d365d771307164e8c415de39,2024-09-27T15:15:14.907000 +CVE-2024-44911,1,1,9743596caf9c07be5fca95a11551930914d3a16d6100507de8f5d2846cb8be0e,2024-09-27T15:15:14.990000 +CVE-2024-44912,1,1,be45a70e189a5066adaad668a77db08b32a30a1414532025964a835bf3592938,2024-09-27T15:15:15.063000 CVE-2024-44913,0,0,332529f8a2f25e9795d6a65fec291670cc1d8fe0aef2e9fae357f99f95186d81,2024-08-30T16:01:54.347000 CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d420b,2024-08-30T16:01:45.013000 CVE-2024-44915,0,0,599d20f62f376d9c9860ebd338604a632ba16d7b9219c3aadc9555ff97ab4b9e,2024-08-30T16:01:10.753000 @@ -260050,9 +260058,9 @@ CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c5 CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000 CVE-2024-45457,0,0,5900191db09039069fbddda66128c2809bcb929085a84aed28a0c8f708ed46f3,2024-09-19T20:53:46.313000 CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000 -CVE-2024-45459,0,0,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000 +CVE-2024-45459,0,1,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000 CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 -CVE-2024-45460,0,0,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000 +CVE-2024-45460,0,1,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000 CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000 CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000 CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 @@ -260148,6 +260156,7 @@ CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 CVE-2024-45770,0,0,e98fab17d907c24beb2a28773665764214c6145643120e7f9304697540dec889,2024-09-20T12:30:17.483000 CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000 +CVE-2024-45773,1,1,e9cdc5014d806c3c3d60272185c9e7326070306ad511fa12380b521b6efff99f,2024-09-27T15:35:02.620000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 CVE-2024-45786,0,0,1027a4a71b54e4ed926e7c4d82608ed7bf7290e7e8486a1ac94d8f7e4edfad02,2024-09-18T20:12:47.337000 CVE-2024-45787,0,0,46f8564066b3f70e712610c0aca9059d9bda6862d53c941af56b2ef72737a51d,2024-09-18T18:15:07.650000 @@ -260205,6 +260214,7 @@ CVE-2024-45858,0,0,b5441be916d9d638a5a087843bce9f2981a17328a32cafaa10622a0d2ef26 CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000 CVE-2024-45861,0,0,57fe73e3a177e4e17ab3e3d5c857fbcecceae3ffb20171f8b220e3723b40fcc2,2024-09-20T12:30:17.483000 CVE-2024-45862,0,0,267d393c40ac4758b5b0d5f00783ff7e60ad200162cab3206861198fe5f922b0,2024-09-20T12:30:17.483000 +CVE-2024-45863,1,1,fd048866aa707237f5e54143a9d87b2c08dcd9e461d7c79379b8ee0322294442,2024-09-27T15:35:02.800000 CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000 @@ -260225,7 +260235,7 @@ CVE-2024-45984,0,0,191e6065bcea691e7d2f212f050b5e86a6bc7b2eba815207627ed9ddd2dc2 CVE-2024-45985,0,0,dc45e2ab3de87861a9443117e4cfd6e57b68e9216bd82bc7bd6f3e068d51ccad,2024-09-26T18:35:10.080000 CVE-2024-45986,0,0,f61f0e27b2db4ecf52ec82e83c4f905d4703f7b81b7eef8d8ec2e435944bc38e,2024-09-26T21:35:21.760000 CVE-2024-45987,0,0,894b34f536a04c93f16834a2446d6c8467b7fe3b94446a5ff31078de5ce6842c,2024-09-26T18:15:08.583000 -CVE-2024-45989,0,0,47f28385e92f7996071ad52dbab7994cb52cd919960b12dd74242640a06f3dde,2024-09-26T18:15:08.667000 +CVE-2024-45989,0,1,af7080c89647f989ac2ca7d839fcda290a1db2a2584e5ec2b33ecc9edab6b0e0,2024-09-27T15:35:02.983000 CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000 CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000 @@ -260272,6 +260282,8 @@ CVE-2024-46327,0,0,1109f4d5733337c522b43c688073dbf042a675894632702e5e62b9816340d CVE-2024-46328,0,0,6d725cf49973d0547b531dffd10544f7db3c88f49071ede40d544ac8d4e71635,2024-09-26T15:35:25.783000 CVE-2024-46329,0,0,67c3a6b863dc93eeddc6458cdb7ed37a92f231ba9522b51de613709b565f065a,2024-09-26T15:35:27.397000 CVE-2024-46330,0,0,5f5561b584280ec21bb45f30f74e33818f7bd5bdd6c0f77a96022667b1fd499f,2024-09-26T15:35:28.713000 +CVE-2024-46331,1,1,43d83daaaee9613c3495100c50497427e3aa818572b8c3c1bdb2ec8cdbeba7aa,2024-09-27T15:15:15.200000 +CVE-2024-46333,1,1,d0e6c55e780a5881bf158a3b26702d3f52e11ad4255562de08c6b98bdc6086a0,2024-09-27T15:15:15.283000 CVE-2024-4634,0,0,2c56b13392d50c2560d26201cfe4914a1f0ee83080b338e78708abce42a9dd35,2024-05-16T13:03:05.353000 CVE-2024-4635,0,0,c975e44d5f71ffee6fe63563ea783b273fe931e5f01b077f7022458b2ef1e222,2024-05-16T13:03:05.353000 CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef43,2024-05-15T16:40:19.330000 @@ -260294,12 +260306,15 @@ CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385 CVE-2024-46424,0,0,46898876dcaeac361faa83e092e89c9c35f949e2ef780f98d9a42ea4cbe250aa,2024-09-17T14:35:30.557000 CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000 CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000 -CVE-2024-46441,1,1,3b6e403c61cc411b3da60642bd1c82efa8fe6eba97439c902c7cb11ad9cd4cfc,2024-09-27T13:15:13.397000 +CVE-2024-46441,0,1,2418b86253ca00f9dc7f73a4a3e896b30ddde24c4b20f0f372cbb6dbc59ef2a5,2024-09-27T15:35:03.803000 CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000 CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188936,2024-09-17T14:35:31.353000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 +CVE-2024-46470,1,1,ec152bb0f19289f3f62326f74efcef4e95e62ce9c433a95c204c3ec486e35cc6,2024-09-27T15:15:15.393000 +CVE-2024-46471,1,1,522cc75b1bf2befa7627369323d79181b7c448923d2e221772e14260cc62fa52,2024-09-27T15:15:15.483000 +CVE-2024-46472,1,1,9fd229e7baa9ea2d5492d76f60c6dd3834e3338560aee71a8dbb7fb9a1d1d9da,2024-09-27T15:15:15.567000 CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000 CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000 CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000 @@ -260358,7 +260373,7 @@ CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf CVE-2024-46610,0,0,d922b4261099847096d8c683fe0eb8434b2ccb3c0c33dd549b34f19d2b943e06,2024-09-26T13:32:02.803000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 -CVE-2024-46627,0,0,f47c005b0f44e593b766a01de7d45f47b9c4d8031f58dc755a16f868fd0ea108,2024-09-26T17:15:04.190000 +CVE-2024-46627,0,1,2d97afaae826c5582be81e574e277b4f6fe41b8dad48517b39b84d283362a60b,2024-09-27T15:35:04.583000 CVE-2024-46628,0,0,b9b3a5b65ec5ae34f5ecdb56d9dab97b5151c6b611a9836ba074833ecc1193a1,2024-09-26T21:35:22.537000 CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000 CVE-2024-46632,0,0,49c02e3668d5e881ef006304da2eb6eae159ef85be40315a6a4d9e988cef6e2a,2024-09-26T19:35:22.293000 @@ -260519,79 +260534,79 @@ CVE-2024-46799,0,0,9272007b77b1874a111bd3818178b47066e5b2d005f81deac8b6b5c2b5db8 CVE-2024-4680,0,0,0c8976c1b63cea89edb43ad9d9b81fc90d65237e24435549d62994fa7d6af35d,2024-07-19T18:51:53.003000 CVE-2024-46800,0,0,87d1b49029d5e1e7de4c32d994818d53e59bb26db74de770ef90f55c819e5407,2024-09-20T17:18:55.260000 CVE-2024-46801,0,0,239d949d680f6da2e86f32ffc06e9b107781e443c485e3945602ddf3b4e94f6c,2024-09-20T17:18:17.810000 -CVE-2024-46802,1,1,e9f139917d1f7ff6bc7947e33e1bbf87c15a20c520c2d26c4d874ead7ccbfa78,2024-09-27T13:15:13.483000 -CVE-2024-46803,1,1,b3fcfb3d231601be8c65634e6f78b288f39fa649eb74dfcb459160f458c615dd,2024-09-27T13:15:13.570000 -CVE-2024-46804,1,1,334690fb38ed7bfd5a78f53f0a3b1ba033c8865cf2d15422a75c925c8f677cdd,2024-09-27T13:15:13.637000 -CVE-2024-46805,1,1,bec2b82aa25f22a5735a97792596f23efc4ed675414c01d6771246c835479c92,2024-09-27T13:15:13.707000 -CVE-2024-46806,1,1,5560b74f3e5070b55a9f244d2f06275af64aa76d7a93d6b943a47162abffb710,2024-09-27T13:15:13.773000 -CVE-2024-46807,1,1,70894da795b0bc31a39b431d1af62b819a9b8fa3cb03591a8fd0ae7d5e59c80b,2024-09-27T13:15:13.840000 -CVE-2024-46808,1,1,d6a2e7bf81073bb0bedd4129bd3a93e6a707e93048454aa00c3bf5c905b11311,2024-09-27T13:15:13.907000 -CVE-2024-46809,1,1,e6c1916b524d146a7c6e6f4b333f0bdd09785c3cdad8a05b4f1cdf2a858b26fc,2024-09-27T13:15:13.973000 +CVE-2024-46802,0,0,e9f139917d1f7ff6bc7947e33e1bbf87c15a20c520c2d26c4d874ead7ccbfa78,2024-09-27T13:15:13.483000 +CVE-2024-46803,0,0,b3fcfb3d231601be8c65634e6f78b288f39fa649eb74dfcb459160f458c615dd,2024-09-27T13:15:13.570000 +CVE-2024-46804,0,0,334690fb38ed7bfd5a78f53f0a3b1ba033c8865cf2d15422a75c925c8f677cdd,2024-09-27T13:15:13.637000 +CVE-2024-46805,0,0,bec2b82aa25f22a5735a97792596f23efc4ed675414c01d6771246c835479c92,2024-09-27T13:15:13.707000 +CVE-2024-46806,0,0,5560b74f3e5070b55a9f244d2f06275af64aa76d7a93d6b943a47162abffb710,2024-09-27T13:15:13.773000 +CVE-2024-46807,0,0,70894da795b0bc31a39b431d1af62b819a9b8fa3cb03591a8fd0ae7d5e59c80b,2024-09-27T13:15:13.840000 +CVE-2024-46808,0,0,d6a2e7bf81073bb0bedd4129bd3a93e6a707e93048454aa00c3bf5c905b11311,2024-09-27T13:15:13.907000 +CVE-2024-46809,0,0,e6c1916b524d146a7c6e6f4b333f0bdd09785c3cdad8a05b4f1cdf2a858b26fc,2024-09-27T13:15:13.973000 CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000 -CVE-2024-46810,1,1,f06b5ed6e4e57d9440cd1356035324bf3168516128d45f5ed833162a15e26f61,2024-09-27T13:15:14.037000 -CVE-2024-46811,1,1,9c06cbe983cf0281e42eba97849b4611a6c0b2d318efacae009163eba509674c,2024-09-27T13:15:14.107000 -CVE-2024-46812,1,1,ca538231b55475d7517cdaeacca9edd93858da44dbc948175f5cd1b98a5d49f1,2024-09-27T13:15:14.163000 -CVE-2024-46813,1,1,3dc255f99046ece5258ed3bcf8b01348f3f55504bb6e19b6345060f5ecf2fc70,2024-09-27T13:15:14.230000 -CVE-2024-46814,1,1,f28000dab7af4247743c13ee681bcb793731a3eb937baf961910ddf725759f73,2024-09-27T13:15:14.297000 -CVE-2024-46815,1,1,b1beb3dbae3607898e3f5adb0992665712715079c3a99aab4feefb9c28cac7fa,2024-09-27T13:15:14.370000 -CVE-2024-46816,1,1,d1006d0a997be568c964833163a5bfecf77f8efff19a50a5acb948bb349d9443,2024-09-27T13:15:14.433000 -CVE-2024-46817,1,1,5cc4604d98bfc67e8ebbd371a5ce325e16351c3c8d9a44dcb107a5d4d900539e,2024-09-27T13:15:14.493000 -CVE-2024-46818,1,1,1702b1609a0fc23fd13330b17748f4ff44ba31d80af3898c888487d1b291f1c4,2024-09-27T13:15:14.563000 -CVE-2024-46819,1,1,cdc2c2b19527c84de8f6216d9a7222b8d3add79380829866240a5d28d9b0b569,2024-09-27T13:15:14.640000 +CVE-2024-46810,0,0,f06b5ed6e4e57d9440cd1356035324bf3168516128d45f5ed833162a15e26f61,2024-09-27T13:15:14.037000 +CVE-2024-46811,0,0,9c06cbe983cf0281e42eba97849b4611a6c0b2d318efacae009163eba509674c,2024-09-27T13:15:14.107000 +CVE-2024-46812,0,0,ca538231b55475d7517cdaeacca9edd93858da44dbc948175f5cd1b98a5d49f1,2024-09-27T13:15:14.163000 +CVE-2024-46813,0,0,3dc255f99046ece5258ed3bcf8b01348f3f55504bb6e19b6345060f5ecf2fc70,2024-09-27T13:15:14.230000 +CVE-2024-46814,0,0,f28000dab7af4247743c13ee681bcb793731a3eb937baf961910ddf725759f73,2024-09-27T13:15:14.297000 +CVE-2024-46815,0,0,b1beb3dbae3607898e3f5adb0992665712715079c3a99aab4feefb9c28cac7fa,2024-09-27T13:15:14.370000 +CVE-2024-46816,0,0,d1006d0a997be568c964833163a5bfecf77f8efff19a50a5acb948bb349d9443,2024-09-27T13:15:14.433000 +CVE-2024-46817,0,0,5cc4604d98bfc67e8ebbd371a5ce325e16351c3c8d9a44dcb107a5d4d900539e,2024-09-27T13:15:14.493000 +CVE-2024-46818,0,0,1702b1609a0fc23fd13330b17748f4ff44ba31d80af3898c888487d1b291f1c4,2024-09-27T13:15:14.563000 +CVE-2024-46819,0,0,cdc2c2b19527c84de8f6216d9a7222b8d3add79380829866240a5d28d9b0b569,2024-09-27T13:15:14.640000 CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000 -CVE-2024-46820,1,1,3ef433eca50b8bd880575b57a9b58c18ffddc5a5a29a46e58c7877eb973fc74c,2024-09-27T13:15:14.707000 -CVE-2024-46821,1,1,32fb2951ec83a47620f623c9885f71efdb8d75e12224b1ad77812cb21a28fb72,2024-09-27T13:15:14.767000 -CVE-2024-46822,1,1,f1263b53fab54e020783396758327e9d0e6c9b7c3cf62a5eb0c23b97f90ffe7c,2024-09-27T13:15:14.830000 -CVE-2024-46823,1,1,ad968e6be2162e32fa37f28af2db1dedd823e343548f0a908d2b6aeb802b54fc,2024-09-27T13:15:14.897000 -CVE-2024-46824,1,1,8e11bc388ee51b12d3aba87ff77058a91456bfc97cf3ed3834b5741b51cb1a4b,2024-09-27T13:15:14.960000 -CVE-2024-46825,1,1,dc9d6285049da1f45b87678682b02617dda0c172ebdac120be2d6f420af90752,2024-09-27T13:15:15.027000 -CVE-2024-46826,1,1,a79263a9942a970ced521484b96b8e8d54879cf827f2fad9c371bf134adccd67,2024-09-27T13:15:15.087000 -CVE-2024-46827,1,1,839d4960c2a4c7aed872145df3ce93b8155bd816176ff84646919168f458121c,2024-09-27T13:15:15.153000 -CVE-2024-46828,1,1,73d4c98ad163d106929727032cc2364c3fa94ac5f6af7f2fc5ca9a38c4607c43,2024-09-27T13:15:15.220000 -CVE-2024-46829,1,1,7513df9dc08d13690238979c00ad51e66c406e53942c6057ed1d8fa9e1776ed4,2024-09-27T13:15:15.300000 +CVE-2024-46820,0,0,3ef433eca50b8bd880575b57a9b58c18ffddc5a5a29a46e58c7877eb973fc74c,2024-09-27T13:15:14.707000 +CVE-2024-46821,0,0,32fb2951ec83a47620f623c9885f71efdb8d75e12224b1ad77812cb21a28fb72,2024-09-27T13:15:14.767000 +CVE-2024-46822,0,0,f1263b53fab54e020783396758327e9d0e6c9b7c3cf62a5eb0c23b97f90ffe7c,2024-09-27T13:15:14.830000 +CVE-2024-46823,0,0,ad968e6be2162e32fa37f28af2db1dedd823e343548f0a908d2b6aeb802b54fc,2024-09-27T13:15:14.897000 +CVE-2024-46824,0,0,8e11bc388ee51b12d3aba87ff77058a91456bfc97cf3ed3834b5741b51cb1a4b,2024-09-27T13:15:14.960000 +CVE-2024-46825,0,0,dc9d6285049da1f45b87678682b02617dda0c172ebdac120be2d6f420af90752,2024-09-27T13:15:15.027000 +CVE-2024-46826,0,0,a79263a9942a970ced521484b96b8e8d54879cf827f2fad9c371bf134adccd67,2024-09-27T13:15:15.087000 +CVE-2024-46827,0,0,839d4960c2a4c7aed872145df3ce93b8155bd816176ff84646919168f458121c,2024-09-27T13:15:15.153000 +CVE-2024-46828,0,0,73d4c98ad163d106929727032cc2364c3fa94ac5f6af7f2fc5ca9a38c4607c43,2024-09-27T13:15:15.220000 +CVE-2024-46829,0,0,7513df9dc08d13690238979c00ad51e66c406e53942c6057ed1d8fa9e1776ed4,2024-09-27T13:15:15.300000 CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000 -CVE-2024-46830,1,1,555fbd23e90e6a4d8ed9fc3e2eca36a0921cdb43ed2b42ddaef05104c9065f7d,2024-09-27T13:15:15.380000 -CVE-2024-46831,1,1,3dc39b10de7d65692acfd01caa41762cb48e875e45d7c8e01cf68c9c32e8067e,2024-09-27T13:15:15.457000 -CVE-2024-46832,1,1,8a1fb9539331fab60df65adb24a11cc6547e8c12c01455cbc70879b717832d56,2024-09-27T13:15:15.517000 -CVE-2024-46833,1,1,adb5ff85207df54032ae82679b3a2df42bc9c878ec4542ddfe015405ece402bf,2024-09-27T13:15:15.593000 -CVE-2024-46834,1,1,688c15b693b074e3e8c9eaa1aa90d0b27824550e5cda417a8a3100e5485703c6,2024-09-27T13:15:15.660000 -CVE-2024-46835,1,1,bd4756ea73ef83edea87ca48ade55fe7fd9d7c9ad2f007d94e4ac9a64fa48807,2024-09-27T13:15:15.720000 -CVE-2024-46836,1,1,d122e6c84b1df5ab0f643192a6dece9f096e3630c5b46fc1c3ecfe33f629aadd,2024-09-27T13:15:15.780000 -CVE-2024-46837,1,1,657a60314cbdeb0d214650deab977b47bcd2c3c230a9ab235b55f2a676691232,2024-09-27T13:15:15.850000 -CVE-2024-46838,1,1,714c00816c1783ceb7c4ab1ce3b3d0ed56f5411141d8872b72ac5a3e6d3aee22,2024-09-27T13:15:15.920000 -CVE-2024-46839,1,1,50455736c6dd8fe8730b4c3de68b4dae5c09fe48f915e4ea05d48dbb7fa20420,2024-09-27T13:15:15.980000 +CVE-2024-46830,0,0,555fbd23e90e6a4d8ed9fc3e2eca36a0921cdb43ed2b42ddaef05104c9065f7d,2024-09-27T13:15:15.380000 +CVE-2024-46831,0,0,3dc39b10de7d65692acfd01caa41762cb48e875e45d7c8e01cf68c9c32e8067e,2024-09-27T13:15:15.457000 +CVE-2024-46832,0,0,8a1fb9539331fab60df65adb24a11cc6547e8c12c01455cbc70879b717832d56,2024-09-27T13:15:15.517000 +CVE-2024-46833,0,0,adb5ff85207df54032ae82679b3a2df42bc9c878ec4542ddfe015405ece402bf,2024-09-27T13:15:15.593000 +CVE-2024-46834,0,0,688c15b693b074e3e8c9eaa1aa90d0b27824550e5cda417a8a3100e5485703c6,2024-09-27T13:15:15.660000 +CVE-2024-46835,0,0,bd4756ea73ef83edea87ca48ade55fe7fd9d7c9ad2f007d94e4ac9a64fa48807,2024-09-27T13:15:15.720000 +CVE-2024-46836,0,0,d122e6c84b1df5ab0f643192a6dece9f096e3630c5b46fc1c3ecfe33f629aadd,2024-09-27T13:15:15.780000 +CVE-2024-46837,0,0,657a60314cbdeb0d214650deab977b47bcd2c3c230a9ab235b55f2a676691232,2024-09-27T13:15:15.850000 +CVE-2024-46838,0,0,714c00816c1783ceb7c4ab1ce3b3d0ed56f5411141d8872b72ac5a3e6d3aee22,2024-09-27T13:15:15.920000 +CVE-2024-46839,0,0,50455736c6dd8fe8730b4c3de68b4dae5c09fe48f915e4ea05d48dbb7fa20420,2024-09-27T13:15:15.980000 CVE-2024-4684,0,0,76a2bcc81dc9a2c7f19544710090eea770016f263f5b8a63e7b8f826540bfd29,2024-06-04T19:20:46.347000 -CVE-2024-46840,1,1,6b2fa36be6044c2e6c7390f4b17867705bc01d5d9f8042ad1283c2312c824bce,2024-09-27T13:15:16.057000 -CVE-2024-46841,1,1,df19dc471a4d283b56f4fc2152cfed78bb6777693c89f01284d2ab648fec09a1,2024-09-27T13:15:16.130000 -CVE-2024-46842,1,1,7182a8bafa709a3acd8e7be1b39c8c3306260b5f6efd0bc8b8f994ce6a432517,2024-09-27T13:15:16.190000 -CVE-2024-46843,1,1,fb456a5b80db8d6621d16b8a73d382a8c2703e9783a4da9880da40e45a3acc27,2024-09-27T13:15:16.250000 -CVE-2024-46844,1,1,da93dce1dd9e9b752304fe37d74bd5feac9b871c3846b3ae9491151ddcac1089,2024-09-27T13:15:16.313000 -CVE-2024-46845,1,1,58824907706a811a1a09e91eeaf9c2af2e6d29a45cf2298723929cab62e9ca1f,2024-09-27T13:15:16.397000 -CVE-2024-46846,1,1,9b22315605a2e611e51e7817f4272aec0b9d06c1b21856864d348b2ee6060a2e,2024-09-27T13:15:16.480000 -CVE-2024-46847,1,1,f403b8e963763ce9d81a628c3e84dcad121b7022281c6fc5382ce58651628d62,2024-09-27T13:15:16.570000 -CVE-2024-46848,1,1,5d5bc0c9f7ca69b110d37e437fc2b95e88bf0d02189c3a5d3068eaa5fd021983,2024-09-27T13:15:16.657000 -CVE-2024-46849,1,1,8e00099733b45c4761a725d526666bbfa9c0a5f1159c26f360f3cf422d7dac17,2024-09-27T13:15:16.723000 +CVE-2024-46840,0,0,6b2fa36be6044c2e6c7390f4b17867705bc01d5d9f8042ad1283c2312c824bce,2024-09-27T13:15:16.057000 +CVE-2024-46841,0,0,df19dc471a4d283b56f4fc2152cfed78bb6777693c89f01284d2ab648fec09a1,2024-09-27T13:15:16.130000 +CVE-2024-46842,0,0,7182a8bafa709a3acd8e7be1b39c8c3306260b5f6efd0bc8b8f994ce6a432517,2024-09-27T13:15:16.190000 +CVE-2024-46843,0,0,fb456a5b80db8d6621d16b8a73d382a8c2703e9783a4da9880da40e45a3acc27,2024-09-27T13:15:16.250000 +CVE-2024-46844,0,0,da93dce1dd9e9b752304fe37d74bd5feac9b871c3846b3ae9491151ddcac1089,2024-09-27T13:15:16.313000 +CVE-2024-46845,0,0,58824907706a811a1a09e91eeaf9c2af2e6d29a45cf2298723929cab62e9ca1f,2024-09-27T13:15:16.397000 +CVE-2024-46846,0,0,9b22315605a2e611e51e7817f4272aec0b9d06c1b21856864d348b2ee6060a2e,2024-09-27T13:15:16.480000 +CVE-2024-46847,0,0,f403b8e963763ce9d81a628c3e84dcad121b7022281c6fc5382ce58651628d62,2024-09-27T13:15:16.570000 +CVE-2024-46848,0,0,5d5bc0c9f7ca69b110d37e437fc2b95e88bf0d02189c3a5d3068eaa5fd021983,2024-09-27T13:15:16.657000 +CVE-2024-46849,0,0,8e00099733b45c4761a725d526666bbfa9c0a5f1159c26f360f3cf422d7dac17,2024-09-27T13:15:16.723000 CVE-2024-4685,0,0,38350af74ad68911fd851342727812175d5d39b6f847c1ca12945db68e23926c,2024-06-04T19:20:46.443000 -CVE-2024-46850,1,1,4f262e2458bf867873395eb1be206dc95131f0ca7899833372d25c463782fe17,2024-09-27T13:15:16.787000 -CVE-2024-46851,1,1,4ef6a63c49c19f1f0606ad6391b5b8e01536eed259c2d187dfbc5ca66e8ced6f,2024-09-27T13:15:16.850000 -CVE-2024-46852,1,1,4d57dbe85354a8265bd8961196b2eba9526edfc3a33c74c97081c3e33639523e,2024-09-27T13:15:16.917000 -CVE-2024-46853,1,1,1a561997e56ca448bc9b9306b8c8f023ce4fa58b91ef7d2bfcf08c8937ff9e94,2024-09-27T13:15:16.997000 -CVE-2024-46854,1,1,6b4b8e3a1763a75b94fee7079bffa9a836dc1962e35d0c74221e9b3490bf0200,2024-09-27T13:15:17.063000 -CVE-2024-46855,1,1,367ccc9814a06e060c65f49493361f6016bdb2e0dae7ef3551e1deba3573154c,2024-09-27T13:15:17.133000 -CVE-2024-46856,1,1,c6de094553adece9d8b4314b32053a86ff4989311778f6efbe882e7b6c6f1151,2024-09-27T13:15:17.210000 -CVE-2024-46857,1,1,10433c2ba74e2dcaee28f156ebcf8e72dadd20f6f216fb23bd30b126205c3166,2024-09-27T13:15:17.277000 -CVE-2024-46858,1,1,a2960ce21730d5c76dc962c9159bb0b3a9ba6b7e28e33460f91a80a497a0e168,2024-09-27T13:15:17.353000 -CVE-2024-46859,1,1,19794ab467d8d430f5ff0af3ddf03ebebbf21aa4cacfd9477037687bfef359d7,2024-09-27T13:15:17.430000 +CVE-2024-46850,0,0,4f262e2458bf867873395eb1be206dc95131f0ca7899833372d25c463782fe17,2024-09-27T13:15:16.787000 +CVE-2024-46851,0,0,4ef6a63c49c19f1f0606ad6391b5b8e01536eed259c2d187dfbc5ca66e8ced6f,2024-09-27T13:15:16.850000 +CVE-2024-46852,0,0,4d57dbe85354a8265bd8961196b2eba9526edfc3a33c74c97081c3e33639523e,2024-09-27T13:15:16.917000 +CVE-2024-46853,0,0,1a561997e56ca448bc9b9306b8c8f023ce4fa58b91ef7d2bfcf08c8937ff9e94,2024-09-27T13:15:16.997000 +CVE-2024-46854,0,0,6b4b8e3a1763a75b94fee7079bffa9a836dc1962e35d0c74221e9b3490bf0200,2024-09-27T13:15:17.063000 +CVE-2024-46855,0,0,367ccc9814a06e060c65f49493361f6016bdb2e0dae7ef3551e1deba3573154c,2024-09-27T13:15:17.133000 +CVE-2024-46856,0,0,c6de094553adece9d8b4314b32053a86ff4989311778f6efbe882e7b6c6f1151,2024-09-27T13:15:17.210000 +CVE-2024-46857,0,0,10433c2ba74e2dcaee28f156ebcf8e72dadd20f6f216fb23bd30b126205c3166,2024-09-27T13:15:17.277000 +CVE-2024-46858,0,0,a2960ce21730d5c76dc962c9159bb0b3a9ba6b7e28e33460f91a80a497a0e168,2024-09-27T13:15:17.353000 +CVE-2024-46859,0,0,19794ab467d8d430f5ff0af3ddf03ebebbf21aa4cacfd9477037687bfef359d7,2024-09-27T13:15:17.430000 CVE-2024-4686,0,0,7fade2d4b0959e1a2b3034c64ee7734431bcab648eb69e4bd96a18330c891096,2024-06-20T20:15:19.483000 -CVE-2024-46860,1,1,0df983f2eb92cc3b84570b02adb6b4b777d10dcb2dc7082af2b6a5233c6d5e74,2024-09-27T13:15:17.493000 -CVE-2024-46861,1,1,ff4ce1e67ee5c0143292d9664a0e40d0d03af20384cb8616942a881722ad45d9,2024-09-27T13:15:17.563000 -CVE-2024-46862,1,1,a37124b1a78b42c293cc5e8694627936a5f2b47374a8359618860d7e55a17b34,2024-09-27T13:15:17.627000 -CVE-2024-46863,1,1,049de94b0edf7a6cb3a13d19398d8d6c073734c335bcb7575ee8e38866e801dd,2024-09-27T13:15:17.690000 -CVE-2024-46864,1,1,4c906437925acc01e0722fb1c63950a249a7408d540cc416fbdb0a039a800e92,2024-09-27T13:15:17.747000 -CVE-2024-46865,1,1,1dbc9b5ba186923b4742e36d49203a434956c8fbe94fcc66757c5dcafc28984e,2024-09-27T13:15:17.820000 -CVE-2024-46866,1,1,982d7ec829e63761004e72cab06c55eec1acd818ec554d5ba1c8696819c1fdf8,2024-09-27T13:15:17.887000 -CVE-2024-46867,1,1,fe7c2edcd1c7e392d0823fc3aa8ffeb9c78398713a78de62c1887c286221356e,2024-09-27T13:15:17.937000 -CVE-2024-46868,1,1,e1f3ecacc97b31ed308f3f47ebdc27c0a1b062ab67d1ce71db8ea81907e1770a,2024-09-27T13:15:18.007000 +CVE-2024-46860,0,0,0df983f2eb92cc3b84570b02adb6b4b777d10dcb2dc7082af2b6a5233c6d5e74,2024-09-27T13:15:17.493000 +CVE-2024-46861,0,0,ff4ce1e67ee5c0143292d9664a0e40d0d03af20384cb8616942a881722ad45d9,2024-09-27T13:15:17.563000 +CVE-2024-46862,0,0,a37124b1a78b42c293cc5e8694627936a5f2b47374a8359618860d7e55a17b34,2024-09-27T13:15:17.627000 +CVE-2024-46863,0,0,049de94b0edf7a6cb3a13d19398d8d6c073734c335bcb7575ee8e38866e801dd,2024-09-27T13:15:17.690000 +CVE-2024-46864,0,0,4c906437925acc01e0722fb1c63950a249a7408d540cc416fbdb0a039a800e92,2024-09-27T13:15:17.747000 +CVE-2024-46865,0,0,1dbc9b5ba186923b4742e36d49203a434956c8fbe94fcc66757c5dcafc28984e,2024-09-27T13:15:17.820000 +CVE-2024-46866,0,0,982d7ec829e63761004e72cab06c55eec1acd818ec554d5ba1c8696819c1fdf8,2024-09-27T13:15:17.887000 +CVE-2024-46867,0,0,fe7c2edcd1c7e392d0823fc3aa8ffeb9c78398713a78de62c1887c286221356e,2024-09-27T13:15:17.937000 +CVE-2024-46868,0,0,e1f3ecacc97b31ed308f3f47ebdc27c0a1b062ab67d1ce71db8ea81907e1770a,2024-09-27T13:15:18.007000 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 @@ -260641,8 +260656,8 @@ CVE-2024-47047,0,0,0a4a15ee2fb8d94ee7dbf9b3ee25f3c32a7e76c7b103a0dd6583489587dba CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000 CVE-2024-47049,0,0,bc768f951de25f2d3b7ee4ed4c1188c49a1568cca5cfdd9dc385ac790402738a,2024-09-20T12:30:51.220000 CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000 -CVE-2024-47050,0,0,5ddac1f8a8053f0642ae4dbec5cd7e9a4084918d6fb4495768633d435a3f2c23,2024-09-20T12:30:17.483000 -CVE-2024-47058,0,0,ce9dc8340a8922ed16d37cd23094d408dba7fce77515a97a3b8ba24288e2b02f,2024-09-20T12:30:17.483000 +CVE-2024-47050,0,1,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000 +CVE-2024-47058,0,1,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000 CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000 CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000 CVE-2024-47060,0,0,3723bb9e2990e983919d891a0f942a097942693d70a5d147a7a34b2c3bd8fa94,2024-09-25T16:43:47.267000 @@ -260696,6 +260711,8 @@ CVE-2024-47177,0,0,4693ff070f9f11940b1b6fa608419c33ee06a3d35c330a56c23ddcccb6e86 CVE-2024-47179,0,0,9058d44736aa5879fe15ebac05ddf4897c6368571c116083074f73c4d934c6d8,2024-09-26T20:15:06.950000 CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000 CVE-2024-47180,0,0,d098d674c2c5dd84a239cf91df06907f039b4828c306456dcad3f506e675b516,2024-09-26T20:15:07.310000 +CVE-2024-47182,1,1,69a16fc9154ea6d7ac97d74655916e8770997f865ecb98299d0d581a01a394b7,2024-09-27T14:15:04.620000 +CVE-2024-47184,1,1,af8ebb1816d7ba0a039271d512029a4f3a5177b9bc7103f3acf040e130a3146c,2024-09-27T14:15:04.833000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47197,0,0,e744485fe82b2c7f5b7c9d650df3296f2a00094efea0a5ed0597ce38048212b5,2024-09-26T13:32:02.803000 CVE-2024-4720,0,0,eb5b6c06efbc2e8e5b700d46905e09781ba603e4dc4e18ff8664640e85fa6762,2024-06-04T19:20:47.440000 @@ -262130,7 +262147,7 @@ CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac67050452 CVE-2024-6336,0,0,d15a7371f14974a83964ccd43d827dda2013bed4e54e361d69b27a97f9fa2a0d,2024-09-17T15:23:02.077000 CVE-2024-6337,0,0,2e78350836fa8817ff4aec79c82f6f0f98d78739985b39708ec542654e5f48f4,2024-08-21T12:30:33.697000 CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd98c,2024-07-19T20:24:40.397000 -CVE-2024-6339,0,0,900c18b99c3b938f801abc6ad5fe5a877c8e068ea7f11186df65574c46246a21,2024-08-21T12:30:33.697000 +CVE-2024-6339,0,1,3df67bcf844ce237505ce6d6f4a1b23415ac19dce852377f3625a08647b9b177,2024-09-27T14:04:31.700000 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 CVE-2024-6342,0,0,fc4f36196431f464caa5a00be2d63e1b0b442bd3ad06196175f1330a8fdfe779,2024-09-10T12:09:50.377000 @@ -262170,7 +262187,7 @@ CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 CVE-2024-6384,0,0,69acc14adf4ad2dfa9acf19196e8d21558fac0b5469b1fd3bf540f24a32ab6da,2024-08-16T14:29:24.947000 CVE-2024-6385,0,0,13d2095bcd11ed43b6c47262c7b96c8a9e162b20cb975895bc98c3af67d39ff6,2024-07-12T16:49:14.047000 -CVE-2024-6386,0,1,f7785143a7449c5f4f7c2d61744dd4c93b2b9f3680cfe79b21fc89908b1565bd,2024-09-27T13:25:43.077000 +CVE-2024-6386,0,0,f7785143a7449c5f4f7c2d61744dd4c93b2b9f3680cfe79b21fc89908b1565bd,2024-09-27T13:25:43.077000 CVE-2024-6387,0,0,33e863f5fbdb5ebd28cdb76db79962b7a834a7793cc2d1eb4023a387b3acaea2,2024-09-14T03:15:08.143000 CVE-2024-6388,0,0,0ce37f83493b5d79bb3fdc963327390bc09266ac17f5f1de660cf43d4cdce70d,2024-06-27T17:11:52.390000 CVE-2024-6389,0,0,97619f937594e57440ea9f8cb3d55fe9ec171c40b4959fd4a8bcfb76e0e63169,2024-09-14T15:10:39.037000 @@ -262242,7 +262259,7 @@ CVE-2024-6472,0,0,06cfc3c26e9764572c1adb3e446cad13cb9599b02c4c47946f6698a134e258 CVE-2024-6473,0,0,9d329dd670917bde4dfbebd26b87a1f0ac64a0b550d97fba6854ff35150aadd6,2024-09-05T14:19:45.153000 CVE-2024-6477,0,0,095ad8bec127bb97feb0819e6df5852cd52601b6cc4ba1d92128a3b9897811f6,2024-09-06T17:35:19.087000 CVE-2024-6481,0,0,8a6ed16cb15e9b1be7b8ecc3c869a269748ddec5ecbc3504e8d7f068ea116af3,2024-08-08T14:35:14.190000 -CVE-2024-6482,0,1,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000 +CVE-2024-6482,0,0,72bf8f43b51dedcbd3503b13fb1098e532f5e135aadff3ebc844afe2ce28381d,2024-09-27T13:54:53.837000 CVE-2024-6484,0,0,bc633abd6bfb9da06585afdfb273066dfbc508847026385eb612d46f7c70ed29,2024-07-11T18:09:58.777000 CVE-2024-6485,0,0,b143d2f5de1cad2c57f83d18fe64abfe0ba2da69210341aec4863f07cdd850cb,2024-07-11T18:09:58.777000 CVE-2024-6487,0,0,ade8feb977b02299075dd869ca65fb48f198290ee8a478009ada36ae91b54213,2024-08-01T14:00:24 @@ -262747,6 +262764,7 @@ CVE-2024-7144,0,0,57a5a71f7611d2bbf4fd3384e95cd03b39e04b60449356a588f871c88f4479 CVE-2024-7145,0,0,09358b8e986da363b6baeebea664dedb137746de39229d5884046e73cf837e28,2024-09-13T14:39:44.490000 CVE-2024-7146,0,0,0d097eb41f121dd3c78bcb7ece20b3c3122f8d7908fd573306f5f8009daac9d3,2024-08-19T13:00:23.117000 CVE-2024-7147,0,0,d64b7d45d4df4fda891fe044ed5ed11da3adfb67eec103504ae2ce9a34185836,2024-08-19T13:00:23.117000 +CVE-2024-7149,1,1,db751ba45894771bbe2c7358eb82d0e711876ef9a7845804adf4692a0c8494e5,2024-09-27T14:15:05.043000 CVE-2024-7150,0,0,c7aa662c62f137fc9f5e7c2c4fa11d684ce4d74402782286c7770e7f6bcc041e,2024-08-08T13:04:18.753000 CVE-2024-7151,0,0,27748e77ac666f37b5ea95444b5871c2d624c12d124d7b3d9588f7bd43672a12,2024-07-29T14:12:08.783000 CVE-2024-7152,0,0,dcb2ef4ff482b2e3310b87257a8cfd0ded02bb0f2f9cc18d404e9808150d9dbb,2024-07-29T14:12:08.783000 @@ -262833,7 +262851,7 @@ CVE-2024-7254,0,0,8400894e8711410825184771bcde9b50c684e58b49dfe4878e8d0a79485e21 CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698ff,2024-08-16T15:23:19.167000 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 -CVE-2024-7258,0,1,d87745b439eb0eec0ee02b318012450e9a5bbd9a1641e9180767ba5e2e2be570,2024-09-27T13:05:06.930000 +CVE-2024-7258,0,0,d87745b439eb0eec0ee02b318012450e9a5bbd9a1641e9180767ba5e2e2be570,2024-09-27T13:05:06.930000 CVE-2024-7259,0,0,06b546cb7425acd940841d9812f3e9ea327d9484b7605f96ad6e03fcd1cd086d,2024-09-26T16:15:08.997000 CVE-2024-7260,0,0,7ac5c086a530cf5346822fe722bc0e211467ce336a1543005152dae602c7481a,2024-09-26T15:01:07.803000 CVE-2024-7261,0,0,f672393d607443ec498009a9b040ef410e3a579843a04e18027fe16c96a4fd8c,2024-09-13T19:39:40.570000 @@ -262913,7 +262931,7 @@ CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5 CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000 CVE-2024-7349,0,0,1654fb20b3d5b8111af7165700d7dd7fc184ee1783ff4e6ae92268a2f53d23f5,2024-09-12T12:43:32.957000 CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000 -CVE-2024-7351,0,1,a289bf4a77945a66ead7c1b1e012c68ef66822055b6831555c4ba82ee4eaeaa9,2024-09-27T12:48:20.803000 +CVE-2024-7351,0,0,a289bf4a77945a66ead7c1b1e012c68ef66822055b6831555c4ba82ee4eaeaa9,2024-09-27T12:48:20.803000 CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000 CVE-2024-7354,0,0,05748d08bcbd17e04b0b98f979c499c8aa6244b799a5028096361dae17757c61,2024-09-03T14:35:08.287000 CVE-2024-7355,0,0,071610fbf603e9022aa74d299a7d28ffd46303d85d85cb60c4b41df2eba6145e,2024-08-07T15:17:46.717000 @@ -262944,7 +262962,7 @@ CVE-2024-7380,0,0,cff48b7b0159d24f65855cb71d23b2ce33ffaef31476b244ab20ece89285d1 CVE-2024-7381,0,0,ca7cc8a67702d68f3387a7110e4857f594b40c8a2313eee62c5e57679029037d,2024-09-06T10:44:38.390000 CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000 CVE-2024-7383,0,0,21277f7530eb9638c0031a3484c43cc9bf1c76998abaa0508791395c60c4cd7b,2024-09-25T01:15:45.270000 -CVE-2024-7384,0,1,e16089be5aef5f78ca7e6b44ab3843ceb098d29ed31bfeb024ecf87d32c582a0,2024-09-27T13:15:28.443000 +CVE-2024-7384,0,0,e16089be5aef5f78ca7e6b44ab3843ceb098d29ed31bfeb024ecf87d32c582a0,2024-09-27T13:15:28.443000 CVE-2024-7385,0,0,a77c5e9bd92ca25ffb5d5fc3a083bc3c8336b2e231394dd2af48112daf35e0eb,2024-09-26T13:32:02.803000 CVE-2024-7386,0,0,73853b6e40a3b4b4a94fcf4c59609f559f6495383ceafa0a1df8f3191c741131,2024-09-26T13:32:02.803000 CVE-2024-7387,0,0,de7380b259c5cde0120b2e8a809f8a10a35a7d4a44cb8d5f57cbb1470484b8a0,2024-09-20T12:31:20.110000 @@ -263284,7 +263302,7 @@ CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7 CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 CVE-2024-7834,0,0,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000 CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277ba,2024-09-26T13:32:55.343000 -CVE-2024-7836,0,1,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000 +CVE-2024-7836,0,0,7e60d885d310741686f6c1eeb7bb5889e64eb59bcb33504b8c9e01388f42accf,2024-09-27T12:53:58.200000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 CVE-2024-7841,0,0,30d01d8bbe3d144bba2b7827240fa327034b88590168a3760f5fd6645e24392a,2024-08-21T14:12:12.943000 @@ -263320,7 +263338,7 @@ CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173 CVE-2024-7885,0,0,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 -CVE-2024-7888,0,1,57ff3b28678f008c2bdd72bf81b6e5b1bbb449b0748e8292d87b9d1342b8d17e,2024-09-27T13:45:33.030000 +CVE-2024-7888,0,0,57ff3b28678f008c2bdd72bf81b6e5b1bbb449b0748e8292d87b9d1342b8d17e,2024-09-27T13:45:33.030000 CVE-2024-7889,0,0,67539a9ea3afa10e1ef371a140e40e7f2e32fcedee02ec133e59e6ef2a347260,2024-09-13T18:35:18.777000 CVE-2024-7890,0,0,1dded06d7bba5f894e59f4fd824f843aaf6c5f24e5dfcfedb3ff09adc8671b20,2024-09-13T18:35:19.517000 CVE-2024-7891,0,0,5aaf92f1216ccc2cb89b6db2b8f39b542c60dfffb3bd17a4a092f87d2244167e,2024-09-12T20:35:27.267000 @@ -263674,7 +263692,7 @@ CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a0 CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000 CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,224fe311bf12d06d4c690b8d9ea3bc4f42261bcb370dc3457883b86fb932f74d,2024-09-26T21:58:45.393000 -CVE-2024-8432,0,1,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000 +CVE-2024-8432,0,0,8868d9b36bd238df6f75f7287d6bafac4ff3b898eed233d7b4ed5ce985d677d0,2024-09-27T12:58:58.433000 CVE-2024-8434,0,0,a7dd938925c560d2c4358a00a748e9c070db95d94d7906c441d33bc026b679c8,2024-09-26T13:32:02.803000 CVE-2024-8436,0,0,0d153a053863f3621c53c1e26deb2ddde74385c0ccdd737c792b34eb9af883c1,2024-09-26T13:32:02.803000 CVE-2024-8437,0,0,4b506df7175b44ffa93e3ef9b1fdedd8455751a5d7f25e7c7b69c7cd1dfd7636,2024-09-26T13:32:02.803000 @@ -263721,7 +263739,7 @@ CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38 CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000 CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000 CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000 -CVE-2024-8544,0,1,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000 +CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000 CVE-2024-8546,0,0,21c437f0d9de25e8960a2d9fbc9927a015111c992509c4b53747f59b9615f4f7,2024-09-26T13:32:02.803000 CVE-2024-8549,0,0,26824bba4a7be5d3e1980cceb3f14676382c512f326742b207079a7edab4cb14,2024-09-26T13:32:02.803000 CVE-2024-8552,0,0,6594d79506dd28071c715cfa6c7597507b339576bdff1f377ea688092ea69413,2024-09-26T13:32:02.803000 @@ -263760,9 +263778,9 @@ CVE-2024-8601,0,0,350a6e2c691d4290217990f07e5aa1eab0aea03118253c9c9cd54625cff0b3 CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000 CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000 CVE-2024-8606,0,0,b26561fdb25b431c7769f970473f862e2409b32db7325f6388e5ff10e75450f5,2024-09-26T13:32:55.343000 -CVE-2024-8607,1,1,2ddb0309fe1197047db89200e1244a0ab07c4cc8c5b67b4ff257922493e74f5b,2024-09-27T12:15:03.617000 -CVE-2024-8608,1,1,70a6908469f677ff13fb63da61d58f7946f34054726b2ac2f47edb4296c4ca33,2024-09-27T12:15:03.823000 -CVE-2024-8609,1,1,5a99fdb2093de97963ab5690f22ae5bbf17fb50466c32aba9a5a2535ef0c4ee9,2024-09-27T12:15:03.997000 +CVE-2024-8607,0,0,2ddb0309fe1197047db89200e1244a0ab07c4cc8c5b67b4ff257922493e74f5b,2024-09-27T12:15:03.617000 +CVE-2024-8608,0,0,70a6908469f677ff13fb63da61d58f7946f34054726b2ac2f47edb4296c4ca33,2024-09-27T12:15:03.823000 +CVE-2024-8609,0,0,5a99fdb2093de97963ab5690f22ae5bbf17fb50466c32aba9a5a2535ef0c4ee9,2024-09-27T12:15:03.997000 CVE-2024-8610,0,0,9284b474db1beea95bd52a2a34ba37d6ccf26129d36f3b91404a653005c49f87,2024-09-17T18:48:12.130000 CVE-2024-8611,0,0,3d63bb09edc11ef6327fe857dfe381551fd3ed233dd119eaa741dce3b9b25e8e,2024-09-18T17:24:34.163000 CVE-2024-8612,0,0,7904070a64ce6b0c617a391de31eeccb03d9f0e9421f89781a9fa23b513c6a78,2024-09-26T13:32:55.343000 @@ -263781,8 +263799,8 @@ CVE-2024-8639,0,0,81b4d237da336d5cfc4eef796e8c69ea1e42ce312224983662ce770673b442 CVE-2024-8640,0,0,355c8649c87d5efaa043494b8ec77b10dd7fca0f372cd99c6e0195d9ec1f3b26,2024-09-14T15:37:37.257000 CVE-2024-8641,0,0,6714847a0a2d7b4da8f2ecb0f7b3c9e94c4657d9429961f088a44e0537d8381a,2024-09-18T19:12:18.930000 CVE-2024-8642,0,0,2aae0632e6322f09814ded77019a17c6bdd3adefc0841a6f6e92e4043db21740,2024-09-19T15:18:47.917000 -CVE-2024-8643,1,1,abb56bfd0e482e5c7719cb049b85dd605dcd566e9e794a81e21255a1b93e2afd,2024-09-27T12:15:04.210000 -CVE-2024-8644,1,1,3daab34a01fefef4393191c7f856d42692489d65740ec2fb464a6318ebfac63e,2024-09-27T12:15:04.390000 +CVE-2024-8643,0,0,abb56bfd0e482e5c7719cb049b85dd605dcd566e9e794a81e21255a1b93e2afd,2024-09-27T12:15:04.210000 +CVE-2024-8644,0,0,3daab34a01fefef4393191c7f856d42692489d65740ec2fb464a6318ebfac63e,2024-09-27T12:15:04.390000 CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000 CVE-2024-8651,0,0,98f15bd48d1c12270cdb328a70de9359f32b42ef85efa713989e765f41ce1150,2024-09-23T17:51:13.050000 @@ -263791,19 +263809,19 @@ CVE-2024-8653,0,0,9ff517ad541f0c9badefd1c8205a26f97eafbec49ef5c58c2bc37d53706b32 CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000 CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000 CVE-2024-8656,0,0,0b43c2b98b59dcf4570c061c34339f89be9c45aed9cf9c6799db7e99cd60e1d8,2024-09-26T15:04:41.223000 -CVE-2024-8657,0,1,ad64a2f776c71acabb5df2c7c03704b8c597e20de250d559c26b9a343246b49c,2024-09-27T12:56:20.197000 +CVE-2024-8657,0,0,ad64a2f776c71acabb5df2c7c03704b8c597e20de250d559c26b9a343246b49c,2024-09-27T12:56:20.197000 CVE-2024-8658,0,0,77ea359923f64bc8a9f672f9257b7ffc4a02979528e9de1aaca429a10565c2d1,2024-09-26T13:32:02.803000 CVE-2024-8660,0,0,e1cfacda5ac49937121e76566dcec30a46275de6b23ffe4cf313c4cb8bedeacf,2024-09-23T23:00:00.437000 CVE-2024-8661,0,0,5b5eb9186f84a6299e6266b90655b3635cbc98e54795da81756013706cf03752,2024-09-25T16:15:11.420000 -CVE-2024-8662,0,1,bdaf5d9d59461992195adcbbf3e9aa44ce17d187816fee0d428bb839e927e0fa,2024-09-27T12:54:36.160000 +CVE-2024-8662,0,0,bdaf5d9d59461992195adcbbf3e9aa44ce17d187816fee0d428bb839e927e0fa,2024-09-27T12:54:36.160000 CVE-2024-8663,0,0,95df1e4ddd212aa242aadc3c7cf5dbe906cc5735393ec0be59f396093ac78f31,2024-09-13T14:06:04.777000 -CVE-2024-8664,0,1,3997b577f06fd6ade8df9705bd2720712ffc514d2a2a019b4c9d40380c5ebba1,2024-09-27T13:48:58.270000 +CVE-2024-8664,0,0,3997b577f06fd6ade8df9705bd2720712ffc514d2a2a019b4c9d40380c5ebba1,2024-09-27T13:48:58.270000 CVE-2024-8665,0,0,09ab15f5f9bd70753d6f594bff7ff364c9764fb90e308cd08c47d778b9a8291f,2024-09-13T14:06:04.777000 CVE-2024-8668,0,0,c353986416e0a4c46c78ecf60b727782bfce62870f6e122356299be7e7438e9c,2024-09-26T13:32:02.803000 CVE-2024-8669,0,0,d594b1491726b390fde9987d33067f88d20ddc09b39dc05c59acae4af25b456f,2024-09-14T11:47:14.677000 CVE-2024-8671,0,0,44eb9fc4ae83bda74c805da6c8f69132f0b0ddef607b7afc290779058022b5c0,2024-09-26T16:38:24.447000 CVE-2024-8678,0,0,889d21ef247546a6f2ba4419351284ba9f2f3727a17d89355bbfe7a36fdacaf2,2024-09-26T13:32:02.803000 -CVE-2024-8680,0,1,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000 +CVE-2024-8680,0,0,f92fa58a804f571c1e7bcf32a74c84f918657d6176f24d169d6d6fd1db54ec14,2024-09-27T13:53:47.910000 CVE-2024-8681,0,0,eb2555a283f92f1304ea04a10441d173f9fe6abf0f05be78151ead97d14620bd,2024-09-27T07:15:05.123000 CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000 CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000 @@ -263829,7 +263847,7 @@ CVE-2024-8713,0,0,77e6eb32497c4838ab6eff0729860dc19e9280431833bec790cbdd0c191045 CVE-2024-8714,0,0,2bf1d2039d26904f97b1e8fc522abe5916905f0e0d26ed18e01afb2d802fce13,2024-09-26T20:06:46.330000 CVE-2024-8716,0,0,1bb41aeeebe4e896420adf3cdaff53e3d88a64a7e4d1f07d25f8bcb2da122bf8,2024-09-26T17:03:05.487000 CVE-2024-8723,0,0,778d0a0398aed78fe986c3e106c93b2232e3d42b0102981078399ce3c143c0f8,2024-09-26T13:32:02.803000 -CVE-2024-8724,0,0,b84c0f858130dbe3d5efee42c723e6b66a5ac84e9dedd508f06aebfed2f7ce86,2024-09-14T11:47:14.677000 +CVE-2024-8724,0,1,41e3dd453fbe3c0072e7ab470e5d529ac122f059bb60a2be671564b989c49676,2024-09-27T15:56:00.073000 CVE-2024-8725,0,0,206d33f8ec7dfc1aa0697b16d275da6d2346e0e0b344cb623ce6b9ea7820dd69,2024-09-26T13:32:02.803000 CVE-2024-8730,0,0,ff380ede7d530472d7457d72280d0377e58fe499631b78029fd0dcbdd667a7f4,2024-09-26T19:58:33.353000 CVE-2024-8731,0,0,17c6adda5eb698d4c05886ce56b7c8d24eb85ac20af08445719f350b3f8c3e38,2024-09-26T19:43:33.110000 @@ -263845,13 +263863,13 @@ CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b56 CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000 CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 -CVE-2024-8758,0,0,d85d9a02694712873ead6e5be3bac99f7e62c17fcb6ef0f670284ba6ad822899,2024-09-26T13:32:55.343000 +CVE-2024-8758,0,1,634aeeda8f9e91934f78e3b64172027c163c387830078a2c36c39ec180a63900,2024-09-27T14:29:23.157000 CVE-2024-8761,0,0,3585691f416075376d018cf9f4fcfa97af66b09d60d17a08ef4151ff63a68129,2024-09-20T12:31:20.110000 CVE-2024-8762,0,0,2877f4481d10e26d4e6bf50e010d02152cab4d90b2c2329689bb4edd4b768ea9,2024-09-14T15:54:10.687000 CVE-2024-8766,0,0,b5c86feebeb7f4c2ef3d57aeff024553a8b8afab58619c1ddcc92e275588dfe2,2024-09-20T12:31:20.110000 CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e0e,2024-09-20T12:31:20.110000 CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000 -CVE-2024-8770,0,1,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 +CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 CVE-2024-8771,0,0,6bb3cfb2358f20779d30660368175ab098a299aee1188c852547dd80b3c854f6,2024-09-26T16:15:09.293000 CVE-2024-8775,0,0,1f8b246503d32d66b42e8fe1d2ca1b6d98900c0e0fb5babb06cd69ea0d0b6cab,2024-09-14T11:47:14.677000 CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000 @@ -263866,7 +263884,7 @@ CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecff CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000 CVE-2024-8795,0,0,f7b3fc89482c22947a1a26e63d2f04d7dee1f77ad827021897b332709b04072d,2024-09-26T16:46:55.587000 CVE-2024-8796,0,0,85a6dfb5fb230c10b66238538bd5fe186ab9999598b67e5deda1ed4d1b78b262,2024-09-20T12:30:51.220000 -CVE-2024-8797,0,0,ba4df0bb11568fe010be4c16334a8844a03d9d0d5268879bae12ea87dcdf4b9f,2024-09-14T11:47:14.677000 +CVE-2024-8797,0,1,bc71120ba9c562037001bef5ed49069a2fb96f9263b3c8e2a617e34946a91f4d,2024-09-27T14:02:23.700000 CVE-2024-8801,0,0,0819fc7670c97dfdf5903331c0719648e4a950ccf6d74c0e2820e973653fdf95,2024-09-26T13:32:02.803000 CVE-2024-8803,0,0,1e21e2187793442a371c4b65c97d90253ace224e18e6d0a30f5421631b4c2a19,2024-09-26T13:32:02.803000 CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000 @@ -263942,19 +263960,19 @@ CVE-2024-9024,0,0,a169982dad174bdcc00c2c78e9efcbc44e6a47176e89361fcc86b05c73e552 CVE-2024-9025,0,0,4a3763d182986e8a9ef475614c0f7e993d3440f162fb5fd30f9debf5502d2386,2024-09-26T13:32:02.803000 CVE-2024-9027,0,0,c409316250f48b36be20429f87c4942220d7d23db3624ffd7bf099b6e997d609,2024-09-26T13:32:02.803000 CVE-2024-9028,0,0,066617345a002ab3642d548e56d10899015c968402247f796f72778f556d5654,2024-09-26T13:32:02.803000 -CVE-2024-9029,0,1,35f447da90177f30c2552d1befa021521534c64f52e07afbe3088997f751fc53,2024-09-27T13:15:18.060000 +CVE-2024-9029,0,0,35f447da90177f30c2552d1befa021521534c64f52e07afbe3088997f751fc53,2024-09-27T13:15:18.060000 CVE-2024-9030,0,0,c11a97e3409538e48c43922920e3ccde8c323ec97995f0c28aa92b45cd65fb6b,2024-09-25T18:01:19.270000 CVE-2024-9031,0,0,a2a75f47877f3d25b358bad394fac156601d3202f3a82ad425179531288fce65,2024-09-25T16:52:25.327000 CVE-2024-9032,0,0,8becc8e05b7d6005b24bf74218ec0dbc532806e337cd797ce3550c4bccf0a3b2,2024-09-20T17:04:51.490000 -CVE-2024-9033,0,0,da7ef5ecb80dbcc843ac183ee1f6a075d01dbd21d6d1d99bb293458f75865ab8,2024-09-26T13:32:55.343000 +CVE-2024-9033,0,1,7be928c299373aac94b8e0b56127ab59524b5bc9208cac30fb16b74e6a6c3108,2024-09-27T15:56:35.317000 CVE-2024-9034,0,0,3413fc4a84b9ff7c3619b4d0e0cc27a0a6e18fb3607100ba58325da27d611048,2024-09-26T13:32:55.343000 CVE-2024-9035,0,0,ecdd08b9ce66f90d6292d7a1da978c23aae7a52839423bea89ea3accdab800d5,2024-09-26T13:32:55.343000 CVE-2024-9036,0,0,8f0f204961acb9a34d32ba51929ff8ed191020e5d897378afa05d39edaf4242d,2024-09-26T13:32:55.343000 CVE-2024-9037,0,0,9a12d1407f1a9b206c0d27c0dfa15addf768f061a25ed0110993d5cbf4244f12,2024-09-26T13:32:55.343000 CVE-2024-9038,0,0,3d0440795c2ef1d6885f692fbc7fd9751c02e8e583f4df587e49c3c125fd66f2,2024-09-26T13:32:55.343000 -CVE-2024-9039,0,0,2f676c88a963c1dd302b4d87190c074ff18e6aa14901dc45744470d7d3f40bca,2024-09-26T13:32:55.343000 -CVE-2024-9040,0,0,79a2716fcea4f161f74af0d7933a358162f310429ebeceda501188d656f9aa7e,2024-09-26T13:32:55.343000 -CVE-2024-9041,0,0,5062146a1939ae3786c2022f32c7342dc6d8c7a9706af0c6420de20edd9da955,2024-09-26T13:32:55.343000 +CVE-2024-9039,0,1,2a46914eca39fc29da2da7edd5c8d5e2462d724fc7b13f9f758dbc7e741a3ad4,2024-09-27T15:58:22.493000 +CVE-2024-9040,0,1,0fb966ef41b73391708aea4bb41bcdf22035487df6b2f9dfc89d7d54ff500837,2024-09-27T15:53:28.333000 +CVE-2024-9041,0,1,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b48,2024-09-27T15:57:55.073000 CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000 CVE-2024-9048,0,0,f177060896179d3e548fb6c61961758dc04b1d06da272024e713ebe682f3a80b,2024-09-26T13:32:55.343000 CVE-2024-9049,0,0,c2460a86793cc351a3c801748f3c41f8869b146a68262e395de944016c346177,2024-09-27T07:15:06.120000 @@ -263981,7 +263999,7 @@ CVE-2024-9090,0,0,f4ae7d6bdfee4058437252a7869fea72e1c41a8988dd0263217c62ee380e24 CVE-2024-9091,0,0,c9dc03a59153ae93dc02180cc0df8139cf142bac3d810d8b52e76b86bb12d8df,2024-09-26T13:32:55.343000 CVE-2024-9092,0,0,91261f691887877cadd7a674bcc9b38df1ed37569442c4381e6926ef3ea0e1cf,2024-09-26T13:32:55.343000 CVE-2024-9093,0,0,d6cda4dff1f2f9dda2ab9b9f9d7e2229533818a3415ab85f02c656b5f130c3e2,2024-09-26T13:32:55.343000 -CVE-2024-9094,0,0,f5ce50f40b1828c6e92401e7f675863a9773a96c6a8d0a8c7fa46fe46d88d6fc,2024-09-26T13:32:55.343000 +CVE-2024-9094,0,1,0e308d006c94a8d09d0a4caea6001ec02d11744a78c5f3fdfc5f94ed1a0ea22c,2024-09-27T15:54:09.463000 CVE-2024-9115,0,0,677b007e44c6a6850476d54cab99d703d388e1f6185b1413799fecf3ba008a07,2024-09-26T13:32:02.803000 CVE-2024-9117,0,0,96ff801e5a2869848fd4e3dd25cc9a878f8aef2f8675658f7019828cd326dfe8,2024-09-26T13:32:02.803000 CVE-2024-9120,0,0,741803f92bc286dd2201245dc8ffb354e00af92f2ccee9f63963d21a0888db6b,2024-09-26T13:32:02.803000 @@ -264005,10 +264023,11 @@ CVE-2024-9199,0,0,27e0a64b81e9357b76a0a39a250ac06701e94144499cdd254c52ef2844f973 CVE-2024-9202,0,0,5d3f2d6a33ba631f7d073198e169a0e32af3f18d36ba441e4605889790f358ed,2024-09-27T10:15:02.827000 CVE-2024-9203,0,0,63881804792b3aed56f72465b329c59bdd2f8e79682e4feb93f16e7c9b49e7f2,2024-09-26T17:15:04.593000 CVE-2024-9275,0,0,6bebcdc92872db9a9776b966b7829994144cd16473a7fe0a7c466b08b5f6ad63,2024-09-27T11:15:13.477000 -CVE-2024-9276,0,1,2cf75b1670ae2606d26d1435cd74bce525bf12e634f531162074c3a9fd3c7c76,2024-09-27T12:15:04.590000 -CVE-2024-9277,0,1,ec04fe753eee8ed7818abf01b73dcc860c29bf948c4c38797a452fce8113417c,2024-09-27T12:15:04.733000 +CVE-2024-9276,0,0,2cf75b1670ae2606d26d1435cd74bce525bf12e634f531162074c3a9fd3c7c76,2024-09-27T12:15:04.590000 +CVE-2024-9277,0,0,ec04fe753eee8ed7818abf01b73dcc860c29bf948c4c38797a452fce8113417c,2024-09-27T12:15:04.733000 CVE-2024-9278,0,0,dc87e9b21a88b467ef6951489f3df167a6f2698a87bf34540b6f8d41c1a7f7d0,2024-09-27T11:15:14.877000 -CVE-2024-9279,1,1,ea949a7d6cfef3252e95b9f876f621c026806686480a2a483245588415753746,2024-09-27T12:15:04.857000 -CVE-2024-9280,1,1,fd07a0abd60c00c43ea242b9a30c0c6f1ba1b12d0f394c37d752db673f5c0152,2024-09-27T12:15:05.227000 -CVE-2024-9281,1,1,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d720942176920,2024-09-27T13:15:18.153000 -CVE-2024-9282,1,1,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000 +CVE-2024-9279,0,0,ea949a7d6cfef3252e95b9f876f621c026806686480a2a483245588415753746,2024-09-27T12:15:04.857000 +CVE-2024-9280,0,0,fd07a0abd60c00c43ea242b9a30c0c6f1ba1b12d0f394c37d752db673f5c0152,2024-09-27T12:15:05.227000 +CVE-2024-9281,0,0,b14fc5143e6a25d74bc27cc2c4a8f20e853a4566f74d81cd628d720942176920,2024-09-27T13:15:18.153000 +CVE-2024-9282,0,0,904745e99b02f17fad93e3d4d12dede442ce386a61a1af6532becd6450b367a2,2024-09-27T13:15:18.443000 +CVE-2024-9283,1,1,0dc135be53023bca555d778c9a31c3d6f3a80278eb8a9232d8da6a70571f147e,2024-09-27T14:15:05.330000