From d00a058b64463dcd3e17e87de2ebaad41118c175 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 9 Oct 2024 14:03:51 +0000 Subject: [PATCH] Auto-Update: 2024-10-09T14:00:52.103800+00:00 --- CVE-2022/CVE-2022-225xx/CVE-2022-22590.json | 32 ++++++-- CVE-2022/CVE-2022-300xx/CVE-2022-30050.json | 12 +-- CVE-2023/CVE-2023-62xx/CVE-2023-6294.json | 62 ++++++++++++++- CVE-2024/CVE-2024-02xx/CVE-2024-0248.json | 65 +++++++++++++++- CVE-2024/CVE-2024-02xx/CVE-2024-0250.json | 65 +++++++++++++++- CVE-2024/CVE-2024-11xx/CVE-2024-1159.json | 64 ++++++++++++++- CVE-2024/CVE-2024-11xx/CVE-2024-1160.json | 44 ++++++++++- CVE-2024/CVE-2024-281xx/CVE-2024-28168.json | 33 ++++++++ CVE-2024/CVE-2024-449xx/CVE-2024-44949.json | 86 +++++++++++++++++++-- CVE-2024/CVE-2024-457xx/CVE-2024-45720.json | 56 ++++++++++++++ CVE-2024/CVE-2024-51xx/CVE-2024-5127.json | 68 ++++++++++++++-- CVE-2024/CVE-2024-95xx/CVE-2024-9568.json | 83 ++++++++++++++++++-- CVE-2024/CVE-2024-95xx/CVE-2024-9569.json | 83 ++++++++++++++++++-- CVE-2024/CVE-2024-96xx/CVE-2024-9680.json | 25 ++++++ README.md | 54 +++++-------- _state.csv | 85 ++++++++++---------- 16 files changed, 783 insertions(+), 134 deletions(-) create mode 100644 CVE-2024/CVE-2024-281xx/CVE-2024-28168.json create mode 100644 CVE-2024/CVE-2024-457xx/CVE-2024-45720.json create mode 100644 CVE-2024/CVE-2024-96xx/CVE-2024-9680.json diff --git a/CVE-2022/CVE-2022-225xx/CVE-2022-22590.json b/CVE-2022/CVE-2022-225xx/CVE-2022-22590.json index a5354374c81..b93d92a49da 100644 --- a/CVE-2022/CVE-2022-225xx/CVE-2022-22590.json +++ b/CVE-2022/CVE-2022-225xx/CVE-2022-22590.json @@ -2,8 +2,8 @@ "id": "CVE-2022-22590", "sourceIdentifier": "product-security@apple.com", "published": "2022-03-18T18:15:12.623", - "lastModified": "2022-09-09T20:43:04.573", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T13:40:58.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -83,6 +83,12 @@ "operator": "OR", "negate": false, "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "556E3C87-7083-4145-8D61-C8F9A1EBC440" + }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", @@ -102,12 +108,6 @@ "versionEndExcluding": "12.2", "matchCriteriaId": "5BD8A840-1C3E-4D4B-B497-250712283BCC" }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:*", - "versionEndExcluding": "15.3", - "matchCriteriaId": "707C6063-5091-455F-8E41-5035CB4D8CC6" - }, { "vulnerable": true, "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", @@ -123,6 +123,22 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.36.7", + "matchCriteriaId": "BA0CF181-BD0B-43B5-B5B6-9BB9B9D28BB9" + } + ] + } + ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-300xx/CVE-2022-30050.json b/CVE-2022/CVE-2022-300xx/CVE-2022-30050.json index e8cfe301c17..819c49e9e20 100644 --- a/CVE-2022/CVE-2022-300xx/CVE-2022-30050.json +++ b/CVE-2022/CVE-2022-300xx/CVE-2022-30050.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30050", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-16T17:15:09.537", - "lastModified": "2022-05-24T22:23:08.480", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-09T13:46:28.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,13 +85,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:5.55:*:*:*:*:*:*:*", - "matchCriteriaId": "3CA1CB2A-84E3-484B-8513-DEFC64A4DD41" + "criteria": "cpe:2.3:a:sir:gnuboard:5.5.5:*:*:*:*:*:*:*", + "matchCriteriaId": "A0D5F8C5-75C4-4586-AEAB-C1868E9E8463" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:sir:gnuboard:5.56:*:*:*:*:*:*:*", - "matchCriteriaId": "C1D25BEA-7619-4E7C-B5FC-9EB347765AE5" + "criteria": "cpe:2.3:a:sir:gnuboard:5.5.6:*:*:*:*:*:*:*", + "matchCriteriaId": "47061CBC-7C39-4483-B940-B44516B5FDB6" } ] } diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6294.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6294.json index 9da8a8654be..20180f31db2 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6294.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6294.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6294", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-12T16:15:08.167", - "lastModified": "2024-08-01T18:35:05.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:24:04.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,20 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +85,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sygnoos:popup_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "94B0DED4-72C8-4177-B7EF-CF8F9CD467E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/eaeb5706-b19c-4266-b7df-889558ee2614/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0248.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0248.json index 261da7ab53e..9a284ee135d 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0248.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0248", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-12T16:15:08.443", - "lastModified": "2024-02-12T17:31:21.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:11:10.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "El complemento EazyDocs de WordPress anterior a 2.4.0 reintrodujo CVE-2023-6029 (https://wpscan.com/vulnerability/7a0aaf85-8130-4fd7-8f09-f8edc929597e/) en 2.3.8, lo que permite a cualquier usuario autenticado, como suscriptor para eliminar publicaciones arbitrarias, as\u00ed como agregar y eliminar documentos/secciones. El problema se solucion\u00f3 parcialmente en 2.3.9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:spider-themes:eazydocs:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.0", + "matchCriteriaId": "E24DCD0E-0D46-49D1-80FE-AEB553CE140F" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/faf50bc0-64c5-4ccc-a8ac-e73ed44a74df/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-02xx/CVE-2024-0250.json b/CVE-2024/CVE-2024-02xx/CVE-2024-0250.json index ceb0ae2029d..ffa3241678f 100644 --- a/CVE-2024/CVE-2024-02xx/CVE-2024-0250.json +++ b/CVE-2024/CVE-2024-02xx/CVE-2024-0250.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0250", "sourceIdentifier": "contact@wpscan.com", "published": "2024-02-12T16:15:08.500", - "lastModified": "2024-02-12T17:31:21.670", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:19:36.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "El complemento Analytics Insights for Google Analytics 4 (AIWP) de WordPress anterior a 6.3 es vulnerable a Open Redirect debido a una validaci\u00f3n insuficiente en el archivo de redireccionamiento oauth2callback.php. Esto hace posible que atacantes no autenticados redirijan a los usuarios a sitios potencialmente maliciosos si logran enga\u00f1arlos para que realicen una acci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deconf:analytics_insights:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.3", + "matchCriteriaId": "87CD0207-50C9-47B0-8156-247A1B2C9C0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/321b07d1-692f-48e9-a8e5-a15b38efa979/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1159.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1159.json index bdf92e09bfa..a817e768484 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1159.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1159", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-13T10:15:08.603", - "lastModified": "2024-02-13T14:01:00.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:22:23.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.1", + "matchCriteriaId": "122FB828-4F7B-4059-B9C1-B6CDC7DA54A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034441%40bold-page-builder&new=3034441%40bold-page-builder&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e71386ea-0546-4aa7-b77a-e1824e80accc?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json index fbd3fbef075..68d91d774c2 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1160.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1160", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-13T10:15:08.783", - "lastModified": "2024-02-13T14:01:00.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:30:12.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bold-themes:bold_page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.8.1", + "matchCriteriaId": "122FB828-4F7B-4059-B9C1-B6CDC7DA54A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034441%40bold-page-builder&new=3034441%40bold-page-builder&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/818d3418-8e14-49b9-a112-8eab9eb3c283?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28168.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28168.json new file mode 100644 index 00000000000..61e7bae798e --- /dev/null +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28168.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-28168", + "sourceIdentifier": "security@apache.org", + "published": "2024-10-09T12:15:02.850", + "lastModified": "2024-10-09T12:15:02.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Restriction of XML External Entity Reference ('XXE') vulnerability in Apache XML Graphics FOP.\n\nThis issue affects Apache XML Graphics FOP: 2.9.\n\nUsers are recommended to upgrade to version 2.10, which fixes the issue." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://xmlgraphics.apache.org/security.html", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json index 9927d7775d0..84cb57cee2a 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44949.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44949", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-04T19:15:30.040", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:53:32.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,93 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: parisc: se corrige una posible corrupci\u00f3n de DMA ARCH_DMA_MINALIGN se defini\u00f3 como 16 - esto es demasiado peque\u00f1o - puede ser posible que dos asignaciones de 16 bytes no relacionadas compartan una l\u00ednea de cach\u00e9. Si una de estas asignaciones se escribe usando DMA y la otra se escribe usando escritura en cach\u00e9, el valor que se escribi\u00f3 con DMA puede estar da\u00f1ado. Esta confirmaci\u00f3n cambia ARCH_DMA_MINALIGN a 128 en PA20 y 32 en PA1.1 - ese es el tama\u00f1o de l\u00ednea de cach\u00e9 m\u00e1s grande posible. Como las diferentes microarquitecturas de parisc tienen diferentes tama\u00f1os de l\u00ednea de cach\u00e9, definimos arch_slab_minalign(), cache_line_size() y dma_get_cache_alignment() para que el kernel pueda ajustar los par\u00e1metros de cach\u00e9 de losa din\u00e1micamente, seg\u00fan el tama\u00f1o de l\u00ednea de cach\u00e9 detectado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.46", + "matchCriteriaId": "84C35A98-08C9-4674-8AC8-9CC0757B7699" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.5", + "matchCriteriaId": "D074AE50-4A5E-499C-A2FD-75FD60DEA560" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*", + "matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/533de2f470baac40d3bf622fe631f15231a03c9f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/642a0b7453daff0295310774016fcb56d1f5bc7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7ae04ba36b381bffe2471eff3a93edced843240f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45720.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45720.json new file mode 100644 index 00000000000..5fe2eb39f6e --- /dev/null +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45720.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45720", + "sourceIdentifier": "security@apache.org", + "published": "2024-10-09T13:15:11.337", + "lastModified": "2024-10-09T13:15:11.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "On Windows platforms, a \"best fit\" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed.\n\nAll versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue.\n\nSubversion is not affected on UNIX-like platforms." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://subversion.apache.org/security/CVE-2024-45720-advisory.txt", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5127.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5127.json index 9c3e3c9affe..df2f256be5b 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5127.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5127.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5127", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:19.000", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:38:49.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.2.2", + "versionEndExcluding": "1.2.25", + "matchCriteriaId": "9169F5D4-79D9-4037-A925-AACE05CCE9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lunary-ai/lunary/commit/b7bd3a830a0f47ba07d0fd57bf78c4dd8a216297", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/719a5db3-f943-4100-a660-011cadf1bb32", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9568.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9568.json index 8d1cb566629..d4488ebe420 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9568.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9568", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-07T15:15:09.177", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:04:42.653", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in D-Link DIR-619L B1 2.06. Affected is the function formAdvNetwork of the file /goform/formAdvNetwork. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "En D-Link DIR-619L B1 2.06 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. La funci\u00f3n formAdvNetwork del archivo /goform/formAdvNetwork est\u00e1 afectada. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. Es posible lanzar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -64,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -123,26 +147,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F99992A1-E442-4D83-84F4-44F44C25219C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formAdvNetwork.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279462", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.279462", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.414545", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9569.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9569.json index 3ec5648063e..88530b6e31f 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9569.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9569", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-07T15:15:09.437", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-09T13:04:55.907", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cna@vuldb.com", @@ -16,6 +16,10 @@ { "lang": "en", "value": "A vulnerability has been found in D-Link DIR-619L B1 2.06 and classified as critical. Affected by this vulnerability is the function formEasySetPassword of the file /goform/formEasySetPassword. The manipulation of the argument curTime leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en D-Link DIR-619L B1 2.06 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a la funci\u00f3n formEasySetPassword del archivo /goform/formEasySetPassword. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -64,6 +68,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -123,26 +147,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-619l_firmware:2.06b1:*:*:*:*:*:*:*", + "matchCriteriaId": "29F7A866-771C-4FA7-B52C-487841644F4C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-619l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F99992A1-E442-4D83-84F4-44F44C25219C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/D-Link/DIR-619L/formEasySetPassword.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279463", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.279463", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.414547", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json new file mode 100644 index 00000000000..50fde390678 --- /dev/null +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9680.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9680", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-10-09T13:15:12.090", + "lastModified": "2024-10-09T13:15:12.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox < 131.0.2, Firefox ESR < 128.3.1, and Firefox ESR < 115.16.1." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1923344", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-51/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 316cebf36f6..6f4bdbc04df 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-09T12:00:19.235794+00:00 +2024-10-09T14:00:52.103800+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-09T11:56:42.770000+00:00 +2024-10-09T13:53:32.513000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265078 +265081 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `3` -- [CVE-2024-45145](CVE-2024/CVE-2024-451xx/CVE-2024-45145.json) (`2024-10-09T10:15:03.283`) -- [CVE-2024-47334](CVE-2024/CVE-2024-473xx/CVE-2024-47334.json) (`2024-10-09T11:15:13.157`) -- [CVE-2024-47410](CVE-2024/CVE-2024-474xx/CVE-2024-47410.json) (`2024-10-09T10:15:04.540`) -- [CVE-2024-47411](CVE-2024/CVE-2024-474xx/CVE-2024-47411.json) (`2024-10-09T10:15:04.793`) -- [CVE-2024-47412](CVE-2024/CVE-2024-474xx/CVE-2024-47412.json) (`2024-10-09T10:15:05.017`) -- [CVE-2024-47413](CVE-2024/CVE-2024-474xx/CVE-2024-47413.json) (`2024-10-09T10:15:05.210`) -- [CVE-2024-47414](CVE-2024/CVE-2024-474xx/CVE-2024-47414.json) (`2024-10-09T10:15:05.417`) -- [CVE-2024-47415](CVE-2024/CVE-2024-474xx/CVE-2024-47415.json) (`2024-10-09T10:15:05.627`) -- [CVE-2024-47416](CVE-2024/CVE-2024-474xx/CVE-2024-47416.json) (`2024-10-09T10:15:05.830`) -- [CVE-2024-47417](CVE-2024/CVE-2024-474xx/CVE-2024-47417.json) (`2024-10-09T10:15:06.060`) -- [CVE-2024-47418](CVE-2024/CVE-2024-474xx/CVE-2024-47418.json) (`2024-10-09T10:15:06.277`) -- [CVE-2024-47419](CVE-2024/CVE-2024-474xx/CVE-2024-47419.json) (`2024-10-09T10:15:06.480`) -- [CVE-2024-47420](CVE-2024/CVE-2024-474xx/CVE-2024-47420.json) (`2024-10-09T10:15:06.660`) -- [CVE-2024-9575](CVE-2024/CVE-2024-95xx/CVE-2024-9575.json) (`2024-10-09T10:15:06.853`) +- [CVE-2024-28168](CVE-2024/CVE-2024-281xx/CVE-2024-28168.json) (`2024-10-09T12:15:02.850`) +- [CVE-2024-45720](CVE-2024/CVE-2024-457xx/CVE-2024-45720.json) (`2024-10-09T13:15:11.337`) +- [CVE-2024-9680](CVE-2024/CVE-2024-96xx/CVE-2024-9680.json) (`2024-10-09T13:15:12.090`) ### CVEs modified in the last Commit -Recently modified CVEs: `16` +Recently modified CVEs: `11` -- [CVE-2021-4118](CVE-2021/CVE-2021-41xx/CVE-2021-4118.json) (`2024-10-09T11:56:42.770`) -- [CVE-2022-0845](CVE-2022/CVE-2022-08xx/CVE-2022-0845.json) (`2024-10-09T11:56:42.770`) -- [CVE-2024-9514](CVE-2024/CVE-2024-95xx/CVE-2024-9514.json) (`2024-10-09T11:19:25.577`) -- [CVE-2024-9515](CVE-2024/CVE-2024-95xx/CVE-2024-9515.json) (`2024-10-09T11:19:00.897`) -- [CVE-2024-9532](CVE-2024/CVE-2024-95xx/CVE-2024-9532.json) (`2024-10-09T11:18:49.027`) -- [CVE-2024-9533](CVE-2024/CVE-2024-95xx/CVE-2024-9533.json) (`2024-10-09T11:18:34.560`) -- [CVE-2024-9534](CVE-2024/CVE-2024-95xx/CVE-2024-9534.json) (`2024-10-09T11:18:23.607`) -- [CVE-2024-9535](CVE-2024/CVE-2024-95xx/CVE-2024-9535.json) (`2024-10-09T11:16:35.487`) -- [CVE-2024-9549](CVE-2024/CVE-2024-95xx/CVE-2024-9549.json) (`2024-10-09T11:16:03.970`) -- [CVE-2024-9550](CVE-2024/CVE-2024-95xx/CVE-2024-9550.json) (`2024-10-09T11:15:52.520`) -- [CVE-2024-9551](CVE-2024/CVE-2024-95xx/CVE-2024-9551.json) (`2024-10-09T11:15:42.060`) -- [CVE-2024-9552](CVE-2024/CVE-2024-95xx/CVE-2024-9552.json) (`2024-10-09T11:15:32.333`) -- [CVE-2024-9553](CVE-2024/CVE-2024-95xx/CVE-2024-9553.json) (`2024-10-09T11:15:21.203`) -- [CVE-2024-9566](CVE-2024/CVE-2024-95xx/CVE-2024-9566.json) (`2024-10-09T11:15:10.977`) -- [CVE-2024-9567](CVE-2024/CVE-2024-95xx/CVE-2024-9567.json) (`2024-10-09T11:15:00.563`) -- [CVE-2024-9570](CVE-2024/CVE-2024-95xx/CVE-2024-9570.json) (`2024-10-09T11:13:11.067`) +- [CVE-2022-22590](CVE-2022/CVE-2022-225xx/CVE-2022-22590.json) (`2024-10-09T13:40:58.817`) +- [CVE-2022-30050](CVE-2022/CVE-2022-300xx/CVE-2022-30050.json) (`2024-10-09T13:46:28.867`) +- [CVE-2023-6294](CVE-2023/CVE-2023-62xx/CVE-2023-6294.json) (`2024-10-09T13:24:04.700`) +- [CVE-2024-0248](CVE-2024/CVE-2024-02xx/CVE-2024-0248.json) (`2024-10-09T13:11:10.553`) +- [CVE-2024-0250](CVE-2024/CVE-2024-02xx/CVE-2024-0250.json) (`2024-10-09T13:19:36.667`) +- [CVE-2024-1159](CVE-2024/CVE-2024-11xx/CVE-2024-1159.json) (`2024-10-09T13:22:23.253`) +- [CVE-2024-1160](CVE-2024/CVE-2024-11xx/CVE-2024-1160.json) (`2024-10-09T13:30:12.563`) +- [CVE-2024-44949](CVE-2024/CVE-2024-449xx/CVE-2024-44949.json) (`2024-10-09T13:53:32.513`) +- [CVE-2024-5127](CVE-2024/CVE-2024-51xx/CVE-2024-5127.json) (`2024-10-09T13:38:49.307`) +- [CVE-2024-9568](CVE-2024/CVE-2024-95xx/CVE-2024-9568.json) (`2024-10-09T13:04:42.653`) +- [CVE-2024-9569](CVE-2024/CVE-2024-95xx/CVE-2024-9569.json) (`2024-10-09T13:04:55.907`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b1dd8fd7ad2..20677401958 100644 --- a/_state.csv +++ b/_state.csv @@ -182826,7 +182826,7 @@ CVE-2021-41176,0,0,fc0656a953a29b676c89c29557933b4ef51b53b2c3e402bffc56bb552b086 CVE-2021-41177,0,0,8e4e8ea9261594bad6baaa43c9c16c540bf301cac813171ea47cbb850806f97e,2022-10-26T15:26:31.550000 CVE-2021-41178,0,0,912176ac67df56fcc102c32234c66be7720685ea13bbd2bdd15daf8e245c3733,2022-10-25T20:53:24.923000 CVE-2021-41179,0,0,7721d04199dd4695e488fdc7c0ae474834a4900f139533473494482edac39bf1,2021-10-29T15:06:22.720000 -CVE-2021-4118,0,1,b3228221350b9519c95f5f03bf3b1c384adb615235f9446916854f0f304ea3ae,2024-10-09T11:56:42.770000 +CVE-2021-4118,0,0,b3228221350b9519c95f5f03bf3b1c384adb615235f9446916854f0f304ea3ae,2024-10-09T11:56:42.770000 CVE-2021-41180,0,0,c370d2d5717d1a4befcad9cc399b5fdae242477559a0d312d220fac55efdb5fe,2022-03-15T16:18:40.120000 CVE-2021-41181,0,0,69eff2c3e10be4d00a7b9b120da4848fd3c558c7bf7dd56e7dcbf7ba93d92d65,2022-10-24T16:42:07.740000 CVE-2021-41182,0,0,7962fc3aad643a6a1db058f153abb4e359e1fc080ea0164a168d0c06130038f4,2023-08-31T03:15:12.807000 @@ -188258,7 +188258,7 @@ CVE-2022-0841,0,0,0c08b8da972eb0774c91026f996e6e87409d7df436e5ff3d82c2c350a7f205 CVE-2022-0842,0,0,83063b91b0c1e05161ae7eeb6e3a41608879a46ba334ce3ba7dd591c66028351,2023-11-15T20:24:37.953000 CVE-2022-0843,0,0,c9eeae3774f04d557c08dcfb82fe824146ecc015b6def2301e1244cf3ccac297,2022-12-29T18:50:49.197000 CVE-2022-0844,0,0,20aad9a2dd83607c889e0f35501e7d064ffb666561227c6630a593e65cdaf797,2023-11-07T03:41:35.647000 -CVE-2022-0845,0,1,386c041824ba45ae3879fff0352d673fa82b9f6e2ac0d380e51845c5a73548d4,2024-10-09T11:56:42.770000 +CVE-2022-0845,0,0,386c041824ba45ae3879fff0352d673fa82b9f6e2ac0d380e51845c5a73548d4,2024-10-09T11:56:42.770000 CVE-2022-0846,0,0,a58344c755acea67ff92dc954724b70511eed59fc9456964fa0912ecbd24896b,2022-04-04T17:52:40.903000 CVE-2022-0847,0,0,5b7e10d23a381c8accc649416b99f8eb9945da1fbcaae03f2894c9991ca201fb,2024-07-02T17:05:01.307000 CVE-2022-0848,0,0,c0a60c007590a2060cad3166c317c1ba0f91356426b687445d61d6415370d9ea,2022-04-08T13:59:36.750000 @@ -191867,7 +191867,7 @@ CVE-2022-22587,0,0,8c673637c5daeb113adde9e9725e46083380d4a5693c2d5287e846df9c0be CVE-2022-22588,0,0,5fb0f2147ad9d3a4fec38e78064011b76a85d6a790fec6675f90ef74fd12c7de,2023-08-08T14:22:24.967000 CVE-2022-22589,0,0,a97ba0e5c607eb7a49b4cebcbfc6bf13d09bcc98b14a96398f05ac7be79ba30a,2023-08-08T14:22:24.967000 CVE-2022-2259,0,0,3b75f1b92e08b9bb0d0953bd8feee8ff80ab3f43b99be91843f613059a667158,2023-08-08T14:22:24.967000 -CVE-2022-22590,0,0,472ed50bceefcc7b12b8bd0fbcb4c0062ca157d2cc6b2c6ae6af16a68e7b11c8,2022-09-09T20:43:04.573000 +CVE-2022-22590,0,1,b43c161e8c211c8396c37c83526e68f3548110f0da6397ea538858401dce4026,2024-10-09T13:40:58.817000 CVE-2022-22591,0,0,aee161a5ee3165e654088d593241356a0a8172c1436df794364b0e2aa62e430e,2022-03-26T03:58:32.277000 CVE-2022-22592,0,0,8a82b82811349975945552f56c6791941c89cb272c65ef5e3fa340eab45b8bba,2022-09-09T20:43:07.863000 CVE-2022-22593,0,0,1bd16cb4234c86447a1e320470dc0df82ce8772167491f2eddf4aa4dc5d287f3,2022-03-26T03:59:50.220000 @@ -198132,7 +198132,7 @@ CVE-2022-30047,0,0,c69a0bb075ce6c76be667b676fecd67ee90a4d8eb917fe505a9656bfe34d2 CVE-2022-30048,0,0,1a7adfbaf421915189caa25656394ce747e300738552e7610f39d9489b63b213,2022-05-20T14:45:22.727000 CVE-2022-30049,0,0,8074b7f48c314fd805e13351120e6dee61dc70414555dfa8d0ef0d8f0225b857,2022-10-29T02:57:30.160000 CVE-2022-3005,0,0,c8d91e0f1399a635a982522898babbad67fe30a0d4e27a2ec6dc921289a3c57c,2022-09-21T16:34:01.010000 -CVE-2022-30050,0,0,a2c9f25dd142f8a2720f1bd98b8a802dc35bf4a9376fa4e1aba0409073fd426d,2022-05-24T22:23:08.480000 +CVE-2022-30050,0,1,3982f93fdddf2530e90321435befd0786202d7c9a85a3e055548866fcaa24af4,2024-10-09T13:46:28.867000 CVE-2022-30052,0,0,f0290b8ecc1c11e62569c73aedb2ade39859a2bc40300166c26500801dba1479,2022-05-25T18:22:17.540000 CVE-2022-30053,0,0,2ab48f3b3cce1a5dfd3474cafb3f263b141d3d26b2a683d8444e8f726b82ba5c,2022-05-25T18:22:54.607000 CVE-2022-30054,0,0,5f829e251fe91a7ef31bb84423be35f6ad992af696f36e192e88b75de8a7f4c0,2022-05-25T18:23:46.100000 @@ -240392,7 +240392,7 @@ CVE-2023-6290,0,0,1e11a2f9028436f27adcdf532e57392ccb16d1b2e91d96ddf9925e24654d44 CVE-2023-6291,0,0,3ea0b73d77ef96c75c225ca0866954d9bea91f804b2ef73a4f0554f6f0204274,2024-02-14T03:15:14.320000 CVE-2023-6292,0,0,9816898f3675569a84220255281f946e21928fba49e4223d1bc3d37273ee48aa,2024-01-23T14:47:58.340000 CVE-2023-6293,0,0,dfe97deb660541d4b661bea6f3a6ba395dd53a51e8ae9be322693d850c6d8bba,2023-11-30T19:55:33.327000 -CVE-2023-6294,0,0,ec6a6172c66a78d3939093b3a26353b1ca5a3a83184f95d8f73052115b844cbe,2024-08-01T18:35:05.917000 +CVE-2023-6294,0,1,6b64458c7e00e91defcfab56c57d789bd9f13ce0c2b6406636a2edc2279b03e7,2024-10-09T13:24:04.700000 CVE-2023-6295,0,0,8ab7296cc0a845d4c6986e960293e952796151051af247272a4a09dc3a86878c,2023-12-21T20:58:23.043000 CVE-2023-6296,0,0,837e0880d7df7f786c30c0aff14cfd1fc904d42744d663bafb5a26dc7bf102cd,2024-05-17T02:33:37.480000 CVE-2023-6297,0,0,0cd875b167eb884176392e5d7dd5f5df9550f76aab834c3e153724cbcf89fb67,2024-05-17T02:33:37.590000 @@ -241438,8 +241438,8 @@ CVE-2024-0243,0,0,68610412076a7e370f30938c644e93518171abb2434f307575d1a2f3a6537f CVE-2024-0244,0,0,67a74aa7fc0d8babe9a5214a60b9a63992d699b01b8a1839df8cfd195ae1b59b,2024-02-13T19:51:41.997000 CVE-2024-0246,0,0,73d0c81a519e396564e77ce5522d589edcaeb72a548241fc7d657fa294fab8de,2024-05-17T02:34:25.567000 CVE-2024-0247,0,0,b27cd6616368531dbb41fd79a6edb76763d21c3245f50b598ab8eb5848e89348,2024-05-17T02:34:25.680000 -CVE-2024-0248,0,0,d5a42163c67136c12b7742210a0dd6ebbc01dc3db40b9a759209b4bb7f3c05ac,2024-02-12T17:31:21.670000 -CVE-2024-0250,0,0,b14f7695a66de1867a9b7d5239e84d0010907def9a5b4d0994ed0776131964d8,2024-02-12T17:31:21.670000 +CVE-2024-0248,0,1,1bb9ae16fd230261db7325554cfa62df226885e581f3674aca64ff22e5465b95,2024-10-09T13:11:10.553000 +CVE-2024-0250,0,1,08a743faea52614cd254679d538973f3a731361c6661082236e7fb92dd7565f1,2024-10-09T13:19:36.667000 CVE-2024-0251,0,0,c035b2edc46ecf620984bc7db273928bce9f42c8e6e6f7ddc9a6058df32dc1f0,2024-01-19T19:55:23.980000 CVE-2024-0252,0,0,b8ec41c6a1be7c5e882b3b52ee367c8c9dfacd93c3dd64e82dabc7c379a7c983,2024-06-07T09:15:09.347000 CVE-2024-0253,0,0,ddeee69b21b0084e2ba924b18ea5e397f396de8ad90474cf8bfd96614dee6053,2024-07-03T01:44:39.010000 @@ -242291,8 +242291,8 @@ CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 CVE-2024-1157,0,0,de378635d0c6de28e0b0565a3de8ba7aaf66f061988c58201005cc7ac895cf44,2024-02-13T14:01:00.987000 CVE-2024-1158,0,0,3f0844fda5c657ec14fc878f4ca458f05346302835336ebfa8e7bba85b29f7d9,2024-03-13T18:16:18.563000 -CVE-2024-1159,0,0,7afd7cc203649d4a5c5ff8f7755954b8453329cb9a9266827322a4070126abb5,2024-02-13T14:01:00.987000 -CVE-2024-1160,0,0,e41caae7c393acaa9f8cdac421c222658c66f112345f9720b18d4b8ff8227d77,2024-02-13T14:01:00.987000 +CVE-2024-1159,0,1,6093cf6c5c8fc4abf001ccc0f4d05ab0de1f6859d26926dcd40937cbf24b911d,2024-10-09T13:22:23.253000 +CVE-2024-1160,0,1,895b8a1484864a7446dc0dad2cc1b1d7457042a73872ab53e023b0e471ba9cb5,2024-10-09T13:30:12.563000 CVE-2024-1161,0,0,17300377fb9940d2e98cf1b56279a3b48a0607eeac56262a31a73cab7a59f6ad,2024-06-06T13:57:52.483000 CVE-2024-1162,0,0,6517ec14e6db831ee5a33abab5e0e4729a77c306548683589462e3183aa8cdb4,2024-02-08T14:22:37.180000 CVE-2024-1163,0,0,d0a6d153d36541940bea220e9031817bbcaed2e39b0e0502d4dc42ede6371f01,2024-02-29T15:15:07.473000 @@ -249060,6 +249060,7 @@ CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000 CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000 +CVE-2024-28168,1,1,353d512e6d0658e8393fc36cdb185053aa6de34206ad4f5c370dd49d0a29d39b,2024-10-09T12:15:02.850000 CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000 CVE-2024-28170,0,0,b651a495621059669c19c3fdc9d2ee84d87fc5f846a93fbe1c30394bd5ddd768,2024-09-23T14:49:17.057000 CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000 @@ -260161,7 +260162,7 @@ CVE-2024-44945,0,0,6df059f581f073064a2495782591f5696f5e78b88875e61106eab64ca2b50 CVE-2024-44946,0,0,baba486800f48daca091ce86b0b3099b94d8fc83c17e121f4572ead5091851fa,2024-09-04T12:15:05.150000 CVE-2024-44947,0,0,80aee974cb8f526f49372964ac6e0ce27b8502cba5192c8bdb08e313a4596942,2024-09-16T17:52:37.563000 CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000 -CVE-2024-44949,0,0,6aaa0682857021304830f46058e76a9629475e0612eeb15cc3936e646938a3bc,2024-09-05T12:53:21.110000 +CVE-2024-44949,0,1,b7b7622b983a3734466cfe3f2958346ada4afa05901a8b3e8d3a4caaf654fb3c,2024-10-09T13:53:32.513000 CVE-2024-4495,0,0,cb1d8bc801c43f7ab8180176a646c9e39a56603c1305eac804522af3adac0fa8,2024-05-17T02:40:25.167000 CVE-2024-44950,0,0,d3089902efd7e9aab9d892a62faf29027951968ca15a849fa454a848592a1ba2,2024-09-05T12:53:21.110000 CVE-2024-44951,0,0,91785c90cadc8356660ba7fdec9917fa45a207e0be2c7481dad5e2297fb51b52,2024-09-05T12:53:21.110000 @@ -260308,7 +260309,7 @@ CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186 CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 -CVE-2024-45145,1,1,b36d6bb4b4247eb059c115ad97c447cca0f70b08025fc2179ef91ba7e7a7f114,2024-10-09T10:15:03.283000 +CVE-2024-45145,0,0,b36d6bb4b4247eb059c115ad97c447cca0f70b08025fc2179ef91ba7e7a7f114,2024-10-09T10:15:03.283000 CVE-2024-45146,0,0,2a5b5a0d648806ca5e54b8bd1a0a8e9a0eaa835e972130f7015e02de53d4b2a8,2024-10-09T09:15:05.693000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45150,0,0,bd12df0ca2dd5e008526d6f546a4cd15e1f7b87d2c471afa5048e25665848888,2024-10-09T09:15:06.210000 @@ -260603,6 +260604,7 @@ CVE-2024-45698,0,0,ae3e99b30522a0cc22ac110f0e079a19451e6ffc669d2c6984799a2bd6bce CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 +CVE-2024-45720,1,1,d41141572be612cef3d4dabfd94bebc08df7abc05793ddafb0664d5a1ebcc907,2024-10-09T13:15:11.337000 CVE-2024-45723,0,0,63a77b3806467261b762149cf38436dbbeeccf91520557e4f16dba13005bb2d7,2024-10-07T17:43:52.783000 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-45744,0,0,ec4698c6891bd67c723c11e0dc841a026f8c5da574327fdd441b22164fa47c9a,2024-09-30T12:45:57.823000 @@ -261327,7 +261329,7 @@ CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf24 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 CVE-2024-47332,0,0,bebcc62121f57accf95efc9e23e2cb785faddb62a35b4509d76c7928e0003c00,2024-10-07T17:47:48.410000 CVE-2024-47333,0,0,7b68cade94253428b89f07ec4ddffee957654bcbdc6a580835fa17b2ed55a3db,2024-10-07T17:47:48.410000 -CVE-2024-47334,1,1,a461c0ff54441d9bc6ff24149dcc4c8001aeba025fc4345aeb144597045138d5,2024-10-09T11:15:13.157000 +CVE-2024-47334,0,0,a461c0ff54441d9bc6ff24149dcc4c8001aeba025fc4345aeb144597045138d5,2024-10-09T11:15:13.157000 CVE-2024-47335,0,0,c59a2e5c398e4128a0999d908dfef31fc9740c09dff0fef290df7418059d3627,2024-10-07T17:47:48.410000 CVE-2024-47336,0,0,3b8a76de4b681d196e3baf6dcff1f288c7d757b771ce878db43b26bfb593064a,2024-10-07T17:47:48.410000 CVE-2024-47337,0,0,3f50b583aae71c6f8cadac0ae6ee64e91fb1dabd9a75ac191a842163ad487c42,2024-09-26T13:32:02.803000 @@ -261388,18 +261390,18 @@ CVE-2024-47393,0,0,58cf853d8f2d02cbccb461c82596ff01f0cdfcc3c36878d036a5e6eb40f01 CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f7e9,2024-10-07T17:47:48.410000 CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000 -CVE-2024-47410,1,1,03c4646e3684ab4ffe24093ab7893889e6845badbdfd13a2aef051391d180b69,2024-10-09T10:15:04.540000 -CVE-2024-47411,1,1,0b009ea43721bf78dbe41692d21031f53829faf0731e26a2cf6a8049d24d992b,2024-10-09T10:15:04.793000 -CVE-2024-47412,1,1,ae08eb76fd03261eb1b35f2c905d400353a1266d7201451421507f3d79750795,2024-10-09T10:15:05.017000 -CVE-2024-47413,1,1,5065446cde4d05320ce1e145d50831bc32758c7feddba11467a1bf7007517702,2024-10-09T10:15:05.210000 -CVE-2024-47414,1,1,1df3eba42d0851203050b86fa1792526dcd9d131eaf80d7391f5232f50b07925,2024-10-09T10:15:05.417000 -CVE-2024-47415,1,1,66806e1b10c27fa75fb436771e6568cb5ffae54a04736652943cbbaf29b17d37,2024-10-09T10:15:05.627000 -CVE-2024-47416,1,1,1181afa98c2dace03b5a8e934f907d824f978de25a5aa3d171706d1f3b9948f4,2024-10-09T10:15:05.830000 -CVE-2024-47417,1,1,3d82a2124c0b4b2bd69e49cc3497e08dc48273a70597ef98e04a55edb8141df5,2024-10-09T10:15:06.060000 -CVE-2024-47418,1,1,081d746b22ffbdd8b799f4808bc76cae4e08fb9d14d385d0abe1cc0263249db6,2024-10-09T10:15:06.277000 -CVE-2024-47419,1,1,d0cdbf286fc8933dcd9ef23a66fbcd5cbbdaedc63b14e3dd36cddcd2ce86eaa5,2024-10-09T10:15:06.480000 +CVE-2024-47410,0,0,03c4646e3684ab4ffe24093ab7893889e6845badbdfd13a2aef051391d180b69,2024-10-09T10:15:04.540000 +CVE-2024-47411,0,0,0b009ea43721bf78dbe41692d21031f53829faf0731e26a2cf6a8049d24d992b,2024-10-09T10:15:04.793000 +CVE-2024-47412,0,0,ae08eb76fd03261eb1b35f2c905d400353a1266d7201451421507f3d79750795,2024-10-09T10:15:05.017000 +CVE-2024-47413,0,0,5065446cde4d05320ce1e145d50831bc32758c7feddba11467a1bf7007517702,2024-10-09T10:15:05.210000 +CVE-2024-47414,0,0,1df3eba42d0851203050b86fa1792526dcd9d131eaf80d7391f5232f50b07925,2024-10-09T10:15:05.417000 +CVE-2024-47415,0,0,66806e1b10c27fa75fb436771e6568cb5ffae54a04736652943cbbaf29b17d37,2024-10-09T10:15:05.627000 +CVE-2024-47416,0,0,1181afa98c2dace03b5a8e934f907d824f978de25a5aa3d171706d1f3b9948f4,2024-10-09T10:15:05.830000 +CVE-2024-47417,0,0,3d82a2124c0b4b2bd69e49cc3497e08dc48273a70597ef98e04a55edb8141df5,2024-10-09T10:15:06.060000 +CVE-2024-47418,0,0,081d746b22ffbdd8b799f4808bc76cae4e08fb9d14d385d0abe1cc0263249db6,2024-10-09T10:15:06.277000 +CVE-2024-47419,0,0,d0cdbf286fc8933dcd9ef23a66fbcd5cbbdaedc63b14e3dd36cddcd2ce86eaa5,2024-10-09T10:15:06.480000 CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000 -CVE-2024-47420,1,1,afe9fbe4da6181dcdd330642f5b24efa9bc0934e4a84c41f7c49815b4e444f73,2024-10-09T10:15:06.660000 +CVE-2024-47420,0,0,afe9fbe4da6181dcdd330642f5b24efa9bc0934e4a84c41f7c49815b4e444f73,2024-10-09T10:15:06.660000 CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 @@ -261848,7 +261850,7 @@ CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,5de159b8ed64f30a1dc7ca0397d4baf3e4e9f9a186275e9923a64ce440abb53a,2024-06-07T14:56:05.647000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 -CVE-2024-5127,0,0,d833a25c87b56e1b99f80afdf1c14f454ddfb1b689be079d5314807c7a156a6b,2024-06-07T14:56:05.647000 +CVE-2024-5127,0,1,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000 CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000 CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000 CVE-2024-5130,0,0,08201be0ef3110b3d4a5f221adfbbc30fa234732006b6518b80f0c4870c61cea,2024-10-03T16:57:19.050000 @@ -265036,19 +265038,19 @@ CVE-2024-9482,0,0,f3165a4a24a2f9114d882c0f7f29d9fd657c327243b8585b7ba3adb352065c CVE-2024-9483,0,0,3a05dd369a56fa7d8019ce26b0a40ec5faf2156ca92b0ceaf0493b163c999d00,2024-10-04T13:50:43.727000 CVE-2024-9484,0,0,09a6a45178e5434bfb1cb0415a67ebc11284aea03e94bd83c401b848478b5c91,2024-10-04T13:50:43.727000 CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 -CVE-2024-9514,0,1,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000 -CVE-2024-9515,0,1,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000 +CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000 +CVE-2024-9515,0,0,b319f60f83e92c55aa0a25714009b76d6e0da4210ce3c744b2eab53a0f6a8b5b,2024-10-09T11:19:00.897000 CVE-2024-9528,0,0,d6fcaf4387a113a292c5be1e6315aa1024df0cc79a828aebf7bc2fe429a4bc75,2024-10-07T17:48:28.117000 -CVE-2024-9532,0,1,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 -CVE-2024-9533,0,1,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000 -CVE-2024-9534,0,1,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 -CVE-2024-9535,0,1,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000 +CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 +CVE-2024-9533,0,0,483ea201fb3f13623de51b6a803ec3c9d4b4a9f8d222ab5b1546c8a9a88ca771,2024-10-09T11:18:34.560000 +CVE-2024-9534,0,0,c826e79c155e2dcea2a83d95fd56ee360f3177c126ff744e515a5e5c9099e0fc,2024-10-09T11:18:23.607000 +CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f619d,2024-10-09T11:16:35.487000 CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000 -CVE-2024-9549,0,1,cb55acb0116148f78fe305f81d4a6eab492f380f42935c650b86596ed312ccf1,2024-10-09T11:16:03.970000 -CVE-2024-9550,0,1,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000 -CVE-2024-9551,0,1,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000 -CVE-2024-9552,0,1,0089ba0b10cb8d31710138a22fd4a80a1adb8a11c547d7653c5c7c5a85ee8f50,2024-10-09T11:15:32.333000 -CVE-2024-9553,0,1,e562e3629a4d3dcbb1c0f68c360778c8b40d2abdc00b7e696f224eb5e09a71e1,2024-10-09T11:15:21.203000 +CVE-2024-9549,0,0,cb55acb0116148f78fe305f81d4a6eab492f380f42935c650b86596ed312ccf1,2024-10-09T11:16:03.970000 +CVE-2024-9550,0,0,910b684d766fc00d3bc835188c16842c5e64a2ca110db17b68c67c53481422d4,2024-10-09T11:15:52.520000 +CVE-2024-9551,0,0,7b5500ec170a7497f673defff182e65008fa33c1b82ef626dcc76f8e4cb7177b,2024-10-09T11:15:42.060000 +CVE-2024-9552,0,0,0089ba0b10cb8d31710138a22fd4a80a1adb8a11c547d7653c5c7c5a85ee8f50,2024-10-09T11:15:32.333000 +CVE-2024-9553,0,0,e562e3629a4d3dcbb1c0f68c360778c8b40d2abdc00b7e696f224eb5e09a71e1,2024-10-09T11:15:21.203000 CVE-2024-9554,0,0,bd84f38adb3ba3dccafe55419a606b89f9861212884b57c128c50c590ca6a91d,2024-10-07T17:47:48.410000 CVE-2024-9555,0,0,820019e6568fa8e1fec5c7ee3b65cf6dcd66a9a7fbaab4fe3e5e127b82da3bd3,2024-10-08T18:36:39.123000 CVE-2024-9556,0,0,d7e7718ff1d3279981fe751528bd9fa57f0756509343c3e8c8e014bbccbaa988,2024-10-08T18:37:28.077000 @@ -265061,19 +265063,20 @@ CVE-2024-9562,0,0,24b8ce3625b9c960baccc39b1342ba09026888a30a22e76df87872d25fdd99 CVE-2024-9563,0,0,d04a15ff94fd263e1592738601aa4f4dbd97de56e0c50134531c3a9014e4a0d6,2024-10-08T18:38:35.537000 CVE-2024-9564,0,0,75b063b0abacbd9110f351ff7ccd52746f7087ff8aee399dba6dd5e983ec8df5,2024-10-08T18:38:49.413000 CVE-2024-9565,0,0,cac279697da73fd9a247e6333ff32006e7530fa32b525043c22e9f3a1ee0040b,2024-10-08T18:39:06.297000 -CVE-2024-9566,0,1,baae4e33fff7b34ffef086c107287cc20b54f178a1e90b003e3b2e13dc231596,2024-10-09T11:15:10.977000 -CVE-2024-9567,0,1,1f19694ad4f0b8aa4802431976e798aebcc8ebb3316ac1f2d628ab03f1adf8fe,2024-10-09T11:15:00.563000 -CVE-2024-9568,0,0,f4c1c36a636390a5fe29944b92550b079ffc949cd547082d09acb92ce133494d,2024-10-07T17:47:48.410000 -CVE-2024-9569,0,0,9cdb8490b63a3351e279146fb0d8dec106ad015a9df5a77c537964e0d1558e51,2024-10-07T17:47:48.410000 -CVE-2024-9570,0,1,a6d6aa86f9472e8a40c53560d31c32402eabf9607861955436706fad1b51f691,2024-10-09T11:13:11.067000 +CVE-2024-9566,0,0,baae4e33fff7b34ffef086c107287cc20b54f178a1e90b003e3b2e13dc231596,2024-10-09T11:15:10.977000 +CVE-2024-9567,0,0,1f19694ad4f0b8aa4802431976e798aebcc8ebb3316ac1f2d628ab03f1adf8fe,2024-10-09T11:15:00.563000 +CVE-2024-9568,0,1,41e4daadf6bdf28aa1545629e9b88ce37b785d72de5233c42256f75518f40bd8,2024-10-09T13:04:42.653000 +CVE-2024-9569,0,1,933d8e2b19b5933ae903804a8b8d091482f43a9d0c52397351d085515644d9c7,2024-10-09T13:04:55.907000 +CVE-2024-9570,0,0,a6d6aa86f9472e8a40c53560d31c32402eabf9607861955436706fad1b51f691,2024-10-09T11:13:11.067000 CVE-2024-9571,0,0,875a4a44417fabed8eda23f7f9f70cde202fd7e807f9d44c2058c5256366a803,2024-10-08T18:45:01.220000 CVE-2024-9572,0,0,6aa8ec5096cffb49c05ffcb187e769f5454844eed5ebf1e91e8e45ef57650b96,2024-10-08T18:45:03.117000 CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c3326,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000 -CVE-2024-9575,1,1,8a9bc539c876523f779887506768b369fbfbf7a242a8116932ec7f29b24955ea,2024-10-09T10:15:06.853000 +CVE-2024-9575,0,0,8a9bc539c876523f779887506768b369fbfbf7a242a8116932ec7f29b24955ea,2024-10-09T10:15:06.853000 CVE-2024-9576,0,0,349b41d5d275d2b69494dd85fe115130849861d9cddaab63cccbcfe5be8a03f5,2024-10-07T17:47:48.410000 CVE-2024-9602,0,0,be3311a6c7e910ed5bc47bf36f941c8a0fb9276c4744df87d5ef4ab5062ab1de,2024-10-08T23:15:12.947000 CVE-2024-9603,0,0,45ccb513db355ca029c1faba5c664e2ded2aa843837e1d077dad481e1915a6c8,2024-10-08T23:15:13.040000 CVE-2024-9620,0,0,0379fb1d0864218f96bae79eafc674616cceed6a1d6b1c374718286d73008692,2024-10-08T17:15:57.357000 CVE-2024-9621,0,0,93a648e082c2d430d057ddc9e3ada713aaa0a2bb50686998ccd1adc379bccdce,2024-10-08T17:15:57.573000 CVE-2024-9622,0,0,c63b888866eff50e6fa5697d58bf1e64edc668dfb35cefc907fc3210c84ae5d9,2024-10-08T17:15:57.790000 +CVE-2024-9680,1,1,0412df6875e3ec499aafbc3c4e100d08d00fc8546341bd2201e9cd3ad3fabc11,2024-10-09T13:15:12.090000