Auto-Update: 2024-10-16T14:00:23.627202+00:00

This commit is contained in:
cad-safe-bot 2024-10-16 14:03:23 +00:00
parent dd813d757a
commit d1759e0eff
80 changed files with 3426 additions and 449 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-12104",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-05-05T15:15:12.420",
"lastModified": "2020-05-07T20:16:35.347",
"lastModified": "2024-10-16T13:47:56.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-advanced-search_project:wp-advanced-search:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.3.7",
"matchCriteriaId": "4D8F28BB-B8FA-4363-8E92-28F552EBB79C"
"matchCriteriaId": "BA1CC381-7BE9-4021-9AD5-8CF3F8E4A7ED"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-13822",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-06-04T15:15:13.510",
"lastModified": "2023-11-07T03:16:58.907",
"lastModified": "2024-10-16T13:45:17.320",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -85,8 +85,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:elliptic_project:elliptic:6.5.2:*:*:*:*:node.js:*:*",
"matchCriteriaId": "83C79EC5-299D-4D27-8606-3BDEB95825E5"
"criteria": "cpe:2.3:a:indutny:elliptic:6.5.2:*:*:*:*:node.js:*:*",
"matchCriteriaId": "E5343FAF-0200-473D-922C-51CB46D28A7F"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-28498",
"sourceIdentifier": "report@snyk.io",
"published": "2021-02-02T19:15:13.720",
"lastModified": "2021-02-08T17:35:34.447",
"lastModified": "2024-10-16T13:45:17.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:elliptic_project:elliptic:*:*:*:*:*:node.js:*:*",
"criteria": "cpe:2.3:a:indutny:elliptic:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "6.5.4",
"matchCriteriaId": "04611CFD-A788-4B0B-BCF1-569C1F90EDA3"
"matchCriteriaId": "FFA0B018-C763-403E-96CE-C7C7C2DE0203"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2020-36841",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-10-16T13:15:11.733",
"lastModified": "2024-10-16T13:15:11.733",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WooCommerce Smart Coupons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the woocommerce_coupon_admin_init function in versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to send themselves gift certificates of any value, which could be redeemed for products sold on the victim\u2019s storefront."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://www.wordfence.com/blog/2020/03/coupon-creation-vulnerability-patched-in-woocommerce-smart-coupons/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eeeb03f7-5f78-4462-b0b4-5080bbc419a3?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-24874",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-02-14T12:15:14.573",
"lastModified": "2022-02-22T22:19:32.587",
"lastModified": "2024-10-16T13:26:19.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.31",
"matchCriteriaId": "6A6C306E-9970-48AF-9798-2866F926C47C"
"matchCriteriaId": "AD983632-19D4-49D0-A68A-EFF1FEC3727D"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-24923",
"sourceIdentifier": "contact@wpscan.com",
"published": "2022-01-24T08:15:08.803",
"lastModified": "2022-01-27T22:07:38.063",
"lastModified": "2024-10-16T13:26:19.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -85,9 +85,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.25",
"matchCriteriaId": "50365816-6B01-444C-B663-AECBE33937AA"
"matchCriteriaId": "B3FECD02-97E4-499F-8333-12E162586788"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42079",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-07-10T16:15:47.467",
"lastModified": "2023-07-14T18:13:24.080",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:03.330",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -96,6 +96,10 @@
}
],
"references": [
{
"url": "https://cisrt.divd.nl/DIVD-2021-00020/",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/CVE-2021-42079",
"source": "csirt@divd.nl",
@ -103,13 +107,6 @@
"Third Party Advisory"
]
},
{
"url": "https://www.divd.nl/DIVD-2021-00020",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.osnexus.com/products/software-defined-storage",
"source": "csirt@divd.nl",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42080",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-07-10T16:15:47.530",
"lastModified": "2024-09-13T18:15:31.627",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:03.660",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -38,20 +38,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"baseScore": 7.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
"impactScore": 4.0
}
]
},
@ -104,11 +104,8 @@
]
},
{
"url": "https://www.divd.nl/DIVD-2021-00020",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2021-00020/",
"source": "csirt@divd.nl"
},
{
"url": "https://www.osnexus.com/products/software-defined-storage",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42081",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-07-10T16:15:47.583",
"lastModified": "2023-07-17T18:30:01.307",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:03.917",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -104,11 +104,8 @@
]
},
{
"url": "https://www.divd.nl/DIVD-2021-00020",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2021-00020/",
"source": "csirt@divd.nl"
},
{
"url": "https://www.osnexus.com/products/software-defined-storage",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-42082",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-07-10T16:15:47.637",
"lastModified": "2023-07-14T14:37:03.653",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:04.060",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -38,7 +38,7 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -46,12 +46,12 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
"impactScore": 5.9
}
]
},
@ -104,11 +104,8 @@
]
},
{
"url": "https://www.divd.nl/DIVD-2021-00020",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2021-00020/",
"source": "csirt@divd.nl"
},
{
"url": "https://www.osnexus.com/products/software-defined-storage",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-42083",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-07-10T16:15:47.690",
"lastModified": "2024-01-02T19:15:09.030",
"lastModified": "2024-10-16T12:15:04.310",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -121,11 +121,8 @@
]
},
{
"url": "https://www.divd.nl/DIVD-2021-00020",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2021-00020/",
"source": "csirt@divd.nl"
},
{
"url": "https://www.osnexus.com/products/software-defined-storage",

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-4406",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-07-10T16:15:47.747",
"lastModified": "2023-07-13T18:52:57.930",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:04.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -104,11 +104,8 @@
]
},
{
"url": "https://www.divd.nl/DIVD-2021-00020",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2021-00020/",
"source": "csirt@divd.nl"
},
{
"url": "https://www.osnexus.com/products/software-defined-storage",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-24387",
"sourceIdentifier": "csirt@divd.nl",
"published": "2022-03-14T13:15:07.943",
"lastModified": "2022-03-19T01:11:04.923",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:04.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -126,6 +126,10 @@
}
],
"references": [
{
"url": "https://csirt.divd.nl/CVE-2022-24387/",
"source": "csirt@divd.nl"
},
{
"url": "https://csirt.divd.nl/DIVD-2021-00029",
"source": "csirt@divd.nl",
@ -133,13 +137,6 @@
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://csrit.divd.nl/CVE-2022-24387",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41217",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-02-22T15:15:11.540",
"lastModified": "2023-06-11T14:15:09.473",
"lastModified": "2024-10-16T12:15:04.860",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -38,19 +38,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45052",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-01-04T19:15:09.447",
"lastModified": "2024-01-02T19:15:10.030",
"lastModified": "2024-10-16T12:15:05.160",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -42,19 +42,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47447",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-05-24T17:15:09.580",
"lastModified": "2023-05-30T17:46:04.750",
"lastModified": "2024-10-16T13:47:56.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -76,9 +76,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wp-advanced-search_project:wp-advanced-search:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "3.3.8",
"matchCriteriaId": "6BE07D64-F1BD-4134-BB7E-0767D328A6CF"
"matchCriteriaId": "994D54C5-C6FF-4727-84EE-1FE4C9D53889"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22582",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.567",
"lastModified": "2023-06-16T03:48:59.780",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:05.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -109,18 +109,12 @@
],
"references": [
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/CVE-2023-22582/",
"source": "csirt@divd.nl"
},
{
"url": "https://divd.nl/cves/CVE-2023-22582",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22583",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.650",
"lastModified": "2023-06-16T03:49:05.240",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:05.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -109,18 +109,12 @@
],
"references": [
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/CVE-2023-22583/",
"source": "csirt@divd.nl"
},
{
"url": "https://divd.nl/cves/CVE-2023-22583",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22584",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.730",
"lastModified": "2023-06-16T03:49:12.840",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:05.867",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -109,18 +109,12 @@
],
"references": [
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/CVE-2023-22584/",
"source": "csirt@divd.nl"
},
{
"url": "https://divd.nl/cves/CVE-2023-22584",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22585",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.797",
"lastModified": "2023-06-16T03:49:18.723",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:06.003",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -109,18 +109,12 @@
],
"references": [
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/CVE-2023-22585/",
"source": "csirt@divd.nl"
},
{
"url": "https://divd.nl/cves/CVE-2023-22585",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-22586",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.853",
"lastModified": "2023-06-16T03:50:40.117",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:06.140",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -38,20 +38,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.4,
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 3.7
"impactScore": 4.0
}
]
},
@ -109,18 +109,12 @@
],
"references": [
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/CVE-2023-22586/",
"source": "csirt@divd.nl"
},
{
"url": "https://divd.nl/cves/CVE-2023-22586",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2472",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-06-05T14:15:10.110",
"lastModified": "2023-11-07T04:12:43.213",
"lastModified": "2024-10-16T13:26:19.017",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -44,9 +44,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.61",
"matchCriteriaId": "551D1815-390C-4FD4-A592-61B51EAFE5BD"
"matchCriteriaId": "E5D7C34E-D7D9-414D-BE6C-D0604E1675A7"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25911",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.923",
"lastModified": "2023-06-16T03:50:50.247",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:06.397",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Danfoss AK-EM100 web applications allow for OS command injection through the web application parameters."
"value": "The Danfoss AK-EM100 web applications allow for an authenticated user to perform OS command injection through the web application parameters."
}
],
"metrics": {
@ -109,18 +109,12 @@
],
"references": [
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/CVE-2023-25911/",
"source": "csirt@divd.nl"
},
{
"url": "https://divd.nl/cves/CVE-2023-25911",
"source": "csirt@divd.nl",
"tags": [
"Broken Link"
]
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25912",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.987",
"lastModified": "2023-06-16T03:50:57.457",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:06.553",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -38,19 +38,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
@ -109,19 +109,12 @@
],
"references": [
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/CVE-2023-25912/",
"source": "csirt@divd.nl"
},
{
"url": "https://divd.nl/cves/CVE-2023-25912",
"source": "csirt@divd.nl",
"tags": [
"Broken Link",
"Third Party Advisory"
]
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25913",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-08-21T21:15:07.993",
"lastModified": "2023-08-24T21:39:11.560",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:06.790",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25914",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-08-21T21:15:08.970",
"lastModified": "2023-08-24T21:38:58.693",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:07.050",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to improper restriction, attackers could retrieve and read system files of the underlying server through the XML interface."
"value": "Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise."
},
{
"lang": "es",
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-25915",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-08-21T21:15:09.170",
"lastModified": "2023-08-24T21:37:26.140",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:07.283",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to improper input validation, a remote attacker could execute arbitrary commands on the target system."
"value": "Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system."
},
{
"lang": "es",

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2023-32190",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T12:15:07.460",
"lastModified": "2024-10-16T12:15:07.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.5,
"baseSeverity": "HIGH"
}
}
]
},
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32190",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-32191",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T13:15:12.067",
"lastModified": "2024-10-16T13:15:12.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When RKE provisions a cluster, it stores the cluster state in a configmap called `full-cluster-state` inside the `kube-system` namespace of the cluster itself. The information available in there allows non-admin users to escalate to admin."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.9,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.1,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32191",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/rke/security/advisories/GHSA-6gr4-52w6-vmqx",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-32192",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T13:15:12.297",
"lastModified": "2024-10-16T13:15:12.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in which unauthenticated cross-site \nscripting (XSS) in the API Server's public API endpoint can be \nexploited, allowing an attacker to execute arbitrary JavaScript code in the victim browser"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32192",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/apiserver/security/advisories/GHSA-833m-37f7-jq55",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-32193",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T13:15:12.540",
"lastModified": "2024-10-16T13:15:12.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in which unauthenticated cross-site \nscripting (XSS) in Norman's public API endpoint can be exploited. This \ncan lead to an attacker exploiting the vulnerability to trigger \nJavaScript code and execute commands remotely."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32193",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/norman/security/advisories/GHSA-r8f4-hv23-6qp6",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2023-32194",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T13:15:12.787",
"lastModified": "2024-10-16T13:15:12.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified when granting a create or * global role for a resource type of \"namespaces\"; no matter the API group, the subject will receive *\n permissions for core namespaces. This can lead to someone being capable\n of accessing, creating, updating, or deleting a namespace in the \nproject."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.6,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32194",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-c85r-fwc7-45vc",
"source": "meissner@suse.de"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2023-32196",
"sourceIdentifier": "meissner@suse.de",
"published": "2024-10-16T13:15:13.060",
"lastModified": "2024-10-16T13:15:13.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified whereby privilege escalation checks are not properly enforced for RoleTemplateobjects when external=true, which in specific scenarios can lead to privilege escalation."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.5,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "meissner@suse.de",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "meissner@suse.de",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32196",
"source": "meissner@suse.de"
},
{
"url": "https://github.com/rancher/rancher/security/advisories/GHSA-64jq-m7rq-768h",
"source": "meissner@suse.de"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52430",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-12T23:15:08.353",
"lastModified": "2024-02-13T14:01:49.147",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:11:53.423",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "El complemento caddy-security 1.1.20 para Caddy permite XSS reflejadi a trav\u00e9s de una solicitud GET a una URL que contiene un payload XSS y comienza con una subcadena /admin o /settings/mfa/delete/."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:authcrunch:caddy-security:1.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA78C41-C188-45AD-9102-E019F39AC33F"
}
]
}
]
}
],
"references": [
{
"url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/greenpau/caddy-security/issues/264",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-7260",
"sourceIdentifier": "security@opentext.com",
"published": "2024-08-22T21:15:16.107",
"lastModified": "2024-08-23T16:18:28.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T12:53:08.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security@opentext.com",
"type": "Secondary",
@ -73,10 +105,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opentext:cx-e_voice:*:*:*:*:*:*:*:*",
"versionEndIncluding": "22.4",
"matchCriteriaId": "8E06D5EB-0706-4767-BBC3-A8AC73BF13B0"
}
]
}
]
}
],
"references": [
{
"url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0823114",
"source": "security@opentext.com"
"source": "security@opentext.com",
"tags": [
"Permissions Required"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10021",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-16T12:15:07.663",
"lastModified": "2024-10-16T12:15:07.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER. The manipulation of the argument text leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.280556",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.280556",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.424334",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10022",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-16T12:15:08.163",
"lastModified": "2024-10-16T12:15:08.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Pharmacy Management System 1.0. This affects an unknown part of the file /php/manage_supplier.php?action=search. The manipulation of the argument text leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/higordiego/2bd0a94e480906a60ce83b8a4ec26957",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.280557",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.280557",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.424337",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10023",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-16T13:15:13.350",
"lastModified": "2024-10-16T13:15:13.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Pharmacy Management System 1.0. This vulnerability affects unknown code of the file /php/add_new_medicine.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/higordiego/01a35a20a4e20e937d384b677c000921",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.280558",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.280558",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.424483",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10024",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-16T13:15:13.650",
"lastModified": "2024-10-16T13:15:13.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Pharmacy Management System 1.0. This issue affects some unknown processing of the file /php/manage_medicine_stock.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://gist.github.com/higordiego/b0083f7f12dee245c2fbe7102e31d9a4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.280559",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.280559",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.424529",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1454",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-02-12T23:15:08.410",
"lastModified": "2024-03-23T03:15:10.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:57:49.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.4,
"impactScore": 2.7
},
{
"source": "secalert@redhat.com",
"type": "Secondary",
@ -51,34 +71,117 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "0.25.0",
"matchCriteriaId": "835E7B28-6A13-42E4-A819-39920F9970B5"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1454",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263929",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21491",
"sourceIdentifier": "report@snyk.io",
"published": "2024-02-13T05:15:08.873",
"lastModified": "2024-03-06T14:15:48.020",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:25:47.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
},
{
"source": "report@snyk.io",
"type": "Secondary",
@ -51,22 +81,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:svix:svix:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.17.0",
"matchCriteriaId": "966B2847-AEC3-4D16-8230-5FDA3526B474"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/svix/svix-webhooks/commit/958821bd3b956d1436af65f70a0964d4ffb7daf6",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/svix/svix-webhooks/pull/1190",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Patch"
]
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2024-0010.html",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://security.snyk.io/vuln/SNYK-RUST-SVIX-6230729",
"source": "report@snyk.io"
"source": "report@snyk.io",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21875",
"sourceIdentifier": "csirt@divd.nl",
"published": "2024-02-11T09:15:07.633",
"lastModified": "2024-09-05T13:50:08.927",
"vulnStatus": "Analyzed",
"lastModified": "2024-10-16T12:15:08.483",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28987",
"sourceIdentifier": "psirt@solarwinds.com",
"published": "2024-08-21T22:15:04.350",
"lastModified": "2024-10-16T01:00:01.723",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:05:08.363",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-10-15",
"cisaActionDue": "2024-11-05",
@ -22,7 +22,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@solarwinds.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -40,6 +40,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
},
{
"source": "psirt@solarwinds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -55,14 +75,49 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:web_help_desk:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.8.3",
"matchCriteriaId": "BDE3AF89-F0D2-4F3C-9565-F6DEA8B2BAC7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:web_help_desk:12.8.3:-:*:*:*:*:*:*",
"matchCriteriaId": "331BF887-F099-419E-9664-EE2EC76E2E23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:solarwinds:web_help_desk:12.8.3:hotfix1:*:*:*:*:*:*",
"matchCriteriaId": "7FCFD6C1-EF56-47F4-AFE5-AD8E54232FF8"
}
]
}
]
}
],
"references": [
{
"url": "https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2",
"source": "psirt@solarwinds.com"
"source": "psirt@solarwinds.com",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987",
"source": "psirt@solarwinds.com"
"source": "psirt@solarwinds.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33209",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-02T16:15:10.300",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:33:21.313",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,67 @@
"value": "FlatPress v1.3 es vulnerable a Cross Site Scripting (XSS). Un atacante puede inyectar c\u00f3digo JavaScript malicioso en la secci\u00f3n \"Agregar nueva entrada\", lo que le permite ejecutar c\u00f3digo arbitrario en el contexto del navegador web de la v\u00edctima."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:flatpress:flatpress:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DD15C4E9-8A2B-4104-AF8A-FFB196940AAF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/paragbagul111/CVE-2024-33209",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35668",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-04T14:15:13.783",
"lastModified": "2024-06-05T19:55:05.997",
"lastModified": "2024-10-16T13:26:19.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.78",
"matchCriteriaId": "3D12CB1F-12A1-42C6-B030-241B4D6C4C64"
"matchCriteriaId": "54819C3A-E471-4AF2-A992-CC9ED7F78A17"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37983",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-10-08T18:15:06.520",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:15:20.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -36,13 +36,43 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,180 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20796",
"matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20796",
"matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.7428",
"matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.7428",
"matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19044.5011",
"matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19044.5011",
"matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19044.5011",
"matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.19045.5011",
"matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.19045.5011",
"matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.19045.5011",
"matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22000.3260",
"matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22000.3260",
"matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22621.4317",
"matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22621.4317",
"matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.22631.4317",
"matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.22631.4317",
"matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
"versionEndExcluding": "10.0.26100.2033",
"matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.26100.2033",
"matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.7428",
"matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.6414",
"matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2762",
"matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.1189",
"matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37983",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39379",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-31T13:15:10.253",
"lastModified": "2024-09-16T12:15:02.870",
"vulnStatus": "Modified",
"lastModified": "2024-10-16T13:38:32.573",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39406",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:26.243",
"lastModified": "2024-09-16T12:15:03.080",
"vulnStatus": "Modified",
"lastModified": "2024-10-16T13:37:57.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,19 +22,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
"baseScore": 6.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"exploitabilityScore": 2.3,
"impactScore": 4.0
},
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39408",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:26.703",
"lastModified": "2024-09-16T13:15:09.133",
"vulnStatus": "Modified",
"lastModified": "2024-10-16T13:36:13.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
"impactScore": 1.4
},
{
"source": "psirt@adobe.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39409",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:26.937",
"lastModified": "2024-09-16T13:15:09.387",
"vulnStatus": "Modified",
"lastModified": "2024-10-16T13:35:32.290",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
"impactScore": 1.4
},
{
"source": "psirt@adobe.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39410",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:27.177",
"lastModified": "2024-09-16T13:15:09.557",
"vulnStatus": "Modified",
"lastModified": "2024-10-16T13:34:52.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39412",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:27.650",
"lastModified": "2024-09-16T13:15:09.840",
"vulnStatus": "Modified",
"lastModified": "2024-10-16T13:33:27.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,14 +22,14 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41867",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-09-13T09:15:10.620",
"lastModified": "2024-09-16T13:15:10.550",
"vulnStatus": "Modified",
"lastModified": "2024-10-16T13:31:42.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -22,14 +22,14 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
@ -61,7 +61,7 @@
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -71,12 +71,12 @@
]
},
{
"source": "nvd@nist.gov",
"source": "psirt@adobe.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-125"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42020",
"sourceIdentifier": "support@hackerone.com",
"published": "2024-09-07T17:15:14.127",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:15:54.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV30": [
{
"source": "support@hackerone.com",
@ -39,10 +61,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12",
"versionEndIncluding": "12.1.0.3208",
"matchCriteriaId": "80851DEC-53C9-40D0-894B-93E6436805DF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.veeam.com/kb4649",
"source": "support@hackerone.com"
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45148",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-10-10T10:15:07.963",
"lastModified": "2024-10-11T22:12:23.237",
"lastModified": "2024-10-16T13:27:46.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -22,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47007",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:54.210",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:23:03.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
"versionEndExcluding": "6.4.5",
"matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47008",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:54.463",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:24:32.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
"versionEndExcluding": "6.4.5",
"matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47009",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:54.777",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:26:39.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -55,10 +85,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
"versionEndExcluding": "6.4.5",
"matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47010",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:55.240",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:28:07.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -55,10 +85,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
"versionEndExcluding": "6.4.5",
"matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47011",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:55.533",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:28:40.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
"versionEndExcluding": "6.4.5",
"matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47134",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-10-03T03:15:02.443",
"lastModified": "2024-10-04T13:50:43.727",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:50:32.607",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
@ -51,18 +81,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:electronics.jtekt:kostac_plc_programming_software:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.6.9.0",
"matchCriteriaId": "4398EBDC-EA9A-4D86-9205-A82122D1D397"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:electronics.jtekt:kostac_plc_programming_software:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.6.10.0",
"versionEndIncluding": "1.6.14.0",
"matchCriteriaId": "575F0B9F-B7A5-4E03-840F-6321387B66CC"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/vu/JVNVU92808077/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.electronics.jtekt.co.jp/en/topics/202410026928/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48042",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-16T13:15:13.973",
"lastModified": "2024-10-16T13:15:13.973",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Contact Form by Supsystic allows Command Injection.This issue affects Contact Form by Supsystic: from n/a through 1.7.28."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/contact-form-by-supsystic/wordpress-contact-form-by-supsystic-plugin-1-7-28-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48255",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-14T14:15:11.937",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:35:03.290",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "Cloudlog 2.6.15 permite la inyecci\u00f3n SQL de Oqrs.php get_station_info station_id."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49247",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-16T13:15:14.277",
"lastModified": "2024-10-16T13:15:14.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ": Authentication Bypass Using an Alternate Path or Channel vulnerability in sooskriszta, webforza BuddyPress Better Registration allows : Authentication Bypass.This issue affects BuddyPress Better Registration: from n/a through 1.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-288"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/better-bp-registration/wordpress-buddypress-better-registration-plugin-1-6-broken-authentication-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49257",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-16T13:15:14.517",
"lastModified": "2024-10-16T13:15:14.517",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unrestricted Upload of File with Dangerous Type vulnerability in Denis Azz Anonim Posting allows Upload a Web Shell to a Web Server.This issue affects Azz Anonim Posting: from n/a through 0.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/azz-anonim-posting/wordpress-azz-anonim-posting-plugin-0-9-arbitrary-file-upload-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49271",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-16T13:15:14.787",
"lastModified": "2024-10-16T13:15:14.787",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": ": Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows : Command Injection.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.121."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "audit@patchstack.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "audit@patchstack.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1336"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-free-widgets-addons-templates-plugin-1-5-121-remote-code-execution-rce-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49382",
"sourceIdentifier": "security@acronis.com",
"published": "2024-10-15T11:15:13.153",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:53:45.860",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@acronis.com",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@acronis.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@acronis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +83,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*",
"matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*",
"matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7286",
"source": "security@acronis.com"
"source": "security@acronis.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49383",
"sourceIdentifier": "security@acronis.com",
"published": "2024-10-15T11:15:13.423",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:53:04.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@acronis.com",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@acronis.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@acronis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +83,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*",
"matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*",
"matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7285",
"source": "security@acronis.com"
"source": "security@acronis.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49384",
"sourceIdentifier": "security@acronis.com",
"published": "2024-10-15T11:15:13.643",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:52:19.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV30": [
{
"source": "security@acronis.com",
@ -41,8 +63,18 @@
},
"weaknesses": [
{
"source": "security@acronis.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security@acronis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +83,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*",
"matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*",
"matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7284",
"source": "security@acronis.com"
"source": "security@acronis.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49387",
"sourceIdentifier": "security@acronis.com",
"published": "2024-10-15T11:15:13.860",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:58:39.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@acronis.com",
@ -51,10 +73,52 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*",
"matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*",
"matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-7022",
"source": "security@acronis.com"
"source": "security@acronis.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49388",
"sourceIdentifier": "security@acronis.com",
"published": "2024-10-15T11:15:14.063",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:57:58.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
],
"cvssMetricV30": [
{
"source": "security@acronis.com",
@ -41,7 +63,7 @@
},
"weaknesses": [
{
"source": "security@acronis.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -49,12 +71,64 @@
"value": "CWE-639"
}
]
},
{
"source": "security@acronis.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*",
"matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*",
"matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://security-advisory.acronis.com/advisories/SEC-5984",
"source": "security@acronis.com"
"source": "security@acronis.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-6380",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-10-16T12:15:08.767",
"lastModified": "2024-10-16T12:15:08.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-8040",
"sourceIdentifier": "3DS.Information-Security@3ds.com",
"published": "2024-10-16T12:15:09.013",
"lastModified": "2024-10-16T12:15:09.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authorization bypass through user-controlled key vulnerability affecting 3DSwym in 3DSwymer on Release 3DEXPERIENCE R2024x allows an authenticated attacker to access some unauthorized data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "3DS.Information-Security@3ds.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://www.3ds.com/vulnerability/advisories",
"source": "3DS.Information-Security@3ds.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8630",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-09-27T17:15:14.180",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:15:59.997",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
@ -95,10 +115,43 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:alisonic:sibylla_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8DD1A679-5DBA-44B6-A704-DFB41BDF7CFE"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:alisonic:sibylla:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E2E83D4-27DF-40E3-9A06-DB607ADD1CCD"
}
]
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-02",
"source": "ics-cert@hq.dhs.gov"
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Zita Elementor Site Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
},
{
"lang": "es",
"value": "El complemento Zita Elementor Site Library para WordPress es vulnerable a Cross-Site Scripting Almacenado mediante cargas de archivos SVG en todas las versiones hasta la 1.6.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9381",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-10-08T17:15:57.183",
"lastModified": "2024-10-10T12:56:30.817",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-10-16T13:30:34.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.2",
"matchCriteriaId": "B633ABF6-4CAD-462D-B6C9-F209D90EAFD9"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9975",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-15T11:15:14.310",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:44:46.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rems:drag_and_drop_image_upload:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "AAE6AAD4-5957-4748-B8BB-3441BB48A61E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/JunMing27/CVE/blob/main/SourceCodester%20-%20Arbitrary%20File%20Upload%20vulnerability%20leads%20to%20RCE%20in%20Drag%20and%20Drop%20Image%20Upload%20without%20Refresh%20Reload%20Using%20PHP%20and%20Ajax.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.280340",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.280340",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.423445",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9976",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-15T11:15:14.570",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-10-16T13:42:24.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,26 +140,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9943605C-820A-4C9A-8A5E-1BA71F57F048"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://gist.github.com/higordiego/b57040961b993cb5f1bfe0005f6b57be",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.280341",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.280341",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.423448",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-10-16T12:00:25.755027+00:00
2024-10-16T14:00:23.627202+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-10-16T11:15:13.080000+00:00
2024-10-16T13:58:39.297000+00:00
```
### Last Data Feed Release
@ -33,21 +33,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
265813
265830
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `17`
- [CVE-2024-8921](CVE-2024/CVE-2024-89xx/CVE-2024-8921.json) (`2024-10-16T11:15:13.080`)
- [CVE-2024-9444](CVE-2024/CVE-2024-94xx/CVE-2024-9444.json) (`2024-10-16T10:15:02.620`)
- [CVE-2020-36841](CVE-2020/CVE-2020-368xx/CVE-2020-36841.json) (`2024-10-16T13:15:11.733`)
- [CVE-2023-32190](CVE-2023/CVE-2023-321xx/CVE-2023-32190.json) (`2024-10-16T12:15:07.460`)
- [CVE-2023-32191](CVE-2023/CVE-2023-321xx/CVE-2023-32191.json) (`2024-10-16T13:15:12.067`)
- [CVE-2023-32192](CVE-2023/CVE-2023-321xx/CVE-2023-32192.json) (`2024-10-16T13:15:12.297`)
- [CVE-2023-32193](CVE-2023/CVE-2023-321xx/CVE-2023-32193.json) (`2024-10-16T13:15:12.540`)
- [CVE-2023-32194](CVE-2023/CVE-2023-321xx/CVE-2023-32194.json) (`2024-10-16T13:15:12.787`)
- [CVE-2023-32196](CVE-2023/CVE-2023-321xx/CVE-2023-32196.json) (`2024-10-16T13:15:13.060`)
- [CVE-2024-10021](CVE-2024/CVE-2024-100xx/CVE-2024-10021.json) (`2024-10-16T12:15:07.663`)
- [CVE-2024-10022](CVE-2024/CVE-2024-100xx/CVE-2024-10022.json) (`2024-10-16T12:15:08.163`)
- [CVE-2024-10023](CVE-2024/CVE-2024-100xx/CVE-2024-10023.json) (`2024-10-16T13:15:13.350`)
- [CVE-2024-10024](CVE-2024/CVE-2024-100xx/CVE-2024-10024.json) (`2024-10-16T13:15:13.650`)
- [CVE-2024-48042](CVE-2024/CVE-2024-480xx/CVE-2024-48042.json) (`2024-10-16T13:15:13.973`)
- [CVE-2024-49247](CVE-2024/CVE-2024-492xx/CVE-2024-49247.json) (`2024-10-16T13:15:14.277`)
- [CVE-2024-49257](CVE-2024/CVE-2024-492xx/CVE-2024-49257.json) (`2024-10-16T13:15:14.517`)
- [CVE-2024-49271](CVE-2024/CVE-2024-492xx/CVE-2024-49271.json) (`2024-10-16T13:15:14.787`)
- [CVE-2024-6380](CVE-2024/CVE-2024-63xx/CVE-2024-6380.json) (`2024-10-16T12:15:08.767`)
- [CVE-2024-8040](CVE-2024/CVE-2024-80xx/CVE-2024-8040.json) (`2024-10-16T12:15:09.013`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `61`
- [CVE-2024-39406](CVE-2024/CVE-2024-394xx/CVE-2024-39406.json) (`2024-10-16T13:37:57.910`)
- [CVE-2024-39408](CVE-2024/CVE-2024-394xx/CVE-2024-39408.json) (`2024-10-16T13:36:13.497`)
- [CVE-2024-39409](CVE-2024/CVE-2024-394xx/CVE-2024-39409.json) (`2024-10-16T13:35:32.290`)
- [CVE-2024-39410](CVE-2024/CVE-2024-394xx/CVE-2024-39410.json) (`2024-10-16T13:34:52.220`)
- [CVE-2024-39412](CVE-2024/CVE-2024-394xx/CVE-2024-39412.json) (`2024-10-16T13:33:27.910`)
- [CVE-2024-41867](CVE-2024/CVE-2024-418xx/CVE-2024-41867.json) (`2024-10-16T13:31:42.040`)
- [CVE-2024-42020](CVE-2024/CVE-2024-420xx/CVE-2024-42020.json) (`2024-10-16T13:15:54.167`)
- [CVE-2024-45148](CVE-2024/CVE-2024-451xx/CVE-2024-45148.json) (`2024-10-16T13:27:46.397`)
- [CVE-2024-47007](CVE-2024/CVE-2024-470xx/CVE-2024-47007.json) (`2024-10-16T13:23:03.467`)
- [CVE-2024-47008](CVE-2024/CVE-2024-470xx/CVE-2024-47008.json) (`2024-10-16T13:24:32.130`)
- [CVE-2024-47009](CVE-2024/CVE-2024-470xx/CVE-2024-47009.json) (`2024-10-16T13:26:39.990`)
- [CVE-2024-47010](CVE-2024/CVE-2024-470xx/CVE-2024-47010.json) (`2024-10-16T13:28:07.393`)
- [CVE-2024-47011](CVE-2024/CVE-2024-470xx/CVE-2024-47011.json) (`2024-10-16T13:28:40.480`)
- [CVE-2024-47134](CVE-2024/CVE-2024-471xx/CVE-2024-47134.json) (`2024-10-16T13:50:32.607`)
- [CVE-2024-48255](CVE-2024/CVE-2024-482xx/CVE-2024-48255.json) (`2024-10-16T13:35:03.290`)
- [CVE-2024-49382](CVE-2024/CVE-2024-493xx/CVE-2024-49382.json) (`2024-10-16T13:53:45.860`)
- [CVE-2024-49383](CVE-2024/CVE-2024-493xx/CVE-2024-49383.json) (`2024-10-16T13:53:04.380`)
- [CVE-2024-49384](CVE-2024/CVE-2024-493xx/CVE-2024-49384.json) (`2024-10-16T13:52:19.317`)
- [CVE-2024-49387](CVE-2024/CVE-2024-493xx/CVE-2024-49387.json) (`2024-10-16T13:58:39.297`)
- [CVE-2024-49388](CVE-2024/CVE-2024-493xx/CVE-2024-49388.json) (`2024-10-16T13:57:58.383`)
- [CVE-2024-8630](CVE-2024/CVE-2024-86xx/CVE-2024-8630.json) (`2024-10-16T13:15:59.997`)
- [CVE-2024-8921](CVE-2024/CVE-2024-89xx/CVE-2024-8921.json) (`2024-10-16T11:15:13.080`)
- [CVE-2024-9381](CVE-2024/CVE-2024-93xx/CVE-2024-9381.json) (`2024-10-16T13:30:34.740`)
- [CVE-2024-9975](CVE-2024/CVE-2024-99xx/CVE-2024-9975.json) (`2024-10-16T13:44:46.220`)
- [CVE-2024-9976](CVE-2024/CVE-2024-99xx/CVE-2024-9976.json) (`2024-10-16T13:42:24.153`)
## Download and Usage

View File

@ -147077,7 +147077,7 @@ CVE-2020-12100,0,0,5f2109d0519da00eb1bdab515eb32b6f3a0a3f9f65df0494c40483c00d981
CVE-2020-12101,0,0,cf9139625b9f0b649b840da134f242e5f2c9b3b4781e0b74e6764c945a49d354,2024-04-29T18:45:40.910000
CVE-2020-12102,0,0,334d46f056ec9e51869491b0d4c4f4d7fa1e52d8eb23bd7050ac5ca8d70d4a32,2024-05-14T20:15:09.087000
CVE-2020-12103,0,0,3a59f1d5a51ef8295c537e5c5ae4d8a9bf4c1114a44ce53252c59c94bd0f48e8,2024-05-14T20:15:10.827000
CVE-2020-12104,0,0,a5a4385915ac81d6db9a6836d07a958d3266656b85528d7c4b172bb9e727975b,2020-05-07T20:16:35.347000
CVE-2020-12104,0,1,c90556433517cb5d5d176b589f735a14d9a33bc7c2c612108f5c581d6d39d1b4,2024-10-16T13:47:56.247000
CVE-2020-12105,0,0,1b0104d22c7c0ec2e5d6aa96a93864fff5c8940b5e30c6bb86ba9c0774641660,2022-05-03T14:21:44.207000
CVE-2020-12106,0,0,4e3d882e5b691be673a8f21eb4e1ee34ab9fbe1cfb11e1d93d639fd0a32d63b7,2021-07-21T11:39:23.747000
CVE-2020-12107,0,0,3836f1f6d5d4faa7b159d018fe0bf113e537b6190554e79e8bc6cc3f85044739,2020-08-19T12:54:46.107000
@ -148635,7 +148635,7 @@ CVE-2020-13819,0,0,7d0e5bc882687b412f2418ec24b1dd9be843e422397645300221984594963
CVE-2020-1382,0,0,a0876529db6daaa28aa38e9bd84657d2a2207ea6d0cf96033594f64082bf944d,2021-07-21T11:39:23.747000
CVE-2020-13820,0,0,9e496591ad44ca77dc312b3e2cd00368fda87f5d814828e305a47a94b328ec58,2023-11-07T03:16:58.837000
CVE-2020-13821,0,0,f7b5cad326778e202650f58face9ae8589633236a49053242bf79766a2119137,2020-12-23T15:43:39.817000
CVE-2020-13822,0,0,48b34565629e0385c2614e956491df038fbc80fbc85c0d89a6ed9bd7a9d04bc6,2023-11-07T03:16:58.907000
CVE-2020-13822,0,1,c834d5de797a453847f9ed62ba35d05b71b8de7b69e23bae24f38a997c3916e3,2024-10-16T13:45:17.320000
CVE-2020-13825,0,0,90e2a75836526776efb694fd8b4324e7d0c0929bd6d204e8655be433efd7a6be,2020-08-24T19:10:36.313000
CVE-2020-13826,0,0,2de936a392d9d270194c018ff6e3b59e6bfadf76e7599ac9624f9941458e1ae1,2021-07-21T11:39:23.747000
CVE-2020-13827,0,0,3bde90887e219f9516b1f289a5f508de896d1958530f2a37b0a1669873b3ae2c,2023-02-27T18:16:26.300000
@ -156938,7 +156938,7 @@ CVE-2020-28493,0,0,d9353fe60ae6c63ec1bfff9f85ea0fb545c914cd07b141b9fe22f9fe82e65
CVE-2020-28494,0,0,d0b68aa88a2f74522ac851a9e05ce4a16763907497fa430f2c95ee5ec5fba84a,2021-07-21T11:39:23.747000
CVE-2020-28495,0,0,4c7c65ebefd525ba71ddc5b80d415a5a705a5e348fcffb403aaf04a11193ff38,2021-02-05T16:53:47.807000
CVE-2020-28496,0,0,c212ccab3408db34cea9b34fdae0f9e8498e95a619a07d99989b57116a41f0fc,2021-02-25T17:05:05.980000
CVE-2020-28498,0,0,6b4c00043fb2e887121baee557908d4801356c0a326c3e9fa54f999966cb0950,2021-02-08T17:35:34.447000
CVE-2020-28498,0,1,81f1cc60ea687112836a08bd67314553fd1edbaa1937c34ba15fa01caaae0212,2024-10-16T13:45:17.320000
CVE-2020-28499,0,0,ad90f9d4f5a379490af8b67dd55869494a0d6c6d5f0fd044b81d677ff00b0f28,2021-05-17T19:55:25.393000
CVE-2020-2850,0,0,50629eccd5b3b9281b1f179f2b8ae3ef11522dbc8e0dd62df5b2500c2045ae16,2020-04-16T13:58:17.320000
CVE-2020-28500,0,0,805928d1d84ab6637afb06f11309a9cee2a0de28cf92c1ebd57b39fabd99a064,2022-09-13T21:18:50.543000
@ -159342,6 +159342,7 @@ CVE-2020-36838,0,0,3a7d865bc4e5d457aefd7a125a83f9e76c208c4baafa85f9e322ba36857e5
CVE-2020-36839,0,0,baa988307e623b23446b2949272b20cbda74bdb8e8bd2f74d8dcfc84a33c3f98,2024-10-16T07:15:09.433000
CVE-2020-3684,0,0,44aa34ae599eab5a673c5cc3034025c1f764a98b61a69b113aa70c68c71a7c49,2020-11-06T16:29:14.480000
CVE-2020-36840,0,0,19f312115ec11958b9e6a2d7c5d1461a9b9a720952690bab09ad8fcbc82536d2,2024-10-16T08:15:03.710000
CVE-2020-36841,1,1,957b677fd33f2345981c4e7c86c2970f0c468056978102eb125099baf6872493,2024-10-16T13:15:11.733000
CVE-2020-36842,0,0,2b0ab9021e8c3546f5c3ac016af5850bb6ea577b04ff806dd46ba7237500c4c0,2024-10-16T08:15:03.923000
CVE-2020-3685,0,0,01cf0158d1e280265cb87314ab78bb48a4960098d5e1ed486f7d5066d87b5a92,2021-01-29T23:46:03.037000
CVE-2020-3686,0,0,236df0d6a9e5b4a5d3130dbb24dece9578efd8fc6235301a045f147575f94cf1,2021-01-30T00:10:19.887000
@ -170758,7 +170759,7 @@ CVE-2021-24870,0,0,b52951bbda633a2496785de6ed9c971a9349589104215e362b329e33b8594
CVE-2021-24871,0,0,8cee336be7c8e81d2a980ee98c9518731e7b00f3d824019a678875e57bcd313f,2021-12-16T20:47:02.653000
CVE-2021-24872,0,0,35696a0eb51e36407a79a9cbf68b6633c9b2efa0f8194208d2fbe0e29f79d3f6,2021-12-15T21:09:01.617000
CVE-2021-24873,0,0,0e2c879d3f204e9403ba3895a5ce0bec82190691622358ef65f867b35c2b7a4c,2021-11-24T16:36:55.757000
CVE-2021-24874,0,0,183ad937bca5876223814367660c5178967b86ea1daca436e20874800088ad1c,2022-02-22T22:19:32.587000
CVE-2021-24874,0,1,64fdf80ee90d5b1d6de6a6b14f87c50343676a2a968b2332fa72c64a34fd2ccd,2024-10-16T13:26:19.017000
CVE-2021-24875,0,0,363986781c5722c301b08ee25bbae68391c570e0d127c7dac6174a02b15224e2,2021-11-24T19:59:07.813000
CVE-2021-24876,0,0,8f2daa7f2d0bb19d86a6056e36e486b9ddf7878105e11e83ffc9baf82bbb9df4,2021-11-29T20:18:36.847000
CVE-2021-24877,0,0,98729407b5f410a005c9d353823b0655188684ae05421381493036ad6847cd41,2021-11-26T15:29:32.943000
@ -170805,7 +170806,7 @@ CVE-2021-24919,0,0,e0dc83f1f53f04e30af67db292687d70b47d2901d44a4a4094abe48112ee8
CVE-2021-24920,0,0,8ccf0cbf5d2d75602a322b800459180bd3da6e37f70ddcda3609c7c41762d147,2022-03-07T16:51:54.773000
CVE-2021-24921,0,0,c39a1fa5f466132c2f295410cc217d4dd877e75f08444981115aa25d5a6e62fd,2022-02-28T19:39:20.853000
CVE-2021-24922,0,0,a62ca72c02c4e8e14a9a21104b9fd358aa1e358b0b5f498ff2f1c6f0b27528c7,2021-12-15T19:17:30.217000
CVE-2021-24923,0,0,bf952289737ccf2b96ebeb7e68a7af5e46b69286456a851a59aec844711e924c,2022-01-27T22:07:38.063000
CVE-2021-24923,0,1,2d2d758c7c6eebc8db1d3b61ec8993a8e8cf30a5b28f15322ff5bbaeaf0a4948,2024-10-16T13:26:19.017000
CVE-2021-24924,0,0,d5c09f8e01fce836950c01ae9d72864e07730e6c1acc3d045ff77bfe1c62f83d,2021-12-06T19:15:49.860000
CVE-2021-24925,0,0,43f0f7063c56c2126e4b2da1eca25ebb89b9598b9884aef1aef4b30bcf478804,2021-12-15T19:19:29.540000
CVE-2021-24926,0,0,ade879c2f6d36382ede146f6320a0f77f16920e22a1169dd3dca126280a41d2b,2022-02-04T18:10:31.700000
@ -183534,12 +183535,12 @@ CVE-2021-42075,0,0,000a82d37ed29cee910dc4d2bb35e08cace658ab1a0cbe32b65e4d58eb7d4
CVE-2021-42076,0,0,67d37381120eacdc8025b22b07c44bb6c8764e4fb533f673681890b936e27812,2021-11-09T22:07:09.187000
CVE-2021-42077,0,0,98645f18b00acbbf0c5a4aca133d443cc300a213a1d1246bbc4446561627477d,2021-11-09T19:28:05.903000
CVE-2021-42078,0,0,f9c4ed900a7cc457676383c89604ac047264bd0c6268e21f9f2156657cef1ce4,2021-11-09T22:07:50.933000
CVE-2021-42079,0,0,bf8418ff05cca0bc28f8241c42a0796bdc079adda7455a48fc84fd2f1a818c08,2023-07-14T18:13:24.080000
CVE-2021-42079,0,1,f2d0232174cdef0ac65a62301a79361e39709edcef7945f8a252784803c24c20,2024-10-16T12:15:03.330000
CVE-2021-4208,0,0,2d1e899b3a2dc18e4d0e14dca0b4da56911208d8a128ca6b60723bc98cecb9ef,2022-02-28T20:44:21.043000
CVE-2021-42080,0,0,0a612afaef583298b22c089dd012105946ce4b7b5fbb1d2326fc67d6a3ec1420,2024-09-13T18:15:31.627000
CVE-2021-42081,0,0,f8cc3f92ff5f3543484b03d48e43c053557cb0b2d30b29adf45e274048747c23,2023-07-17T18:30:01.307000
CVE-2021-42082,0,0,4dc8dbb1ed268662fdd44e78cbd0f101d858d22b600135c57208ffd91491262f,2023-07-14T14:37:03.653000
CVE-2021-42083,0,0,0a7005314b230851b71d5b4faa83822c49b1bf92ba1f754bfd5b9f3bf7769a6e,2024-01-02T19:15:09.030000
CVE-2021-42080,0,1,4863517402ea4ae064cce4d190ff794e05d23afdb6886abdf0409131fd7d14bc,2024-10-16T12:15:03.660000
CVE-2021-42081,0,1,07d978a5398e364de9533d1bd550c699f5e3c2588f10c43ef340b736650af00a,2024-10-16T12:15:03.917000
CVE-2021-42082,0,1,52126f925f12f5bfcadb761c382bbd8aecd38f5d9e3257960591d441d24ea02c,2024-10-16T12:15:04.060000
CVE-2021-42083,0,1,c10fde8c85fa8f4d2b4a18ad0ae53ddf337d4eb99e1f3433cd21ce5af76634f6,2024-10-16T12:15:04.310000
CVE-2021-42084,0,0,81065ef5f09344b2cb782a579e737f83a3f6ca39c592801b4564cfd3729a4041,2021-10-14T14:01:17.467000
CVE-2021-42085,0,0,3d24b94025f7037dea7492fe13c4b7c889f8e2725b5b1fc0aa9646e0f375be57,2021-10-13T20:30:38.137000
CVE-2021-42086,0,0,744eb91bf663a489a3723f87c99505cf072c48b027d221f331a36d29196226f2,2022-07-12T17:42:04.277000
@ -184964,7 +184965,7 @@ CVE-2021-44054,0,0,fe12d0efdb6d5105654667af112ba35a00eb28953fe49396933dea52f92c7
CVE-2021-44055,0,0,36d086a0d865afcf75dd26dbd53eb99e6ce2fcd35caf2d6d5d5a6057d9767e37,2022-05-13T20:13:04.620000
CVE-2021-44056,0,0,8addbbbea73af6ebf0ae24e7a335e8cadec71c4b3189f8b9ae7b3717ab944269,2022-05-13T20:14:39.333000
CVE-2021-44057,0,0,f32a37ffbfbd3bde7a0b4b4c685341477054534ab9bc6a7b81c6ca45796fd4a5,2022-05-13T20:10:09.653000
CVE-2021-4406,0,0,284da2be0ba4556b64a949485e10f3dd5a616193c48f66a6d0dd9b434e6588fa,2023-07-13T18:52:57.930000
CVE-2021-4406,0,1,a5158228cbadb9a55a3074ff27c8fb5c85e60eddbef1e7b5652296510306f983,2024-10-16T12:15:04.490000
CVE-2021-4407,0,0,8868f8e6298397f199da7799571646e132baa80008874a12ae7fe458e60186a9,2023-11-07T03:40:52.797000
CVE-2021-44076,0,0,9ebc136e380f43b1e756eaa21ff068495ea86d8e31a165ce24b3cace1556fef1,2022-09-17T03:45:01.677000
CVE-2021-44077,0,0,8337d84f511bb37dc2be298cdd0c1fb229c2333fc8ada2b995c6c4bdca398026,2023-08-08T14:21:49.707000
@ -193484,7 +193485,7 @@ CVE-2022-24383,0,0,e447d7d9205166fb86d5a5967e3f74514587059d80957cbbb2197f8733e6f
CVE-2022-24384,0,0,c8c54f246c395683b34fe69e0716c06cb09982df57d3b04973b292acd788f92d,2022-03-19T01:10:43.233000
CVE-2022-24385,0,0,ee57eb1c279ae326a5c0dac5cdc2e80222055e9a5199159daa29a76c075334d3,2022-03-19T01:10:50.360000
CVE-2022-24386,0,0,457222f095c62db0fb0ca8bf1941849311c926f62af825405c1c6aca5315e926,2024-09-13T18:12:44.327000
CVE-2022-24387,0,0,54dc02b7b2ac9a081a5973c3d20f765d63e8646b2df0467cc341110e81783a58,2022-03-19T01:11:04.923000
CVE-2022-24387,0,1,1d7e42229c2657f23c2a379fa4dda7f34697a22903ffcf500a57f48755ed44a0,2024-10-16T12:15:04.657000
CVE-2022-24388,0,0,0aa162374a72e7b272071bc85f23bb3ac62a1dbd8bcfa58503cbe59a9d783e6a,2022-05-26T01:49:38.753000
CVE-2022-24389,0,0,1bfcfb3a923a3c536cc281292090c1401824e60d2f38b82785afa6c7ed823d33,2022-05-26T01:59:03.417000
CVE-2022-2439,0,0,71c4c44c3559f8dfdec520c0c7b7ccf9de70a0b28373021d99fd5226fd703f97,2024-09-26T13:32:55.343000
@ -206925,7 +206926,7 @@ CVE-2022-41212,0,0,3aee6601ecb5b41394b21d287c82806881cbeec27c635ec77fc09f456f918
CVE-2022-41214,0,0,57a63dcb9dcef2d0f21c9b04f05402500987bd94c501c557a12d92cc1d0e9e1b,2023-11-07T03:52:44.250000
CVE-2022-41215,0,0,d6b56989d143f5b7ced880f0198bbb0aea11b6840881eb818f104364d0047d01,2023-11-07T03:52:44.333000
CVE-2022-41216,0,0,b51753b79cd3b73dda1fbafb0583b9dfb992bd7ffa5207deb922d4db751db73b,2024-09-13T18:08:43.850000
CVE-2022-41217,0,0,5c51a152d62386c9ce84f687c77e80c97106882f13cf41fa2d78c7cd09417371,2023-06-11T14:15:09.473000
CVE-2022-41217,0,1,ef03321142499fc7419a7ce5e88db20e188a7cffb612fb3a160d149af443bfe3,2024-10-16T12:15:04.860000
CVE-2022-41218,0,0,4d8d0f5612320f06b4d039e95a77096f203ac9352286eb59f9765d04c53bec07,2024-03-25T01:15:52.347000
CVE-2022-4122,0,0,f5151e95d79980c9d929f6448713384a73d5e1f0b0edb7410e38f0420d8822aa,2022-12-12T15:48:07.023000
CVE-2022-41220,0,0,da1cbb52d343b2134f8ea63cf473ac9cbe9d0168374bda3242bc76b5d9d8b0f8,2024-08-03T13:15:42.457000
@ -209774,7 +209775,7 @@ CVE-2022-45049,0,0,d98b08f41c9f4c9b8c17761481eb8da8fc31beca12133aa5d1d9a4f2dd4ed
CVE-2022-4505,0,0,80acf6850bff297cdcdcde9e235f2ea50363cd8a843569ae0e7b3ec505ac1090,2023-07-11T08:15:10.283000
CVE-2022-45050,0,0,6a37ecc7452e165ad3ae682d972aa78274210ba552c1115ed44bbaf958414280,2023-01-09T17:12:50.767000
CVE-2022-45051,0,0,4e552beb31f904d7ac3844f86db76bd9fc9a6e763f151f7268caf3ff4ad0b103,2023-01-11T03:05:10.367000
CVE-2022-45052,0,0,d26208f0c18bd2578007a9535cc218acd5de9b924ca157f88fbf78bb37035dfc,2024-01-02T19:15:10.030000
CVE-2022-45052,0,1,04d1575250c1293df846f72aca4704340bf01fa0cd6fedf46fa5b4ab63d794c9,2024-10-16T12:15:05.160000
CVE-2022-45059,0,0,d33334463a33c5bae7491e5f05f48cf2f1272b7d9eb0571e9d0b56906c97a288,2023-11-07T03:54:29.960000
CVE-2022-4506,0,0,6eaca7d450e1159b3b0c00e9dbba66557efed1f01003df22ac4e40cc1645e937,2023-11-07T03:58:01.067000
CVE-2022-45060,0,0,ab2b4e231abf462892ff46383a29d0f52cc1dcee9bf3ea910e5e072bd622082b,2023-11-07T03:54:30.160000
@ -211452,7 +211453,7 @@ CVE-2022-47443,0,0,f3515c60fd4f71ff9333641d9a1e0aa7946c04420fb0afbf849e665f04ab9
CVE-2022-47444,0,0,6624a8a1c3b9de9de1701d058fc5912d473ea3542c518e98f1d8de690761bc95,2023-11-07T03:56:15.930000
CVE-2022-47445,0,0,b11c350216f07ac5b657d219600f06905c0c0562ab8a865c5e75560f8682b702,2024-09-05T18:35:01.370000
CVE-2022-47446,0,0,83b1c896c5c167280e3a1efadbbd80b817554e557ce03717a283513f01e521e4,2023-05-30T17:47:25.017000
CVE-2022-47447,0,0,e190bcf416043cc6839d125742303a5093000d65eb02279f6356422a385db953,2023-05-30T17:46:04.750000
CVE-2022-47447,0,1,5955dfc6cec68f406ba7d4f7829f67750169ce9fd780a2a7f6716ae9f2453857,2024-10-16T13:47:56.247000
CVE-2022-47448,0,0,3fc801e4772dc4e483f5041fb67f263631a138235229f497dffcf10544b4f237,2023-05-30T17:45:12.073000
CVE-2022-47449,0,0,f6073a1b17ec4fa41311192d25996afaab7a92363c0277345010937216824fd0,2023-05-10T18:20:05.127000
CVE-2022-4745,0,0,167ce06261c5076745838b2dcaa3388a78ac0606306429453e09e207f90daf06,2023-11-07T03:58:46.707000
@ -216805,11 +216806,11 @@ CVE-2023-22579,0,0,b50f51817f5ab55f90ca17e0a70b50b2a7f894e20f1a8ab175a13831f05df
CVE-2023-2258,0,0,2111fd7aff14bd333121caf2dac078ba48b6ab8a9a535c7974b5ec7af774769a,2023-05-03T20:15:13.487000
CVE-2023-22580,0,0,48060b11ca3496a0342f2a08e850a8810444693991f5cd3ef61f9f628e8c7fc0,2023-04-28T18:52:21.847000
CVE-2023-22581,0,0,dbe8e80a125a9057948e68bca7230a78bb5a4b7e3bb2aab39d6610a03f0070c1,2023-05-02T19:16:34.527000
CVE-2023-22582,0,0,a95213131288786e7f638ed1f9f7c047dae79986d265ac26bef86b9bba3ee69d,2023-06-16T03:48:59.780000
CVE-2023-22583,0,0,17594c3beb44f98bcc8871f2d1d32db04375f161abc0dfd375ac5cadd3546fbc,2023-06-16T03:49:05.240000
CVE-2023-22584,0,0,3153a18e4215df1908c59b944fa4fe9a3a3ef8252e9b5106e456c9e2bc164f5c,2023-06-16T03:49:12.840000
CVE-2023-22585,0,0,97819e07630fc43fe1515be8affe0540bfcf0796f06220ea92ba4f7bb75c2386,2023-06-16T03:49:18.723000
CVE-2023-22586,0,0,e1fcf62afd5044838dd569d5d91dd2151c7ee8effd634d94992aad8792d618bf,2023-06-16T03:50:40.117000
CVE-2023-22582,0,1,cf329a854808f7208c5e3e3800300d304be782dbfdc793baec1ef6c1ace45547,2024-10-16T12:15:05.483000
CVE-2023-22583,0,1,33fbce81cdccd7f3d37293ade3ec80a9908f552445fb87dad119e1b409b5853d,2024-10-16T12:15:05.707000
CVE-2023-22584,0,1,af8ca952c62b02738757a7b333bfdb6278825d2bc6dec13179658ac78b50607b,2024-10-16T12:15:05.867000
CVE-2023-22585,0,1,c2d5ebfe96532d7494693ccb578baf870c54dbf9ca7a116da9e3505e44e696c6,2024-10-16T12:15:06.003000
CVE-2023-22586,0,1,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a10e1,2024-10-16T12:15:06.140000
CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000
CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000
CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000
@ -218459,7 +218460,7 @@ CVE-2023-24690,0,0,e2547dd910c57f1b22f5098edefee1c2fd4450e661ce4f71183eb31abaa7c
CVE-2023-24698,0,0,9eabc9392f3eb51c31329d1b42a8ce11e17f2220f701712f00f2cc7c3d488a87,2023-08-15T13:35:18.067000
CVE-2023-2470,0,0,08c45f40e998215eae3bede674c7687151b938a249e0bdedf2c49640d6c5a3b4,2023-11-07T04:12:43.057000
CVE-2023-24709,0,0,a44d1abf1b51b002a1a36940e85deb0e91478cee4831ca0b9a57e1912bd50ac6,2023-04-10T20:15:09.513000
CVE-2023-2472,0,0,39c793663948349c1e943a765ed6afbfc581f40c730c1cb740dbe7a606a4511b,2023-11-07T04:12:43.213000
CVE-2023-2472,0,1,65a10d9848ce0509536c037a8c964c58f82bfa3f18b74e8ffa29952f6a82f291,2024-10-16T13:26:19.017000
CVE-2023-24720,0,0,9226b5d1018d73f45aaefd8e3101bed72bd92e6f193e3914e55aed5ec06c5596,2023-04-12T17:11:20.667000
CVE-2023-24721,0,0,36c5b231ac40fad13b4992be5e40fb14a845817c3b03d5d72925828da8d5cfee,2023-04-14T18:51:08.097000
CVE-2023-24724,0,0,4a23d9573bb538b640e11ef479329a77c129b98d6eed84ab97293bd70ace2028,2023-11-07T04:08:39.583000
@ -219469,11 +219470,11 @@ CVE-2023-25908,0,0,711438efc879e2da908e2fe34d4665fa30cbe36911b66474d51f45124f9d1
CVE-2023-25909,0,0,3a86e8d0a5a9c75a3b1ba6c2bad2da112b86b40373c068ef888ca6a2ada20e0e,2023-03-31T14:22:26.143000
CVE-2023-2591,0,0,96d5b6c54d43252f274ceb94cd62959a81cbf5756e69f0c5bf41509a0370f395,2023-05-15T06:15:09.727000
CVE-2023-25910,0,0,8820f037eb373093f9e7e9604082c261621d3d440b751f2aaafe310d86c53bc4,2024-05-14T16:15:28.993000
CVE-2023-25911,0,0,bb253e3d93c23950b5a387d554e5841508a5fabb7ca4dcfd880ddd0641046692,2023-06-16T03:50:50.247000
CVE-2023-25912,0,0,54c0f8f142adf0992a2dd3b98cd004bef5d62ef04b7be7ea1a55bb8bb182ceaa,2023-06-16T03:50:57.457000
CVE-2023-25913,0,0,bd3236e5c5fbfaffd7cb643349e8edfed18b048f405402ad058b581786840f37,2023-08-24T21:39:11.560000
CVE-2023-25914,0,0,03557213b083ed4bba2b2e91db2d570930173dd3fbb5957e4a25a1a0e3fc1c0f,2023-08-24T21:38:58.693000
CVE-2023-25915,0,0,070cd155dd068b511c1052b0453209c9ac81e57c4910bc16f3ee3002b77d7e44,2023-08-24T21:37:26.140000
CVE-2023-25911,0,1,4d70a282bfba98a9074899c40fb1bb9eea1ffda5de7053461b3d608a074e9fa5,2024-10-16T12:15:06.397000
CVE-2023-25912,0,1,509f2d60312d748e00f47e4b6a3907b60209f5abee1c17e89e6f2341c971ad34,2024-10-16T12:15:06.553000
CVE-2023-25913,0,1,d3b01a7e6e3bdc4679b239e3fd5c80b1402416d5dea2cc053bcdfeacc7b49bd1,2024-10-16T12:15:06.790000
CVE-2023-25914,0,1,94e4d6f64339663bdaaf0e7f6ede3aec39430ba15fb568ca5059bc3d81a48ec2,2024-10-16T12:15:07.050000
CVE-2023-25915,0,1,2e07e82a0215a37be87d12b1ad1b5f202cb89d3b909001b573d9eec559937ea5,2024-10-16T12:15:07.283000
CVE-2023-2592,0,0,7e4a496757ad28922cc131b3dc6c5dcce821dacaa7d1248a91b5f3a5abc13651,2023-11-07T04:12:55.187000
CVE-2023-25921,0,0,db434be2822e9f805fcd7099a71822c578de64397a6bb25c1f1ea2030a0f42fd,2024-02-29T13:49:47.277000
CVE-2023-25922,0,0,8bbaac4e7be5e855017ab720e3a49ba12435c5575eb4c40dc6dd2b4acb226464,2024-02-29T13:49:47.277000
@ -224290,6 +224291,12 @@ CVE-2023-32186,0,0,e06556634f58d819dfae5b78cb8714f5c9bc5370508503590046fde23b888
CVE-2023-32187,0,0,604bbf8f396584f0efa1594da6fe3c409bf951238cacbb8e57499c590e5e3fd1,2023-09-21T15:21:31.567000
CVE-2023-32188,0,0,414806e16a24df1ecbb6aadbe57c9884e174210dd398c42b014e332ad5c10d7d,2024-10-16T09:15:03.260000
CVE-2023-3219,0,0,6eb56310ef4fd619262ae96943204b765f45a221a776e69bfc250b710761d69b,2023-11-07T04:18:14.830000
CVE-2023-32190,1,1,506aec27991d4772be88a76d50cd44b48e86907fc0c8f0f8223fc2c6448d0dab,2024-10-16T12:15:07.460000
CVE-2023-32191,1,1,5ba893f4fdb69c66bdfcbd5d71c019fcc35759e17b71a85ff4fbee016b65eb28,2024-10-16T13:15:12.067000
CVE-2023-32192,1,1,cdd03a4f1481533d366cc92c2198ee88b86f88e5c8761f91fffc421021d38743,2024-10-16T13:15:12.297000
CVE-2023-32193,1,1,515b91e441a27f79b30ea6e869fedba70054dfa58fe7b65ae5cd73cd9ba5c477,2024-10-16T13:15:12.540000
CVE-2023-32194,1,1,9f00faaba13c9dba9727f29211f38af09e2a6ccc23288040dea8a061e4cf893e,2024-10-16T13:15:12.787000
CVE-2023-32196,1,1,3dd5c164e1456347ab06fbe343f8075b758091f15ef870871cf4cc45c4173712,2024-10-16T13:15:13.060000
CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f910122,2023-06-27T12:44:47.967000
CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000
CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000
@ -238982,7 +238989,7 @@ CVE-2023-52427,0,0,0a54450b6cf413ae3e0cd14ca73a4997d322ba669f6ff28b106bdd9dadc65
CVE-2023-52428,0,0,780a20df5925e099c50682efa6b9b5b9a7581e992635addf027a9478a9c99948,2024-02-11T22:29:15.837000
CVE-2023-52429,0,0,bb71f6867b546918a32b40939aad4a54664a6e064966565e92e979c5b5823dd4,2024-06-27T12:15:13.797000
CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700c3,2023-11-08T18:40:41.847000
CVE-2023-52430,0,0,b4d094e234634baccb6573b9549623bf267a56f0333e94c03e9a66a8c1ebd247,2024-02-13T14:01:49.147000
CVE-2023-52430,0,1,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000
CVE-2023-52431,0,0,199f10747613e848b4be76ff988b9f76b50282c6e59f2e5da91f811ef18a5901,2024-08-01T18:35:05.050000
CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000
CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000
@ -241283,7 +241290,7 @@ CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d078
CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000
CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000
CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000
CVE-2023-7260,0,0,35ca28d322ddb3cec2b6f685cf55f84e63f8dd8597ea20f0a701ece3d6e0c72d,2024-08-23T16:18:28.547000
CVE-2023-7260,0,1,320b55d1f034809d79e51e192994ba6b2fe9aaa6c60b445d7c661747328ccbb2,2024-10-16T12:53:08.807000
CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000
CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000
CVE-2023-7265,0,0,fb43e2fc7ead32f16ab1a40e592be4835649042e83490e66c86a7fe9f44ca4b0,2024-09-06T16:38:04.533000
@ -242204,6 +242211,10 @@ CVE-2024-10004,0,0,231cc5ca14331ea97625043de7a57398d2b1f74e8058a5b71a2840a63876a
CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000
CVE-2024-10018,0,0,48094474c9a835a3211b517c0339040bcffcf76ffcf2e981b9d66c0ec82efb42,2024-10-16T03:15:02.620000
CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000
CVE-2024-10021,1,1,07e6b52c1364dda8ad8ea27c95a3dabc68a676e7ccf5b45ebdbee80a281368c4,2024-10-16T12:15:07.663000
CVE-2024-10022,1,1,8fa31ce99ccec4e2e52ee9bec89d95d4d376e26078adaac9508062c560c7628d,2024-10-16T12:15:08.163000
CVE-2024-10023,1,1,ccbf4801c6b8aa5cf2b2aedcb35d6690eb8e2dd2a5d829b16e4da410a1eee636,2024-10-16T13:15:13.350000
CVE-2024-10024,1,1,ce51adeabcce6f84d32448bdacfff70e14a2ad81fddb95d38b3025cbc2a17cbd,2024-10-16T13:15:13.650000
CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000
CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000
CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000
@ -242636,7 +242647,7 @@ CVE-2024-1450,0,0,5c78ee7ecaa738b41245290c13db435007588e4f06193084183217b1157cb9
CVE-2024-1451,0,0,06be5f5604355f77fabf82dd57df1f8809446c587ecb10ad9e69cebf8ec03e7a,2024-03-04T20:12:59.223000
CVE-2024-1452,0,0,e53b6badbfb961b470f92bd813c19b81fa9530e5a4fab209b8360590eeab9b44,2024-03-13T18:15:58.530000
CVE-2024-1453,0,0,4c7fdd77bf9774c0b4902debd5fbb9a5a455811c9e20dd37093901421ad05d83,2024-03-01T22:22:25.913000
CVE-2024-1454,0,0,9c1d9da7cb6e13542db5ad8fde7cf11a522dc964e325e6c58d4572b66e6a68c8,2024-03-23T03:15:10.633000
CVE-2024-1454,0,1,18d85e22fa9ffdfecab668843fd14652fcb1ac45d6f86513cdcc76aa1478a0be,2024-10-16T13:57:49.460000
CVE-2024-1455,0,0,150cf04553026c6d927055f564987fc57df0c743f9421c15918b44f92d1a260f,2024-04-16T12:15:09.230000
CVE-2024-1456,0,0,5b0bf210be135d03b9e0f0aa4d44e1d74b665ecf3cd8074dce271769fca228b4,2024-04-16T13:24:07.103000
CVE-2024-1458,0,0,3592b3461bffe67c8c4bc63c3d6ff327fca1737b7c0b5caa3c39b57cb625a124,2024-04-10T13:24:00.070000
@ -244346,7 +244357,7 @@ CVE-2024-21488,0,0,83c39f70c0498b72911f550d6611f69059c8c9cdf3b0f0904578cd793bad0
CVE-2024-21489,0,0,6e86fec7408d381a4d3031befda9d6c352fa47e8cee94c50201daa0dfff4032f,2024-10-04T13:51:25.567000
CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000
CVE-2024-21490,0,0,8fef65cf0f770a0e61ceff38aa6805ccb146d3ccd992f46918345da0115fd835,2024-10-10T13:51:02.213000
CVE-2024-21491,0,0,63964727e1fdc972a64d38287aa6ef5a878b19c8b9971dfbb9cf22b94a0f689c,2024-03-06T14:15:48.020000
CVE-2024-21491,0,1,8b3f805634bd0202a6da1c84d9cc592601351153f9b1f8af4e7e32c9715d19c2,2024-10-16T13:25:47.870000
CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3fc49,2024-02-20T19:50:53.960000
CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000
CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000
@ -244640,7 +244651,7 @@ CVE-2024-2187,0,0,a8936a0952b83c5ba88ca6cea81f9850e57edc6e1289ba1fdb9217f4cb3f21
CVE-2024-21870,0,0,261e723ef3190c288a9a8c3f8500f3cefd68fef15433091d79f48a8358a48f68,2024-04-03T17:24:18.150000
CVE-2024-21871,0,0,9e312d84dd9b4a7b8467743245c308406e6b8b9b76e882b65ddead6c290aed9e,2024-09-16T18:03:16.707000
CVE-2024-21872,0,0,53e0faa097226f02f7b28a1019bf889e7e0fb2883871bfc21fe50f5bf87c752b,2024-05-28T17:15:09.413000
CVE-2024-21875,0,0,c15eeb9fc23fb1b7054be1e69f99412e4f77868f1517c1932f7423f5619332ef,2024-09-05T13:50:08.927000
CVE-2024-21875,0,1,d94092dada175a6c14145cd6d661efc5ba9ae7bfe0356d1291e89ee2b35fd0c0,2024-10-16T12:15:08.483000
CVE-2024-21876,0,0,c3710b348c31e352259903f2c418ef0aba69493db54d12f1534898cd1d5b4667,2024-08-23T18:05:55.543000
CVE-2024-21877,0,0,e2e73302f5bf8afaaaffb2f0db0c2d16b586fe615b2b0992bf2ac9b6679823c9,2024-08-23T18:06:45.520000
CVE-2024-21878,0,0,789e3fe91c4f9f15772842a823deae244077b3af25e7833e3c5892430f68e0d6,2024-08-23T17:52:11.777000
@ -249692,7 +249703,7 @@ CVE-2024-28982,0,0,a19015356d660d2e2e0aa0476b84c95e664ecbb510badb624ee4eb55091f6
CVE-2024-28983,0,0,703d0fea3e992e6c157faf14895b95484e69f73d18d43a1bdd6448ade19b1d58,2024-09-18T14:36:16.267000
CVE-2024-28984,0,0,061a156a04ab4e4c76d21331d25299f4cff837eab5762774bbd4e38e96a6350a,2024-09-18T15:22:51.163000
CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000
CVE-2024-28987,0,0,fd9407806be9984d6335ac9abd6eecc748e3ca1a4b5d0c8ad5582f580a3cab1e,2024-10-16T01:00:01.723000
CVE-2024-28987,0,1,134caea59d5c8acf403cbb3a7d3c67116746c4784635b286d9fa1320e0c17afe,2024-10-16T13:05:08.363000
CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000
CVE-2024-28990,0,0,c552d85779f742e9eee5a53e7cb3b834247c40cd3dea313e4f856bb71772b3d4,2024-09-16T18:05:28.957000
CVE-2024-28991,0,0,f3a76278588de09c2001ab77f03da4ee20a5494ef74524c789ac890512227cb2,2024-09-16T18:06:20.037000
@ -252759,7 +252770,7 @@ CVE-2024-33181,0,0,050373cfb1c1e53ba8267dbc3fabd7fa63ef5d1b950dbe9c6f1ffa2007dbe
CVE-2024-33182,0,0,85cf52b790aabe853226358e7739617cb8f2d818ce16c35309a03355724b6ba5,2024-08-01T13:51:45.673000
CVE-2024-3319,0,0,158d523f4b4278449eb505d443711326036725edee1f3bf66f060fea5f4e72ad,2024-05-15T16:40:19.330000
CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000
CVE-2024-33209,0,0,ac059f47fe6be1bb58ede6494b10e4f909701600addafff9d3b36e213f3ebc5d,2024-10-04T13:50:43.727000
CVE-2024-33209,0,1,23a878e2073f134744034d1a78662ef24aa281701d58b60b1da6b83829cc478b,2024-10-16T13:33:21.313000
CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000
CVE-2024-33210,0,0,a4330105a4d6b07d9316e6cba604bab6a3559db00469caeaea106e3e51ae6801,2024-10-04T13:50:43.727000
CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000
@ -254397,7 +254408,7 @@ CVE-2024-35664,0,0,d79002de8da9e4d3f22c86ffd8612cf721c3746877f9a04d00f31875fb615
CVE-2024-35665,0,0,3ec6c16cd5ce59c400ebb223fa0493349556b644d7485525d7dad77d94866b13,2024-06-13T18:36:45.417000
CVE-2024-35666,0,0,7d30ae20e2b20547d79bad15b0051704877dbfaf3d285a1eae11b5b5283cb8bd,2024-06-05T19:56:00.610000
CVE-2024-35667,0,0,c32fdbccccc90d44083bd3cba19fae84edd3cb0342751cb4029eff2079dc1b43,2024-06-13T18:36:45.417000
CVE-2024-35668,0,0,de18d8120b6f95c99a8f2f97c12feacf43a4f3fb09be59bc33140eb046e17239,2024-06-05T19:55:05.997000
CVE-2024-35668,0,1,49b71c5733405679aa5a6cffbeb4b1f5d70ff1fc7782fb400e93b7a73851724d,2024-10-16T13:26:19.017000
CVE-2024-35669,0,0,20efb437d66c1878fd59888d419c698eccea67ad6491e02d87d867ff4b2f6a6c,2024-06-10T02:52:08.267000
CVE-2024-3567,0,0,46438f6ba8ccb224e08abd25ef147809187d2726401fa8ce52eb0ec2d0d324c4,2024-06-10T18:39:52.067000
CVE-2024-35670,0,0,51723aef74fe3b42251da8d8a3c5d9d4b5ca7558b70cc7d63f887d024b81fa64,2024-08-01T13:52:44.810000
@ -256082,7 +256093,7 @@ CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e7520035
CVE-2024-37980,0,0,70458b75bacf19393793b89d35eb3b322f8d4d2f01c38ded10361b8e8312542e,2024-09-10T17:43:14.410000
CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000
CVE-2024-37982,0,0,1292ccc2fe03c8adf5b700bc537860b6176a2bf8245a83e69cdc6e18846029b1,2024-10-10T12:56:30.817000
CVE-2024-37983,0,0,374c0a73ae0ebf72dddb80fd2ddbe206d85b4e03b510e4e97d6c59e2a0a9a119,2024-10-10T12:56:30.817000
CVE-2024-37983,0,1,39a105b60c6e6ee1852628d9ff36501e8387b025b8bf6c3d832b1bcddc72f4a4,2024-10-16T13:15:20.690000
CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000
CVE-2024-37985,0,0,8e75e8ded91c606cf6f8a7951d4db59fbd2c888177e5eb0c4c7845eff08923bb,2024-09-29T00:26:19.423000
CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000
@ -257072,7 +257083,7 @@ CVE-2024-39375,0,0,31332bf05b45d0877e0bebd823a0b8990f670564be1a4f26de0abecda30c1
CVE-2024-39376,0,0,094b2854b24d67516e532564da0172680d99cf6023e4bba311dd29dab7b73993,2024-09-17T18:32:09.573000
CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000
CVE-2024-39378,0,0,78d548832ec8eaca862f31d0849369d8a35a80bd3fe2e2677ab3e2744e35edc4,2024-09-18T19:16:39.390000
CVE-2024-39379,0,0,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000
CVE-2024-39379,0,1,937655b9f60345c2c3d4d209288aec8a6083432905819ab0ea023d403f9d9ae5,2024-10-16T13:38:32.573000
CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000
CVE-2024-39380,0,0,1910572fe42c7147873be8861011fe1658b3f4e08e9e17ecea7358ec80d109ff,2024-09-13T16:55:04.930000
CVE-2024-39381,0,0,c446a0a3cf348c0d4a05fe80309ddc5c180ba4a1c6f9ab0dd7c079d8ea253d78,2024-09-13T16:54:39.217000
@ -257102,14 +257113,14 @@ CVE-2024-39402,0,0,8f9792ca39ac0f5735d2d339471513a0d0066ed8186936bed3b6cb6fc80ab
CVE-2024-39403,0,0,07e4d8e2e8e77f045e47a14368527780bd5cf232eacf57cf163f25b08d6cbab6,2024-08-14T14:45:31.187000
CVE-2024-39404,0,0,0a57924699a1991f76f1f50910f14cbebc966dfeaddc9ac00c410fa553a973bd,2024-08-14T14:44:35.470000
CVE-2024-39405,0,0,eca7af29b059ce089e741bc6a4c7a853c086cfad9296c28a6d43dd725f7e44bb,2024-08-14T14:44:17.217000
CVE-2024-39406,0,0,25d04b0f853cf383417a927f1df57bb53469f9bc9deb7d3dea31cd7c4b9bef49,2024-09-16T12:15:03.080000
CVE-2024-39406,0,1,633fb315ca3cf7fbc901ff87493b47ea3021d4451c297abe74f6c359c41d4eb9,2024-10-16T13:37:57.910000
CVE-2024-39407,0,0,a04cbb78d44437ccd0b191c3d3b80ebe08944fb4ba6ecee4b56aa111da23fcee,2024-08-14T14:42:50.467000
CVE-2024-39408,0,0,78ac02ebc7a31d73c30bb0b0fdb3565c4c03fb335f3337c1996a68797a39d9bb,2024-09-16T13:15:09.133000
CVE-2024-39409,0,0,c94c20a181dda97d1ec8c605dd5d9d484beb306fe41b366d7c33da38095ea491,2024-09-16T13:15:09.387000
CVE-2024-39408,0,1,a04b9d9586a65e8b3b2b8a3436bb7e17aeddb9297a359461cdebadedd6869697,2024-10-16T13:36:13.497000
CVE-2024-39409,0,1,1d728e7ba1e6d584c5973295f3b86c5bdaca656c272947c18b496fe522679835,2024-10-16T13:35:32.290000
CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000
CVE-2024-39410,0,0,80d8ff5a50f6536ea45b9c6d8909a33772be394437655373822bc6801ca5774a,2024-09-16T13:15:09.557000
CVE-2024-39410,0,1,d4fb76feb6d703aec325d1b8952b775465a1af0a318e675a0d1406b74d55e4e1,2024-10-16T13:34:52.220000
CVE-2024-39411,0,0,1272b538409151f4f62bcba24a09806ce4b7e124f6e1ad5512b378725548cd2c,2024-08-14T14:40:55.510000
CVE-2024-39412,0,0,2d8f844692ee592a9c89a505d8cfc64b3d2eefd95e162394536ffc1d73e487cd,2024-09-16T13:15:09.840000
CVE-2024-39412,0,1,9c186aff7828cbce6c1530dfb5120772fbf9df3f5623d38a01aaf9818deea799,2024-10-16T13:33:27.910000
CVE-2024-39413,0,0,4a894151c2ac93955d773bf053f53d0a6272124b1d199025eed7c821185013ca,2024-08-14T14:39:39.737000
CVE-2024-39414,0,0,a4bb8c6b936f8f3de2a8e0d95754370d5eb00e62f1de95bf54a93c835f112913,2024-08-14T14:39:26.427000
CVE-2024-39415,0,0,894bb113716af642843f4f18ce95fb8548231a5b76d859c1eef366fbd2f5e3ce,2024-08-14T14:34:26.620000
@ -258556,7 +258567,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6
CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000
CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000
CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000
CVE-2024-41867,0,0,0b44a5cfeee3dcc50283505e9313394317205be34bd484508e6768cab06aa764,2024-09-16T13:15:10.550000
CVE-2024-41867,0,1,fd5c870db572cf0990aeab1137beb7b2d076ec970020111ee85606a94793d440,2024-10-16T13:31:42.040000
CVE-2024-41868,0,0,474264e4381c67d192296dcca9e302a0bd9824b3109f4a89fdd2c65ae7fab6b0,2024-09-18T19:13:45.177000
CVE-2024-41869,0,0,b360088796a0288f30adc9e94f2784d3ed96eb99fe66d3cd813b58581cd0f09f,2024-09-19T15:09:52.967000
CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000
@ -258665,7 +258676,7 @@ CVE-2024-42017,0,0,7f9a4913b1239026519e3fb7d6fc6d114e8e4e346f101e97cc1469132655d
CVE-2024-42018,0,0,48c29334c5da2098d436407e3b178f068ba556edf0bd6315b98cc5d6fe724ba8,2024-10-15T12:58:51.050000
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
CVE-2024-42020,0,0,256c5ebd865730f43a9d1e31df527e38a101d62b918b1916a8bc092516adbeb9,2024-09-09T13:03:38.303000
CVE-2024-42020,0,1,d569e3e7cf117be8e1c9449013dcb5505f3719093aed1760ccc7c7a75a0722b3,2024-10-16T13:15:54.167000
CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000
CVE-2024-42022,0,0,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000
CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000
@ -260552,7 +260563,7 @@ CVE-2024-45143,0,0,c9b9a124829e0d2a7d474321709c5bbc931c06bd5326351ea6fa85f162edd
CVE-2024-45144,0,0,64621bb6d61564f88f9feaa7e344b2f13a0396399af28a792d7d3f4e26dc3d76,2024-10-10T12:51:56.987000
CVE-2024-45145,0,0,c1818470b42fece224cd41c8bc05042642e8ea9d58b46cefbfb3b1af17d7185b,2024-10-10T12:51:56.987000
CVE-2024-45146,0,0,17ec48bf33b117e07b098d9477fe575ec7fef6e8962360588be61205dc1d5909,2024-10-10T12:51:56.987000
CVE-2024-45148,0,0,9cb33460bbb35056f58ae317dd69784c25057b5c95ac53296d7214a24f478bc5,2024-10-11T22:12:23.237000
CVE-2024-45148,0,1,0e90a71edeeb1f6c08cc4e8f74179b58bc7185e9e9129d62d43635e1d8f74649,2024-10-16T13:27:46.397000
CVE-2024-45149,0,0,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4727,2024-10-11T22:12:25.263000
CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000
CVE-2024-45150,0,0,dbe919e5c667b9926e7c591cb1e366017443e889755041e9c87b727b9667b713,2024-10-10T12:51:56.987000
@ -261479,12 +261490,12 @@ CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb
CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000
CVE-2024-47001,0,0,2bb4bf673c202add583b3cb6aa8d87ad17a722980665125974c3d12c60f8fe21,2024-09-20T12:30:51.220000
CVE-2024-47003,0,0,c6454df65c14575f310d6ef1594423fd9063d7eb945a40e78647d22752216edb,2024-09-26T18:42:29.383000
CVE-2024-47007,0,0,cba47909844ff89b52b01f81272aa442efa9cc08afffba46ab835ac00f34c395,2024-10-10T12:56:30.817000
CVE-2024-47008,0,0,c7534a20215bd95be86d32b3decf7881bdda0e595865d4dc9e1ba9e11cb17454,2024-10-10T12:56:30.817000
CVE-2024-47009,0,0,93c4d7fb83910ede64f8945a04f24d6d6aa42133537ea8449962473352058ce8,2024-10-10T12:56:30.817000
CVE-2024-47007,0,1,3966cfd0855356af21029f9e88ce4245313f12b1445c555ff24527e36ea648db,2024-10-16T13:23:03.467000
CVE-2024-47008,0,1,ac9fc7439ea4c872f1a11d08feaa8243839dfaa7a5b88077656ebe89fc3922b6,2024-10-16T13:24:32.130000
CVE-2024-47009,0,1,264b3f36a46fb3043a7ff13a0518523aa897b1a061a2770490e43d56fad1b234,2024-10-16T13:26:39.990000
CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000
CVE-2024-47010,0,0,c332d13d6bc4c9de707b0b305984e8b800597de3eb03c505d94cd9509d8d2bf8,2024-10-10T12:56:30.817000
CVE-2024-47011,0,0,63c77aaaecb38ba40258fc3df08e68da3c72085ea6c4b317b044afd49303d749,2024-10-10T12:56:30.817000
CVE-2024-47010,0,1,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000
CVE-2024-47011,0,1,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000
CVE-2024-4702,0,0,bbb2ec3c513c4ef6cbdc2bf640b4bb7115c796c33db7b092e6fb7d12cf64fdd5,2024-05-15T16:40:19.330000
CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000
CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
@ -261543,7 +261554,7 @@ CVE-2024-47128,0,0,34ea8927e934499e78ad6fe6ea64ad0e07c8dfb2bcd2b9a4925f5334d6b08
CVE-2024-47129,0,0,b38b36d9af9ba9097d5f30d3ac794a3599474bb5946ca986d25e9630ca9b227c,2024-10-07T17:54:22.923000
CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000
CVE-2024-47130,0,0,e7f6fb202a607836b8263c1620a1a5e98a9ca050003113851c771acca23538dd,2024-10-07T17:57:43.347000
CVE-2024-47134,0,0,2dc8636e0ee5fd2f97b814bd39f5b4217906ea0a61e539db830c2896b6e052cf,2024-10-04T13:50:43.727000
CVE-2024-47134,0,1,c469be51a68158c099c563ecb132d768058c9b0b7de566d173182963980dd322,2024-10-16T13:50:32.607000
CVE-2024-47135,0,0,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000
CVE-2024-47136,0,0,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000
CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000
@ -261969,6 +261980,7 @@ CVE-2024-48033,0,0,8f5c8e0edb7dcfae09a626cf6444750e299103bc74d1c2eb25573eea6cdde
CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000
CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000
CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000
CVE-2024-48042,1,1,7631d4882f2a15f05db90f4f1e3762fc928e54ffca192197efe4aed22818ae38,2024-10-16T13:15:13.973000
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
@ -261998,7 +262010,7 @@ CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf2
CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000
CVE-2024-48251,0,0,4d098db24396007455b29406aa1659eb8d5f46a48fef3576943743462426dc0d,2024-10-15T12:57:46.880000
CVE-2024-48253,0,0,3bf19f22b051acf529017405a1e456dc3273dcf3e1fd7bc187ab36f4f4639f3f,2024-10-15T19:35:37.163000
CVE-2024-48255,0,0,313b410d31dd8621f0d7faab3c11bc5341a96c35dca7329f3a83e566161ad534,2024-10-15T12:57:46.880000
CVE-2024-48255,0,1,a826b5671f1255534307018f49f7a25dfbafe07430ab4d6dce4993224e178988,2024-10-16T13:35:03.290000
CVE-2024-48257,0,0,9f5631e693f5ccf56007259ca7fa4278ab31fa9e4d26cb7e4af7e2a3dfb55f8a,2024-10-15T20:35:12.940000
CVE-2024-48259,0,0,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000
CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000
@ -262152,9 +262164,12 @@ CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81
CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000
CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000
CVE-2024-4924,0,0,1be75affb45c8b20da2e31570d5662533bb5af7060cf2ef9bdabbaa6aefcbc3f,2024-06-13T18:36:09.013000
CVE-2024-49247,1,1,7deb0181f0560e4a78510bb6fdf111e26ea3cdbbb03543e49e7c431a14dd2be2,2024-10-16T13:15:14.277000
CVE-2024-4925,0,0,e685289dc2254f889ad5a234b3fb30d6e7f6b2466e13190ceb3e2217a8a2793e,2024-06-04T19:20:53.933000
CVE-2024-49257,1,1,7b8ce644c27d0aa540babed15d46feb5e84c9bfe46d4fe270cdbcf62ec75d4ee,2024-10-16T13:15:14.517000
CVE-2024-4926,0,0,0d237df43556e4b080e4a7390a685a0eb6e73f0f5564912a819a125e3b5027a7,2024-06-04T19:20:54.033000
CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b3606,2024-06-12T12:15:09.767000
CVE-2024-49271,1,1,f2f25c2ecdf36f518f5d394e68c36bc15d53d88c94e48d11eb239381f7117971,2024-10-16T13:15:14.787000
CVE-2024-4928,0,0,e26d33912989577395dd3f5446c3b9e0710db7f1a80702fd147e50c8947c1051,2024-06-04T19:20:54.230000
CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000
CVE-2024-4930,0,0,af679b04f9fd8769c21afbd06a19763f2fe78e9326434dadfeea44855b5d14c8,2024-06-04T19:20:54.437000
@ -262164,11 +262179,11 @@ CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d
CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000
CVE-2024-49340,0,0,bbc93ab9c45be01079f3c1d658cdfc2a6eecf00268e25c02a38c47ed2703edf5,2024-10-16T00:15:03.100000
CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000
CVE-2024-49382,0,0,d6d3194a27b37c7540514c4731f1be0a1c4e00dff5b6d95578bca9d91ca2adeb,2024-10-15T12:57:46.880000
CVE-2024-49383,0,0,9a79c1b14e996faf6e99c8814b1479907260de1955f2d41c586fc188ea94710f,2024-10-15T12:57:46.880000
CVE-2024-49384,0,0,4f909b9909488641b14ba38aff1dfbd6065c34f23247c00f8c1f18bb284334ce,2024-10-15T12:57:46.880000
CVE-2024-49387,0,0,b58241a7bb7721b4c23910b730295514abba830656a2629f22dda0812caa40ad,2024-10-15T12:57:46.880000
CVE-2024-49388,0,0,dc8dff73536c142e42fd08217246ea13bb1218d9c1300e136efa90f7b42bc08d,2024-10-15T12:57:46.880000
CVE-2024-49382,0,1,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000
CVE-2024-49383,0,1,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000
CVE-2024-49384,0,1,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000
CVE-2024-49387,0,1,e70e4e295fee330a123c323f35cb15d527d316ee3f5221af871424ea3c5d431e,2024-10-16T13:58:39.297000
CVE-2024-49388,0,1,5d13081edde105848217330e8cc20460dfb42c426e8875787362e8bb17013386,2024-10-16T13:57:58.383000
CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150c3,2024-06-11T17:08:33.350000
CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000
CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000
@ -263431,6 +263446,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985
CVE-2024-6377,0,0,a4383a12ef7c4e9b6235d084a289049b62e13ce9034f0b68805986655c50a719,2024-08-27T08:15:05.537000
CVE-2024-6378,0,0,7454eef210b98e6b1e597d6be8302018d48792f1f9421573a9f7b1dc13ff197f,2024-08-21T15:53:57.750000
CVE-2024-6379,0,0,a28eade3b1a09164fa7466fcbbaf023824917e2e858c95c995a8e2d79a83a15f,2024-08-27T09:15:03.780000
CVE-2024-6380,1,1,c94834fad8f3c8d49813e9cf97c951a3a6daf5255d367dde62bfaa4fa1e7cc24,2024-10-16T12:15:08.767000
CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000
CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000
CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000
@ -264744,6 +264760,7 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad
CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000
CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000
CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000
CVE-2024-8040,1,1,437a7aef402dde5441276acff2853f73da12ef4afd878651b64021ec437a64c3,2024-10-16T12:15:09.013000
CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000
CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000
CVE-2024-8043,0,0,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000
@ -265151,7 +265168,7 @@ CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec066
CVE-2024-8626,0,0,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000
CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000
CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000
CVE-2024-8630,0,0,fa2e1d0ffca4b3a6674a3552869b604a1a3b291cd638b0dbeae393e9111a5cfd,2024-09-30T12:45:57.823000
CVE-2024-8630,0,1,c5e92ea3475e7fdf4ce18793c10b7cc1fb102a32792867098f992a914ab99d4c,2024-10-16T13:15:59.997000
CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000
CVE-2024-8632,0,0,e0cada97c6995cbb67fe42f80a349e37abe4361f782a8365fc38e88552a5da8f,2024-10-04T13:51:25.567000
CVE-2024-8633,0,0,11f9c1ab75a0acad9e38c7131ee0e717752f233463501613a3dd97a61fe47734,2024-10-01T14:17:43.700000
@ -265319,7 +265336,7 @@ CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da
CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000
CVE-2024-8918,0,0,084bd8c5ed92875e6f88d442f38453599e3b598184441c66b1a4885b965a4813,2024-10-16T07:15:16.777000
CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000
CVE-2024-8921,1,1,c76f9d87c5b4c284dcc906e3c2d531ea600ce7a78e6f16b796e6dc85bfd53fa7,2024-10-16T11:15:13.080000
CVE-2024-8921,0,1,fb0eb850a34a1b05c910c2ff54b31084b7d71490e226dede8661082f694dea3c,2024-10-16T11:15:13.080000
CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000
CVE-2024-8925,0,0,573fa9fc5dcadaf344ac622d80d126966b00ab4fb4c5a5f790f844b7bfe8b0ca,2024-10-10T12:57:21.987000
CVE-2024-8926,0,0,d0e916c7cd86cec53049a41ddbf4dec10c1366cdaa0ebe3384f1e3c4ead8cd0d,2024-10-10T12:57:21.987000
@ -265566,7 +265583,7 @@ CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5e
CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000
CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000
CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000
CVE-2024-9381,0,0,25cf43ff2a0a9532d395ad1081122edeb1520bcb9236eaf7cc384a1005025472,2024-10-10T12:56:30.817000
CVE-2024-9381,0,1,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000
CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000
CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000
CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000
@ -265595,7 +265612,7 @@ CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40c
CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3e1,2024-10-15T12:58:51.050000
CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000
CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000
CVE-2024-9444,1,1,c35f85573c3a0322f2f144a2adfb339291383ffd313e4775ddaf4902a99cc782,2024-10-16T10:15:02.620000
CVE-2024-9444,0,0,c35f85573c3a0322f2f144a2adfb339291383ffd313e4775ddaf4902a99cc782,2024-10-16T10:15:02.620000
CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000
CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000
CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000
@ -265801,8 +265818,8 @@ CVE-2024-9971,0,0,0594322115675ee753da27d556fc98ba9a723e7e04d41180f103320a4dd3f2
CVE-2024-9972,0,0,5672d796a3c0672617371b1fdfcdf3d8d1d30983cb269f7a20c96a13095710bc,2024-10-15T12:57:46.880000
CVE-2024-9973,0,0,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000
CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000
CVE-2024-9975,0,0,19a95b0d8594378de1a658f6110dd6917411d1ac6b44da217f59a38aaf420a6d,2024-10-15T12:57:46.880000
CVE-2024-9976,0,0,a0343d2773336f2452d12e06f8ed1c829d33d78887485939f459af0a85f318bf,2024-10-15T12:57:46.880000
CVE-2024-9975,0,1,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000
CVE-2024-9976,0,1,5980d080e9ad25dff2e581d3c904125c709818a390af58c76d59996e26d292c8,2024-10-16T13:42:24.153000
CVE-2024-9977,0,0,2ff728332776d36f7a0b4f17f71817f48b8215cf8e3f608a790b17fa094fa3ba,2024-10-15T13:15:11.457000
CVE-2024-9979,0,0,dafd9ca9f773f8e2b76ea816a62af234502d02e9d7ac277bfd64cb30201efc2c,2024-10-15T14:15:05.817000
CVE-2024-9980,0,0,227587e27b79422988a8ba9d0e19869dca70cd6d378d1d6d8beb91efa3b64d47,2024-10-15T12:57:46.880000

Can't render this file because it is too large.