From d1759e0eff42c61539131a9732075d92d11127b4 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 16 Oct 2024 14:03:23 +0000 Subject: [PATCH] Auto-Update: 2024-10-16T14:00:23.627202+00:00 --- CVE-2020/CVE-2020-121xx/CVE-2020-12104.json | 6 +- CVE-2020/CVE-2020-138xx/CVE-2020-13822.json | 6 +- CVE-2020/CVE-2020-284xx/CVE-2020-28498.json | 6 +- CVE-2020/CVE-2020-368xx/CVE-2020-36841.json | 60 ++++++ CVE-2021/CVE-2021-248xx/CVE-2021-24874.json | 6 +- CVE-2021/CVE-2021-249xx/CVE-2021-24923.json | 6 +- CVE-2021/CVE-2021-420xx/CVE-2021-42079.json | 15 +- CVE-2021/CVE-2021-420xx/CVE-2021-42080.json | 21 +- CVE-2021/CVE-2021-420xx/CVE-2021-42081.json | 11 +- CVE-2021/CVE-2021-420xx/CVE-2021-42082.json | 19 +- CVE-2021/CVE-2021-420xx/CVE-2021-42083.json | 9 +- CVE-2021/CVE-2021-44xx/CVE-2021-4406.json | 11 +- CVE-2022/CVE-2022-243xx/CVE-2022-24387.json | 15 +- CVE-2022/CVE-2022-412xx/CVE-2022-41217.json | 12 +- CVE-2022/CVE-2022-450xx/CVE-2022-45052.json | 12 +- CVE-2022/CVE-2022-474xx/CVE-2022-47447.json | 6 +- CVE-2023/CVE-2023-225xx/CVE-2023-22582.json | 18 +- CVE-2023/CVE-2023-225xx/CVE-2023-22583.json | 18 +- CVE-2023/CVE-2023-225xx/CVE-2023-22584.json | 18 +- CVE-2023/CVE-2023-225xx/CVE-2023-22585.json | 18 +- CVE-2023/CVE-2023-225xx/CVE-2023-22586.json | 30 ++- CVE-2023/CVE-2023-24xx/CVE-2023-2472.json | 6 +- CVE-2023/CVE-2023-259xx/CVE-2023-25911.json | 20 +- CVE-2023/CVE-2023-259xx/CVE-2023-25912.json | 29 +-- CVE-2023/CVE-2023-259xx/CVE-2023-25913.json | 16 +- CVE-2023/CVE-2023-259xx/CVE-2023-25914.json | 18 +- CVE-2023/CVE-2023-259xx/CVE-2023-25915.json | 6 +- CVE-2023/CVE-2023-321xx/CVE-2023-32190.json | 66 ++++++ CVE-2023/CVE-2023-321xx/CVE-2023-32191.json | 60 ++++++ CVE-2023/CVE-2023-321xx/CVE-2023-32192.json | 60 ++++++ CVE-2023/CVE-2023-321xx/CVE-2023-32193.json | 60 ++++++ CVE-2023/CVE-2023-321xx/CVE-2023-32194.json | 104 ++++++++++ CVE-2023/CVE-2023-321xx/CVE-2023-32196.json | 104 ++++++++++ CVE-2023/CVE-2023-524xx/CVE-2023-52430.json | 69 ++++++- CVE-2023/CVE-2023-72xx/CVE-2023-7260.json | 59 +++++- CVE-2024/CVE-2024-100xx/CVE-2024-10021.json | 141 +++++++++++++ CVE-2024/CVE-2024-100xx/CVE-2024-10022.json | 141 +++++++++++++ CVE-2024/CVE-2024-100xx/CVE-2024-10023.json | 141 +++++++++++++ CVE-2024/CVE-2024-100xx/CVE-2024-10024.json | 141 +++++++++++++ CVE-2024/CVE-2024-14xx/CVE-2024-1454.json | 121 ++++++++++- CVE-2024/CVE-2024-214xx/CVE-2024-21491.json | 72 ++++++- CVE-2024/CVE-2024-218xx/CVE-2024-21875.json | 12 +- CVE-2024/CVE-2024-289xx/CVE-2024-28987.json | 65 +++++- CVE-2024/CVE-2024-332xx/CVE-2024-33209.json | 64 +++++- CVE-2024/CVE-2024-356xx/CVE-2024-35668.json | 6 +- CVE-2024/CVE-2024-379xx/CVE-2024-37983.json | 210 +++++++++++++++++++- CVE-2024/CVE-2024-393xx/CVE-2024-39379.json | 16 +- CVE-2024/CVE-2024-394xx/CVE-2024-39406.json | 14 +- CVE-2024/CVE-2024-394xx/CVE-2024-39408.json | 14 +- CVE-2024/CVE-2024-394xx/CVE-2024-39409.json | 14 +- CVE-2024/CVE-2024-394xx/CVE-2024-39410.json | 18 +- CVE-2024/CVE-2024-394xx/CVE-2024-39412.json | 10 +- CVE-2024/CVE-2024-418xx/CVE-2024-41867.json | 16 +- CVE-2024/CVE-2024-420xx/CVE-2024-42020.json | 62 +++++- CVE-2024/CVE-2024-451xx/CVE-2024-45148.json | 14 +- CVE-2024/CVE-2024-470xx/CVE-2024-47007.json | 57 +++++- CVE-2024/CVE-2024-470xx/CVE-2024-47008.json | 57 +++++- CVE-2024/CVE-2024-470xx/CVE-2024-47009.json | 57 +++++- CVE-2024/CVE-2024-470xx/CVE-2024-47010.json | 57 +++++- CVE-2024/CVE-2024-470xx/CVE-2024-47011.json | 57 +++++- CVE-2024/CVE-2024-471xx/CVE-2024-47134.json | 74 ++++++- CVE-2024/CVE-2024-480xx/CVE-2024-48042.json | 56 ++++++ CVE-2024/CVE-2024-482xx/CVE-2024-48255.json | 41 +++- CVE-2024/CVE-2024-492xx/CVE-2024-49247.json | 56 ++++++ CVE-2024/CVE-2024-492xx/CVE-2024-49257.json | 56 ++++++ CVE-2024/CVE-2024-492xx/CVE-2024-49271.json | 56 ++++++ CVE-2024/CVE-2024-493xx/CVE-2024-49382.json | 82 +++++++- CVE-2024/CVE-2024-493xx/CVE-2024-49383.json | 82 +++++++- CVE-2024/CVE-2024-493xx/CVE-2024-49384.json | 82 +++++++- CVE-2024/CVE-2024-493xx/CVE-2024-49387.json | 70 ++++++- CVE-2024/CVE-2024-493xx/CVE-2024-49388.json | 82 +++++++- CVE-2024/CVE-2024-63xx/CVE-2024-6380.json | 56 ++++++ CVE-2024/CVE-2024-80xx/CVE-2024-8040.json | 56 ++++++ CVE-2024/CVE-2024-86xx/CVE-2024-8630.json | 59 +++++- CVE-2024/CVE-2024-89xx/CVE-2024-8921.json | 4 + CVE-2024/CVE-2024-93xx/CVE-2024-9381.json | 57 +++++- CVE-2024/CVE-2024-99xx/CVE-2024-9975.json | 67 ++++++- CVE-2024/CVE-2024-99xx/CVE-2024-9976.json | 67 ++++++- README.md | 54 ++++- _state.csv | 141 +++++++------ 80 files changed, 3426 insertions(+), 449 deletions(-) create mode 100644 CVE-2020/CVE-2020-368xx/CVE-2020-36841.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32190.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32191.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32192.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32193.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32194.json create mode 100644 CVE-2023/CVE-2023-321xx/CVE-2023-32196.json create mode 100644 CVE-2024/CVE-2024-100xx/CVE-2024-10021.json create mode 100644 CVE-2024/CVE-2024-100xx/CVE-2024-10022.json create mode 100644 CVE-2024/CVE-2024-100xx/CVE-2024-10023.json create mode 100644 CVE-2024/CVE-2024-100xx/CVE-2024-10024.json create mode 100644 CVE-2024/CVE-2024-480xx/CVE-2024-48042.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49247.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49257.json create mode 100644 CVE-2024/CVE-2024-492xx/CVE-2024-49271.json create mode 100644 CVE-2024/CVE-2024-63xx/CVE-2024-6380.json create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8040.json diff --git a/CVE-2020/CVE-2020-121xx/CVE-2020-12104.json b/CVE-2020/CVE-2020-121xx/CVE-2020-12104.json index d5793c08721..e71e4fa1c38 100644 --- a/CVE-2020/CVE-2020-121xx/CVE-2020-12104.json +++ b/CVE-2020/CVE-2020-121xx/CVE-2020-12104.json @@ -2,7 +2,7 @@ "id": "CVE-2020-12104", "sourceIdentifier": "cve@mitre.org", "published": "2020-05-05T15:15:12.420", - "lastModified": "2020-05-07T20:16:35.347", + "lastModified": "2024-10-16T13:47:56.247", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wp-advanced-search_project:wp-advanced-search:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.3.7", - "matchCriteriaId": "4D8F28BB-B8FA-4363-8E92-28F552EBB79C" + "matchCriteriaId": "BA1CC381-7BE9-4021-9AD5-8CF3F8E4A7ED" } ] } diff --git a/CVE-2020/CVE-2020-138xx/CVE-2020-13822.json b/CVE-2020/CVE-2020-138xx/CVE-2020-13822.json index 7ef1dac4e30..e9f56684f11 100644 --- a/CVE-2020/CVE-2020-138xx/CVE-2020-13822.json +++ b/CVE-2020/CVE-2020-138xx/CVE-2020-13822.json @@ -2,7 +2,7 @@ "id": "CVE-2020-13822", "sourceIdentifier": "cve@mitre.org", "published": "2020-06-04T15:15:13.510", - "lastModified": "2023-11-07T03:16:58.907", + "lastModified": "2024-10-16T13:45:17.320", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:elliptic_project:elliptic:6.5.2:*:*:*:*:node.js:*:*", - "matchCriteriaId": "83C79EC5-299D-4D27-8606-3BDEB95825E5" + "criteria": "cpe:2.3:a:indutny:elliptic:6.5.2:*:*:*:*:node.js:*:*", + "matchCriteriaId": "E5343FAF-0200-473D-922C-51CB46D28A7F" } ] } diff --git a/CVE-2020/CVE-2020-284xx/CVE-2020-28498.json b/CVE-2020/CVE-2020-284xx/CVE-2020-28498.json index 626a3b4eae3..72d2c9494b3 100644 --- a/CVE-2020/CVE-2020-284xx/CVE-2020-28498.json +++ b/CVE-2020/CVE-2020-284xx/CVE-2020-28498.json @@ -2,7 +2,7 @@ "id": "CVE-2020-28498", "sourceIdentifier": "report@snyk.io", "published": "2021-02-02T19:15:13.720", - "lastModified": "2021-02-08T17:35:34.447", + "lastModified": "2024-10-16T13:45:17.320", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:elliptic_project:elliptic:*:*:*:*:*:node.js:*:*", + "criteria": "cpe:2.3:a:indutny:elliptic:*:*:*:*:*:node.js:*:*", "versionEndExcluding": "6.5.4", - "matchCriteriaId": "04611CFD-A788-4B0B-BCF1-569C1F90EDA3" + "matchCriteriaId": "FFA0B018-C763-403E-96CE-C7C7C2DE0203" } ] } diff --git a/CVE-2020/CVE-2020-368xx/CVE-2020-36841.json b/CVE-2020/CVE-2020-368xx/CVE-2020-36841.json new file mode 100644 index 00000000000..7b897d3a5ed --- /dev/null +++ b/CVE-2020/CVE-2020-368xx/CVE-2020-36841.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2020-36841", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-16T13:15:11.733", + "lastModified": "2024-10-16T13:15:11.733", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The WooCommerce Smart Coupons plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the woocommerce_coupon_admin_init function in versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to send themselves gift certificates of any value, which could be redeemed for products sold on the victim\u2019s storefront." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://www.wordfence.com/blog/2020/03/coupon-creation-vulnerability-patched-in-woocommerce-smart-coupons/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eeeb03f7-5f78-4462-b0b4-5080bbc419a3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-248xx/CVE-2021-24874.json b/CVE-2021/CVE-2021-248xx/CVE-2021-24874.json index 1e794bda9ed..b45d04061d2 100644 --- a/CVE-2021/CVE-2021-248xx/CVE-2021-24874.json +++ b/CVE-2021/CVE-2021-248xx/CVE-2021-24874.json @@ -2,7 +2,7 @@ "id": "CVE-2021-24874", "sourceIdentifier": "contact@wpscan.com", "published": "2022-02-14T12:15:14.573", - "lastModified": "2022-02-22T22:19:32.587", + "lastModified": "2024-10-16T13:26:19.017", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.1.31", - "matchCriteriaId": "6A6C306E-9970-48AF-9798-2866F926C47C" + "matchCriteriaId": "AD983632-19D4-49D0-A68A-EFF1FEC3727D" } ] } diff --git a/CVE-2021/CVE-2021-249xx/CVE-2021-24923.json b/CVE-2021/CVE-2021-249xx/CVE-2021-24923.json index 16c9bd536c2..3ed455cd55f 100644 --- a/CVE-2021/CVE-2021-249xx/CVE-2021-24923.json +++ b/CVE-2021/CVE-2021-249xx/CVE-2021-24923.json @@ -2,7 +2,7 @@ "id": "CVE-2021-24923", "sourceIdentifier": "contact@wpscan.com", "published": "2022-01-24T08:15:08.803", - "lastModified": "2022-01-27T22:07:38.063", + "lastModified": "2024-10-16T13:26:19.017", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.1.25", - "matchCriteriaId": "50365816-6B01-444C-B663-AECBE33937AA" + "matchCriteriaId": "B3FECD02-97E4-499F-8333-12E162586788" } ] } diff --git a/CVE-2021/CVE-2021-420xx/CVE-2021-42079.json b/CVE-2021/CVE-2021-420xx/CVE-2021-42079.json index 7186d0cfe18..d86e89d4a2b 100644 --- a/CVE-2021/CVE-2021-420xx/CVE-2021-42079.json +++ b/CVE-2021/CVE-2021-420xx/CVE-2021-42079.json @@ -2,8 +2,8 @@ "id": "CVE-2021-42079", "sourceIdentifier": "csirt@divd.nl", "published": "2023-07-10T16:15:47.467", - "lastModified": "2023-07-14T18:13:24.080", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:03.330", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -96,6 +96,10 @@ } ], "references": [ + { + "url": "https://cisrt.divd.nl/DIVD-2021-00020/", + "source": "csirt@divd.nl" + }, { "url": "https://csirt.divd.nl/CVE-2021-42079", "source": "csirt@divd.nl", @@ -103,13 +107,6 @@ "Third Party Advisory" ] }, - { - "url": "https://www.divd.nl/DIVD-2021-00020", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] - }, { "url": "https://www.osnexus.com/products/software-defined-storage", "source": "csirt@divd.nl", diff --git a/CVE-2021/CVE-2021-420xx/CVE-2021-42080.json b/CVE-2021/CVE-2021-420xx/CVE-2021-42080.json index 71e8ebaffbe..960d5769278 100644 --- a/CVE-2021/CVE-2021-420xx/CVE-2021-42080.json +++ b/CVE-2021/CVE-2021-420xx/CVE-2021-42080.json @@ -2,8 +2,8 @@ "id": "CVE-2021-42080", "sourceIdentifier": "csirt@divd.nl", "published": "2023-07-10T16:15:47.530", - "lastModified": "2024-09-13T18:15:31.627", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:03.660", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -38,20 +38,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "baseScore": 7.4, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 4.0 } ] }, @@ -104,11 +104,8 @@ ] }, { - "url": "https://www.divd.nl/DIVD-2021-00020", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2021-00020/", + "source": "csirt@divd.nl" }, { "url": "https://www.osnexus.com/products/software-defined-storage", diff --git a/CVE-2021/CVE-2021-420xx/CVE-2021-42081.json b/CVE-2021/CVE-2021-420xx/CVE-2021-42081.json index 4e1529319c1..3693fc45ad6 100644 --- a/CVE-2021/CVE-2021-420xx/CVE-2021-42081.json +++ b/CVE-2021/CVE-2021-420xx/CVE-2021-42081.json @@ -2,8 +2,8 @@ "id": "CVE-2021-42081", "sourceIdentifier": "csirt@divd.nl", "published": "2023-07-10T16:15:47.583", - "lastModified": "2023-07-17T18:30:01.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:03.917", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -104,11 +104,8 @@ ] }, { - "url": "https://www.divd.nl/DIVD-2021-00020", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2021-00020/", + "source": "csirt@divd.nl" }, { "url": "https://www.osnexus.com/products/software-defined-storage", diff --git a/CVE-2021/CVE-2021-420xx/CVE-2021-42082.json b/CVE-2021/CVE-2021-420xx/CVE-2021-42082.json index d41e705281e..00e494ee765 100644 --- a/CVE-2021/CVE-2021-420xx/CVE-2021-42082.json +++ b/CVE-2021/CVE-2021-420xx/CVE-2021-42082.json @@ -2,8 +2,8 @@ "id": "CVE-2021-42082", "sourceIdentifier": "csirt@divd.nl", "published": "2023-07-10T16:15:47.637", - "lastModified": "2023-07-14T14:37:03.653", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:04.060", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -38,7 +38,7 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -46,12 +46,12 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 7.1, + "availabilityImpact": "HIGH", + "baseScore": 7.8, "baseSeverity": "HIGH" }, "exploitabilityScore": 1.8, - "impactScore": 5.2 + "impactScore": 5.9 } ] }, @@ -104,11 +104,8 @@ ] }, { - "url": "https://www.divd.nl/DIVD-2021-00020", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2021-00020/", + "source": "csirt@divd.nl" }, { "url": "https://www.osnexus.com/products/software-defined-storage", diff --git a/CVE-2021/CVE-2021-420xx/CVE-2021-42083.json b/CVE-2021/CVE-2021-420xx/CVE-2021-42083.json index 7375ca12df9..c5423c63fcb 100644 --- a/CVE-2021/CVE-2021-420xx/CVE-2021-42083.json +++ b/CVE-2021/CVE-2021-420xx/CVE-2021-42083.json @@ -2,7 +2,7 @@ "id": "CVE-2021-42083", "sourceIdentifier": "csirt@divd.nl", "published": "2023-07-10T16:15:47.690", - "lastModified": "2024-01-02T19:15:09.030", + "lastModified": "2024-10-16T12:15:04.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -121,11 +121,8 @@ ] }, { - "url": "https://www.divd.nl/DIVD-2021-00020", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2021-00020/", + "source": "csirt@divd.nl" }, { "url": "https://www.osnexus.com/products/software-defined-storage", diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4406.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4406.json index 8f64c5b1fac..a9d9e41f590 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4406.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4406.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4406", "sourceIdentifier": "csirt@divd.nl", "published": "2023-07-10T16:15:47.747", - "lastModified": "2023-07-13T18:52:57.930", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:04.490", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -104,11 +104,8 @@ ] }, { - "url": "https://www.divd.nl/DIVD-2021-00020", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2021-00020/", + "source": "csirt@divd.nl" }, { "url": "https://www.osnexus.com/products/software-defined-storage", diff --git a/CVE-2022/CVE-2022-243xx/CVE-2022-24387.json b/CVE-2022/CVE-2022-243xx/CVE-2022-24387.json index ba6c53ab512..dd027d5e81e 100644 --- a/CVE-2022/CVE-2022-243xx/CVE-2022-24387.json +++ b/CVE-2022/CVE-2022-243xx/CVE-2022-24387.json @@ -2,8 +2,8 @@ "id": "CVE-2022-24387", "sourceIdentifier": "csirt@divd.nl", "published": "2022-03-14T13:15:07.943", - "lastModified": "2022-03-19T01:11:04.923", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:04.657", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -126,6 +126,10 @@ } ], "references": [ + { + "url": "https://csirt.divd.nl/CVE-2022-24387/", + "source": "csirt@divd.nl" + }, { "url": "https://csirt.divd.nl/DIVD-2021-00029", "source": "csirt@divd.nl", @@ -133,13 +137,6 @@ "Third Party Advisory", "VDB Entry" ] - }, - { - "url": "https://csrit.divd.nl/CVE-2022-24387", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-412xx/CVE-2022-41217.json b/CVE-2022/CVE-2022-412xx/CVE-2022-41217.json index e5ab0219c0c..ffb6507377a 100644 --- a/CVE-2022/CVE-2022-412xx/CVE-2022-41217.json +++ b/CVE-2022/CVE-2022-412xx/CVE-2022-41217.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41217", "sourceIdentifier": "csirt@divd.nl", "published": "2023-02-22T15:15:11.540", - "lastModified": "2023-06-11T14:15:09.473", + "lastModified": "2024-10-16T12:15:04.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -38,19 +38,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "baseScore": 9.8, + "baseSeverity": "CRITICAL" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 3.9, "impactScore": 5.9 } ] diff --git a/CVE-2022/CVE-2022-450xx/CVE-2022-45052.json b/CVE-2022/CVE-2022-450xx/CVE-2022-45052.json index b829522a1b0..5e619616b29 100644 --- a/CVE-2022/CVE-2022-450xx/CVE-2022-45052.json +++ b/CVE-2022/CVE-2022-450xx/CVE-2022-45052.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45052", "sourceIdentifier": "csirt@divd.nl", "published": "2023-01-04T19:15:09.447", - "lastModified": "2024-01-02T19:15:10.030", + "lastModified": "2024-10-16T12:15:05.160", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 5.9 } ] diff --git a/CVE-2022/CVE-2022-474xx/CVE-2022-47447.json b/CVE-2022/CVE-2022-474xx/CVE-2022-47447.json index 6d0b1317a1c..58c5237c12c 100644 --- a/CVE-2022/CVE-2022-474xx/CVE-2022-47447.json +++ b/CVE-2022/CVE-2022-474xx/CVE-2022-47447.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47447", "sourceIdentifier": "audit@patchstack.com", "published": "2023-05-24T17:15:09.580", - "lastModified": "2023-05-30T17:46:04.750", + "lastModified": "2024-10-16T13:47:56.247", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:wp-advanced-search_project:wp-advanced-search:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "3.3.8", - "matchCriteriaId": "6BE07D64-F1BD-4134-BB7E-0767D328A6CF" + "matchCriteriaId": "994D54C5-C6FF-4727-84EE-1FE4C9D53889" } ] } diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22582.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22582.json index 92f3ed3a008..d1493d511e6 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22582.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22582.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22582", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.567", - "lastModified": "2023-06-16T03:48:59.780", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:05.483", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -109,18 +109,12 @@ ], "references": [ { - "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "csirt@divd.nl", - "tags": [ - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/CVE-2023-22582/", + "source": "csirt@divd.nl" }, { - "url": "https://divd.nl/cves/CVE-2023-22582", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2023-00021/", + "source": "csirt@divd.nl" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22583.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22583.json index 7498dba39b8..77aaf04451b 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22583.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22583", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.650", - "lastModified": "2023-06-16T03:49:05.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:05.707", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -109,18 +109,12 @@ ], "references": [ { - "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "csirt@divd.nl", - "tags": [ - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/CVE-2023-22583/", + "source": "csirt@divd.nl" }, { - "url": "https://divd.nl/cves/CVE-2023-22583", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2023-00021/", + "source": "csirt@divd.nl" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22584.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22584.json index 0c5b52007b0..f4e62a1af90 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22584.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22584.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22584", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.730", - "lastModified": "2023-06-16T03:49:12.840", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:05.867", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -109,18 +109,12 @@ ], "references": [ { - "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "csirt@divd.nl", - "tags": [ - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/CVE-2023-22584/", + "source": "csirt@divd.nl" }, { - "url": "https://divd.nl/cves/CVE-2023-22584", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2023-00021/", + "source": "csirt@divd.nl" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22585.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22585.json index 1d3ff76cf4d..cef7d7e46a1 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22585.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22585.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22585", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.797", - "lastModified": "2023-06-16T03:49:18.723", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:06.003", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -109,18 +109,12 @@ ], "references": [ { - "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "csirt@divd.nl", - "tags": [ - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/CVE-2023-22585/", + "source": "csirt@divd.nl" }, { - "url": "https://divd.nl/cves/CVE-2023-22585", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2023-00021/", + "source": "csirt@divd.nl" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-225xx/CVE-2023-22586.json b/CVE-2023/CVE-2023-225xx/CVE-2023-22586.json index 099310ce6bd..b7d48ebe2f0 100644 --- a/CVE-2023/CVE-2023-225xx/CVE-2023-22586.json +++ b/CVE-2023/CVE-2023-225xx/CVE-2023-22586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22586", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.853", - "lastModified": "2023-06-16T03:50:40.117", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:06.140", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -38,20 +38,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "CHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 7.4, + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, "baseSeverity": "HIGH" }, "exploitabilityScore": 3.1, - "impactScore": 3.7 + "impactScore": 4.0 } ] }, @@ -109,18 +109,12 @@ ], "references": [ { - "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "csirt@divd.nl", - "tags": [ - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/CVE-2023-22586/", + "source": "csirt@divd.nl" }, { - "url": "https://divd.nl/cves/CVE-2023-22586", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2023-00021/", + "source": "csirt@divd.nl" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-24xx/CVE-2023-2472.json b/CVE-2023/CVE-2023-24xx/CVE-2023-2472.json index 9121b3479c1..a6085fde97a 100644 --- a/CVE-2023/CVE-2023-24xx/CVE-2023-2472.json +++ b/CVE-2023/CVE-2023-24xx/CVE-2023-2472.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2472", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-05T14:15:10.110", - "lastModified": "2023-11-07T04:12:43.213", + "lastModified": "2024-10-16T13:26:19.017", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -44,9 +44,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.1.61", - "matchCriteriaId": "551D1815-390C-4FD4-A592-61B51EAFE5BD" + "matchCriteriaId": "E5D7C34E-D7D9-414D-BE6C-D0604E1675A7" } ] } diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json index 017072014dc..f7692d80886 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25911.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25911", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.923", - "lastModified": "2023-06-16T03:50:50.247", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:06.397", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Danfoss AK-EM100 web applications allow for OS command injection through the web application parameters." + "value": "The Danfoss AK-EM100 web applications allow for an authenticated user to perform OS command injection through the web application parameters." } ], "metrics": { @@ -109,18 +109,12 @@ ], "references": [ { - "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "csirt@divd.nl", - "tags": [ - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/CVE-2023-25911/", + "source": "csirt@divd.nl" }, { - "url": "https://divd.nl/cves/CVE-2023-25911", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link" - ] + "url": "https://csirt.divd.nl/DIVD-2023-00021/", + "source": "csirt@divd.nl" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25912.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25912.json index ff1099ec019..f30af5c05e1 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25912.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25912.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25912", "sourceIdentifier": "csirt@divd.nl", "published": "2023-06-11T14:15:09.987", - "lastModified": "2023-06-16T03:50:57.457", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:06.553", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -38,19 +38,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 5.0, + "baseScore": 5.3, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.1, + "exploitabilityScore": 3.9, "impactScore": 1.4 } ] @@ -109,19 +109,12 @@ ], "references": [ { - "url": "https://csirt.divd.nl/DIVD-2023-00021", - "source": "csirt@divd.nl", - "tags": [ - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/CVE-2023-25912/", + "source": "csirt@divd.nl" }, { - "url": "https://divd.nl/cves/CVE-2023-25912", - "source": "csirt@divd.nl", - "tags": [ - "Broken Link", - "Third Party Advisory" - ] + "url": "https://csirt.divd.nl/DIVD-2023-00021/", + "source": "csirt@divd.nl" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25913.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25913.json index ce73dcf7b08..ba9f799cdf8 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25913.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25913.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25913", "sourceIdentifier": "csirt@divd.nl", "published": "2023-08-21T21:15:07.993", - "lastModified": "2023-08-24T21:39:11.560", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:06.790", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,20 +42,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 7.7, + "baseScore": 7.5, "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.1, - "impactScore": 4.0 + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json index 99532f106b2..529d2aae6a9 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25914.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25914", "sourceIdentifier": "csirt@divd.nl", "published": "2023-08-21T21:15:08.970", - "lastModified": "2023-08-24T21:38:58.693", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:07.050", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Due to improper restriction, attackers could retrieve and read system files of the underlying server through the XML interface." + "value": "Due to improper restriction, authenticated attackers could retrieve and read system files of the underlying server through the XML interface. The information that can be read can lead to a full system compromise." }, { "lang": "es", @@ -42,20 +42,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 9.9, - "baseSeverity": "CRITICAL" + "baseScore": 8.8, + "baseSeverity": "HIGH" }, - "exploitabilityScore": 3.1, - "impactScore": 6.0 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json index c099e0b0ec9..abce62ee924 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25915.json @@ -2,13 +2,13 @@ "id": "CVE-2023-25915", "sourceIdentifier": "csirt@divd.nl", "published": "2023-08-21T21:15:09.170", - "lastModified": "2023-08-24T21:37:26.140", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:07.283", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Due to improper input validation, a remote attacker could execute arbitrary commands on the target system." + "value": "Due to improper input validation, an authenticated remote attacker could execute arbitrary commands on the target system." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32190.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32190.json new file mode 100644 index 00000000000..09812f88303 --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32190.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2023-32190", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T12:15:07.460", + "lastModified": "2024-10-16T12:15:07.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "mlocate's %post script allows RUN_UPDATEDB_AS user to make arbitrary files world readable by abusing insecure file operations that run with root privileges." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ] + }, + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32190", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32191.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32191.json new file mode 100644 index 00000000000..d120c1f6b4d --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32191.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-32191", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T13:15:12.067", + "lastModified": "2024-10-16T13:15:12.067", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When RKE provisions a cluster, it stores the cluster state in a configmap called `full-cluster-state` inside the `kube-system` namespace of the cluster itself. The information available in there allows non-admin users to escalate to admin." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32191", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/rancher/rke/security/advisories/GHSA-6gr4-52w6-vmqx", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32192.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32192.json new file mode 100644 index 00000000000..b26b45c19d7 --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32192.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-32192", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T13:15:12.297", + "lastModified": "2024-10-16T13:15:12.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in which unauthenticated cross-site \nscripting (XSS) in the API Server's public API endpoint can be \nexploited, allowing an attacker to execute arbitrary JavaScript code in the victim browser" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32192", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/rancher/apiserver/security/advisories/GHSA-833m-37f7-jq55", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32193.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32193.json new file mode 100644 index 00000000000..f92f086ca7f --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32193.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-32193", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T13:15:12.540", + "lastModified": "2024-10-16T13:15:12.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in which unauthenticated cross-site \nscripting (XSS) in Norman's public API endpoint can be exploited. This \ncan lead to an attacker exploiting the vulnerability to trigger \nJavaScript code and execute commands remotely." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32193", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/rancher/norman/security/advisories/GHSA-r8f4-hv23-6qp6", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32194.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32194.json new file mode 100644 index 00000000000..878f955866e --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32194.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2023-32194", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T13:15:12.787", + "lastModified": "2024-10-16T13:15:12.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified when granting a create or * global role for a resource type of \"namespaces\"; no matter the API group, the subject will receive *\n permissions for core namespaces. This can lead to someone being capable\n of accessing, creating, updating, or deleting a namespace in the \nproject." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32194", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/rancher/rancher/security/advisories/GHSA-c85r-fwc7-45vc", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32196.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32196.json new file mode 100644 index 00000000000..79c418d8c76 --- /dev/null +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32196.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2023-32196", + "sourceIdentifier": "meissner@suse.de", + "published": "2024-10-16T13:15:13.060", + "lastModified": "2024-10-16T13:15:13.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified whereby privilege escalation checks are not properly enforced for RoleTemplateobjects when external=true, which in specific scenarios can lead to privilege escalation." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "meissner@suse.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "meissner@suse.de", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2023-32196", + "source": "meissner@suse.de" + }, + { + "url": "https://github.com/rancher/rancher/security/advisories/GHSA-64jq-m7rq-768h", + "source": "meissner@suse.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json index 698e3891c21..c66c5a44ee4 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52430.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52430", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-12T23:15:08.353", - "lastModified": "2024-02-13T14:01:49.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:11:53.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "El complemento caddy-security 1.1.20 para Caddy permite XSS reflejadi a trav\u00e9s de una solicitud GET a una URL que contiene un payload XSS y comienza con una subcadena /admin o /settings/mfa/delete/." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:authcrunch:caddy-security:1.1.20:*:*:*:*:*:*:*", + "matchCriteriaId": "0DA78C41-C188-45AD-9102-E019F39AC33F" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.trailofbits.com/2023/09/18/security-flaws-in-an-sso-plugin-for-caddy/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/greenpau/caddy-security/issues/264", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json index e71b6b18ecf..36a53fbd37a 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7260.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7260", "sourceIdentifier": "security@opentext.com", "published": "2024-08-22T21:15:16.107", - "lastModified": "2024-08-23T16:18:28.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T12:53:08.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:cx-e_voice:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.4", + "matchCriteriaId": "8E06D5EB-0706-4767-BBC3-A8AC73BF13B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.opentext.com/csm?id=kb_article_view&sysparm_article=KB0823114", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json new file mode 100644 index 00000000000..8e588926297 --- /dev/null +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10021.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10021", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-16T12:15:07.663", + "lastModified": "2024-10-16T12:15:07.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Pharmacy Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /php/manage_purchase.php?action=search&tag=VOUCHER_NUMBER. The manipulation of the argument text leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/higordiego/439f2af836c2c7d6075ba9de2e1169da", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280556", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280556", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.424334", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json new file mode 100644 index 00000000000..c8662200839 --- /dev/null +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10022.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10022", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-16T12:15:08.163", + "lastModified": "2024-10-16T12:15:08.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in code-projects Pharmacy Management System 1.0. This affects an unknown part of the file /php/manage_supplier.php?action=search. The manipulation of the argument text leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/higordiego/2bd0a94e480906a60ce83b8a4ec26957", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280557", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280557", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.424337", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json new file mode 100644 index 00000000000..8676ec25a84 --- /dev/null +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10023.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10023", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-16T13:15:13.350", + "lastModified": "2024-10-16T13:15:13.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Pharmacy Management System 1.0. This vulnerability affects unknown code of the file /php/add_new_medicine.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/higordiego/01a35a20a4e20e937d384b677c000921", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280558", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280558", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.424483", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json new file mode 100644 index 00000000000..0fb9043a23e --- /dev/null +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10024.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10024", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-16T13:15:13.650", + "lastModified": "2024-10-16T13:15:13.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in code-projects Pharmacy Management System 1.0. This issue affects some unknown processing of the file /php/manage_medicine_stock.php. The manipulation of the argument name/packing/generic_name/suppliers_name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/higordiego/b0083f7f12dee245c2fbe7102e31d9a4", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.280559", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.280559", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.424529", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json index 721c6c2e269..00ecb13b433 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1454.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1454", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-12T23:15:08.410", - "lastModified": "2024-03-23T03:15:10.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:57:49.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.4, + "impactScore": 2.7 + }, { "source": "secalert@redhat.com", "type": "Secondary", @@ -51,34 +71,117 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opensc_project:opensc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.25.0", + "matchCriteriaId": "835E7B28-6A13-42E4-A819-39920F9970B5" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-1454", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263929", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json index e3bd858e37c..075bfe242d5 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21491", "sourceIdentifier": "report@snyk.io", "published": "2024-02-13T05:15:08.873", - "lastModified": "2024-03-06T14:15:48.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:25:47.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "report@snyk.io", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + }, { "source": "report@snyk.io", "type": "Secondary", @@ -51,22 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:svix:svix:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.17.0", + "matchCriteriaId": "966B2847-AEC3-4D16-8230-5FDA3526B474" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/svix/svix-webhooks/commit/958821bd3b956d1436af65f70a0964d4ffb7daf6", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/svix/svix-webhooks/pull/1190", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Patch" + ] }, { "url": "https://rustsec.org/advisories/RUSTSEC-2024-0010.html", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.snyk.io/vuln/SNYK-RUST-SVIX-6230729", - "source": "report@snyk.io" + "source": "report@snyk.io", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21875.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21875.json index 522530ea71f..fbc4c2d7001 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21875.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21875", "sourceIdentifier": "csirt@divd.nl", "published": "2024-02-11T09:15:07.633", - "lastModified": "2024-09-05T13:50:08.927", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-16T12:15:08.483", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,19 +42,19 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 5.7, + "baseScore": 6.5, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.1, + "exploitabilityScore": 2.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28987.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28987.json index 02b444632e9..bde4ad9dc77 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28987.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28987", "sourceIdentifier": "psirt@solarwinds.com", "published": "2024-08-21T22:15:04.350", - "lastModified": "2024-10-16T01:00:01.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:05:08.363", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-10-15", "cisaActionDue": "2024-11-05", @@ -22,7 +22,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@solarwinds.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -40,6 +40,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "psirt@solarwinds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -55,14 +75,49 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:web_help_desk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.8.3", + "matchCriteriaId": "BDE3AF89-F0D2-4F3C-9565-F6DEA8B2BAC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:web_help_desk:12.8.3:-:*:*:*:*:*:*", + "matchCriteriaId": "331BF887-F099-419E-9664-EE2EC76E2E23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:solarwinds:web_help_desk:12.8.3:hotfix1:*:*:*:*:*:*", + "matchCriteriaId": "7FCFD6C1-EF56-47F4-AFE5-AD8E54232FF8" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.solarwinds.com/SuccessCenter/s/article/SolarWinds-Web-Help-Desk-12-8-3-Hotfix-2", - "source": "psirt@solarwinds.com" + "source": "psirt@solarwinds.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://www.solarwinds.com/trust-center/security-advisories/cve-2024-28987", - "source": "psirt@solarwinds.com" + "source": "psirt@solarwinds.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json index d776f7d5d40..dbb843c2f6b 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33209.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33209", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-02T16:15:10.300", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:33:21.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "FlatPress v1.3 es vulnerable a Cross Site Scripting (XSS). Un atacante puede inyectar c\u00f3digo JavaScript malicioso en la secci\u00f3n \"Agregar nueva entrada\", lo que le permite ejecutar c\u00f3digo arbitrario en el contexto del navegador web de la v\u00edctima." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:flatpress:flatpress:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "DD15C4E9-8A2B-4104-AF8A-FFB196940AAF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/paragbagul111/CVE-2024-33209", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-356xx/CVE-2024-35668.json b/CVE-2024/CVE-2024-356xx/CVE-2024-35668.json index 79f8bc00094..0071f1e5d99 100644 --- a/CVE-2024/CVE-2024-356xx/CVE-2024-35668.json +++ b/CVE-2024/CVE-2024-356xx/CVE-2024-35668.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35668", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-04T14:15:13.783", - "lastModified": "2024-06-05T19:55:05.997", + "lastModified": "2024-10-16T13:26:19.017", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:sendinblue:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:brevo:newsletter\\,_smtp\\,_email_marketing_and_subscribe:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.1.78", - "matchCriteriaId": "3D12CB1F-12A1-42C6-B030-241B4D6C4C64" + "matchCriteriaId": "54819C3A-E471-4AF2-A992-CC9ED7F78A17" } ] } diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json index 3946b4603cc..a06aaf08a04 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37983", "sourceIdentifier": "secure@microsoft.com", "published": "2024-10-08T18:15:06.520", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:15:20.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,7 +18,7 @@ "metrics": { "cvssMetricV31": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -36,13 +36,43 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,180 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "8D5CDF9D-43B5-411C-9627-14DECDA937BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20796", + "matchCriteriaId": "84562B34-6BC0-4DBD-B153-C8F1A065A08D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "58DB776E-E3B6-4990-8AA2-6A63FDAA84C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "4AC4CAAB-C035-4D00-8DBC-9C3CE39FBBD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "EE205A52-173D-44F2-AAD0-A45F5FF4D603" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "8ED2CAD8-D2E2-4AF5-874A-2938D3C3EA0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "D13B5EE1-0F5A-4DD8-9462-18FC0D2A59EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "857DFFF9-C926-41C5-96E6-7CD3DD86FDD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19044.5011", + "matchCriteriaId": "73AD21BF-973F-47E2-8831-A8B9DD066D75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "6DDD519F-4617-4958-A2AA-5E5EC9D6E0E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "FD728A6F-4F70-4407-B19C-92DF529793EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.19045.5011", + "matchCriteriaId": "11B05B8E-F956-45E2-A735-B3169384178F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "FE4A4090-29D6-4B44-9B01-858886DAD93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22000.3260", + "matchCriteriaId": "41629AD7-FF9A-4C54-9FFE-800F4C1E719B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "89687486-E330-4475-9119-0E0AD18F8129" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22621.4317", + "matchCriteriaId": "0B0F11A8-E14B-4A82-BB09-C4259FC6B0E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "FD22B308-7AB1-4820-8B4F-E79C18DB0FF0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.22631.4317", + "matchCriteriaId": "6D7CF880-E057-4694-8DD2-FF62D41A5BB7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "1262CACE-C787-4F46-9E12-C9F254225FC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2033", + "matchCriteriaId": "ED2BB762-C417-4B64-80A2-ED152893FAD7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7428", + "matchCriteriaId": "AF65E43A-AD45-43C6-A371-7C29C5CA0BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6414", + "matchCriteriaId": "F003109E-32C0-4044-89D6-2747366E051D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2762", + "matchCriteriaId": "F438CECD-698A-4BDF-8B02-B4FE9E5B86E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1189", + "matchCriteriaId": "B3B68BF1-40C7-45E9-BD3C-8CEE104054E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37983", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json index a11d92b919e..a7bf7cb60f3 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39379.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39379", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-31T13:15:10.253", - "lastModified": "2024-09-16T12:15:02.870", - "vulnStatus": "Modified", + "lastModified": "2024-10-16T13:38:32.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,20 +42,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 1.8, - "impactScore": 5.9 + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39406.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39406.json index 70409def1e8..6cf47313d1d 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39406.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39406.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39406", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.243", - "lastModified": "2024-09-16T12:15:03.080", - "vulnStatus": "Modified", + "lastModified": "2024-10-16T13:37:57.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 7.7, - "baseSeverity": "HIGH" + "baseScore": 6.8, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.1, + "exploitabilityScore": 2.3, "impactScore": 4.0 }, { diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39408.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39408.json index c8f4e929f0c..552ba501bec 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39408.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39408", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.703", - "lastModified": "2024-09-16T13:15:09.133", - "vulnStatus": "Modified", + "lastModified": "2024-10-16T13:36:13.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 6.3, + "availabilityImpact": "NONE", + "baseScore": 4.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, - "impactScore": 3.4 + "impactScore": 1.4 }, { "source": "psirt@adobe.com", diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39409.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39409.json index 6fe2b3df1be..2b5094baf04 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39409.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39409.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39409", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:26.937", - "lastModified": "2024-09-16T13:15:09.387", - "vulnStatus": "Modified", + "lastModified": "2024-10-16T13:35:32.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 6.3, + "availabilityImpact": "NONE", + "baseScore": 4.3, "baseSeverity": "MEDIUM" }, "exploitabilityScore": 2.8, - "impactScore": 3.4 + "impactScore": 1.4 }, { "source": "psirt@adobe.com", diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39410.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39410.json index 430afb4ff27..fe774a4db4b 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39410.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39410", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.177", - "lastModified": "2024-09-16T13:15:09.557", - "vulnStatus": "Modified", + "lastModified": "2024-10-16T13:34:52.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,20 +42,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 5.5, + "availabilityImpact": "NONE", + "baseScore": 4.3, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.1, - "impactScore": 3.4 + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39412.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39412.json index 133efd66578..b828cdb8112 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39412.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39412", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-14T12:15:27.650", - "lastModified": "2024-09-16T13:15:09.840", - "vulnStatus": "Modified", + "lastModified": "2024-10-16T13:33:27.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,14 +22,14 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM" diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41867.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41867.json index ec45abd6cd1..9257395e19f 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41867.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41867", "sourceIdentifier": "psirt@adobe.com", "published": "2024-09-13T09:15:10.620", - "lastModified": "2024-09-16T13:15:10.550", - "vulnStatus": "Modified", + "lastModified": "2024-10-16T13:31:42.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,14 +22,14 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM" @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -71,12 +71,12 @@ ] }, { - "source": "nvd@nist.gov", + "source": "psirt@adobe.com", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-787" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json index 4d877339266..56b9fc3b262 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42020.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42020", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-07T17:15:14.127", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:15:54.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -39,10 +61,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:veeam:one:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12", + "versionEndIncluding": "12.1.0.3208", + "matchCriteriaId": "80851DEC-53C9-40D0-894B-93E6436805DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.veeam.com/kb4649", - "source": "support@hackerone.com" + "source": "support@hackerone.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json index cf3b42028d9..cce82354cd3 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45148.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45148", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:07.963", - "lastModified": "2024-10-11T22:12:23.237", + "lastModified": "2024-10-16T13:27:46.397", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.9 }, { "source": "psirt@adobe.com", diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json index 5e98c25b96c..d56b6b6574c 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47007", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.210", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:23:03.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", + "versionEndExcluding": "6.4.5", + "matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json index 942a03afe3f..bc9fbe65260 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47008", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.463", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:24:32.130", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", + "versionEndExcluding": "6.4.5", + "matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json index cd75b958de7..0f0c9629220 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47009", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:54.777", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:26:39.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -55,10 +85,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", + "versionEndExcluding": "6.4.5", + "matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json index d129e028e72..91f7d74404e 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47010", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:55.240", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:28:07.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -55,10 +85,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", + "versionEndExcluding": "6.4.5", + "matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json index 4ffc131ea22..3b48112709f 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47011", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:55.533", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:28:40.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*", + "versionEndExcluding": "6.4.5", + "matchCriteriaId": "E80B784E-D10B-4D20-9D63-CBD3E3CF1868" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Ivanti-Avalanche-6-4-5-Security-Advisory", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json index db16a0ba297..692ade92ada 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47134.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47134", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-03T03:15:02.443", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:50:32.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "vultures@jpcert.or.jp", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "vultures@jpcert.or.jp", "type": "Secondary", @@ -51,18 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:electronics.jtekt:kostac_plc_programming_software:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.9.0", + "matchCriteriaId": "4398EBDC-EA9A-4D86-9205-A82122D1D397" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:electronics.jtekt:kostac_plc_programming_software:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.6.10.0", + "versionEndIncluding": "1.6.14.0", + "matchCriteriaId": "575F0B9F-B7A5-4E03-840F-6321387B66CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU92808077/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.electronics.jtekt.co.jp/en/topics/202410026928/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48042.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48042.json new file mode 100644 index 00000000000..841947526ee --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48042.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48042", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T13:15:13.973", + "lastModified": "2024-10-16T13:15:13.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Supsystic Contact Form by Supsystic allows Command Injection.This issue affects Contact Form by Supsystic: from n/a through 1.7.28." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/contact-form-by-supsystic/wordpress-contact-form-by-supsystic-plugin-1-7-28-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json index 4991b018d7e..8a8b3e1b100 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48255", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T14:15:11.937", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:35:03.290", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Cloudlog 2.6.15 permite la inyecci\u00f3n SQL de Oqrs.php get_station_info station_id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3", diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49247.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49247.json new file mode 100644 index 00000000000..598c3bbb099 --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49247.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49247", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T13:15:14.277", + "lastModified": "2024-10-16T13:15:14.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ": Authentication Bypass Using an Alternate Path or Channel vulnerability in sooskriszta, webforza BuddyPress Better Registration allows : Authentication Bypass.This issue affects BuddyPress Better Registration: from n/a through 1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/better-bp-registration/wordpress-buddypress-better-registration-plugin-1-6-broken-authentication-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49257.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49257.json new file mode 100644 index 00000000000..04ebfce2a2a --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49257.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49257", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T13:15:14.517", + "lastModified": "2024-10-16T13:15:14.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Denis Azz Anonim Posting allows Upload a Web Shell to a Web Server.This issue affects Azz Anonim Posting: from n/a through 0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/azz-anonim-posting/wordpress-azz-anonim-posting-plugin-0-9-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49271.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49271.json new file mode 100644 index 00000000000..92f8f63ae4d --- /dev/null +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49271.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49271", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-16T13:15:14.787", + "lastModified": "2024-10-16T13:15:14.787", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ": Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) allows : Command Injection.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through 1.5.121." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1336" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/unlimited-elements-for-elementor/wordpress-unlimited-elements-for-elementor-free-widgets-addons-templates-plugin-1-5-121-remote-code-execution-rce-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49382.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49382.json index 475e6517b22..8e6d9b72ac1 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49382.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49382.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49382", "sourceIdentifier": "security@acronis.com", "published": "2024-10-15T11:15:13.153", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:53:45.860", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@acronis.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@acronis.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +83,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-7286", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49383.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49383.json index e14cd9e659d..ded4ae43000 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49383.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49383.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49383", "sourceIdentifier": "security@acronis.com", "published": "2024-10-15T11:15:13.423", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:53:04.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@acronis.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@acronis.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +83,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-7285", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49384.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49384.json index e9558404992..f2f883f3fef 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49384.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49384", "sourceIdentifier": "security@acronis.com", "published": "2024-10-15T11:15:13.643", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:52:19.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@acronis.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@acronis.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +83,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-7284", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49387.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49387.json index 773795ea23e..31fd14c4a42 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49387.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49387", "sourceIdentifier": "security@acronis.com", "published": "2024-10-15T11:15:13.860", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:58:39.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -51,10 +73,52 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-7022", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49388.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49388.json index 2b0bc8ecf1e..c29010a596e 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49388.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49388", "sourceIdentifier": "security@acronis.com", "published": "2024-10-15T11:15:14.063", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:57:58.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@acronis.com", @@ -41,7 +63,7 @@ }, "weaknesses": [ { - "source": "security@acronis.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -49,12 +71,64 @@ "value": "CWE-639" } ] + }, + { + "source": "security@acronis.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:-:*:*:*:*:*:*", + "matchCriteriaId": "9151E39F-20EA-4A01-9E1A-4A951BEABA5E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acronis:cyber_protect:16:update1:*:*:*:*:*:*", + "matchCriteriaId": "6F99AD89-6646-4C55-87CD-D20B40D25808" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://security-advisory.acronis.com/advisories/SEC-5984", - "source": "security@acronis.com" + "source": "security@acronis.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-63xx/CVE-2024-6380.json b/CVE-2024/CVE-2024-63xx/CVE-2024-6380.json new file mode 100644 index 00000000000..a22abb5020a --- /dev/null +++ b/CVE-2024/CVE-2024-63xx/CVE-2024-6380.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6380", + "sourceIdentifier": "3DS.Information-Security@3ds.com", + "published": "2024-10-16T12:15:08.767", + "lastModified": "2024-10-16T12:15:08.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A reflected Cross-site Scripting (XSS) vulnerability affecting ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.3ds.com/vulnerability/advisories", + "source": "3DS.Information-Security@3ds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8040.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8040.json new file mode 100644 index 00000000000..a405d070318 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8040.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8040", + "sourceIdentifier": "3DS.Information-Security@3ds.com", + "published": "2024-10-16T12:15:09.013", + "lastModified": "2024-10-16T12:15:09.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authorization bypass through user-controlled key vulnerability affecting 3DSwym in 3DSwymer on Release 3DEXPERIENCE R2024x allows an authenticated attacker to access some unauthorized data." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.3ds.com/vulnerability/advisories", + "source": "3DS.Information-Security@3ds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json index ccb2e206bd1..1db2cd83cbc 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8630.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8630", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-27T17:15:14.180", - "lastModified": "2024-09-30T12:45:57.823", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:15:59.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -95,10 +115,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:alisonic:sibylla_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD1A679-5DBA-44B6-A704-DFB41BDF7CFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:alisonic:sibylla:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E2E83D4-27DF-40E3-9A06-DB607ADD1CCD" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-02", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8921.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8921.json index 76029814541..c575866f0d2 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8921.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8921.json @@ -9,6 +9,10 @@ { "lang": "en", "value": "The Zita Elementor Site Library plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 1.6.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file." + }, + { + "lang": "es", + "value": "El complemento Zita Elementor Site Library para WordPress es vulnerable a Cross-Site Scripting Almacenado mediante cargas de archivos SVG en todas las versiones hasta la 1.6.3 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes autenticados, con acceso de nivel de autor y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda al archivo SVG." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json index 2a26d2411ab..da125499900 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9381.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9381", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-10-08T17:15:57.183", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-16T13:30:34.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:endpoint_manager_cloud_services_appliance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.2", + "matchCriteriaId": "B633ABF6-4CAD-462D-B6C9-F209D90EAFD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-Cloud-Services-Appliance-CVE-2024-9379-CVE-2024-9380-CVE-2024-9381", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9975.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9975.json index 05324683727..809cf11d41c 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9975.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9975.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9975", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-15T11:15:14.310", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:44:46.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:drag_and_drop_image_upload:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "AAE6AAD4-5957-4748-B8BB-3441BB48A61E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/JunMing27/CVE/blob/main/SourceCodester%20-%20Arbitrary%20File%20Upload%20vulnerability%20leads%20to%20RCE%20in%20Drag%20and%20Drop%20Image%20Upload%20without%20Refresh%20Reload%20Using%20PHP%20and%20Ajax.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280340", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280340", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.423445", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9976.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9976.json index a17860c6b7d..6cf0780bb89 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9976.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9976", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-15T11:15:14.570", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-16T13:42:24.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:pharmacy_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9943605C-820A-4C9A-8A5E-1BA71F57F048" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://gist.github.com/higordiego/b57040961b993cb5f1bfe0005f6b57be", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280341", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280341", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.423448", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 8f4196b0274..7b7481b933b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-16T12:00:25.755027+00:00 +2024-10-16T14:00:23.627202+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-16T11:15:13.080000+00:00 +2024-10-16T13:58:39.297000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,61 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265813 +265830 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `17` -- [CVE-2024-8921](CVE-2024/CVE-2024-89xx/CVE-2024-8921.json) (`2024-10-16T11:15:13.080`) -- [CVE-2024-9444](CVE-2024/CVE-2024-94xx/CVE-2024-9444.json) (`2024-10-16T10:15:02.620`) +- [CVE-2020-36841](CVE-2020/CVE-2020-368xx/CVE-2020-36841.json) (`2024-10-16T13:15:11.733`) +- [CVE-2023-32190](CVE-2023/CVE-2023-321xx/CVE-2023-32190.json) (`2024-10-16T12:15:07.460`) +- [CVE-2023-32191](CVE-2023/CVE-2023-321xx/CVE-2023-32191.json) (`2024-10-16T13:15:12.067`) +- [CVE-2023-32192](CVE-2023/CVE-2023-321xx/CVE-2023-32192.json) (`2024-10-16T13:15:12.297`) +- [CVE-2023-32193](CVE-2023/CVE-2023-321xx/CVE-2023-32193.json) (`2024-10-16T13:15:12.540`) +- [CVE-2023-32194](CVE-2023/CVE-2023-321xx/CVE-2023-32194.json) (`2024-10-16T13:15:12.787`) +- [CVE-2023-32196](CVE-2023/CVE-2023-321xx/CVE-2023-32196.json) (`2024-10-16T13:15:13.060`) +- [CVE-2024-10021](CVE-2024/CVE-2024-100xx/CVE-2024-10021.json) (`2024-10-16T12:15:07.663`) +- [CVE-2024-10022](CVE-2024/CVE-2024-100xx/CVE-2024-10022.json) (`2024-10-16T12:15:08.163`) +- [CVE-2024-10023](CVE-2024/CVE-2024-100xx/CVE-2024-10023.json) (`2024-10-16T13:15:13.350`) +- [CVE-2024-10024](CVE-2024/CVE-2024-100xx/CVE-2024-10024.json) (`2024-10-16T13:15:13.650`) +- [CVE-2024-48042](CVE-2024/CVE-2024-480xx/CVE-2024-48042.json) (`2024-10-16T13:15:13.973`) +- [CVE-2024-49247](CVE-2024/CVE-2024-492xx/CVE-2024-49247.json) (`2024-10-16T13:15:14.277`) +- [CVE-2024-49257](CVE-2024/CVE-2024-492xx/CVE-2024-49257.json) (`2024-10-16T13:15:14.517`) +- [CVE-2024-49271](CVE-2024/CVE-2024-492xx/CVE-2024-49271.json) (`2024-10-16T13:15:14.787`) +- [CVE-2024-6380](CVE-2024/CVE-2024-63xx/CVE-2024-6380.json) (`2024-10-16T12:15:08.767`) +- [CVE-2024-8040](CVE-2024/CVE-2024-80xx/CVE-2024-8040.json) (`2024-10-16T12:15:09.013`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `61` +- [CVE-2024-39406](CVE-2024/CVE-2024-394xx/CVE-2024-39406.json) (`2024-10-16T13:37:57.910`) +- [CVE-2024-39408](CVE-2024/CVE-2024-394xx/CVE-2024-39408.json) (`2024-10-16T13:36:13.497`) +- [CVE-2024-39409](CVE-2024/CVE-2024-394xx/CVE-2024-39409.json) (`2024-10-16T13:35:32.290`) +- [CVE-2024-39410](CVE-2024/CVE-2024-394xx/CVE-2024-39410.json) (`2024-10-16T13:34:52.220`) +- [CVE-2024-39412](CVE-2024/CVE-2024-394xx/CVE-2024-39412.json) (`2024-10-16T13:33:27.910`) +- [CVE-2024-41867](CVE-2024/CVE-2024-418xx/CVE-2024-41867.json) (`2024-10-16T13:31:42.040`) +- [CVE-2024-42020](CVE-2024/CVE-2024-420xx/CVE-2024-42020.json) (`2024-10-16T13:15:54.167`) +- [CVE-2024-45148](CVE-2024/CVE-2024-451xx/CVE-2024-45148.json) (`2024-10-16T13:27:46.397`) +- [CVE-2024-47007](CVE-2024/CVE-2024-470xx/CVE-2024-47007.json) (`2024-10-16T13:23:03.467`) +- [CVE-2024-47008](CVE-2024/CVE-2024-470xx/CVE-2024-47008.json) (`2024-10-16T13:24:32.130`) +- [CVE-2024-47009](CVE-2024/CVE-2024-470xx/CVE-2024-47009.json) (`2024-10-16T13:26:39.990`) +- [CVE-2024-47010](CVE-2024/CVE-2024-470xx/CVE-2024-47010.json) (`2024-10-16T13:28:07.393`) +- [CVE-2024-47011](CVE-2024/CVE-2024-470xx/CVE-2024-47011.json) (`2024-10-16T13:28:40.480`) +- [CVE-2024-47134](CVE-2024/CVE-2024-471xx/CVE-2024-47134.json) (`2024-10-16T13:50:32.607`) +- [CVE-2024-48255](CVE-2024/CVE-2024-482xx/CVE-2024-48255.json) (`2024-10-16T13:35:03.290`) +- [CVE-2024-49382](CVE-2024/CVE-2024-493xx/CVE-2024-49382.json) (`2024-10-16T13:53:45.860`) +- [CVE-2024-49383](CVE-2024/CVE-2024-493xx/CVE-2024-49383.json) (`2024-10-16T13:53:04.380`) +- [CVE-2024-49384](CVE-2024/CVE-2024-493xx/CVE-2024-49384.json) (`2024-10-16T13:52:19.317`) +- [CVE-2024-49387](CVE-2024/CVE-2024-493xx/CVE-2024-49387.json) (`2024-10-16T13:58:39.297`) +- [CVE-2024-49388](CVE-2024/CVE-2024-493xx/CVE-2024-49388.json) (`2024-10-16T13:57:58.383`) +- [CVE-2024-8630](CVE-2024/CVE-2024-86xx/CVE-2024-8630.json) (`2024-10-16T13:15:59.997`) +- [CVE-2024-8921](CVE-2024/CVE-2024-89xx/CVE-2024-8921.json) (`2024-10-16T11:15:13.080`) +- [CVE-2024-9381](CVE-2024/CVE-2024-93xx/CVE-2024-9381.json) (`2024-10-16T13:30:34.740`) +- [CVE-2024-9975](CVE-2024/CVE-2024-99xx/CVE-2024-9975.json) (`2024-10-16T13:44:46.220`) +- [CVE-2024-9976](CVE-2024/CVE-2024-99xx/CVE-2024-9976.json) (`2024-10-16T13:42:24.153`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d73b930b5b1..c0ecd5f77e8 100644 --- a/_state.csv +++ b/_state.csv @@ -147077,7 +147077,7 @@ CVE-2020-12100,0,0,5f2109d0519da00eb1bdab515eb32b6f3a0a3f9f65df0494c40483c00d981 CVE-2020-12101,0,0,cf9139625b9f0b649b840da134f242e5f2c9b3b4781e0b74e6764c945a49d354,2024-04-29T18:45:40.910000 CVE-2020-12102,0,0,334d46f056ec9e51869491b0d4c4f4d7fa1e52d8eb23bd7050ac5ca8d70d4a32,2024-05-14T20:15:09.087000 CVE-2020-12103,0,0,3a59f1d5a51ef8295c537e5c5ae4d8a9bf4c1114a44ce53252c59c94bd0f48e8,2024-05-14T20:15:10.827000 -CVE-2020-12104,0,0,a5a4385915ac81d6db9a6836d07a958d3266656b85528d7c4b172bb9e727975b,2020-05-07T20:16:35.347000 +CVE-2020-12104,0,1,c90556433517cb5d5d176b589f735a14d9a33bc7c2c612108f5c581d6d39d1b4,2024-10-16T13:47:56.247000 CVE-2020-12105,0,0,1b0104d22c7c0ec2e5d6aa96a93864fff5c8940b5e30c6bb86ba9c0774641660,2022-05-03T14:21:44.207000 CVE-2020-12106,0,0,4e3d882e5b691be673a8f21eb4e1ee34ab9fbe1cfb11e1d93d639fd0a32d63b7,2021-07-21T11:39:23.747000 CVE-2020-12107,0,0,3836f1f6d5d4faa7b159d018fe0bf113e537b6190554e79e8bc6cc3f85044739,2020-08-19T12:54:46.107000 @@ -148635,7 +148635,7 @@ CVE-2020-13819,0,0,7d0e5bc882687b412f2418ec24b1dd9be843e422397645300221984594963 CVE-2020-1382,0,0,a0876529db6daaa28aa38e9bd84657d2a2207ea6d0cf96033594f64082bf944d,2021-07-21T11:39:23.747000 CVE-2020-13820,0,0,9e496591ad44ca77dc312b3e2cd00368fda87f5d814828e305a47a94b328ec58,2023-11-07T03:16:58.837000 CVE-2020-13821,0,0,f7b5cad326778e202650f58face9ae8589633236a49053242bf79766a2119137,2020-12-23T15:43:39.817000 -CVE-2020-13822,0,0,48b34565629e0385c2614e956491df038fbc80fbc85c0d89a6ed9bd7a9d04bc6,2023-11-07T03:16:58.907000 +CVE-2020-13822,0,1,c834d5de797a453847f9ed62ba35d05b71b8de7b69e23bae24f38a997c3916e3,2024-10-16T13:45:17.320000 CVE-2020-13825,0,0,90e2a75836526776efb694fd8b4324e7d0c0929bd6d204e8655be433efd7a6be,2020-08-24T19:10:36.313000 CVE-2020-13826,0,0,2de936a392d9d270194c018ff6e3b59e6bfadf76e7599ac9624f9941458e1ae1,2021-07-21T11:39:23.747000 CVE-2020-13827,0,0,3bde90887e219f9516b1f289a5f508de896d1958530f2a37b0a1669873b3ae2c,2023-02-27T18:16:26.300000 @@ -156938,7 +156938,7 @@ CVE-2020-28493,0,0,d9353fe60ae6c63ec1bfff9f85ea0fb545c914cd07b141b9fe22f9fe82e65 CVE-2020-28494,0,0,d0b68aa88a2f74522ac851a9e05ce4a16763907497fa430f2c95ee5ec5fba84a,2021-07-21T11:39:23.747000 CVE-2020-28495,0,0,4c7c65ebefd525ba71ddc5b80d415a5a705a5e348fcffb403aaf04a11193ff38,2021-02-05T16:53:47.807000 CVE-2020-28496,0,0,c212ccab3408db34cea9b34fdae0f9e8498e95a619a07d99989b57116a41f0fc,2021-02-25T17:05:05.980000 -CVE-2020-28498,0,0,6b4c00043fb2e887121baee557908d4801356c0a326c3e9fa54f999966cb0950,2021-02-08T17:35:34.447000 +CVE-2020-28498,0,1,81f1cc60ea687112836a08bd67314553fd1edbaa1937c34ba15fa01caaae0212,2024-10-16T13:45:17.320000 CVE-2020-28499,0,0,ad90f9d4f5a379490af8b67dd55869494a0d6c6d5f0fd044b81d677ff00b0f28,2021-05-17T19:55:25.393000 CVE-2020-2850,0,0,50629eccd5b3b9281b1f179f2b8ae3ef11522dbc8e0dd62df5b2500c2045ae16,2020-04-16T13:58:17.320000 CVE-2020-28500,0,0,805928d1d84ab6637afb06f11309a9cee2a0de28cf92c1ebd57b39fabd99a064,2022-09-13T21:18:50.543000 @@ -159342,6 +159342,7 @@ CVE-2020-36838,0,0,3a7d865bc4e5d457aefd7a125a83f9e76c208c4baafa85f9e322ba36857e5 CVE-2020-36839,0,0,baa988307e623b23446b2949272b20cbda74bdb8e8bd2f74d8dcfc84a33c3f98,2024-10-16T07:15:09.433000 CVE-2020-3684,0,0,44aa34ae599eab5a673c5cc3034025c1f764a98b61a69b113aa70c68c71a7c49,2020-11-06T16:29:14.480000 CVE-2020-36840,0,0,19f312115ec11958b9e6a2d7c5d1461a9b9a720952690bab09ad8fcbc82536d2,2024-10-16T08:15:03.710000 +CVE-2020-36841,1,1,957b677fd33f2345981c4e7c86c2970f0c468056978102eb125099baf6872493,2024-10-16T13:15:11.733000 CVE-2020-36842,0,0,2b0ab9021e8c3546f5c3ac016af5850bb6ea577b04ff806dd46ba7237500c4c0,2024-10-16T08:15:03.923000 CVE-2020-3685,0,0,01cf0158d1e280265cb87314ab78bb48a4960098d5e1ed486f7d5066d87b5a92,2021-01-29T23:46:03.037000 CVE-2020-3686,0,0,236df0d6a9e5b4a5d3130dbb24dece9578efd8fc6235301a045f147575f94cf1,2021-01-30T00:10:19.887000 @@ -170758,7 +170759,7 @@ CVE-2021-24870,0,0,b52951bbda633a2496785de6ed9c971a9349589104215e362b329e33b8594 CVE-2021-24871,0,0,8cee336be7c8e81d2a980ee98c9518731e7b00f3d824019a678875e57bcd313f,2021-12-16T20:47:02.653000 CVE-2021-24872,0,0,35696a0eb51e36407a79a9cbf68b6633c9b2efa0f8194208d2fbe0e29f79d3f6,2021-12-15T21:09:01.617000 CVE-2021-24873,0,0,0e2c879d3f204e9403ba3895a5ce0bec82190691622358ef65f867b35c2b7a4c,2021-11-24T16:36:55.757000 -CVE-2021-24874,0,0,183ad937bca5876223814367660c5178967b86ea1daca436e20874800088ad1c,2022-02-22T22:19:32.587000 +CVE-2021-24874,0,1,64fdf80ee90d5b1d6de6a6b14f87c50343676a2a968b2332fa72c64a34fd2ccd,2024-10-16T13:26:19.017000 CVE-2021-24875,0,0,363986781c5722c301b08ee25bbae68391c570e0d127c7dac6174a02b15224e2,2021-11-24T19:59:07.813000 CVE-2021-24876,0,0,8f2daa7f2d0bb19d86a6056e36e486b9ddf7878105e11e83ffc9baf82bbb9df4,2021-11-29T20:18:36.847000 CVE-2021-24877,0,0,98729407b5f410a005c9d353823b0655188684ae05421381493036ad6847cd41,2021-11-26T15:29:32.943000 @@ -170805,7 +170806,7 @@ CVE-2021-24919,0,0,e0dc83f1f53f04e30af67db292687d70b47d2901d44a4a4094abe48112ee8 CVE-2021-24920,0,0,8ccf0cbf5d2d75602a322b800459180bd3da6e37f70ddcda3609c7c41762d147,2022-03-07T16:51:54.773000 CVE-2021-24921,0,0,c39a1fa5f466132c2f295410cc217d4dd877e75f08444981115aa25d5a6e62fd,2022-02-28T19:39:20.853000 CVE-2021-24922,0,0,a62ca72c02c4e8e14a9a21104b9fd358aa1e358b0b5f498ff2f1c6f0b27528c7,2021-12-15T19:17:30.217000 -CVE-2021-24923,0,0,bf952289737ccf2b96ebeb7e68a7af5e46b69286456a851a59aec844711e924c,2022-01-27T22:07:38.063000 +CVE-2021-24923,0,1,2d2d758c7c6eebc8db1d3b61ec8993a8e8cf30a5b28f15322ff5bbaeaf0a4948,2024-10-16T13:26:19.017000 CVE-2021-24924,0,0,d5c09f8e01fce836950c01ae9d72864e07730e6c1acc3d045ff77bfe1c62f83d,2021-12-06T19:15:49.860000 CVE-2021-24925,0,0,43f0f7063c56c2126e4b2da1eca25ebb89b9598b9884aef1aef4b30bcf478804,2021-12-15T19:19:29.540000 CVE-2021-24926,0,0,ade879c2f6d36382ede146f6320a0f77f16920e22a1169dd3dca126280a41d2b,2022-02-04T18:10:31.700000 @@ -183534,12 +183535,12 @@ CVE-2021-42075,0,0,000a82d37ed29cee910dc4d2bb35e08cace658ab1a0cbe32b65e4d58eb7d4 CVE-2021-42076,0,0,67d37381120eacdc8025b22b07c44bb6c8764e4fb533f673681890b936e27812,2021-11-09T22:07:09.187000 CVE-2021-42077,0,0,98645f18b00acbbf0c5a4aca133d443cc300a213a1d1246bbc4446561627477d,2021-11-09T19:28:05.903000 CVE-2021-42078,0,0,f9c4ed900a7cc457676383c89604ac047264bd0c6268e21f9f2156657cef1ce4,2021-11-09T22:07:50.933000 -CVE-2021-42079,0,0,bf8418ff05cca0bc28f8241c42a0796bdc079adda7455a48fc84fd2f1a818c08,2023-07-14T18:13:24.080000 +CVE-2021-42079,0,1,f2d0232174cdef0ac65a62301a79361e39709edcef7945f8a252784803c24c20,2024-10-16T12:15:03.330000 CVE-2021-4208,0,0,2d1e899b3a2dc18e4d0e14dca0b4da56911208d8a128ca6b60723bc98cecb9ef,2022-02-28T20:44:21.043000 -CVE-2021-42080,0,0,0a612afaef583298b22c089dd012105946ce4b7b5fbb1d2326fc67d6a3ec1420,2024-09-13T18:15:31.627000 -CVE-2021-42081,0,0,f8cc3f92ff5f3543484b03d48e43c053557cb0b2d30b29adf45e274048747c23,2023-07-17T18:30:01.307000 -CVE-2021-42082,0,0,4dc8dbb1ed268662fdd44e78cbd0f101d858d22b600135c57208ffd91491262f,2023-07-14T14:37:03.653000 -CVE-2021-42083,0,0,0a7005314b230851b71d5b4faa83822c49b1bf92ba1f754bfd5b9f3bf7769a6e,2024-01-02T19:15:09.030000 +CVE-2021-42080,0,1,4863517402ea4ae064cce4d190ff794e05d23afdb6886abdf0409131fd7d14bc,2024-10-16T12:15:03.660000 +CVE-2021-42081,0,1,07d978a5398e364de9533d1bd550c699f5e3c2588f10c43ef340b736650af00a,2024-10-16T12:15:03.917000 +CVE-2021-42082,0,1,52126f925f12f5bfcadb761c382bbd8aecd38f5d9e3257960591d441d24ea02c,2024-10-16T12:15:04.060000 +CVE-2021-42083,0,1,c10fde8c85fa8f4d2b4a18ad0ae53ddf337d4eb99e1f3433cd21ce5af76634f6,2024-10-16T12:15:04.310000 CVE-2021-42084,0,0,81065ef5f09344b2cb782a579e737f83a3f6ca39c592801b4564cfd3729a4041,2021-10-14T14:01:17.467000 CVE-2021-42085,0,0,3d24b94025f7037dea7492fe13c4b7c889f8e2725b5b1fc0aa9646e0f375be57,2021-10-13T20:30:38.137000 CVE-2021-42086,0,0,744eb91bf663a489a3723f87c99505cf072c48b027d221f331a36d29196226f2,2022-07-12T17:42:04.277000 @@ -184964,7 +184965,7 @@ CVE-2021-44054,0,0,fe12d0efdb6d5105654667af112ba35a00eb28953fe49396933dea52f92c7 CVE-2021-44055,0,0,36d086a0d865afcf75dd26dbd53eb99e6ce2fcd35caf2d6d5d5a6057d9767e37,2022-05-13T20:13:04.620000 CVE-2021-44056,0,0,8addbbbea73af6ebf0ae24e7a335e8cadec71c4b3189f8b9ae7b3717ab944269,2022-05-13T20:14:39.333000 CVE-2021-44057,0,0,f32a37ffbfbd3bde7a0b4b4c685341477054534ab9bc6a7b81c6ca45796fd4a5,2022-05-13T20:10:09.653000 -CVE-2021-4406,0,0,284da2be0ba4556b64a949485e10f3dd5a616193c48f66a6d0dd9b434e6588fa,2023-07-13T18:52:57.930000 +CVE-2021-4406,0,1,a5158228cbadb9a55a3074ff27c8fb5c85e60eddbef1e7b5652296510306f983,2024-10-16T12:15:04.490000 CVE-2021-4407,0,0,8868f8e6298397f199da7799571646e132baa80008874a12ae7fe458e60186a9,2023-11-07T03:40:52.797000 CVE-2021-44076,0,0,9ebc136e380f43b1e756eaa21ff068495ea86d8e31a165ce24b3cace1556fef1,2022-09-17T03:45:01.677000 CVE-2021-44077,0,0,8337d84f511bb37dc2be298cdd0c1fb229c2333fc8ada2b995c6c4bdca398026,2023-08-08T14:21:49.707000 @@ -193484,7 +193485,7 @@ CVE-2022-24383,0,0,e447d7d9205166fb86d5a5967e3f74514587059d80957cbbb2197f8733e6f CVE-2022-24384,0,0,c8c54f246c395683b34fe69e0716c06cb09982df57d3b04973b292acd788f92d,2022-03-19T01:10:43.233000 CVE-2022-24385,0,0,ee57eb1c279ae326a5c0dac5cdc2e80222055e9a5199159daa29a76c075334d3,2022-03-19T01:10:50.360000 CVE-2022-24386,0,0,457222f095c62db0fb0ca8bf1941849311c926f62af825405c1c6aca5315e926,2024-09-13T18:12:44.327000 -CVE-2022-24387,0,0,54dc02b7b2ac9a081a5973c3d20f765d63e8646b2df0467cc341110e81783a58,2022-03-19T01:11:04.923000 +CVE-2022-24387,0,1,1d7e42229c2657f23c2a379fa4dda7f34697a22903ffcf500a57f48755ed44a0,2024-10-16T12:15:04.657000 CVE-2022-24388,0,0,0aa162374a72e7b272071bc85f23bb3ac62a1dbd8bcfa58503cbe59a9d783e6a,2022-05-26T01:49:38.753000 CVE-2022-24389,0,0,1bfcfb3a923a3c536cc281292090c1401824e60d2f38b82785afa6c7ed823d33,2022-05-26T01:59:03.417000 CVE-2022-2439,0,0,71c4c44c3559f8dfdec520c0c7b7ccf9de70a0b28373021d99fd5226fd703f97,2024-09-26T13:32:55.343000 @@ -206925,7 +206926,7 @@ CVE-2022-41212,0,0,3aee6601ecb5b41394b21d287c82806881cbeec27c635ec77fc09f456f918 CVE-2022-41214,0,0,57a63dcb9dcef2d0f21c9b04f05402500987bd94c501c557a12d92cc1d0e9e1b,2023-11-07T03:52:44.250000 CVE-2022-41215,0,0,d6b56989d143f5b7ced880f0198bbb0aea11b6840881eb818f104364d0047d01,2023-11-07T03:52:44.333000 CVE-2022-41216,0,0,b51753b79cd3b73dda1fbafb0583b9dfb992bd7ffa5207deb922d4db751db73b,2024-09-13T18:08:43.850000 -CVE-2022-41217,0,0,5c51a152d62386c9ce84f687c77e80c97106882f13cf41fa2d78c7cd09417371,2023-06-11T14:15:09.473000 +CVE-2022-41217,0,1,ef03321142499fc7419a7ce5e88db20e188a7cffb612fb3a160d149af443bfe3,2024-10-16T12:15:04.860000 CVE-2022-41218,0,0,4d8d0f5612320f06b4d039e95a77096f203ac9352286eb59f9765d04c53bec07,2024-03-25T01:15:52.347000 CVE-2022-4122,0,0,f5151e95d79980c9d929f6448713384a73d5e1f0b0edb7410e38f0420d8822aa,2022-12-12T15:48:07.023000 CVE-2022-41220,0,0,da1cbb52d343b2134f8ea63cf473ac9cbe9d0168374bda3242bc76b5d9d8b0f8,2024-08-03T13:15:42.457000 @@ -209774,7 +209775,7 @@ CVE-2022-45049,0,0,d98b08f41c9f4c9b8c17761481eb8da8fc31beca12133aa5d1d9a4f2dd4ed CVE-2022-4505,0,0,80acf6850bff297cdcdcde9e235f2ea50363cd8a843569ae0e7b3ec505ac1090,2023-07-11T08:15:10.283000 CVE-2022-45050,0,0,6a37ecc7452e165ad3ae682d972aa78274210ba552c1115ed44bbaf958414280,2023-01-09T17:12:50.767000 CVE-2022-45051,0,0,4e552beb31f904d7ac3844f86db76bd9fc9a6e763f151f7268caf3ff4ad0b103,2023-01-11T03:05:10.367000 -CVE-2022-45052,0,0,d26208f0c18bd2578007a9535cc218acd5de9b924ca157f88fbf78bb37035dfc,2024-01-02T19:15:10.030000 +CVE-2022-45052,0,1,04d1575250c1293df846f72aca4704340bf01fa0cd6fedf46fa5b4ab63d794c9,2024-10-16T12:15:05.160000 CVE-2022-45059,0,0,d33334463a33c5bae7491e5f05f48cf2f1272b7d9eb0571e9d0b56906c97a288,2023-11-07T03:54:29.960000 CVE-2022-4506,0,0,6eaca7d450e1159b3b0c00e9dbba66557efed1f01003df22ac4e40cc1645e937,2023-11-07T03:58:01.067000 CVE-2022-45060,0,0,ab2b4e231abf462892ff46383a29d0f52cc1dcee9bf3ea910e5e072bd622082b,2023-11-07T03:54:30.160000 @@ -211452,7 +211453,7 @@ CVE-2022-47443,0,0,f3515c60fd4f71ff9333641d9a1e0aa7946c04420fb0afbf849e665f04ab9 CVE-2022-47444,0,0,6624a8a1c3b9de9de1701d058fc5912d473ea3542c518e98f1d8de690761bc95,2023-11-07T03:56:15.930000 CVE-2022-47445,0,0,b11c350216f07ac5b657d219600f06905c0c0562ab8a865c5e75560f8682b702,2024-09-05T18:35:01.370000 CVE-2022-47446,0,0,83b1c896c5c167280e3a1efadbbd80b817554e557ce03717a283513f01e521e4,2023-05-30T17:47:25.017000 -CVE-2022-47447,0,0,e190bcf416043cc6839d125742303a5093000d65eb02279f6356422a385db953,2023-05-30T17:46:04.750000 +CVE-2022-47447,0,1,5955dfc6cec68f406ba7d4f7829f67750169ce9fd780a2a7f6716ae9f2453857,2024-10-16T13:47:56.247000 CVE-2022-47448,0,0,3fc801e4772dc4e483f5041fb67f263631a138235229f497dffcf10544b4f237,2023-05-30T17:45:12.073000 CVE-2022-47449,0,0,f6073a1b17ec4fa41311192d25996afaab7a92363c0277345010937216824fd0,2023-05-10T18:20:05.127000 CVE-2022-4745,0,0,167ce06261c5076745838b2dcaa3388a78ac0606306429453e09e207f90daf06,2023-11-07T03:58:46.707000 @@ -216805,11 +216806,11 @@ CVE-2023-22579,0,0,b50f51817f5ab55f90ca17e0a70b50b2a7f894e20f1a8ab175a13831f05df CVE-2023-2258,0,0,2111fd7aff14bd333121caf2dac078ba48b6ab8a9a535c7974b5ec7af774769a,2023-05-03T20:15:13.487000 CVE-2023-22580,0,0,48060b11ca3496a0342f2a08e850a8810444693991f5cd3ef61f9f628e8c7fc0,2023-04-28T18:52:21.847000 CVE-2023-22581,0,0,dbe8e80a125a9057948e68bca7230a78bb5a4b7e3bb2aab39d6610a03f0070c1,2023-05-02T19:16:34.527000 -CVE-2023-22582,0,0,a95213131288786e7f638ed1f9f7c047dae79986d265ac26bef86b9bba3ee69d,2023-06-16T03:48:59.780000 -CVE-2023-22583,0,0,17594c3beb44f98bcc8871f2d1d32db04375f161abc0dfd375ac5cadd3546fbc,2023-06-16T03:49:05.240000 -CVE-2023-22584,0,0,3153a18e4215df1908c59b944fa4fe9a3a3ef8252e9b5106e456c9e2bc164f5c,2023-06-16T03:49:12.840000 -CVE-2023-22585,0,0,97819e07630fc43fe1515be8affe0540bfcf0796f06220ea92ba4f7bb75c2386,2023-06-16T03:49:18.723000 -CVE-2023-22586,0,0,e1fcf62afd5044838dd569d5d91dd2151c7ee8effd634d94992aad8792d618bf,2023-06-16T03:50:40.117000 +CVE-2023-22582,0,1,cf329a854808f7208c5e3e3800300d304be782dbfdc793baec1ef6c1ace45547,2024-10-16T12:15:05.483000 +CVE-2023-22583,0,1,33fbce81cdccd7f3d37293ade3ec80a9908f552445fb87dad119e1b409b5853d,2024-10-16T12:15:05.707000 +CVE-2023-22584,0,1,af8ca952c62b02738757a7b333bfdb6278825d2bc6dec13179658ac78b50607b,2024-10-16T12:15:05.867000 +CVE-2023-22585,0,1,c2d5ebfe96532d7494693ccb578baf870c54dbf9ca7a116da9e3505e44e696c6,2024-10-16T12:15:06.003000 +CVE-2023-22586,0,1,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a10e1,2024-10-16T12:15:06.140000 CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000 CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000 CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000 @@ -218459,7 +218460,7 @@ CVE-2023-24690,0,0,e2547dd910c57f1b22f5098edefee1c2fd4450e661ce4f71183eb31abaa7c CVE-2023-24698,0,0,9eabc9392f3eb51c31329d1b42a8ce11e17f2220f701712f00f2cc7c3d488a87,2023-08-15T13:35:18.067000 CVE-2023-2470,0,0,08c45f40e998215eae3bede674c7687151b938a249e0bdedf2c49640d6c5a3b4,2023-11-07T04:12:43.057000 CVE-2023-24709,0,0,a44d1abf1b51b002a1a36940e85deb0e91478cee4831ca0b9a57e1912bd50ac6,2023-04-10T20:15:09.513000 -CVE-2023-2472,0,0,39c793663948349c1e943a765ed6afbfc581f40c730c1cb740dbe7a606a4511b,2023-11-07T04:12:43.213000 +CVE-2023-2472,0,1,65a10d9848ce0509536c037a8c964c58f82bfa3f18b74e8ffa29952f6a82f291,2024-10-16T13:26:19.017000 CVE-2023-24720,0,0,9226b5d1018d73f45aaefd8e3101bed72bd92e6f193e3914e55aed5ec06c5596,2023-04-12T17:11:20.667000 CVE-2023-24721,0,0,36c5b231ac40fad13b4992be5e40fb14a845817c3b03d5d72925828da8d5cfee,2023-04-14T18:51:08.097000 CVE-2023-24724,0,0,4a23d9573bb538b640e11ef479329a77c129b98d6eed84ab97293bd70ace2028,2023-11-07T04:08:39.583000 @@ -219469,11 +219470,11 @@ CVE-2023-25908,0,0,711438efc879e2da908e2fe34d4665fa30cbe36911b66474d51f45124f9d1 CVE-2023-25909,0,0,3a86e8d0a5a9c75a3b1ba6c2bad2da112b86b40373c068ef888ca6a2ada20e0e,2023-03-31T14:22:26.143000 CVE-2023-2591,0,0,96d5b6c54d43252f274ceb94cd62959a81cbf5756e69f0c5bf41509a0370f395,2023-05-15T06:15:09.727000 CVE-2023-25910,0,0,8820f037eb373093f9e7e9604082c261621d3d440b751f2aaafe310d86c53bc4,2024-05-14T16:15:28.993000 -CVE-2023-25911,0,0,bb253e3d93c23950b5a387d554e5841508a5fabb7ca4dcfd880ddd0641046692,2023-06-16T03:50:50.247000 -CVE-2023-25912,0,0,54c0f8f142adf0992a2dd3b98cd004bef5d62ef04b7be7ea1a55bb8bb182ceaa,2023-06-16T03:50:57.457000 -CVE-2023-25913,0,0,bd3236e5c5fbfaffd7cb643349e8edfed18b048f405402ad058b581786840f37,2023-08-24T21:39:11.560000 -CVE-2023-25914,0,0,03557213b083ed4bba2b2e91db2d570930173dd3fbb5957e4a25a1a0e3fc1c0f,2023-08-24T21:38:58.693000 -CVE-2023-25915,0,0,070cd155dd068b511c1052b0453209c9ac81e57c4910bc16f3ee3002b77d7e44,2023-08-24T21:37:26.140000 +CVE-2023-25911,0,1,4d70a282bfba98a9074899c40fb1bb9eea1ffda5de7053461b3d608a074e9fa5,2024-10-16T12:15:06.397000 +CVE-2023-25912,0,1,509f2d60312d748e00f47e4b6a3907b60209f5abee1c17e89e6f2341c971ad34,2024-10-16T12:15:06.553000 +CVE-2023-25913,0,1,d3b01a7e6e3bdc4679b239e3fd5c80b1402416d5dea2cc053bcdfeacc7b49bd1,2024-10-16T12:15:06.790000 +CVE-2023-25914,0,1,94e4d6f64339663bdaaf0e7f6ede3aec39430ba15fb568ca5059bc3d81a48ec2,2024-10-16T12:15:07.050000 +CVE-2023-25915,0,1,2e07e82a0215a37be87d12b1ad1b5f202cb89d3b909001b573d9eec559937ea5,2024-10-16T12:15:07.283000 CVE-2023-2592,0,0,7e4a496757ad28922cc131b3dc6c5dcce821dacaa7d1248a91b5f3a5abc13651,2023-11-07T04:12:55.187000 CVE-2023-25921,0,0,db434be2822e9f805fcd7099a71822c578de64397a6bb25c1f1ea2030a0f42fd,2024-02-29T13:49:47.277000 CVE-2023-25922,0,0,8bbaac4e7be5e855017ab720e3a49ba12435c5575eb4c40dc6dd2b4acb226464,2024-02-29T13:49:47.277000 @@ -224290,6 +224291,12 @@ CVE-2023-32186,0,0,e06556634f58d819dfae5b78cb8714f5c9bc5370508503590046fde23b888 CVE-2023-32187,0,0,604bbf8f396584f0efa1594da6fe3c409bf951238cacbb8e57499c590e5e3fd1,2023-09-21T15:21:31.567000 CVE-2023-32188,0,0,414806e16a24df1ecbb6aadbe57c9884e174210dd398c42b014e332ad5c10d7d,2024-10-16T09:15:03.260000 CVE-2023-3219,0,0,6eb56310ef4fd619262ae96943204b765f45a221a776e69bfc250b710761d69b,2023-11-07T04:18:14.830000 +CVE-2023-32190,1,1,506aec27991d4772be88a76d50cd44b48e86907fc0c8f0f8223fc2c6448d0dab,2024-10-16T12:15:07.460000 +CVE-2023-32191,1,1,5ba893f4fdb69c66bdfcbd5d71c019fcc35759e17b71a85ff4fbee016b65eb28,2024-10-16T13:15:12.067000 +CVE-2023-32192,1,1,cdd03a4f1481533d366cc92c2198ee88b86f88e5c8761f91fffc421021d38743,2024-10-16T13:15:12.297000 +CVE-2023-32193,1,1,515b91e441a27f79b30ea6e869fedba70054dfa58fe7b65ae5cd73cd9ba5c477,2024-10-16T13:15:12.540000 +CVE-2023-32194,1,1,9f00faaba13c9dba9727f29211f38af09e2a6ccc23288040dea8a061e4cf893e,2024-10-16T13:15:12.787000 +CVE-2023-32196,1,1,3dd5c164e1456347ab06fbe343f8075b758091f15ef870871cf4cc45c4173712,2024-10-16T13:15:13.060000 CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f910122,2023-06-27T12:44:47.967000 CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000 CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000 @@ -238982,7 +238989,7 @@ CVE-2023-52427,0,0,0a54450b6cf413ae3e0cd14ca73a4997d322ba669f6ff28b106bdd9dadc65 CVE-2023-52428,0,0,780a20df5925e099c50682efa6b9b5b9a7581e992635addf027a9478a9c99948,2024-02-11T22:29:15.837000 CVE-2023-52429,0,0,bb71f6867b546918a32b40939aad4a54664a6e064966565e92e979c5b5823dd4,2024-06-27T12:15:13.797000 CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700c3,2023-11-08T18:40:41.847000 -CVE-2023-52430,0,0,b4d094e234634baccb6573b9549623bf267a56f0333e94c03e9a66a8c1ebd247,2024-02-13T14:01:49.147000 +CVE-2023-52430,0,1,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000 CVE-2023-52431,0,0,199f10747613e848b4be76ff988b9f76b50282c6e59f2e5da91f811ef18a5901,2024-08-01T18:35:05.050000 CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000 CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000 @@ -241283,7 +241290,7 @@ CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d078 CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 -CVE-2023-7260,0,0,35ca28d322ddb3cec2b6f685cf55f84e63f8dd8597ea20f0a701ece3d6e0c72d,2024-08-23T16:18:28.547000 +CVE-2023-7260,0,1,320b55d1f034809d79e51e192994ba6b2fe9aaa6c60b445d7c661747328ccbb2,2024-10-16T12:53:08.807000 CVE-2023-7261,0,0,44080cc2bc0d6a25d80bc7855327b03309b2d9def17d97f1c55e50122c67ac97,2024-07-03T01:44:30.563000 CVE-2023-7264,0,0,51dd8b83703649c91504628a1d95022ef41c77d28d8363a527e775cafaba1511,2024-06-11T13:54:12.057000 CVE-2023-7265,0,0,fb43e2fc7ead32f16ab1a40e592be4835649042e83490e66c86a7fe9f44ca4b0,2024-09-06T16:38:04.533000 @@ -242204,6 +242211,10 @@ CVE-2024-10004,0,0,231cc5ca14331ea97625043de7a57398d2b1f74e8058a5b71a2840a63876a CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10018,0,0,48094474c9a835a3211b517c0339040bcffcf76ffcf2e981b9d66c0ec82efb42,2024-10-16T03:15:02.620000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 +CVE-2024-10021,1,1,07e6b52c1364dda8ad8ea27c95a3dabc68a676e7ccf5b45ebdbee80a281368c4,2024-10-16T12:15:07.663000 +CVE-2024-10022,1,1,8fa31ce99ccec4e2e52ee9bec89d95d4d376e26078adaac9508062c560c7628d,2024-10-16T12:15:08.163000 +CVE-2024-10023,1,1,ccbf4801c6b8aa5cf2b2aedcb35d6690eb8e2dd2a5d829b16e4da410a1eee636,2024-10-16T13:15:13.350000 +CVE-2024-10024,1,1,ce51adeabcce6f84d32448bdacfff70e14a2ad81fddb95d38b3025cbc2a17cbd,2024-10-16T13:15:13.650000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 @@ -242636,7 +242647,7 @@ CVE-2024-1450,0,0,5c78ee7ecaa738b41245290c13db435007588e4f06193084183217b1157cb9 CVE-2024-1451,0,0,06be5f5604355f77fabf82dd57df1f8809446c587ecb10ad9e69cebf8ec03e7a,2024-03-04T20:12:59.223000 CVE-2024-1452,0,0,e53b6badbfb961b470f92bd813c19b81fa9530e5a4fab209b8360590eeab9b44,2024-03-13T18:15:58.530000 CVE-2024-1453,0,0,4c7fdd77bf9774c0b4902debd5fbb9a5a455811c9e20dd37093901421ad05d83,2024-03-01T22:22:25.913000 -CVE-2024-1454,0,0,9c1d9da7cb6e13542db5ad8fde7cf11a522dc964e325e6c58d4572b66e6a68c8,2024-03-23T03:15:10.633000 +CVE-2024-1454,0,1,18d85e22fa9ffdfecab668843fd14652fcb1ac45d6f86513cdcc76aa1478a0be,2024-10-16T13:57:49.460000 CVE-2024-1455,0,0,150cf04553026c6d927055f564987fc57df0c743f9421c15918b44f92d1a260f,2024-04-16T12:15:09.230000 CVE-2024-1456,0,0,5b0bf210be135d03b9e0f0aa4d44e1d74b665ecf3cd8074dce271769fca228b4,2024-04-16T13:24:07.103000 CVE-2024-1458,0,0,3592b3461bffe67c8c4bc63c3d6ff327fca1737b7c0b5caa3c39b57cb625a124,2024-04-10T13:24:00.070000 @@ -244346,7 +244357,7 @@ CVE-2024-21488,0,0,83c39f70c0498b72911f550d6611f69059c8c9cdf3b0f0904578cd793bad0 CVE-2024-21489,0,0,6e86fec7408d381a4d3031befda9d6c352fa47e8cee94c50201daa0dfff4032f,2024-10-04T13:51:25.567000 CVE-2024-2149,0,0,63aa7f0d2a03697c39fae7a40d96338e0e86a5e57c9276eb9e14dee434e327b9,2024-05-17T02:38:04.480000 CVE-2024-21490,0,0,8fef65cf0f770a0e61ceff38aa6805ccb146d3ccd992f46918345da0115fd835,2024-10-10T13:51:02.213000 -CVE-2024-21491,0,0,63964727e1fdc972a64d38287aa6ef5a878b19c8b9971dfbb9cf22b94a0f689c,2024-03-06T14:15:48.020000 +CVE-2024-21491,0,1,8b3f805634bd0202a6da1c84d9cc592601351153f9b1f8af4e7e32c9715d19c2,2024-10-16T13:25:47.870000 CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3fc49,2024-02-20T19:50:53.960000 CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000 CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000 @@ -244640,7 +244651,7 @@ CVE-2024-2187,0,0,a8936a0952b83c5ba88ca6cea81f9850e57edc6e1289ba1fdb9217f4cb3f21 CVE-2024-21870,0,0,261e723ef3190c288a9a8c3f8500f3cefd68fef15433091d79f48a8358a48f68,2024-04-03T17:24:18.150000 CVE-2024-21871,0,0,9e312d84dd9b4a7b8467743245c308406e6b8b9b76e882b65ddead6c290aed9e,2024-09-16T18:03:16.707000 CVE-2024-21872,0,0,53e0faa097226f02f7b28a1019bf889e7e0fb2883871bfc21fe50f5bf87c752b,2024-05-28T17:15:09.413000 -CVE-2024-21875,0,0,c15eeb9fc23fb1b7054be1e69f99412e4f77868f1517c1932f7423f5619332ef,2024-09-05T13:50:08.927000 +CVE-2024-21875,0,1,d94092dada175a6c14145cd6d661efc5ba9ae7bfe0356d1291e89ee2b35fd0c0,2024-10-16T12:15:08.483000 CVE-2024-21876,0,0,c3710b348c31e352259903f2c418ef0aba69493db54d12f1534898cd1d5b4667,2024-08-23T18:05:55.543000 CVE-2024-21877,0,0,e2e73302f5bf8afaaaffb2f0db0c2d16b586fe615b2b0992bf2ac9b6679823c9,2024-08-23T18:06:45.520000 CVE-2024-21878,0,0,789e3fe91c4f9f15772842a823deae244077b3af25e7833e3c5892430f68e0d6,2024-08-23T17:52:11.777000 @@ -249692,7 +249703,7 @@ CVE-2024-28982,0,0,a19015356d660d2e2e0aa0476b84c95e664ecbb510badb624ee4eb55091f6 CVE-2024-28983,0,0,703d0fea3e992e6c157faf14895b95484e69f73d18d43a1bdd6448ade19b1d58,2024-09-18T14:36:16.267000 CVE-2024-28984,0,0,061a156a04ab4e4c76d21331d25299f4cff837eab5762774bbd4e38e96a6350a,2024-09-18T15:22:51.163000 CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000 -CVE-2024-28987,0,0,fd9407806be9984d6335ac9abd6eecc748e3ca1a4b5d0c8ad5582f580a3cab1e,2024-10-16T01:00:01.723000 +CVE-2024-28987,0,1,134caea59d5c8acf403cbb3a7d3c67116746c4784635b286d9fa1320e0c17afe,2024-10-16T13:05:08.363000 CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 CVE-2024-28990,0,0,c552d85779f742e9eee5a53e7cb3b834247c40cd3dea313e4f856bb71772b3d4,2024-09-16T18:05:28.957000 CVE-2024-28991,0,0,f3a76278588de09c2001ab77f03da4ee20a5494ef74524c789ac890512227cb2,2024-09-16T18:06:20.037000 @@ -252759,7 +252770,7 @@ CVE-2024-33181,0,0,050373cfb1c1e53ba8267dbc3fabd7fa63ef5d1b950dbe9c6f1ffa2007dbe CVE-2024-33182,0,0,85cf52b790aabe853226358e7739617cb8f2d818ce16c35309a03355724b6ba5,2024-08-01T13:51:45.673000 CVE-2024-3319,0,0,158d523f4b4278449eb505d443711326036725edee1f3bf66f060fea5f4e72ad,2024-05-15T16:40:19.330000 CVE-2024-3320,0,0,00dd140c669ed55b9724819953be5e5ab674983ce3dcac0f7cca51e60d13bb6e,2024-05-17T02:39:50.797000 -CVE-2024-33209,0,0,ac059f47fe6be1bb58ede6494b10e4f909701600addafff9d3b36e213f3ebc5d,2024-10-04T13:50:43.727000 +CVE-2024-33209,0,1,23a878e2073f134744034d1a78662ef24aa281701d58b60b1da6b83829cc478b,2024-10-16T13:33:21.313000 CVE-2024-3321,0,0,c2a87eddc88d30331563f9d17a640b75164460d2c5dacd42388be73c643c2230,2024-05-17T02:39:50.900000 CVE-2024-33210,0,0,a4330105a4d6b07d9316e6cba604bab6a3559db00469caeaea106e3e51ae6801,2024-10-04T13:50:43.727000 CVE-2024-33211,0,0,46152f7fae2f0904bdc8d43eed72ce61042ffe07ea20488d0724e6d357feeeca,2024-07-03T01:57:35.503000 @@ -254397,7 +254408,7 @@ CVE-2024-35664,0,0,d79002de8da9e4d3f22c86ffd8612cf721c3746877f9a04d00f31875fb615 CVE-2024-35665,0,0,3ec6c16cd5ce59c400ebb223fa0493349556b644d7485525d7dad77d94866b13,2024-06-13T18:36:45.417000 CVE-2024-35666,0,0,7d30ae20e2b20547d79bad15b0051704877dbfaf3d285a1eae11b5b5283cb8bd,2024-06-05T19:56:00.610000 CVE-2024-35667,0,0,c32fdbccccc90d44083bd3cba19fae84edd3cb0342751cb4029eff2079dc1b43,2024-06-13T18:36:45.417000 -CVE-2024-35668,0,0,de18d8120b6f95c99a8f2f97c12feacf43a4f3fb09be59bc33140eb046e17239,2024-06-05T19:55:05.997000 +CVE-2024-35668,0,1,49b71c5733405679aa5a6cffbeb4b1f5d70ff1fc7782fb400e93b7a73851724d,2024-10-16T13:26:19.017000 CVE-2024-35669,0,0,20efb437d66c1878fd59888d419c698eccea67ad6491e02d87d867ff4b2f6a6c,2024-06-10T02:52:08.267000 CVE-2024-3567,0,0,46438f6ba8ccb224e08abd25ef147809187d2726401fa8ce52eb0ec2d0d324c4,2024-06-10T18:39:52.067000 CVE-2024-35670,0,0,51723aef74fe3b42251da8d8a3c5d9d4b5ca7558b70cc7d63f887d024b81fa64,2024-08-01T13:52:44.810000 @@ -256082,7 +256093,7 @@ CVE-2024-3798,0,0,0b85fa9696a9b911425afa5f1da8b23352f77c3b644e418948a0e7e7520035 CVE-2024-37980,0,0,70458b75bacf19393793b89d35eb3b322f8d4d2f01c38ded10361b8e8312542e,2024-09-10T17:43:14.410000 CVE-2024-37981,0,0,21e2c6f93736909ccf452ff971bb58314fc8d03f8877901219941882d1cdb65e,2024-07-16T16:38:46.800000 CVE-2024-37982,0,0,1292ccc2fe03c8adf5b700bc537860b6176a2bf8245a83e69cdc6e18846029b1,2024-10-10T12:56:30.817000 -CVE-2024-37983,0,0,374c0a73ae0ebf72dddb80fd2ddbe206d85b4e03b510e4e97d6c59e2a0a9a119,2024-10-10T12:56:30.817000 +CVE-2024-37983,0,1,39a105b60c6e6ee1852628d9ff36501e8387b025b8bf6c3d832b1bcddc72f4a4,2024-10-16T13:15:20.690000 CVE-2024-37984,0,0,795bbd0d983da96a0e51622d507b54846875127f8b996aff715bb2b9778cfcc2,2024-07-17T15:48:09.993000 CVE-2024-37985,0,0,8e75e8ded91c606cf6f8a7951d4db59fbd2c888177e5eb0c4c7845eff08923bb,2024-09-29T00:26:19.423000 CVE-2024-37986,0,0,2487af021a0226ccec4882899dac83c56eac5cd7eeb2fa0beb7fe3b7d12bbdce,2024-07-12T18:59:41.357000 @@ -257072,7 +257083,7 @@ CVE-2024-39375,0,0,31332bf05b45d0877e0bebd823a0b8990f670564be1a4f26de0abecda30c1 CVE-2024-39376,0,0,094b2854b24d67516e532564da0172680d99cf6023e4bba311dd29dab7b73993,2024-09-17T18:32:09.573000 CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000 CVE-2024-39378,0,0,78d548832ec8eaca862f31d0849369d8a35a80bd3fe2e2677ab3e2744e35edc4,2024-09-18T19:16:39.390000 -CVE-2024-39379,0,0,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000 +CVE-2024-39379,0,1,937655b9f60345c2c3d4d209288aec8a6083432905819ab0ea023d403f9d9ae5,2024-10-16T13:38:32.573000 CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000 CVE-2024-39380,0,0,1910572fe42c7147873be8861011fe1658b3f4e08e9e17ecea7358ec80d109ff,2024-09-13T16:55:04.930000 CVE-2024-39381,0,0,c446a0a3cf348c0d4a05fe80309ddc5c180ba4a1c6f9ab0dd7c079d8ea253d78,2024-09-13T16:54:39.217000 @@ -257102,14 +257113,14 @@ CVE-2024-39402,0,0,8f9792ca39ac0f5735d2d339471513a0d0066ed8186936bed3b6cb6fc80ab CVE-2024-39403,0,0,07e4d8e2e8e77f045e47a14368527780bd5cf232eacf57cf163f25b08d6cbab6,2024-08-14T14:45:31.187000 CVE-2024-39404,0,0,0a57924699a1991f76f1f50910f14cbebc966dfeaddc9ac00c410fa553a973bd,2024-08-14T14:44:35.470000 CVE-2024-39405,0,0,eca7af29b059ce089e741bc6a4c7a853c086cfad9296c28a6d43dd725f7e44bb,2024-08-14T14:44:17.217000 -CVE-2024-39406,0,0,25d04b0f853cf383417a927f1df57bb53469f9bc9deb7d3dea31cd7c4b9bef49,2024-09-16T12:15:03.080000 +CVE-2024-39406,0,1,633fb315ca3cf7fbc901ff87493b47ea3021d4451c297abe74f6c359c41d4eb9,2024-10-16T13:37:57.910000 CVE-2024-39407,0,0,a04cbb78d44437ccd0b191c3d3b80ebe08944fb4ba6ecee4b56aa111da23fcee,2024-08-14T14:42:50.467000 -CVE-2024-39408,0,0,78ac02ebc7a31d73c30bb0b0fdb3565c4c03fb335f3337c1996a68797a39d9bb,2024-09-16T13:15:09.133000 -CVE-2024-39409,0,0,c94c20a181dda97d1ec8c605dd5d9d484beb306fe41b366d7c33da38095ea491,2024-09-16T13:15:09.387000 +CVE-2024-39408,0,1,a04b9d9586a65e8b3b2b8a3436bb7e17aeddb9297a359461cdebadedd6869697,2024-10-16T13:36:13.497000 +CVE-2024-39409,0,1,1d728e7ba1e6d584c5973295f3b86c5bdaca656c272947c18b496fe522679835,2024-10-16T13:35:32.290000 CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000 -CVE-2024-39410,0,0,80d8ff5a50f6536ea45b9c6d8909a33772be394437655373822bc6801ca5774a,2024-09-16T13:15:09.557000 +CVE-2024-39410,0,1,d4fb76feb6d703aec325d1b8952b775465a1af0a318e675a0d1406b74d55e4e1,2024-10-16T13:34:52.220000 CVE-2024-39411,0,0,1272b538409151f4f62bcba24a09806ce4b7e124f6e1ad5512b378725548cd2c,2024-08-14T14:40:55.510000 -CVE-2024-39412,0,0,2d8f844692ee592a9c89a505d8cfc64b3d2eefd95e162394536ffc1d73e487cd,2024-09-16T13:15:09.840000 +CVE-2024-39412,0,1,9c186aff7828cbce6c1530dfb5120772fbf9df3f5623d38a01aaf9818deea799,2024-10-16T13:33:27.910000 CVE-2024-39413,0,0,4a894151c2ac93955d773bf053f53d0a6272124b1d199025eed7c821185013ca,2024-08-14T14:39:39.737000 CVE-2024-39414,0,0,a4bb8c6b936f8f3de2a8e0d95754370d5eb00e62f1de95bf54a93c835f112913,2024-08-14T14:39:26.427000 CVE-2024-39415,0,0,894bb113716af642843f4f18ce95fb8548231a5b76d859c1eef366fbd2f5e3ce,2024-08-14T14:34:26.620000 @@ -258556,7 +258567,7 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6 CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000 CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000 CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000 -CVE-2024-41867,0,0,0b44a5cfeee3dcc50283505e9313394317205be34bd484508e6768cab06aa764,2024-09-16T13:15:10.550000 +CVE-2024-41867,0,1,fd5c870db572cf0990aeab1137beb7b2d076ec970020111ee85606a94793d440,2024-10-16T13:31:42.040000 CVE-2024-41868,0,0,474264e4381c67d192296dcca9e302a0bd9824b3109f4a89fdd2c65ae7fab6b0,2024-09-18T19:13:45.177000 CVE-2024-41869,0,0,b360088796a0288f30adc9e94f2784d3ed96eb99fe66d3cd813b58581cd0f09f,2024-09-19T15:09:52.967000 CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000 @@ -258665,7 +258676,7 @@ CVE-2024-42017,0,0,7f9a4913b1239026519e3fb7d6fc6d114e8e4e346f101e97cc1469132655d CVE-2024-42018,0,0,48c29334c5da2098d436407e3b178f068ba556edf0bd6315b98cc5d6fe724ba8,2024-10-15T12:58:51.050000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 -CVE-2024-42020,0,0,256c5ebd865730f43a9d1e31df527e38a101d62b918b1916a8bc092516adbeb9,2024-09-09T13:03:38.303000 +CVE-2024-42020,0,1,d569e3e7cf117be8e1c9449013dcb5505f3719093aed1760ccc7c7a75a0722b3,2024-10-16T13:15:54.167000 CVE-2024-42021,0,0,92fcf0a329a30077e7207f0242d35213efc1d1dd2f8104ea65b7c53bf17c0c14,2024-09-09T14:35:04.620000 CVE-2024-42022,0,0,9cf24962f372bb813f8c933991a85f958eb86110c2be996c8eb09086ce39756e,2024-09-09T15:35:09.917000 CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc8146b,2024-09-09T14:35:05.330000 @@ -260552,7 +260563,7 @@ CVE-2024-45143,0,0,c9b9a124829e0d2a7d474321709c5bbc931c06bd5326351ea6fa85f162edd CVE-2024-45144,0,0,64621bb6d61564f88f9feaa7e344b2f13a0396399af28a792d7d3f4e26dc3d76,2024-10-10T12:51:56.987000 CVE-2024-45145,0,0,c1818470b42fece224cd41c8bc05042642e8ea9d58b46cefbfb3b1af17d7185b,2024-10-10T12:51:56.987000 CVE-2024-45146,0,0,17ec48bf33b117e07b098d9477fe575ec7fef6e8962360588be61205dc1d5909,2024-10-10T12:51:56.987000 -CVE-2024-45148,0,0,9cb33460bbb35056f58ae317dd69784c25057b5c95ac53296d7214a24f478bc5,2024-10-11T22:12:23.237000 +CVE-2024-45148,0,1,0e90a71edeeb1f6c08cc4e8f74179b58bc7185e9e9129d62d43635e1d8f74649,2024-10-16T13:27:46.397000 CVE-2024-45149,0,0,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4727,2024-10-11T22:12:25.263000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45150,0,0,dbe919e5c667b9926e7c591cb1e366017443e889755041e9c87b727b9667b713,2024-10-10T12:51:56.987000 @@ -261479,12 +261490,12 @@ CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb CVE-2024-47000,0,0,d44e65f26ff5211f3ae15f921442088284d2de145a1f7d23069c9caedddf80a6,2024-09-24T20:25:30.493000 CVE-2024-47001,0,0,2bb4bf673c202add583b3cb6aa8d87ad17a722980665125974c3d12c60f8fe21,2024-09-20T12:30:51.220000 CVE-2024-47003,0,0,c6454df65c14575f310d6ef1594423fd9063d7eb945a40e78647d22752216edb,2024-09-26T18:42:29.383000 -CVE-2024-47007,0,0,cba47909844ff89b52b01f81272aa442efa9cc08afffba46ab835ac00f34c395,2024-10-10T12:56:30.817000 -CVE-2024-47008,0,0,c7534a20215bd95be86d32b3decf7881bdda0e595865d4dc9e1ba9e11cb17454,2024-10-10T12:56:30.817000 -CVE-2024-47009,0,0,93c4d7fb83910ede64f8945a04f24d6d6aa42133537ea8449962473352058ce8,2024-10-10T12:56:30.817000 +CVE-2024-47007,0,1,3966cfd0855356af21029f9e88ce4245313f12b1445c555ff24527e36ea648db,2024-10-16T13:23:03.467000 +CVE-2024-47008,0,1,ac9fc7439ea4c872f1a11d08feaa8243839dfaa7a5b88077656ebe89fc3922b6,2024-10-16T13:24:32.130000 +CVE-2024-47009,0,1,264b3f36a46fb3043a7ff13a0518523aa897b1a061a2770490e43d56fad1b234,2024-10-16T13:26:39.990000 CVE-2024-4701,0,0,5f841f0540b46f49c80d409ca526b0c08d190fe4f1f5bc2d7cfb115b5ba38647,2024-05-14T16:11:39.510000 -CVE-2024-47010,0,0,c332d13d6bc4c9de707b0b305984e8b800597de3eb03c505d94cd9509d8d2bf8,2024-10-10T12:56:30.817000 -CVE-2024-47011,0,0,63c77aaaecb38ba40258fc3df08e68da3c72085ea6c4b317b044afd49303d749,2024-10-10T12:56:30.817000 +CVE-2024-47010,0,1,ee58b9d0b7d45ffa465af597d034eab50b110dc72368e1b0d3bbec3fe3bad3d6,2024-10-16T13:28:07.393000 +CVE-2024-47011,0,1,834715db0c973116652eef0dcc6e7b991e8d6c4d096b7d3fa0496c73f0d11b86,2024-10-16T13:28:40.480000 CVE-2024-4702,0,0,bbb2ec3c513c4ef6cbdc2bf640b4bb7115c796c33db7b092e6fb7d12cf64fdd5,2024-05-15T16:40:19.330000 CVE-2024-4703,0,0,7e57d47de6048bcd912b4c77aa51d488946887d89315e68305481f1a25780324,2024-06-11T18:06:31.967000 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 @@ -261543,7 +261554,7 @@ CVE-2024-47128,0,0,34ea8927e934499e78ad6fe6ea64ad0e07c8dfb2bcd2b9a4925f5334d6b08 CVE-2024-47129,0,0,b38b36d9af9ba9097d5f30d3ac794a3599474bb5946ca986d25e9630ca9b227c,2024-10-07T17:54:22.923000 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-47130,0,0,e7f6fb202a607836b8263c1620a1a5e98a9ca050003113851c771acca23538dd,2024-10-07T17:57:43.347000 -CVE-2024-47134,0,0,2dc8636e0ee5fd2f97b814bd39f5b4217906ea0a61e539db830c2896b6e052cf,2024-10-04T13:50:43.727000 +CVE-2024-47134,0,1,c469be51a68158c099c563ecb132d768058c9b0b7de566d173182963980dd322,2024-10-16T13:50:32.607000 CVE-2024-47135,0,0,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000 CVE-2024-47136,0,0,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 @@ -261969,6 +261980,7 @@ CVE-2024-48033,0,0,8f5c8e0edb7dcfae09a626cf6444750e299103bc74d1c2eb25573eea6cdde CVE-2024-4804,0,0,27889f6e71f31f5b5cb9daf7c221df1ea26a19e5d20319852f304f02b73ccaf6,2024-06-04T19:20:50.450000 CVE-2024-48040,0,0,75285ff1778ed53ff4f87c50cadf2623354cdbd73a2ea1e7e03f15540cde1f0e,2024-10-15T12:57:46.880000 CVE-2024-48041,0,0,9636470c5937ff2a206ba0bfcba752cadd8615816ee98049f50969b87891e79a,2024-10-15T12:57:46.880000 +CVE-2024-48042,1,1,7631d4882f2a15f05db90f4f1e3762fc928e54ffca192197efe4aed22818ae38,2024-10-16T13:15:13.973000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 @@ -261998,7 +262010,7 @@ CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf2 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 CVE-2024-48251,0,0,4d098db24396007455b29406aa1659eb8d5f46a48fef3576943743462426dc0d,2024-10-15T12:57:46.880000 CVE-2024-48253,0,0,3bf19f22b051acf529017405a1e456dc3273dcf3e1fd7bc187ab36f4f4639f3f,2024-10-15T19:35:37.163000 -CVE-2024-48255,0,0,313b410d31dd8621f0d7faab3c11bc5341a96c35dca7329f3a83e566161ad534,2024-10-15T12:57:46.880000 +CVE-2024-48255,0,1,a826b5671f1255534307018f49f7a25dfbafe07430ab4d6dce4993224e178988,2024-10-16T13:35:03.290000 CVE-2024-48257,0,0,9f5631e693f5ccf56007259ca7fa4278ab31fa9e4d26cb7e4af7e2a3dfb55f8a,2024-10-15T20:35:12.940000 CVE-2024-48259,0,0,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 @@ -262152,9 +262164,12 @@ CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81 CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000 CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000 CVE-2024-4924,0,0,1be75affb45c8b20da2e31570d5662533bb5af7060cf2ef9bdabbaa6aefcbc3f,2024-06-13T18:36:09.013000 +CVE-2024-49247,1,1,7deb0181f0560e4a78510bb6fdf111e26ea3cdbbb03543e49e7c431a14dd2be2,2024-10-16T13:15:14.277000 CVE-2024-4925,0,0,e685289dc2254f889ad5a234b3fb30d6e7f6b2466e13190ceb3e2217a8a2793e,2024-06-04T19:20:53.933000 +CVE-2024-49257,1,1,7b8ce644c27d0aa540babed15d46feb5e84c9bfe46d4fe270cdbcf62ec75d4ee,2024-10-16T13:15:14.517000 CVE-2024-4926,0,0,0d237df43556e4b080e4a7390a685a0eb6e73f0f5564912a819a125e3b5027a7,2024-06-04T19:20:54.033000 CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b3606,2024-06-12T12:15:09.767000 +CVE-2024-49271,1,1,f2f25c2ecdf36f518f5d394e68c36bc15d53d88c94e48d11eb239381f7117971,2024-10-16T13:15:14.787000 CVE-2024-4928,0,0,e26d33912989577395dd3f5446c3b9e0710db7f1a80702fd147e50c8947c1051,2024-06-04T19:20:54.230000 CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000 CVE-2024-4930,0,0,af679b04f9fd8769c21afbd06a19763f2fe78e9326434dadfeea44855b5d14c8,2024-06-04T19:20:54.437000 @@ -262164,11 +262179,11 @@ CVE-2024-4933,0,0,4d4c0ec531cab6a4561c767f5a9082d29f26ceefaadcc74bb08507bf05ca5d CVE-2024-4934,0,0,fd5d4b9709dde517f56a9aae7369c165c45ceba9bcf88bee680213c2fc56b62f,2024-08-01T13:59:37.220000 CVE-2024-49340,0,0,bbc93ab9c45be01079f3c1d658cdfc2a6eecf00268e25c02a38c47ed2703edf5,2024-10-16T00:15:03.100000 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 -CVE-2024-49382,0,0,d6d3194a27b37c7540514c4731f1be0a1c4e00dff5b6d95578bca9d91ca2adeb,2024-10-15T12:57:46.880000 -CVE-2024-49383,0,0,9a79c1b14e996faf6e99c8814b1479907260de1955f2d41c586fc188ea94710f,2024-10-15T12:57:46.880000 -CVE-2024-49384,0,0,4f909b9909488641b14ba38aff1dfbd6065c34f23247c00f8c1f18bb284334ce,2024-10-15T12:57:46.880000 -CVE-2024-49387,0,0,b58241a7bb7721b4c23910b730295514abba830656a2629f22dda0812caa40ad,2024-10-15T12:57:46.880000 -CVE-2024-49388,0,0,dc8dff73536c142e42fd08217246ea13bb1218d9c1300e136efa90f7b42bc08d,2024-10-15T12:57:46.880000 +CVE-2024-49382,0,1,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 +CVE-2024-49383,0,1,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 +CVE-2024-49384,0,1,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 +CVE-2024-49387,0,1,e70e4e295fee330a123c323f35cb15d527d316ee3f5221af871424ea3c5d431e,2024-10-16T13:58:39.297000 +CVE-2024-49388,0,1,5d13081edde105848217330e8cc20460dfb42c426e8875787362e8bb17013386,2024-10-16T13:57:58.383000 CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150c3,2024-06-11T17:08:33.350000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000 @@ -263431,6 +263446,7 @@ CVE-2024-6376,0,0,2eceea6553f0e47a0e34ab01650b7781a20682f6799be39f9cd1e64f3f1985 CVE-2024-6377,0,0,a4383a12ef7c4e9b6235d084a289049b62e13ce9034f0b68805986655c50a719,2024-08-27T08:15:05.537000 CVE-2024-6378,0,0,7454eef210b98e6b1e597d6be8302018d48792f1f9421573a9f7b1dc13ff197f,2024-08-21T15:53:57.750000 CVE-2024-6379,0,0,a28eade3b1a09164fa7466fcbbaf023824917e2e858c95c995a8e2d79a83a15f,2024-08-27T09:15:03.780000 +CVE-2024-6380,1,1,c94834fad8f3c8d49813e9cf97c951a3a6daf5255d367dde62bfaa4fa1e7cc24,2024-10-16T12:15:08.767000 CVE-2024-6381,0,0,2822fb12d769fe1cca32125b45cae52ba3e5807419213b6087c6db8de8d2b326,2024-07-03T12:53:24.977000 CVE-2024-6382,0,0,9f140af24f460b4413fa844f95383cc153754360a136939b8743c2d8327ebf99,2024-07-03T12:53:24.977000 CVE-2024-6383,0,0,4622f4fc90fbde51d6570a14e2ee494e3e71659c68201475e4e4eb659c036ac0,2024-07-05T12:55:51.367000 @@ -264744,6 +264760,7 @@ CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000 CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000 CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000 +CVE-2024-8040,1,1,437a7aef402dde5441276acff2853f73da12ef4afd878651b64021ec437a64c3,2024-10-16T12:15:09.013000 CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a6898399,2024-09-11T16:54:10.997000 CVE-2024-8042,0,0,e4aa4e1a36a07a1eb78e15d1333e45b76f368de2e361b8c314d2f7b5ac3ec00f,2024-09-17T17:25:02.330000 CVE-2024-8043,0,0,64a4eb5bb222479441ed067bfc6fe873f303afec2ac8c6b2d3d33e0811bfa896,2024-09-27T18:22:43.967000 @@ -265151,7 +265168,7 @@ CVE-2024-8624,0,0,1732629a73b0f7a73256425937c92b86f35ca441eabdeb398d592189eec066 CVE-2024-8626,0,0,0a3a6a067accd62c7f1e4362c07a97c5507716edc2a0ef32e9c35b5c51ec20a4,2024-10-10T12:56:30.817000 CVE-2024-8628,0,0,eae51dc9330e4c3449bbbf5b2aafba06ad0db1b999ee8c88380618befb3102be,2024-09-26T16:42:16.700000 CVE-2024-8629,0,0,6c9063bb86e9be09fbe263c2afa91e0d043c7779d47db076384be2da04357d8a,2024-10-10T12:56:30.817000 -CVE-2024-8630,0,0,fa2e1d0ffca4b3a6674a3552869b604a1a3b291cd638b0dbeae393e9111a5cfd,2024-09-30T12:45:57.823000 +CVE-2024-8630,0,1,c5e92ea3475e7fdf4ce18793c10b7cc1fb102a32792867098f992a914ab99d4c,2024-10-16T13:15:59.997000 CVE-2024-8631,0,0,ec0f3e499204fe8b3096f23de4c15b4f57ab537964111dc6b7313fbad5d35ea5,2024-09-14T15:22:31.717000 CVE-2024-8632,0,0,e0cada97c6995cbb67fe42f80a349e37abe4361f782a8365fc38e88552a5da8f,2024-10-04T13:51:25.567000 CVE-2024-8633,0,0,11f9c1ab75a0acad9e38c7131ee0e717752f233463501613a3dd97a61fe47734,2024-10-01T14:17:43.700000 @@ -265319,7 +265336,7 @@ CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8918,0,0,084bd8c5ed92875e6f88d442f38453599e3b598184441c66b1a4885b965a4813,2024-10-16T07:15:16.777000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 -CVE-2024-8921,1,1,c76f9d87c5b4c284dcc906e3c2d531ea600ce7a78e6f16b796e6dc85bfd53fa7,2024-10-16T11:15:13.080000 +CVE-2024-8921,0,1,fb0eb850a34a1b05c910c2ff54b31084b7d71490e226dede8661082f694dea3c,2024-10-16T11:15:13.080000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 CVE-2024-8925,0,0,573fa9fc5dcadaf344ac622d80d126966b00ab4fb4c5a5f790f844b7bfe8b0ca,2024-10-10T12:57:21.987000 CVE-2024-8926,0,0,d0e916c7cd86cec53049a41ddbf4dec10c1366cdaa0ebe3384f1e3c4ead8cd0d,2024-10-10T12:57:21.987000 @@ -265566,7 +265583,7 @@ CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5e CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 -CVE-2024-9381,0,0,25cf43ff2a0a9532d395ad1081122edeb1520bcb9236eaf7cc384a1005025472,2024-10-10T12:56:30.817000 +CVE-2024-9381,0,1,b7ffa8189ba636e7b223831995cd87655bb323db0a8ce57a0037b68bd6c82df8,2024-10-16T13:30:34.740000 CVE-2024-9384,0,0,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000 CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688dc2,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 @@ -265595,7 +265612,7 @@ CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40c CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3e1,2024-10-15T12:58:51.050000 CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 -CVE-2024-9444,1,1,c35f85573c3a0322f2f144a2adfb339291383ffd313e4775ddaf4902a99cc782,2024-10-16T10:15:02.620000 +CVE-2024-9444,0,0,c35f85573c3a0322f2f144a2adfb339291383ffd313e4775ddaf4902a99cc782,2024-10-16T10:15:02.620000 CVE-2024-9445,0,0,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000 CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000 @@ -265801,8 +265818,8 @@ CVE-2024-9971,0,0,0594322115675ee753da27d556fc98ba9a723e7e04d41180f103320a4dd3f2 CVE-2024-9972,0,0,5672d796a3c0672617371b1fdfcdf3d8d1d30983cb269f7a20c96a13095710bc,2024-10-15T12:57:46.880000 CVE-2024-9973,0,0,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000 CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000 -CVE-2024-9975,0,0,19a95b0d8594378de1a658f6110dd6917411d1ac6b44da217f59a38aaf420a6d,2024-10-15T12:57:46.880000 -CVE-2024-9976,0,0,a0343d2773336f2452d12e06f8ed1c829d33d78887485939f459af0a85f318bf,2024-10-15T12:57:46.880000 +CVE-2024-9975,0,1,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000 +CVE-2024-9976,0,1,5980d080e9ad25dff2e581d3c904125c709818a390af58c76d59996e26d292c8,2024-10-16T13:42:24.153000 CVE-2024-9977,0,0,2ff728332776d36f7a0b4f17f71817f48b8215cf8e3f608a790b17fa094fa3ba,2024-10-15T13:15:11.457000 CVE-2024-9979,0,0,dafd9ca9f773f8e2b76ea816a62af234502d02e9d7ac277bfd64cb30201efc2c,2024-10-15T14:15:05.817000 CVE-2024-9980,0,0,227587e27b79422988a8ba9d0e19869dca70cd6d378d1d6d8beb91efa3b64d47,2024-10-15T12:57:46.880000