diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json new file mode 100644 index 00000000000..0f218ac7d18 --- /dev/null +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25219.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2019-25219", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-29T17:15:03.567", + "lastModified": "2024-10-29T17:15:03.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Asio C++ Library before 1.13.0 lacks a fallback error code in the case of SSL_ERROR_SYSCALL with no associated error information from the SSL library being used." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/chriskohlhoff/asio/commit/93337cba7b013150f5aa6194393e1d94be2853ec", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chriskohlhoff/asio/compare/asio-1-12-2...asio-1-13-0", + "source": "cve@mitre.org" + }, + { + "url": "https://think-async.com/Asio/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json index 221d57cfebf..e60701a6c7d 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48669.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48669", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T13:15:48.220", - "lastModified": "2024-05-01T19:50:25.633", + "lastModified": "2024-10-29T18:35:00.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/pseries: corrija una posible fuga de mem en papr_get_attr() `buf` est\u00e1 asignado en papr_get_attr(), y krealloc() de `buf` podr\u00eda fallar. Necesitamos liberar el \"buf\" original en caso de falla." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/1699fb915b9f61794d559b55114c09a390aaf234", diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3329.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3329.json index 6ec1b34daba..c1f367e7043 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3329.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3329.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3329", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-08-02T23:15:10.547", - "lastModified": "2023-11-07T04:18:31.170", + "lastModified": "2024-10-29T18:35:02.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json index c36c7a995d4..aa462b4ea6a 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35677.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35677", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.367", - "lastModified": "2023-09-13T17:39:58.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T18:35:00.990", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json b/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json index 46d246a7a1b..c1d4694bf63 100644 --- a/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json +++ b/CVE-2023/CVE-2023-356xx/CVE-2023-35680.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35680", "sourceIdentifier": "security@android.com", "published": "2023-09-11T21:15:42.490", - "lastModified": "2023-09-13T17:39:23.453", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T18:35:01.837", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-470" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-64xx/CVE-2023-6491.json b/CVE-2023/CVE-2023-64xx/CVE-2023-6491.json index 486936a8901..825350d9a8f 100644 --- a/CVE-2023/CVE-2023-64xx/CVE-2023-6491.json +++ b/CVE-2023/CVE-2023-64xx/CVE-2023-6491.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6491", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T06:15:09.320", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:59:12.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpchill:strong_testimonials:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.13", + "matchCriteriaId": "7A7E2DE8-5E8F-47D8-8973-6270FCD253B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3097409/strong-testimonials/tags/3.1.13/admin/views.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c3277d93-4f47-445b-a193-ff990b55d054?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7047.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7047.json index cfbd632343c..84cf81785d2 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7047.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7047.json @@ -2,8 +2,8 @@ "id": "CVE-2023-7047", "sourceIdentifier": "security@devolutions.net", "published": "2023-12-21T15:15:14.427", - "lastModified": "2024-01-04T18:37:04.157", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T17:35:02.770", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json index c71eda0520c..dbb14a42fed 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10073", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-17T17:15:11.253", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:18:17.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:informatik.hu-berlin:flair:0.14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2ACC9C94-1387-4C95-A667-7C2DB83BACEF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/bayuncao/vul-cve-20", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/bayuncao/vul-cve-20/blob/main/PoC.py", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.280722", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280722", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.420055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10276.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10276.json index ecf27cf5246..6a35f1f2507 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10276.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10276.json @@ -2,13 +2,13 @@ "id": "CVE-2024-10276", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T11:15:13.137", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:15:05.140", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability has been found in Tektronix Sentry 6.0.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /?page=reports of the component Reports Page. The manipulation of the argument z leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability has been found in Telestream Sentry 6.0.9 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /?page=reports of the component Reports Page. The manipulation of the argument z leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10491.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10491.json new file mode 100644 index 00000000000..c1536b872ca --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10491.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-10491", + "sourceIdentifier": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "published": "2024-10-29T17:15:03.853", + "lastModified": "2024-10-29T17:15:03.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been identified in the Express response.links\u00a0function, allowing for arbitrary resource injection in the Link\u00a0header when unsanitized data is used.\n\nThe issue arises from improper sanitization in `Link` header values, which can allow a combination of characters like `,`, `;`, and `<>` to preload malicious resources.\n\nThis vulnerability is especially relevant for dynamic parameters." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://www.herodevs.com/vulnerability-directory/cve-2024-10491", + "source": "36c7be3b-2937-45df-85ea-ca7133ea542c" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json b/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json index 9e2e3bc9e0a..42664f90096 100644 --- a/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json +++ b/CVE-2024/CVE-2024-204xx/CVE-2024-20481.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20481", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-10-23T18:15:11.737", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:47:44.083", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-10-24", "cisaActionDue": "2024-11-14", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -44,6 +64,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + }, { "source": "ykramarz@cisco.com", "type": "Secondary", @@ -55,10 +85,1480 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "02DB8AC0-A41E-41E8-BCBC-459C83347116" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FE3322F3-8FC7-4D6B-88DE-FAC3312EB3F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "608E3A14-3D44-429C-92DA-61FEF12D10BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "96DBD354-2BFB-4A66-8778-41FACC96F74F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.4:*:*:*:*:*:*:*", + "matchCriteriaId": "01FF9607-149F-43BE-9957-5F5C38CE49BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "B90D7BDE-3677-4F62-A68F-866E57471C23" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.6:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD18A1F-26E4-445C-A10E-32873795FA99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "2C64555C-AFFA-40A6-BD05-6D670972527A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A900C9D8-F325-4781-B3AB-3137CBC3D8EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "EB03B75F-F539-4A3D-97EC-0DCDD21CA089" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.10:*:*:*:*:*:*:*", + "matchCriteriaId": "BF4079F5-6807-405F-8582-13284BE36FEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "5A48D1F8-305F-4292-8E7A-959231BD5ECD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "D1CD01BD-6393-4EB7-A954-B5E4FC00AAB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "F5BDF296-CB64-445B-92A9-BE629009D271" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "29F999C7-AB88-4F43-8E8E-FBE11BC2DF6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "A316A657-16D8-4DC1-9EA2-6C79061F13F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "1AC1077E-9BD3-42A3-8919-6EFC2CE8E086" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.17:*:*:*:*:*:*:*", + "matchCriteriaId": "1A623887-B250-43EE-A106-57B810B5B930" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.2.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "A4D26852-B895-4C72-BFC8-AE29BCCF9E7E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8BDAB447-1F2C-4983-89B2-E723A82BCD71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1A0AB352-A4ED-4DF0-B749-84078DA48FA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CF3B749B-2EFB-4734-B775-180A6E8627FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "54006F46-95F3-4785-9660-C1DF21789783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "C61B2F7C-195B-4DBF-8C3C-0F269E56CEC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "C35A81B4-FC1D-4E28-8235-7DAD7F1B1C43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C62E1E33-480B-44C7-8155-EF725ACE7A5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.7:*:*:*:*:*:*:*", + "matchCriteriaId": "01831166-3C2C-48CC-A8DE-EEE631349C4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.8:*:*:*:*:*:*:*", + "matchCriteriaId": "F5107E77-57C9-4C7B-A974-BAF6F01BCA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.9:*:*:*:*:*:*:*", + "matchCriteriaId": "1ED851EA-1BDF-4D88-83E8-53B14F7C1FF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.10:*:*:*:*:*:*:*", + "matchCriteriaId": "279C2F98-E719-413A-A284-5AE1B28171CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.11:*:*:*:*:*:*:*", + "matchCriteriaId": "CBA2A3A4-12A9-4280-980E-B6D932185AEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.12:*:*:*:*:*:*:*", + "matchCriteriaId": "5665319D-5532-4F03-8F12-4F98C5548023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.13:*:*:*:*:*:*:*", + "matchCriteriaId": "5994E2A7-118C-4E08-AF03-4F2409E55AEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.14:*:*:*:*:*:*:*", + "matchCriteriaId": "6A7844A0-5EF6-4AD6-ACB8-E01D8579AC93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.15:*:*:*:*:*:*:*", + "matchCriteriaId": "6CD8A9AC-3FD8-4B30-8785-B541ADC4EDEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.16:*:*:*:*:*:*:*", + "matchCriteriaId": "298441F6-BAB5-4116-BEAF-DEFB75A52CBA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.17:*:*:*:*:*:*:*", + "matchCriteriaId": "63E08CFF-68F5-45E6-B6F3-D111D33C5E2A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.4.0.18:*:*:*:*:*:*:*", + "matchCriteriaId": "F58348A7-25EC-4023-B4CA-CAB35A3798C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ED2AFE0E-E86E-48B4-8F2E-EF270F362214" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "7C90AE41-3D8C-4ACB-BD39-F727B8C21B15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E67D82E2-C1B4-42C2-8E20-99AD23BCBD9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "204577E6-37DF-41FD-A102-0DA948399F3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E7FFD0D7-2B19-45FE-A808-4AAC64A4CA83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.5:*:*:*:*:*:*:*", + "matchCriteriaId": "AE5ED905-D723-4FF6-ADFF-EE8717F3BE7F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "2D072E33-BC63-4CE6-9C06-B3C70629DDA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CBA5BA53-D8D1-4839-ACBA-E1F7CE718C75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.7:*:*:*:*:*:*:*", + "matchCriteriaId": "A8B737F7-587E-4682-A0D7-F66357BABB9C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A45B6EAB-2372-4870-8E08-E8AE22ED7F3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.6.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4654FC54-A6D3-4F5D-AF55-6D3687AFF41C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "49DC76CE-4A98-478D-899C-9F7D2332D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36E9FB92-5CA2-4046-8D0D-EC12B37540AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A37D3C0E-03A7-48E2-A04D-86288138E5DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:6.7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "F642BF4F-B99D-4FEA-B3FE-6ED974C65124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DDE321FE-9034-4E0F-9A32-D41443A9D86A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "09E779C6-2740-47A1-A6D5-E22C6DC7D1CE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E794B83A-4A14-431C-B882-578CD70E412B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "292E681D-D4C0-4D85-B84C-4C9328FCD12F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "963A59C5-6EC0-4BAD-B547-EFA785707050" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "5F1551BB-37A4-4383-8AA8-DA25642B7353" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "88B6632C-4A35-4D10-B323-8C3266319114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.4:*:*:*:*:*:*:*", + "matchCriteriaId": "638D2739-FAA7-4880-BC2F-BC632140E9DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.5:*:*:*:*:*:*:*", + "matchCriteriaId": "40098313-CC8A-49E6-8095-093881DA7107" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.6:*:*:*:*:*:*:*", + "matchCriteriaId": "C00C3A8F-34AE-443E-9B77-0532C9F11F1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "01F32FDA-54ED-4117-8FA7-D749140F628F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.0.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "B8BA96B9-A0DD-4065-A295-FA85A33F7E84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B07AA16A-6DE0-4226-8A44-CDA8E26830D3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "8B7AC5D5-B171-4163-BFB3-02163DD8817B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0.2:*:*:*:*:*:*:*", + "matchCriteriaId": "31AD8591-C99A-4780-A742-13CFD921F46A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.1.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "173C2DA6-625C-465C-A080-E578539E30F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8288F62-8BEC-4318-8096-9D36817D1D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A617690D-92D7-4793-AEAC-15F31162D5F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F9608894-B4A7-49A1-863A-D44E53D6CE69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3FDB77ED-AB5E-475F-A5F8-515B807E99A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "0BEE0323-AC5A-4570-9681-14CD9FB8FD46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "F6773BC9-C84C-4249-B6C3-FD39BAAA0555" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A4DFC6F7-2BA1-4F32-AD55-8BF0888FDB92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "291705AE-7BAE-4305-BECA-204821BF467A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.5.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FC683581-4B46-46A8-BBD8-CB01283641DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CC2A816A-63D6-498B-B167-BE71F0019DB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.6:*:*:*:*:*:*:*", + "matchCriteriaId": "294D71C7-FFC3-4431-88AA-E03EFAE78CCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "FA8287D0-B817-4143-BE34-B3C7FEC7BDEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "9621C619-C4F8-4906-8A24-E560C08F6921" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.2.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7F9C8B-35E4-459C-B31E-FCF2DAD0120E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8AF82E95-C8D3-402B-BC97-29EA1771D5EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0350CCE9-512A-4A77-8FAB-7A8F9B061170" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "3CC55E28-36AC-4D40-BB6D-A1B53503F5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.3.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "66F0A624-DDE8-490C-9DA4-762CD39764B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "901C034C-DDA4-49E1-B8B4-62F3B5C00173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D094896F-425A-4E69-8941-41147222C42D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cisco:firepower_threat_defense_software:7.4.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "30825677-8EF7-46A0-BB47-887707E007C3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D482F818-0A8E-49D7-8E3E-0958019FA629" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "8E7BFB57-BC02-4930-A02F-83583E6A0FC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "026F1960-C879-4611-A60A-96311B63CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EAF8B33E-0C95-467D-A865-0A234E69D0CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "EFF144F5-D933-4DE4-818C-001BD9E3958A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.14:*:*:*:*:*:*:*", + "matchCriteriaId": "00112ED3-FE7B-425B-9A28-1E5F2BC8BB01" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.15:*:*:*:*:*:*:*", + "matchCriteriaId": "DDD491D5-FAAB-493F-91A6-D2F3B5F5970E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.17:*:*:*:*:*:*:*", + "matchCriteriaId": "1519F49D-588F-4B70-B38F-EF4F3E13FEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.20:*:*:*:*:*:*:*", + "matchCriteriaId": "15354443-5EB7-4712-B2DE-61DB33830759" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.24:*:*:*:*:*:*:*", + "matchCriteriaId": "248D6B44-E134-4DEC-A947-636824E3FDFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.26:*:*:*:*:*:*:*", + "matchCriteriaId": "0820A79C-F3EF-407F-9AC7-DCAB4CD39C89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.28:*:*:*:*:*:*:*", + "matchCriteriaId": "9D3E8805-85D2-4345-8076-039513209A31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.33:*:*:*:*:*:*:*", + "matchCriteriaId": "14BB907B-D75A-4F5E-B20D-5457A71A70EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.35:*:*:*:*:*:*:*", + "matchCriteriaId": "F118B803-4C55-436A-A136-0C1FEA49858F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.38:*:*:*:*:*:*:*", + "matchCriteriaId": "6A272121-408E-45F6-A2A1-0BA6EBC060A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.2.45:*:*:*:*:*:*:*", + "matchCriteriaId": "61C3A433-0792-434E-AC90-A84B346499D5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3:*:*:*:*:*:*:*", + "matchCriteriaId": "980CEA3B-5A81-4E8C-BEA3-DD31BE7DA2CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.8:*:*:*:*:*:*:*", + "matchCriteriaId": "A3910211-D4DB-4CA7-BBEA-DD8246FF10ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "C260BF30-7A33-4C70-9509-404856C93666" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "AF894850-39EC-4B57-BBFF-F1AB4F8389A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.16:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FAFCF9-0ABE-483E-9604-329762BB7870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "83DB4278-3126-4765-97C4-6C0A8C78DA78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.21:*:*:*:*:*:*:*", + "matchCriteriaId": "174E631B-6099-47DE-8790-BBF4B7FDB8CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.26:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE3538B-F612-4105-BFDE-A4B594482DCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.3.29:*:*:*:*:*:*:*", + "matchCriteriaId": "3143B0FF-C855-485E-A908-E48974B1643C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4:*:*:*:*:*:*:*", + "matchCriteriaId": "26DD9992-6D98-4E03-9599-ECF38A186FBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "24DCEAE6-355B-40AE-A7C8-AF744FCA8A86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "2097E81E-B422-4B93-AF09-F300A0E8AF71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "454DEA31-A607-4054-82D3-24A4FEB7358F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "57F0B213-8187-4465-84F1-FB8D92B36020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "E540771E-BA0B-42D1-8251-B576B0F142C4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.15:*:*:*:*:*:*:*", + "matchCriteriaId": "BEC2A833-BECF-4000-A592-6113A84C2D20" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.17:*:*:*:*:*:*:*", + "matchCriteriaId": "077F1416-924A-4D25-9CEE-3BD66A96A019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.20:*:*:*:*:*:*:*", + "matchCriteriaId": "5BDC8D92-D6E0-40EE-B190-D2B32C7DEB75" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "23CD5619-E534-4F40-998D-39DC19FA0451" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.25:*:*:*:*:*:*:*", + "matchCriteriaId": "C5D0EB11-14B1-44B3-8D46-B9DD872F772C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.26:*:*:*:*:*:*:*", + "matchCriteriaId": "4FA399CF-12DB-42E0-A66F-14508B52A453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.29:*:*:*:*:*:*:*", + "matchCriteriaId": "7B5A7608-E737-420E-9B5E-836600DAC701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.32:*:*:*:*:*:*:*", + "matchCriteriaId": "C7EB6801-336D-4F41-ADE7-1C58C63C3F6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.33:*:*:*:*:*:*:*", + "matchCriteriaId": "8413DA41-02A5-4269-8C88-9DD5076AF91B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.34:*:*:*:*:*:*:*", + "matchCriteriaId": "AA00285F-6914-4749-8A47-FC4EDAFFF3C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.35:*:*:*:*:*:*:*", + "matchCriteriaId": "4AA4D367-32B9-4F54-8352-A959F61A1FDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "2259FF9E-0C8B-440F-B1AC-51BDE3F60E68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.40:*:*:*:*:*:*:*", + "matchCriteriaId": "3C522B55-904D-4C08-B73E-1457D877C0AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.41:*:*:*:*:*:*:*", + "matchCriteriaId": "4483056A-FBF3-4E00-81EB-1E97334EF240" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.43:*:*:*:*:*:*:*", + "matchCriteriaId": "48677330-06AB-4C7F-B2AD-F7E465A9632A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.44:*:*:*:*:*:*:*", + "matchCriteriaId": "7AEA80D2-5DB8-4334-9A88-7DDE395832C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.45:*:*:*:*:*:*:*", + "matchCriteriaId": "FB1C38A5-1028-4AD3-8CC7-A00091091E76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.46:*:*:*:*:*:*:*", + "matchCriteriaId": "848147B2-C49A-43F6-9069-FC8885BDFDA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.8.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "D6FEF0DA-741E-4361-8143-068EB47D6520" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F002FD55-F881-450E-BC1B-8073E188F47E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AA940C4F-13BB-465F-BB8D-CBD0109BF012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "8B0434F5-9A50-4B57-9C5B-E09415D098C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2:*:*:*:*:*:*:*", + "matchCriteriaId": "AE727035-06CB-4E37-A9D2-96BD54502120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.1:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE52B81-2CF8-48E5-A7BA-A163A25A669B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E8D7C9-5272-40E6-869B-B33959F9F0CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "FE8D5D71-5C85-4644-8A84-F073549ADB50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "0790DDC2-7BA0-42DC-A157-754C0CBBE178" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3:*:*:*:*:*:*:*", + "matchCriteriaId": "882394EA-70C8-4D86-9AEF-5D273D8E518C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "855AD3CC-F404-48C5-80D2-7F2765D16D72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.7:*:*:*:*:*:*:*", + "matchCriteriaId": "26B6BF72-9124-4213-B3C0-BD31B46E8C91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "DE8FBE89-8FDA-4B9B-BA1A-90FFD482A585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.3.12:*:*:*:*:*:*:*", + "matchCriteriaId": "149C3872-8DA9-48DD-ADD0-2E84C1A76A40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4:*:*:*:*:*:*:*", + "matchCriteriaId": "D2D33E8C-294A-4C43-8DB6-9DA9F61F0B3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "7E23ACB0-DF8B-4672-A819-4DCD3104CE4A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.4:*:*:*:*:*:*:*", + "matchCriteriaId": "E4723B88-62BA-40E6-AA89-BAC02D6A036F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "7C698819-3C8E-4A16-8F52-42FF1E54C076" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "8D3CE74E-59E7-448A-8417-18F97C05C798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.10:*:*:*:*:*:*:*", + "matchCriteriaId": "0986C171-0E75-4F6F-A9BD-276830104E5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.13:*:*:*:*:*:*:*", + "matchCriteriaId": "66A2777A-7831-4324-AEB2-5D93B5F6C04B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.18:*:*:*:*:*:*:*", + "matchCriteriaId": "37045680-9189-4B7F-A4F7-4E682FE20A09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.24:*:*:*:*:*:*:*", + "matchCriteriaId": "B6C9F37B-CF3C-4861-A969-C7CF4946274A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.26:*:*:*:*:*:*:*", + "matchCriteriaId": "6A1DAF21-3FED-4691-9D4C-8FD8CEA7FB3A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.29:*:*:*:*:*:*:*", + "matchCriteriaId": "FB938E58-4963-4A31-8836-88E958592B30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.30:*:*:*:*:*:*:*", + "matchCriteriaId": "1E317897-EE97-44F3-96BB-E54228D72A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.35:*:*:*:*:*:*:*", + "matchCriteriaId": "1EF7FAB2-158D-4C48-9246-E7AD3BF1D801" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.37:*:*:*:*:*:*:*", + "matchCriteriaId": "056D43AE-ECDB-40D2-A196-18DDCD02629E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.38:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E555F3-3580-4D71-8D8D-92FE72763D62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "93013503-8B9A-4160-AF7E-277958FA6E9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.40:*:*:*:*:*:*:*", + "matchCriteriaId": "A3B009FD-0F2B-4511-8EDF-C3E670623F89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.41:*:*:*:*:*:*:*", + "matchCriteriaId": "52579D8D-E855-42B3-B406-32DD1C39F721" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.47:*:*:*:*:*:*:*", + "matchCriteriaId": "E7E44FC6-12A2-4F76-A095-28F3804B619F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "42917E5E-E362-4B40-B2B2-3C77BA35641C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.50:*:*:*:*:*:*:*", + "matchCriteriaId": "CF317FA3-EBF3-49BB-A9E6-0D4295FA3F60" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.52:*:*:*:*:*:*:*", + "matchCriteriaId": "F98B1683-914F-43D3-AE1C-311D3A90BE8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.54:*:*:*:*:*:*:*", + "matchCriteriaId": "A8D24656-CAB1-4A98-A440-482927FEDD16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.55:*:*:*:*:*:*:*", + "matchCriteriaId": "E504557C-DA5D-4D0F-A813-4CE7D5109F15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.56:*:*:*:*:*:*:*", + "matchCriteriaId": "04D2A067-C717-4921-BBF5-3EFBE02736EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.58:*:*:*:*:*:*:*", + "matchCriteriaId": "36DDEC5B-4BEA-499C-9F34-BB3D39B7A963" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.62:*:*:*:*:*:*:*", + "matchCriteriaId": "C4E44C37-0F6F-440B-BA26-FB6D0B179E44" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.65:*:*:*:*:*:*:*", + "matchCriteriaId": "6AEE0050-34DC-49CB-B859-8ED500FD79A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.12.4.67:*:*:*:*:*:*:*", + "matchCriteriaId": "6A47E5C5-E058-4B4C-A258-6DF7CE0EA92B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1:*:*:*:*:*:*:*", + "matchCriteriaId": "52D83C3A-ED0B-42D5-A08A-97D27E189875" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.6:*:*:*:*:*:*:*", + "matchCriteriaId": "A649E319-D408-4AA2-8293-C9E37AF14BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "F4187EFE-4D7E-4493-A6E0-24C98256CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "6730194F-5069-40AB-AE66-871D3992560C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.19:*:*:*:*:*:*:*", + "matchCriteriaId": "9E257F98-D1A0-4D28-9504-1749CC090D49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.1.30:*:*:*:*:*:*:*", + "matchCriteriaId": "3FF1A5FC-73BE-4218-86D9-2E81FA64EABD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2:*:*:*:*:*:*:*", + "matchCriteriaId": "4E492943-6EC0-4E34-9DBC-DD1C2CF1CDCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.4:*:*:*:*:*:*:*", + "matchCriteriaId": "589E46F3-8038-4B87-8C40-55C6268B82F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "3F3B73F6-139E-42DC-B895-DDD17B5A1138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2590E7-FE04-4B29-B36B-AABAA5F3B9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.2.15:*:*:*:*:*:*:*", + "matchCriteriaId": "3E4FD5E3-7E82-4294-8B05-D2045D857029" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3:*:*:*:*:*:*:*", + "matchCriteriaId": "4E998A4A-5346-4CFA-A617-FD1106C6B7A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.1:*:*:*:*:*:*:*", + "matchCriteriaId": "91265549-A16E-4A00-A031-4F1EB8D6881C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.9:*:*:*:*:*:*:*", + "matchCriteriaId": "EA3C316B-5485-4CDD-A1A1-6C0A9CB4719F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "ECE6D033-7B8B-4F61-B653-0C0EF13466EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "14441650-DAD5-4959-83DF-4D6F3D6A05FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "1B21ABC9-A64B-43E4-8951-1E6C0F427DBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.3.18:*:*:*:*:*:*:*", + "matchCriteriaId": "A48EC041-322F-422D-B95B-0FC07BDA2B6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4:*:*:*:*:*:*:*", + "matchCriteriaId": "FE0D50C0-DADB-4747-8649-8A5257111FE6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "FEE2699F-353F-44CB-A778-981783DDC31F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "7D8E50BD-1FBD-483B-9C27-70E95C732E55" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.12:*:*:*:*:*:*:*", + "matchCriteriaId": "F46E5E4F-787C-4C05-B1E7-C39BB9125D16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.13:*:*:*:*:*:*:*", + "matchCriteriaId": "D6A29312-38E7-456B-94DD-4D7329691114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.14:*:*:*:*:*:*:*", + "matchCriteriaId": "27F7BB31-C733-4C32-BF0F-33B5AF020156" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.15:*:*:*:*:*:*:*", + "matchCriteriaId": "DC313568-33A6-435B-98FF-8A7091D9C451" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.17:*:*:*:*:*:*:*", + "matchCriteriaId": "7F85710A-28CE-4913-8523-356461908FBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "D6069950-016B-419A-B754-D58956CB6D14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.23:*:*:*:*:*:*:*", + "matchCriteriaId": "5A2F3FEC-624F-47C5-B056-836861BB038A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.14.4.24:*:*:*:*:*:*:*", + "matchCriteriaId": "8C4B1136-66B6-42BA-BC17-86E7DCE1CF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EA0B9B73-A9E6-4924-9EAE-B57E534938FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "012812C4-EFF8-465F-A771-134BEB617CC9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "E06141A9-8C37-445A-B58A-45739AFE7D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "7EDC09E5-51D3-4672-B910-B34A9CBD6128" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "71ED7A71-81CB-444C-A4ED-EA4A58D5E73C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.16:*:*:*:*:*:*:*", + "matchCriteriaId": "CAD13331-0EB8-4C8D-85CC-D96CA9F829AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.17:*:*:*:*:*:*:*", + "matchCriteriaId": "7137F22B-F993-4620-9378-9412DAEA9EF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.15.1.21:*:*:*:*:*:*:*", + "matchCriteriaId": "923A40E8-6456-4288-B9AB-DBF5F9C4246A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1:*:*:*:*:*:*:*", + "matchCriteriaId": "13F57A86-6284-4269-823E-B30C57185D14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.1.28:*:*:*:*:*:*:*", + "matchCriteriaId": "F6560447-039C-40FA-A24D-C8994AC2743B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2:*:*:*:*:*:*:*", + "matchCriteriaId": "378ED826-F5FE-40BA-9FC0-9C185A13518B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.3:*:*:*:*:*:*:*", + "matchCriteriaId": "130B6FD9-764D-4EF8-91AA-37E52AE9B3E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "225861CE-FFF8-4AFA-A07B-CB8D5BC9C361" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.11:*:*:*:*:*:*:*", + "matchCriteriaId": "FD08C4E8-3ADB-4048-9B3C-4F0385201523" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "A4875811-F209-49ED-B310-8377B2F87FF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.2.14:*:*:*:*:*:*:*", + "matchCriteriaId": "99C52C7B-B626-4A3C-A2EC-28A20E7FA95F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3:*:*:*:*:*:*:*", + "matchCriteriaId": "08CCBF5E-257A-4A1F-8930-3643A9588838" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.3:*:*:*:*:*:*:*", + "matchCriteriaId": "782BC9ED-1395-472B-9F34-DED812AA5BFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.14:*:*:*:*:*:*:*", + "matchCriteriaId": "153449C0-B93F-49A2-8A6A-BE84305E8D2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.15:*:*:*:*:*:*:*", + "matchCriteriaId": "853A002C-839A-4372-8485-750A86E9F6E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.19:*:*:*:*:*:*:*", + "matchCriteriaId": "C62BB5D6-CE75-4C83-82DC-4148EF8CB1F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.3.23:*:*:*:*:*:*:*", + "matchCriteriaId": "D32F1365-EAF8-4570-B2FF-45E47E8586F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4:*:*:*:*:*:*:*", + "matchCriteriaId": "DFD07F9B-6BB3-4423-8DBE-4E89A6478E65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.9:*:*:*:*:*:*:*", + "matchCriteriaId": "34FE4F28-B704-4325-AE8A-C790163FEE71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.14:*:*:*:*:*:*:*", + "matchCriteriaId": "E832BC0C-8439-4779-9064-C2D93F231031" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.18:*:*:*:*:*:*:*", + "matchCriteriaId": "FA99DF94-D031-4375-9A16-306606FE28F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.19:*:*:*:*:*:*:*", + "matchCriteriaId": "FC149D03-5609-46E6-A1B3-F4D91F282B49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.27:*:*:*:*:*:*:*", + "matchCriteriaId": "B5D7FC6F-1370-4272-97E5-226C2ED1D335" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.38:*:*:*:*:*:*:*", + "matchCriteriaId": "164D5774-D51B-47C6-AD32-ED6B84E78BBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.39:*:*:*:*:*:*:*", + "matchCriteriaId": "24A810C8-1BB5-4589-84AB-C357C1937201" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.42:*:*:*:*:*:*:*", + "matchCriteriaId": "F22D8D65-2E88-4557-BF85-1E3ABD4CCAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.48:*:*:*:*:*:*:*", + "matchCriteriaId": "FF62C9AF-70F5-4A12-9B0A-F32551FB2C40" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.55:*:*:*:*:*:*:*", + "matchCriteriaId": "A04EB4FB-0C9F-441E-B02A-6B22F195348F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.57:*:*:*:*:*:*:*", + "matchCriteriaId": "ACDD7BD6-1C1D-49FE-8478-D0F37EB59BC3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.16.4.61:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7D8466-0050-495A-9442-8C5FF3912F5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1:*:*:*:*:*:*:*", + "matchCriteriaId": "27ACBA2A-87A7-4836-A474-AFD7D22F820D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.7:*:*:*:*:*:*:*", + "matchCriteriaId": "C73E0B2E-BABF-4998-A1D7-4E803F9D78AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "59306ADF-FAA6-4970-ADFB-C5D9A5AEF1AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.10:*:*:*:*:*:*:*", + "matchCriteriaId": "959107AC-E9EC-467C-901B-A3164E3762E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.11:*:*:*:*:*:*:*", + "matchCriteriaId": "6F944F8F-0255-42BE-BD44-D21EC9F0FFC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.13:*:*:*:*:*:*:*", + "matchCriteriaId": "0F39C535-5A41-47CE-A9CF-B360998D4BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.15:*:*:*:*:*:*:*", + "matchCriteriaId": "E9CEAEFC-7B82-41F9-A09D-C86A3A60A4FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.20:*:*:*:*:*:*:*", + "matchCriteriaId": "40FAC31D-19C0-4BA0-A019-C7E7A0BA0B5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.30:*:*:*:*:*:*:*", + "matchCriteriaId": "6CAAFE0F-416F-4BCA-BA37-30EAEADA8AFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.33:*:*:*:*:*:*:*", + "matchCriteriaId": "8E1E8552-58F0-491E-B7D7-E89527872FC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.17.1.39:*:*:*:*:*:*:*", + "matchCriteriaId": "9347D71D-1F50-4F85-9F6D-E11D79BD26E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1:*:*:*:*:*:*:*", + "matchCriteriaId": "0BA16A6D-2747-4DAC-A30A-166F1FD906FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "289F9874-FC01-4809-9BDA-1AF583FB60B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2:*:*:*:*:*:*:*", + "matchCriteriaId": "74EDFC67-E4EE-4D2C-BF9F-5881C987C662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "826869BE-4874-4BBA-9392-14851560BA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.7:*:*:*:*:*:*:*", + "matchCriteriaId": "EF52D477-3045-45D1-9FD3-12F396266463" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.2.8:*:*:*:*:*:*:*", + "matchCriteriaId": "88E310BF-F1F6-4124-A875-81967B9B531E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3:*:*:*:*:*:*:*", + "matchCriteriaId": "5B330F8F-F0DA-472C-A932-AD1D232C7DB5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.39:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF59DAA-268C-4FCF-A0AA-7967128AEBC5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.46:*:*:*:*:*:*:*", + "matchCriteriaId": "140ED95D-173C-4ADB-A2E6-97F0D595D1AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.53:*:*:*:*:*:*:*", + "matchCriteriaId": "BC9B00E1-3E50-4356-B6D9-F84BCD552402" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.55:*:*:*:*:*:*:*", + "matchCriteriaId": "552319A9-01F7-47BA-83B3-B2DD648AA07E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.3.56:*:*:*:*:*:*:*", + "matchCriteriaId": "4914603C-4B1B-48F1-826C-DB803BD21F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4:*:*:*:*:*:*:*", + "matchCriteriaId": "2AE21762-3085-4AFC-B1DE-A4562CDAC509" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.5:*:*:*:*:*:*:*", + "matchCriteriaId": "852C3478-7529-4002-8540-ABA4D556DEFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "23B8A815-5D58-4952-936E-D47B83637BEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.22:*:*:*:*:*:*:*", + "matchCriteriaId": "2C98D085-E321-4BAE-AF03-ABDEDC4D24BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.18.4.24:*:*:*:*:*:*:*", + "matchCriteriaId": "C05599C9-C0DB-47C1-B145-C410076C1049" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1:*:*:*:*:*:*:*", + "matchCriteriaId": "BEE52F59-AABA-4069-A909-64AD5DFD2B18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "20D7966E-B02B-48C8-BF96-723DD6C25314" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.9:*:*:*:*:*:*:*", + "matchCriteriaId": "FA618249-E76F-4104-9326-C9F2DC8DE3D7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.12:*:*:*:*:*:*:*", + "matchCriteriaId": "7C925E1F-6BD9-4CD1-8AC4-4263A9094786" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.18:*:*:*:*:*:*:*", + "matchCriteriaId": "C5EE76D9-6D18-4823-B6B0-E1394A4D140C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.22:*:*:*:*:*:*:*", + "matchCriteriaId": "3F635946-586D-4DE2-927B-300CE569C596" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.24:*:*:*:*:*:*:*", + "matchCriteriaId": "459C11B9-ABA1-472A-8CDA-9C7B4E48E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.27:*:*:*:*:*:*:*", + "matchCriteriaId": "FA060112-E2D8-4EC5-8400-D8D189A119B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.28:*:*:*:*:*:*:*", + "matchCriteriaId": "C3888BB0-B529-486C-8563-392BD1C5DFD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.19.1.31:*:*:*:*:*:*:*", + "matchCriteriaId": "43FE3FA7-8281-4BD9-A08B-8C79D369480E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B25468E3-03F9-4C2A-B82A-F87F4FCD57E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.1.5:*:*:*:*:*:*:*", + "matchCriteriaId": "5EC6F412-4A30-4E9A-B8DF-C4BF80E5C4B8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2:*:*:*:*:*:*:*", + "matchCriteriaId": "DA47E8EA-29F2-40F3-826E-E7295FFAD8C1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.10:*:*:*:*:*:*:*", + "matchCriteriaId": "B4D303F8-E6AA-4F1C-9988-055EECD0A902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.20.2.21:*:*:*:*:*:*:*", + "matchCriteriaId": "2DCBBA66-6D00-4D8B-86FE-81EF431A7806" + } + ] + } + ] + } + ], "references": [ { "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-bf-dos-vDZhLqrW", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24192.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24192.json index 38564aa13ae..dfc5daa96e6 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24192.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24192", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.213", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:25:10.853", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Se descubri\u00f3 que robdns commit d76d2e6 conten\u00eda un desbordamiento de mont\u00f3n a trav\u00e9s del bloque de componentes->nombre de archivo en /src/zonefile-insertion.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:robertdavidgraham:robdns:2015-12-09:*:*:*:*:*:*:*", + "matchCriteriaId": "468F3841-3FFD-4B95-A5AB-5BE25DB6066D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/robertdavidgraham/robdns/issues/8", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24195.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24195.json index d19d33af0cd..43438d090ec 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24195.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24195.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24195", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.390", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:24:07.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Se descubri\u00f3 que el commit de robdns d76d2e6 conten\u00eda una direcci\u00f3n desalineada en /src/zonefile-insertion.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:robertdavidgraham:robdns:2015-12-09:*:*:*:*:*:*:*", + "matchCriteriaId": "468F3841-3FFD-4B95-A5AB-5BE25DB6066D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/robertdavidgraham/robdns/issues/9", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-241xx/CVE-2024-24198.json b/CVE-2024/CVE-2024-241xx/CVE-2024-24198.json index 82e5e0e0e85..e4fddeca085 100644 --- a/CVE-2024/CVE-2024-241xx/CVE-2024-24198.json +++ b/CVE-2024/CVE-2024-241xx/CVE-2024-24198.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24198", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:10.480", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:45:47.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Se descubri\u00f3 que el commit de smartdns 54b4dc conten\u00eda una direcci\u00f3n desalineada en smartdns/src/util.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pymumu:smartdns:45:*:*:*:*:*:*:*", + "matchCriteriaId": "F7567279-7406-4D75-A9BA-4723E6C33110" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pymumu/smartdns/issues/1629", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2402.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2402.json index cf3f4c81c03..947d7931fa7 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2402.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2402.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2402", "sourceIdentifier": "contact@wpscan.com", "published": "2024-04-24T05:15:47.070", - "lastModified": "2024-04-24T13:39:42.883", + "lastModified": "2024-10-29T17:35:05.720", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Better Comments de WordPress anterior a 1.5.6 no sanitiza ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir a usuarios con privilegios elevados, como el administrador, realizar ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/98e050cf-5686-4216-bad1-575decf3eaa7/", diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25676.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25676.json index e84f1dda73e..8a4b14c6387 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25676.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25676.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25676", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-01T20:15:12.733", - "lastModified": "2024-05-02T13:27:25.103", + "lastModified": "2024-10-29T18:35:03.590", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en ViewerJS 0.5.8. Un script del componente carga contenido a trav\u00e9s de ETIQUETAS URL sin sanitizarlo adecuadamente. Esto conduce tanto a la redirecci\u00f3n abierta como a la carga de recursos fuera de banda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://excellium-services.com/cert-xlm-advisory/cve-2024-25676", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3288.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3288.json index 7a6020b9348..0d282e2a221 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3288.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3288", "sourceIdentifier": "contact@wpscan.com", "published": "2024-06-07T06:15:10.837", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:52:30.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "El complemento Logo Slider de WordPress anterior a 4.0.0 no valida ni escapa algunas de sus configuraciones del control deslizante antes de devolverlas en atributos, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superiores realizar ataques de Cross-Site Scripting Almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:logichunt:logo_slider:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.0.0", + "matchCriteriaId": "1E676EDD-A336-42BE-B662-29D43DD8B5D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/4ef99f54-68df-4353-8fc0-9b09ac0df7ba/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-36xx/CVE-2024-3652.json b/CVE-2024/CVE-2024-36xx/CVE-2024-3652.json index 31724b1cd36..a3e229b739a 100644 --- a/CVE-2024/CVE-2024-36xx/CVE-2024-3652.json +++ b/CVE-2024/CVE-2024-36xx/CVE-2024-3652.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3652", "sourceIdentifier": "d42dc95b-23f1-4e06-9076-20753a0fb0df", "published": "2024-04-11T02:15:47.790", - "lastModified": "2024-05-01T17:15:37.793", + "lastModified": "2024-10-29T18:35:08.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se notific\u00f3 a Libreswan Project sobre un problema que provocaba que libreswan se reiniciara al usar IKEv1 sin especificar una l\u00ednea esp=. Cuando el par solicita AES-GMAC, el controlador de propuestas predeterminado de libreswan provoca un error de aserci\u00f3n, falla y se reinicia. Las conexiones IKEv2 no se ven afectadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/04/18/2", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json index e571dcf23ab..0f1121d2674 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37845", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T19:15:03.973", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:35:04.397", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que MangoOS anterior a 5.2.0 conten\u00eda una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) autenticada a trav\u00e9s de la funci\u00f3n Comando de proceso activo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37845%20RCE.pdf", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json index b93bdad02ab..715c4f19643 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37846", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T19:15:04.027", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:35:05.693", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que MangoOS anterior a 5.2.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n de plantilla del lado del cliente (CSTI) a trav\u00e9s de la p\u00e1gina Editar administraci\u00f3n de la plataforma." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37846-CSTI.pdf", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json index 1e32aa2a375..d94c5a77b69 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37847", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T19:15:04.087", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:35:06.983", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,46 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en MangoOS anterior a 5.1.4 y Mango API anterior a 4.5.5 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de un archivo manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37847%20File%20Upload%20Path%20Traversal.pdf", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38476.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38476.json index 353ec181c97..a6fb93953cb 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38476.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38476.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38476", "sourceIdentifier": "security@apache.org", "published": "2024-07-01T19:15:04.977", - "lastModified": "2024-08-21T15:08:56.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T17:35:06.547", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3987.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3987.json index 5a79bc70486..f03c1752132 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3987.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3987", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T03:15:09.440", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:39:09.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,14 +39,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:freshlightlab:wp_mobile_menu:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.8.4.3", + "matchCriteriaId": "00711E9D-D22A-44D8-A246-87E2F225A39C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3097563/mobile-menu/trunk/includes/class-wp-mobile-menu-core.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7bcbc6b6-ed05-4709-bf05-214418798339?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json index 14c49d8350e..5ec1aeacd30 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40792.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40792", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.670", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:28:34.383", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15. Una aplicaci\u00f3n maliciosa podr\u00eda cambiar la configuraci\u00f3n de red." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json index 2d4bab4c55e..90c8f07bf18 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40851.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40851", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.740", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:42:35.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,74 @@ "value": "Este problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante con acceso f\u00edsico podr\u00eda acceder a las fotos de los contactos desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json index 3cf915e2083..63b529760f6 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40855.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40855", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.870", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:42:18.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,91 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n aislada puede tener acceso a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json index ab25ad966e5..b59f76b8f14 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40867", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.937", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:41:59.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,74 @@ "value": "Se solucion\u00f3 un problema de manejo de esquemas de URL personalizados con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante remoto podr\u00eda evadir el entorno limitado de contenido web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41617.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41617.json index c76f6b65cff..69a67f86ded 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41617.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41617.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41617", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T22:15:03.687", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-29T17:35:07.133", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Money Manager EX WebApp (web-money-manager-ex) 1.2.2 es vulnerable a un control de acceso incorrecto. La funci\u00f3n `redirect_if_not_loggedin` en `functions_security.php` no puede finalizar la ejecuci\u00f3n del script despu\u00e9s de redirigir a usuarios no autenticados. Esta falla permite que un atacante no autenticado cargue archivos arbitrarios, lo que puede provocar una ejecuci\u00f3n remota de c\u00f3digo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://github.com/moneymanagerex/web-money-manager-ex/commit/f2850b295ee21bc299799343a3bc4d004d05651d", diff --git a/CVE-2024/CVE-2024-416xx/CVE-2024-41618.json b/CVE-2024/CVE-2024-416xx/CVE-2024-41618.json index b036dcd4f06..4be9499d789 100644 --- a/CVE-2024/CVE-2024-416xx/CVE-2024-41618.json +++ b/CVE-2024/CVE-2024-416xx/CVE-2024-41618.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41618", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-24T22:15:03.787", - "lastModified": "2024-10-25T12:56:07.750", + "lastModified": "2024-10-29T17:35:08.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Money Manager EX WebApp (web-money-manager-ex) 1.2.2 es vulnerable a la inyecci\u00f3n SQL en la funci\u00f3n `transaction_delete_group`. La vulnerabilidad se debe a una desinfecci\u00f3n incorrecta de la entrada del usuario en el par\u00e1metro `TrDeleteArr`, que se incorpora directamente a una consulta SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/moneymanagerex/web-money-manager-ex/commit/f2850b295ee21bc299799343a3bc4d004d05651d", diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json index d62159bb23d..64e841691fe 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42508.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42508", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-10-18T16:15:04.710", - "lastModified": "2024-10-21T17:10:22.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:38:49.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,8 +15,41 @@ "value": "Esta vulnerabilidad podr\u00eda ser explotada para provocar la divulgaci\u00f3n no autorizada de informaci\u00f3n a usuarios autenticados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security-alert@hpe.com", "type": "Secondary", @@ -28,10 +61,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:oneview:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.20.00", + "matchCriteriaId": "B081F48C-BFCB-4BAB-A774-226EEDD28608" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04721en_us&docLocale=en_US", - "source": "security-alert@hpe.com" + "source": "security-alert@hpe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json index 57796b5bf03..bbfe9ac4829 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44122", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.123", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:38:18.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,91 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda salir de su entorno limitado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json index 9ceadd65a4e..753749b9ca3 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44123", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.190", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:37:15.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,88 @@ "value": "Se solucion\u00f3 un problema de permisos con restricciones adicionales. Este problema se solucion\u00f3 en macOS Sequoia 15, iOS 18 y iPadOS 18. Una aplicaci\u00f3n maliciosa con privilegios de superusuario podr\u00eda acceder a la informaci\u00f3n de ubicaci\u00f3n y a la entrada del teclado sin el consentimiento del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json index 0506d3b6b84..44dcb61183c 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44126.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44126", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.263", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:35:48.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,133 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15, iOS 17.7 y iPadOS 17.7, macOS Sonoma 14.7, visionOS 2, iOS 18 y iPadOS 18. El procesamiento de un archivo manipulado con fines malintencionados puede provocar da\u00f1os en el mont\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7", + "matchCriteriaId": "064488F4-456F-4C5D-B325-4F1FCDF2D432" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7", + "matchCriteriaId": "B8542FD9-368A-4A38-965E-47AE279208F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7", + "matchCriteriaId": "06F1EED8-2BB5-4768-908B-83AF76DE7B5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0", + "matchCriteriaId": "A6AE7B0F-C356-4601-9636-617CDD09F009" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121246", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121247", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121249", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json index cc9ed595583..b8a9b015f7a 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44137.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44137", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.330", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:35:23.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,91 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1, macOS Sequoia 15 y macOS Sonoma 14.7.1. Un atacante con acceso f\u00edsico podr\u00eda compartir elementos desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json index dba6c095bea..405f9aa1f94 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44144.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44144", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.397", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:34:55.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,140 @@ "value": "Se solucion\u00f3 un desbordamiento de b\u00fafer mejorando la validaci\u00f3n de tama\u00f1o. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1, tvOS 18, watchOS 11, visionOS 2, iOS 18 y iPadOS 18. El procesamiento de un archivo manipulado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "20977171-B964-4F89-AF53-6136003EDDB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "F34BD4C1-5C6A-4C6D-BD96-8CC3F3CBFF74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.0", + "matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121240", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121248", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121249", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json index d1b1d210288..b3c5fbdca6f 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44155.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44155", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.460", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:34:16.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,124 @@ "value": "Se solucion\u00f3 un problema de manejo de esquemas de URL personalizados con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en Safari 18, iOS 17.7.1 y iPadOS 17.7.1, macOS Sequoia 15, watchOS 11, iOS 18 y iPadOS 18. El contenido web manipulado con fines malintencionados puede infringir la pol\u00edtica de la sandbox de iframe." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "0DCB4657-8F40-418E-8E98-743C271E4CDE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.0", + "matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121240", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121241", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json index de055da2063..b88ae83324f 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44156.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44156", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.543", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:33:51.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "Se solucion\u00f3 una vulnerabilidad de eliminaci\u00f3n de ruta al evitar que el c\u00f3digo vulnerable se ejecutara con privilegios. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda eludir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json index 3f97e8c4b6c..7da09f9817b 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44159", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.603", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:33:37.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "Se solucion\u00f3 una vulnerabilidad de eliminaci\u00f3n de ruta al evitar que el c\u00f3digo vulnerable se ejecutara con privilegios. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda eludir las preferencias de privacidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json index a4031eea562..b8c75e76e60 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44174.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44174", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.667", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-29T17:33:16.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Sequoia 15. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json index 67cc8e0de0d..be4d6e489ba 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48218", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.603", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:35:08.783", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Funadmin v5.0.2 tiene una vulnerabilidad de inyecci\u00f3n SQL en /curd/table/list." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/21", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json index 0fce9285377..48fc121bd9f 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48222", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.680", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:35:10.053", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Funadmin v5.0.2 tiene una vulnerabilidad de inyecci\u00f3n SQL en /curd/table/edit." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/22", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json index 39ecb1c6bda..ad5e9df5140 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48223.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48223", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.740", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:35:11.373", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Funadmin v5.0.2 tiene una vulnerabilidad de inyecci\u00f3n SQL en /curd/table/fieldlist." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/23", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json index 1d898bc302d..56436045a33 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48224.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48224", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T21:15:03.793", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:35:12.697", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Funadmin v5.0.2 tiene una vulnerabilidad de lectura de archivos arbitrarios en /curd/index/editfile." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/funadmin/funadmin/issues/24", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json new file mode 100644 index 00000000000..41221ec708b --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48955.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-48955", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-29T18:15:05.690", + "lastModified": "2024-10-29T18:15:05.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In NetAdmin 4.0.30319, an attacker can steal a valid session cookie and inject it into another device, granting unauthorized access. This type of attack is commonly referred to as session hijacking." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/BrotherOfJhonny/CVE-2024-48955_Overview", + "source": "cve@mitre.org" + }, + { + "url": "https://netadmin.software/gestao-de-identidade-e-acesso/", + "source": "cve@mitre.org" + }, + { + "url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2024-48955&sortby=bydate", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49978.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49978.json index 55b05eb3ff6..d3ce2090829 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49978.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49978", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:18.483", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:01:43.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,122 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: gso: arregla la segmentaci\u00f3n de fraglist gso udp despu\u00e9s de extraer de frag_list Detecta skbs de fraglist gso con geometr\u00eda corrupta (ver abajo) y p\u00e1salos a skb_segment en lugar de a skb_segment_list, ya que el primero puede segmentarlos correctamente. Skbs SKB_GSO_FRAGLIST v\u00e1lidos: consisten en dos o m\u00e1s segmentos: el head_skb contiene los encabezados de protocolo m\u00e1s el primero gso_size: uno o m\u00e1s skbs de frag_list contienen exactamente un segmento: todos menos el \u00faltimo deben ser gso_size Los ganchos de ruta de datos opcionales como NAT y BPF (bpf_skb_pull_data) pueden modificar estos skbs, rompiendo estos invariantes. En casos extremos, extraen todos los datos en skb lineal. Para UDP, esto provoca un desreferenciado de ptr NULL en __udpv4_gso_segment_list_csum en udp_hdr(seg->next)->dest. Detecta geometr\u00eda no v\u00e1lida debido a la extracci\u00f3n, verificando el tama\u00f1o de head_skb. No la elimines, ya que esto puede convertir un destino en un agujero negro. Convierte para poder pasar a skb_segment normal." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.6", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D22D5882-BF74-46ED-9D50-1924ECF3C786" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/080e6c9a3908de193a48f646c5ce1bfb15676ffc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/33e28acf42ee863f332a958bfc2f1a284a3659df", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3cd00d2e3655fad3bda96dc1ebf17b6495f86fea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a1e40ac5b5e9077fe1f7ae0eb88034db0f9ae1ab", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/af3122f5fdc0d00581d6e598a668df6bf54c9daa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49979.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49979.json index a071dd4d686..99002c95f51 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49979.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49979", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:18.550", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:02:14.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,94 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: gso: arregla la segmentaci\u00f3n de tcp fraglist despu\u00e9s de extraer de frag_list Detecta skbs tcp gso fraglist con geometr\u00eda corrupta (ver abajo) y p\u00e1salos a skb_segment en lugar de a skb_segment_list, ya que el primero puede segmentarlos correctamente. Skbs SKB_GSO_FRAGLIST v\u00e1lidos: consisten en dos o m\u00e1s segmentos: el head_skb contiene los encabezados de protocolo m\u00e1s el primer gso_size: uno o m\u00e1s skbs frag_list contienen exactamente un segmento: todos menos el \u00faltimo deben ser gso_size Los ganchos de ruta de datos opcionales como NAT y BPF (bpf_skb_pull_data) pueden modificar estos skbs, rompiendo estos invariantes. En casos extremos, extraen todos los datos en skb lineal. Para TCP, esto provoca un desreferenciado de ptr NULL en __tcpv4_gso_segment_list_csum en tcp_hdr(seg->next). Detecta geometr\u00eda no v\u00e1lida debido a la extracci\u00f3n, verificando el tama\u00f1o de head_skb. No lo descartes, ya que esto puede convertir un destino en un agujero negro. Convierte para poder pasar a skb_segment normal. Enfoque y descripci\u00f3n basados en un parche de Willem de Bruijn." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "20A9A1A8-B921-4FB1-BC2B-00E240DE3643" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/17bd3bd82f9f79f3feba15476c2b2c95a9b11ff8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2d4a83a44428de45bfe9dccb0192a3711d1097e0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3fdd8c83e83fa5e82f1b5585245c51e0355c9f46", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49999.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49999.json index 894b1311a69..0c00df62fd7 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49999.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49999", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:19.973", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:03:40.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,94 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: afs: Arreglar la configuraci\u00f3n del indicador de respuesta del servidor En afs_wait_for_operation(), configuramos la transcripci\u00f3n del indicador de respuesta de llamada en el registro del servidor que usamos despu\u00e9s de realizar el bucle de iteraci\u00f3n del servidor de archivos, pero es posible salir del bucle despu\u00e9s de haber recibido una respuesta del servidor que descartamos (por ejemplo, devolvi\u00f3 un aborto o comenzamos a recibir datos, pero la llamada no se complet\u00f3). Esto significa que op->server podr\u00eda ser NULL, pero no lo verificamos antes de intentar configurar el indicador del servidor." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "0E3AE738-A62B-4806-9D9C-933998214C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3d51ab44123f35dd1d646d99a15ebef10f55e263", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/97c953572d98080c5f1486155350bb688041747a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ff98751bae40faed1ba9c6a7287e84430f7dec64", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4902.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4902.json index 136fd043cd3..02e6686c834 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4902.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4902.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4902", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T05:15:49.740", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:07:23.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -39,18 +59,57 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.2", + "matchCriteriaId": "6F84873F-FB6C-4354-B70A-1E2B7CA481CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/tutor/tags/2.7.0/classes/Utils.php#L1936", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3098465%40tutor%2Ftrunk&old=3086489%40tutor%2Ftrunk&sfp_email=&sfph_mail=#file8", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f00e8169-3b8f-44a0-9af2-e81777a913f8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50459.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50459.json new file mode 100644 index 00000000000..5955f1a1da9 --- /dev/null +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50459.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50459", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T17:15:04.423", + "lastModified": "2024-10-29T17:15:04.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in HM Plugin WordPress Stripe Donation and Payment Plugin allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WordPress Stripe Donation and Payment Plugin: from n/a through 3.2.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-stripe-donation/wordpress-aidwp-plugin-3-2-3-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50466.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50466.json new file mode 100644 index 00000000000..3e5f2a0ba80 --- /dev/null +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50466.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50466", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-10-29T17:15:04.640", + "lastModified": "2024-10-29T17:15:04.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in DarkMySite DarkMySite \u2013 Advanced Dark Mode Plugin for WordPress darkmysite allows Cross Site Request Forgery.This issue affects DarkMySite \u2013 Advanced Dark Mode Plugin for WordPress: from n/a through 1.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/darkmysite/wordpress-darkmysite-advanced-dark-mode-plugin-for-wordpress-plugin-1-2-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50573.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50573.json index 82d76551047..ca89fc53abe 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50573.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50573.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50573", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:08.040", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:12:14.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains Hub before 2024.3.47707 improper access control allowed users to generate permanent tokens for unauthorized services" + }, + { + "lang": "es", + "value": "En JetBrains Hub antes de 2024.3.47707, un control de acceso inadecuado permit\u00eda a los usuarios generar tokens permanentes para servicios no autorizados" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -37,7 +61,7 @@ }, "weaknesses": [ { - "source": "cve@jetbrains.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -45,12 +69,43 @@ "value": "CWE-862" } ] + }, + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "F0C96330-C723-4B53-B678-2400CDB81854" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50574.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50574.json index de2d9b6d38f..00895272fa3 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50574.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50574.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50574", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:08.310", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:16:11.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 potential ReDoS exploit was possible via email header parsing in Helpdesk functionality" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707 era posible una posible explotaci\u00f3n ReDoS a trav\u00e9s del an\u00e1lisis del encabezado del correo electr\u00f3nico en la funcionalidad del Helpdesk" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50575.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50575.json index 7763712479e..b9b3ef04b5e 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50575.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50575.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50575", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:08.583", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:18:26.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 reflected XSS was possible in Widget API" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707, el XSS reflejado era posible en la API del widget" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50576.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50576.json index b4e3d5126ca..a26764004f4 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50576.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50576.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50576", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:08.787", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:18:08.373", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 stored XSS was possible via vendor URL in App manifest" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707, el XSS almacenado era posible a trav\u00e9s de la URL del proveedor en el manifiesto de la aplicaci\u00f3n" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50577.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50577.json index 9ccbddbe0a1..f4753239bb0 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50577.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50577.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50577", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:08.987", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:18:02.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 stored XSS was possible via Angular template injection in Hub settings" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707, el XSS almacenado era posible a trav\u00e9s de la inyecci\u00f3n de plantilla angular en la configuraci\u00f3n del Hub" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50578.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50578.json index c313c83d581..90cd0bb33fe 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50578.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50578.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50578", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:09.190", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:17:53.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 stored XSS was possible via sprint value on agile boards page" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707, el XSS almacenado era posible a trav\u00e9s del valor del sprint en la p\u00e1gina de tableros \u00e1giles" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50579.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50579.json index 10b8e73bb82..3b91c55c5d4 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50579.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50579.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50579", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:09.390", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:17:46.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 reflected XSS due to insecure link sanitization was possible" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707 era posible que se XSS reflejado debido a la desinfecci\u00f3n de enlaces inseguros" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50580.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50580.json index 4eb40fdb036..aa3ee95d6a6 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50580.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50580.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50580", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:09.597", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:17:29.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 multiple XSS were possible due to insecure markdown parsing and custom rendering rule" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707, eran posibles varios XSS debido al an\u00e1lisis de Markdown inseguro y a una regla de representaci\u00f3n personalizada" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50581.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50581.json index c2ee5f6d54b..36f61a11a03 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50581.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50581.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50581", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:09.797", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:17:20.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 improper HTML sanitization could lead to XSS attack via comment tag" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707, la desinfecci\u00f3n incorrecta del HTML podr\u00eda provocar un ataque XSS a trav\u00e9s de la etiqueta de comentario" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50582.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50582.json index e765933b839..321e1ba1f18 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50582.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50582.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50582", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-10-28T13:15:09.997", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T17:16:46.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In JetBrains YouTrack before 2024.3.47707 stored XSS was possible due to improper HTML sanitization in markdown elements" + }, + { + "lang": "es", + "value": "En JetBrains YouTrack antes de 2024.3.47707, el XSS almacenado era posible debido a una desinfecci\u00f3n HTML incorrecta en elementos Markdown" } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cve@jetbrains.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.47707", + "matchCriteriaId": "CB12320F-E3AC-4F21-BB60-B56B2091966B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5612.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5612.json index b65978c683b..ea6f384f600 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5612.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5612.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5612", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-07T05:15:50.523", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T18:05:42.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -39,14 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:essential_addons_for_elementor:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.8.16", + "matchCriteriaId": "E1EA971E-7A1A-49DF-84DF-319DA0CBEFDA" + } + ] + } + ] + } + ], "references": [ { "url": "https://essential-addons.com/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8dbe4104-b7d1-484f-a843-a3d1fc02999d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json index 0eafc665f69..6a5f7e812a7 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8923", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-10-29T16:15:06.417", - "lastModified": "2024-10-29T16:15:06.417", + "lastModified": "2024-10-29T17:15:04.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -79,6 +79,18 @@ } ] }, + "weaknesses": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706070", diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8924.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8924.json new file mode 100644 index 00000000000..57ca7b4cc23 --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8924.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-8924", + "sourceIdentifier": "psirt@servicenow.com", + "published": "2024-10-29T17:15:04.983", + "lastModified": "2024-10-29T17:15:04.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ServiceNow has addressed a blind SQL injection vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to extract unauthorized information.\u00a0ServiceNow deployed an update to hosted instances, and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706072", + "source": "psirt@servicenow.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9988.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9988.json new file mode 100644 index 00000000000..dc23478582a --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9988.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9988", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-29T17:15:05.227", + "lastModified": "2024-10-29T17:15:05.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due to missing validation on the user being supplied in the 'crypto_connect_ajax_process::register' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L91", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7bfe87cf-9883-4f8f-a0f5-23bbc7bb9b7c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9989.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9989.json new file mode 100644 index 00000000000..09c8d74c326 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9989.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-9989", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-29T17:15:05.463", + "lastModified": "2024-10-29T17:15:05.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Crypto plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.15. This is due a to limited arbitrary method call to 'crypto_connect_ajax_process::log_in' function in the 'crypto_connect_ajax_process' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L138", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L33", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e21bd924-1d96-4371-972a-5c99d67261cc?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9990.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9990.json new file mode 100644 index 00000000000..34086a23d45 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9990.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-9990", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-29T17:15:05.707", + "lastModified": "2024-10-29T17:15:05.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Crypto plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.15. This is due to missing nonce validation in the 'crypto_connect_ajax_process::check' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator via a forged request granted they can trick a site administrator into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L31", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/crypto/tags/2.10/includes/class-crypto_connect_ajax_register.php#L65", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cea39157-94aa-4982-983e-9c3e4b1af86d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index bd0c057df89..2284dc9594f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-29T17:00:30.149051+00:00 +2024-10-29T19:00:19.928735+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-29T16:59:05.867000+00:00 +2024-10-29T18:45:47.057000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267551 +267560 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `9` -- [CVE-2024-10452](CVE-2024/CVE-2024-104xx/CVE-2024-10452.json) (`2024-10-29T16:15:04.593`) -- [CVE-2024-25566](CVE-2024/CVE-2024-255xx/CVE-2024-25566.json) (`2024-10-29T16:15:04.947`) -- [CVE-2024-48921](CVE-2024/CVE-2024-489xx/CVE-2024-48921.json) (`2024-10-29T15:15:10.593`) -- [CVE-2024-49768](CVE-2024/CVE-2024-497xx/CVE-2024-49768.json) (`2024-10-29T15:15:11.440`) -- [CVE-2024-49769](CVE-2024/CVE-2024-497xx/CVE-2024-49769.json) (`2024-10-29T15:15:12.030`) -- [CVE-2024-50334](CVE-2024/CVE-2024-503xx/CVE-2024-50334.json) (`2024-10-29T15:15:12.560`) -- [CVE-2024-7985](CVE-2024/CVE-2024-79xx/CVE-2024-7985.json) (`2024-10-29T16:15:06.180`) -- [CVE-2024-8923](CVE-2024/CVE-2024-89xx/CVE-2024-8923.json) (`2024-10-29T16:15:06.417`) +- [CVE-2019-25219](CVE-2019/CVE-2019-252xx/CVE-2019-25219.json) (`2024-10-29T17:15:03.567`) +- [CVE-2024-10491](CVE-2024/CVE-2024-104xx/CVE-2024-10491.json) (`2024-10-29T17:15:03.853`) +- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-29T18:15:05.690`) +- [CVE-2024-50459](CVE-2024/CVE-2024-504xx/CVE-2024-50459.json) (`2024-10-29T17:15:04.423`) +- [CVE-2024-50466](CVE-2024/CVE-2024-504xx/CVE-2024-50466.json) (`2024-10-29T17:15:04.640`) +- [CVE-2024-8924](CVE-2024/CVE-2024-89xx/CVE-2024-8924.json) (`2024-10-29T17:15:04.983`) +- [CVE-2024-9988](CVE-2024/CVE-2024-99xx/CVE-2024-9988.json) (`2024-10-29T17:15:05.227`) +- [CVE-2024-9989](CVE-2024/CVE-2024-99xx/CVE-2024-9989.json) (`2024-10-29T17:15:05.463`) +- [CVE-2024-9990](CVE-2024/CVE-2024-99xx/CVE-2024-9990.json) (`2024-10-29T17:15:05.707`) ### CVEs modified in the last Commit -Recently modified CVEs: `108` +Recently modified CVEs: `57` -- [CVE-2024-44205](CVE-2024/CVE-2024-442xx/CVE-2024-44205.json) (`2024-10-29T15:27:08.630`) -- [CVE-2024-44206](CVE-2024/CVE-2024-442xx/CVE-2024-44206.json) (`2024-10-29T15:31:02.493`) -- [CVE-2024-44667](CVE-2024/CVE-2024-446xx/CVE-2024-44667.json) (`2024-10-29T16:35:13.953`) -- [CVE-2024-47068](CVE-2024/CVE-2024-470xx/CVE-2024-47068.json) (`2024-10-29T16:15:05.583`) -- [CVE-2024-47486](CVE-2024/CVE-2024-474xx/CVE-2024-47486.json) (`2024-10-29T15:35:31.557`) -- [CVE-2024-47883](CVE-2024/CVE-2024-478xx/CVE-2024-47883.json) (`2024-10-29T15:38:11.573`) -- [CVE-2024-49214](CVE-2024/CVE-2024-492xx/CVE-2024-49214.json) (`2024-10-29T16:35:14.877`) -- [CVE-2024-49273](CVE-2024/CVE-2024-492xx/CVE-2024-49273.json) (`2024-10-29T15:48:10.617`) -- [CVE-2024-49288](CVE-2024/CVE-2024-492xx/CVE-2024-49288.json) (`2024-10-29T16:59:05.867`) -- [CVE-2024-49293](CVE-2024/CVE-2024-492xx/CVE-2024-49293.json) (`2024-10-29T15:07:39.407`) -- [CVE-2024-49321](CVE-2024/CVE-2024-493xx/CVE-2024-49321.json) (`2024-10-29T15:20:12.503`) -- [CVE-2024-49970](CVE-2024/CVE-2024-499xx/CVE-2024-49970.json) (`2024-10-29T15:57:41.000`) -- [CVE-2024-49983](CVE-2024/CVE-2024-499xx/CVE-2024-49983.json) (`2024-10-29T16:23:31.943`) -- [CVE-2024-49984](CVE-2024/CVE-2024-499xx/CVE-2024-49984.json) (`2024-10-29T16:22:25.833`) -- [CVE-2024-49997](CVE-2024/CVE-2024-499xx/CVE-2024-49997.json) (`2024-10-29T16:20:49.107`) -- [CVE-2024-50067](CVE-2024/CVE-2024-500xx/CVE-2024-50067.json) (`2024-10-29T16:30:44.217`) -- [CVE-2024-50408](CVE-2024/CVE-2024-504xx/CVE-2024-50408.json) (`2024-10-29T16:01:08.447`) -- [CVE-2024-50416](CVE-2024/CVE-2024-504xx/CVE-2024-50416.json) (`2024-10-29T16:02:10.660`) -- [CVE-2024-50442](CVE-2024/CVE-2024-504xx/CVE-2024-50442.json) (`2024-10-29T16:04:29.950`) -- [CVE-2024-50450](CVE-2024/CVE-2024-504xx/CVE-2024-50450.json) (`2024-10-29T16:05:40.250`) -- [CVE-2024-50463](CVE-2024/CVE-2024-504xx/CVE-2024-50463.json) (`2024-10-29T16:25:01.827`) -- [CVE-2024-50486](CVE-2024/CVE-2024-504xx/CVE-2024-50486.json) (`2024-10-29T16:07:03.833`) -- [CVE-2024-9589](CVE-2024/CVE-2024-95xx/CVE-2024-9589.json) (`2024-10-29T16:07:54.387`) -- [CVE-2024-9590](CVE-2024/CVE-2024-95xx/CVE-2024-9590.json) (`2024-10-29T16:07:43.737`) -- [CVE-2024-9591](CVE-2024/CVE-2024-95xx/CVE-2024-9591.json) (`2024-10-29T16:04:23.463`) +- [CVE-2024-44144](CVE-2024/CVE-2024-441xx/CVE-2024-44144.json) (`2024-10-29T17:34:55.923`) +- [CVE-2024-44155](CVE-2024/CVE-2024-441xx/CVE-2024-44155.json) (`2024-10-29T17:34:16.487`) +- [CVE-2024-44156](CVE-2024/CVE-2024-441xx/CVE-2024-44156.json) (`2024-10-29T17:33:51.597`) +- [CVE-2024-44159](CVE-2024/CVE-2024-441xx/CVE-2024-44159.json) (`2024-10-29T17:33:37.147`) +- [CVE-2024-44174](CVE-2024/CVE-2024-441xx/CVE-2024-44174.json) (`2024-10-29T17:33:16.540`) +- [CVE-2024-48218](CVE-2024/CVE-2024-482xx/CVE-2024-48218.json) (`2024-10-29T18:35:08.783`) +- [CVE-2024-48222](CVE-2024/CVE-2024-482xx/CVE-2024-48222.json) (`2024-10-29T18:35:10.053`) +- [CVE-2024-48223](CVE-2024/CVE-2024-482xx/CVE-2024-48223.json) (`2024-10-29T18:35:11.373`) +- [CVE-2024-48224](CVE-2024/CVE-2024-482xx/CVE-2024-48224.json) (`2024-10-29T18:35:12.697`) +- [CVE-2024-4902](CVE-2024/CVE-2024-49xx/CVE-2024-4902.json) (`2024-10-29T18:07:23.897`) +- [CVE-2024-49978](CVE-2024/CVE-2024-499xx/CVE-2024-49978.json) (`2024-10-29T18:01:43.080`) +- [CVE-2024-49979](CVE-2024/CVE-2024-499xx/CVE-2024-49979.json) (`2024-10-29T18:02:14.197`) +- [CVE-2024-49999](CVE-2024/CVE-2024-499xx/CVE-2024-49999.json) (`2024-10-29T18:03:40.857`) +- [CVE-2024-50573](CVE-2024/CVE-2024-505xx/CVE-2024-50573.json) (`2024-10-29T17:12:14.760`) +- [CVE-2024-50574](CVE-2024/CVE-2024-505xx/CVE-2024-50574.json) (`2024-10-29T17:16:11.277`) +- [CVE-2024-50575](CVE-2024/CVE-2024-505xx/CVE-2024-50575.json) (`2024-10-29T17:18:26.957`) +- [CVE-2024-50576](CVE-2024/CVE-2024-505xx/CVE-2024-50576.json) (`2024-10-29T17:18:08.373`) +- [CVE-2024-50577](CVE-2024/CVE-2024-505xx/CVE-2024-50577.json) (`2024-10-29T17:18:02.127`) +- [CVE-2024-50578](CVE-2024/CVE-2024-505xx/CVE-2024-50578.json) (`2024-10-29T17:17:53.960`) +- [CVE-2024-50579](CVE-2024/CVE-2024-505xx/CVE-2024-50579.json) (`2024-10-29T17:17:46.297`) +- [CVE-2024-50580](CVE-2024/CVE-2024-505xx/CVE-2024-50580.json) (`2024-10-29T17:17:29.440`) +- [CVE-2024-50581](CVE-2024/CVE-2024-505xx/CVE-2024-50581.json) (`2024-10-29T17:17:20.747`) +- [CVE-2024-50582](CVE-2024/CVE-2024-505xx/CVE-2024-50582.json) (`2024-10-29T17:16:46.007`) +- [CVE-2024-5612](CVE-2024/CVE-2024-56xx/CVE-2024-5612.json) (`2024-10-29T18:05:42.823`) +- [CVE-2024-8923](CVE-2024/CVE-2024-89xx/CVE-2024-8923.json) (`2024-10-29T17:15:04.870`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1d80168b357..d9f100a1e3b 100644 --- a/_state.csv +++ b/_state.csv @@ -27,7 +27,7 @@ CVE-1999-0025,0,0,6c6407f328012c5416b209d35e346a687d97406b934eb8c868f128082df534 CVE-1999-0026,0,0,f9caf922c508972730247bfc7e867c55914ff079be00e0eef5f0c214abea25ea,2022-08-17T07:15:08.527000 CVE-1999-0027,0,0,f7e33215150f66046a5642a64a14620c3ac916e797bbad850bedc353a4daa610,2022-08-17T07:15:08.580000 CVE-1999-0028,0,0,45a87a430985a1eac9173b76b0a64f87e3ac56a2775c2f5011c966800857b980,2022-08-17T07:15:08.637000 -CVE-1999-0029,0,1,353ea6e62ec1cf420835a811e5850b31a9702d069699bc7b862aff407aced817,2024-10-29T15:35:01.487000 +CVE-1999-0029,0,0,353ea6e62ec1cf420835a811e5850b31a9702d069699bc7b862aff407aced817,2024-10-29T15:35:01.487000 CVE-1999-0030,0,0,9d18e6d9dbc7f2571f4d8b358d8015df71fa19ccf517329c01942d3017115903,2022-08-17T07:15:08.743000 CVE-1999-0031,0,0,d3e9363bb7c96b3d84066b2e3da2defae4e6116d4eb96c7b418773e581f85675,2024-02-14T01:17:43.863000 CVE-1999-0032,0,0,57dd00fc1961e4d4c387499ac05792a9fe192ac191f5589da8f7faf9c7ccac9b,2008-09-09T12:33:35.867000 @@ -64094,7 +64094,7 @@ CVE-2013-7024,0,0,f69dfb33b726c99c09e7ec1cfc4b23e5b2357257e4c01221ad12f94b9687a2 CVE-2013-7025,0,0,0c06b92c09cd5e5b8b25b690ab99e51861bf2c68a061e20ac48b62d2fe6b1dcb,2018-03-12T17:22:58.757000 CVE-2013-7026,0,0,064ad508609ac0f6241a57de11029bdc80cbccbd4d3c53e3191d8a4022c749be,2023-11-07T02:17:51.830000 CVE-2013-7027,0,0,617716f913701f6d9015662788a250b9ca079a3d4ce663c2b49d9ab220513b37,2023-11-07T02:17:51.913000 -CVE-2013-7030,0,1,f48993dec3c119255ff7808d9efb4faf723b3ccf6bf8101903ded7380155bb09,2024-10-29T15:35:02.647000 +CVE-2013-7030,0,0,f48993dec3c119255ff7808d9efb4faf723b3ccf6bf8101903ded7380155bb09,2024-10-29T15:35:02.647000 CVE-2013-7032,0,0,755f9dcaf16880822e3b18c4d66ef94055901553dea5aee900fe9bbcf7632afb,2017-08-29T01:34:02.747000 CVE-2013-7033,0,0,9120c005361703e7139b903a7fdd8ac4dfe946033f094d7e06ef92744889cd2c,2014-05-20T12:03:46.753000 CVE-2013-7034,0,0,e6403cc91dd05f33ed640ffa3cb80f9bedfb07166ab07fd217b01483a0d42683,2017-08-29T01:34:02.810000 @@ -72940,7 +72940,7 @@ CVE-2014-9422,0,0,27c8e7a0cf99a84ef981b8b2b672e59145d9cb55a8a19433f70fca6bfaa621 CVE-2014-9423,0,0,dbadccf52a483c15e53cbfc8cff4f8c35dff181abefb76aad09cc936bb620341,2020-01-21T15:46:57.183000 CVE-2014-9424,0,0,55bdda0c39ccc1cb32dee00597a52f0dc9d40ef04ef47b61da3a378a5e610d68,2014-12-30T15:35:22.727000 CVE-2014-9425,0,0,dccca6d22e6a40ca8c10cd53a77b3ca62bb27fbd6d878e5c45a7840efff9cab2,2023-11-07T02:23:05.040000 -CVE-2014-9426,0,1,9fbd66fb1971644fa8a55b6898eec7531f8e5c661bb3c377fa47ee5179065b3d,2024-10-29T15:35:02.883000 +CVE-2014-9426,0,0,9fbd66fb1971644fa8a55b6898eec7531f8e5c661bb3c377fa47ee5179065b3d,2024-10-29T15:35:02.883000 CVE-2014-9427,0,0,cdf611994b2bbdb6383e0c3ae8d5b7d74beb486f34c9d704c2cf8812d341710e,2023-11-07T02:23:05.237000 CVE-2014-9428,0,0,dab4fb56a8e7f25bde74bf56cfa79dff31b355fde3d82e45f5476f14c98784f0,2023-11-07T02:23:05.363000 CVE-2014-9429,0,0,545088f5923f35de470761ad7721527bc41230312934d94b14622336a9798a18,2017-09-08T01:29:34.293000 @@ -138411,6 +138411,7 @@ CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000 CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000 CVE-2019-25218,0,0,5b80931fba7b5b61a09b6a7cef47b52c4c321e607f57f9764b15a065a78a0d69,2024-10-21T17:10:22.857000 +CVE-2019-25219,1,1,e88697049c6c7bfe4584917de7b3f889cee4d72f7defcac97255b8b6ae9a8f79,2024-10-29T17:15:03.567000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -193438,7 +193439,7 @@ CVE-2022-24323,0,0,60933f9defeff6ffaca1206f125a529ca2fd450897a5ecdd4a1dc57f02a29 CVE-2022-24324,0,0,40ff4a81d9205c96789d84e2cb0a474b7cd8f2362ad8a5836c903abe7f719eb8,2023-02-08T15:58:21.810000 CVE-2022-24327,0,0,a13ed7bbc787a46e63c14b6c4fc06e6001037675034c33c85b9627e17c84f296,2022-03-04T02:01:35.887000 CVE-2022-24328,0,0,816798155f43a17a8e125d70fe1d9198f2c5fdb4c060ff8f14f71a6a07458a66,2022-03-04T02:05:33.877000 -CVE-2022-24329,0,1,af5d3fc0ad398e3456f084890afa77e3ccd837d448d3209b160510d7dff4f42f,2024-10-29T15:36:31.610000 +CVE-2022-24329,0,0,af5d3fc0ad398e3456f084890afa77e3ccd837d448d3209b160510d7dff4f42f,2024-10-29T15:36:31.610000 CVE-2022-2433,0,0,f15487e277bdcefbb231f399ec09c6aba0c3c1218877701f420b8cdc9e979e18,2023-11-07T03:46:34.623000 CVE-2022-24330,0,0,a2999038b1d765eecddd8185bf0a19fe846f15e55e5f2474cefa5c8a88aeb1b9,2022-03-04T02:10:23.783000 CVE-2022-24331,0,0,4b2584daa512df956c9784798625d17ecc848560039c2b3695c72172e14ed7df,2023-08-08T14:21:49.707000 @@ -194472,7 +194473,7 @@ CVE-2022-25464,0,0,fa4446c0b87ccc8489496fa2f9dcccfb6f1f7e87309e1719761a02c32bdef CVE-2022-25465,0,0,7cbe3853c67634a1c63754575fe4ed932bd1f0187da78b5a63369dcaa7c4cae1,2022-03-11T15:55:36.710000 CVE-2022-2547,0,0,dbeba4a8b3d68d6d3de10cc461419e2c751bf3e1f6f2ec4f183c6a17312177c5,2022-08-19T01:43:28.157000 CVE-2022-25471,0,0,d59a2094cef30b0a74747ab7cc9d6328094a89833946591fcbe214da809a6cc7,2022-03-09T19:47:15.070000 -CVE-2022-25477,0,1,3a41e0696d9b7093c271393e844e39591137c452b650a874800dac195bfa4e88,2024-10-29T15:35:03.380000 +CVE-2022-25477,0,0,3a41e0696d9b7093c271393e844e39591137c452b650a874800dac195bfa4e88,2024-10-29T15:35:03.380000 CVE-2022-25478,0,0,ed982e56e9c14c65c29ba579ed08350359448be86acb78a40fa8eafcbcfa73f6,2024-10-27T15:35:00.560000 CVE-2022-25479,0,0,f692c3efe0d91ffaa495484faf07e81ae6f282eb960806bd2c9e1b2594541e23,2024-10-28T19:35:02.130000 CVE-2022-25480,0,0,c5c263da9f1df4b92b5b97a94c271252be09f3b4a9bab47b12b6b752f161829f,2024-10-24T17:15:13.817000 @@ -195023,7 +195024,7 @@ CVE-2022-26130,0,0,f5d00a8d594c3c9a5a76c59a5eae2a9b0265e622b079a3869dfb48c26aa3c CVE-2022-26131,0,0,ae0b4fb43b33e1484c241aac17637114600c06f8bca32f6fe29efec493803887,2022-03-23T18:37:02.983000 CVE-2022-26133,0,0,ffa6882abf1006ca33138be1d3118308796159752fdef8b4640dacb3c5e895ed,2024-10-03T15:35:00.870000 CVE-2022-26134,0,0,d3c92ffe05d5b347d66ad1f6e09fe61e264909d50ad2ff29e6820d2348a3d6ff,2024-06-28T14:22:46.883000 -CVE-2022-26135,0,1,6362a7161b68e45e099fd9ef982d945176c5c06d9e0772531efe48ad79179457,2024-10-29T16:35:01.013000 +CVE-2022-26135,0,0,6362a7161b68e45e099fd9ef982d945176c5c06d9e0772531efe48ad79179457,2024-10-29T16:35:01.013000 CVE-2022-26136,0,0,d3c4eb85ac63626dba3e8c570510b596fede05247aec3106659fc0077d1cecaa,2024-10-03T17:35:00.530000 CVE-2022-26137,0,0,4d61537846b2a0cec058cac99e9cac03c99d1687b308900e0eb773cecfff291b,2024-10-03T17:35:01.143000 CVE-2022-26138,0,0,7590806ebfbbe178e5eacbe72eea932c8666bfae87cee4c9d2637bc12d14b0b4,2022-08-04T14:13:04.353000 @@ -195441,7 +195442,7 @@ CVE-2022-26694,0,0,169c107dc25cd8fe2031df5efd9423cace17eb0870c85c9758cc8168e70aa CVE-2022-26696,0,0,bca2bf4ee2335bd72ee817b2bbd1edc26686976fcbc5d1d24edc6a7c7cbf3e76,2022-09-22T20:25:34.193000 CVE-2022-26697,0,0,31624809f9cdc65d0276755db20b983160e808ce83061faa07fddc3f26adb8c8,2022-06-08T18:21:35.653000 CVE-2022-26698,0,0,3a52443786f0bd357f8e04dc6524a78fbc15640b76331152a666dd6b3c6883e4,2022-06-08T18:50:01.627000 -CVE-2022-26699,0,1,9bdbb984d5f5097ea1323ff4942eed4be55928b5d83277230733daa1b675ab10,2024-10-29T15:35:04.353000 +CVE-2022-26699,0,0,9bdbb984d5f5097ea1323ff4942eed4be55928b5d83277230733daa1b675ab10,2024-10-29T15:35:04.353000 CVE-2022-26700,0,0,a66b72d1fb946ca44c0170eb3f2f4482773ae37880fd98ab53c322ca21300dfa,2023-08-08T14:21:49.707000 CVE-2022-26701,0,0,256df3327cb732c3329184704791a0a8969cc817ecead12b37cede5d2c5fd1f7,2022-06-08T19:00:39.003000 CVE-2022-26702,0,0,5be1e7ecf83886193681ffa88c713840633ebecb2922e143d35505104879d011,2023-03-28T05:15:07.577000 @@ -199530,7 +199531,7 @@ CVE-2022-31625,0,0,b2f4cc813c1ca180b90a012dcd95ca87f4fbfbb9e9eaac7bf904c97b8f8b2 CVE-2022-31626,0,0,8d94e8e2103c7862bc20f22cd91ae7a0fc49a69374596f2d1963324fae2d8e4d,2023-11-07T03:47:39.910000 CVE-2022-31627,0,0,71717207ad4e5fdd41ef51ce9ec9df450045b8dbf5e32c118f066a3578f11cad,2022-10-25T19:45:51.713000 CVE-2022-31628,0,0,318257423888c15846b494c47e87840cd1108d4bd4ce2079f0ead2aa19679a05,2023-11-07T03:47:40.020000 -CVE-2022-31629,0,1,40e49bcadc3d2c9e6ba8aef844fadf44ccb48c31ac09ac6fb7ee3b18a76a42f8,2024-10-29T15:35:04.630000 +CVE-2022-31629,0,0,40e49bcadc3d2c9e6ba8aef844fadf44ccb48c31ac09ac6fb7ee3b18a76a42f8,2024-10-29T15:35:04.630000 CVE-2022-31630,0,0,8d3e760820fd817b7c9c3295a2647273326d355de0036c89b782973772926d83,2024-04-02T03:15:07.973000 CVE-2022-31635,0,0,5e1cf10a427e50450538e356254bf291a5830b0c0ade6c88ffadb7c2692ba11d,2023-06-29T20:00:00.027000 CVE-2022-31636,0,0,e3d132a1af04b3d9083c5ed58892a13d87dfeea9ffdce8bde41483a9ad35cc23,2023-06-29T19:59:04.183000 @@ -200191,7 +200192,7 @@ CVE-2022-32497,0,0,409cd89fd07f73753644dd274b182d97057b0345e3dbc349e8160d0e576e9 CVE-2022-32498,0,0,7e077c92647ed8c3a2a9b16e6c5edcba97f696da7c1d8c831a2eceabd97716f1,2022-07-30T01:24:17.157000 CVE-2022-3250,0,0,f5bd8db8cab9b54b1b72289fb537f8db5593484a25773a6d077ab99d66a1b38a,2022-09-23T17:00:34.603000 CVE-2022-32502,0,0,8043bd7b67ea0539b415e98c4f691c3c17aca58cf56f8cb93f7ff0987225b88f,2024-07-03T01:38:30.257000 -CVE-2022-32503,0,1,0502e59f680c5964f98e4b05a8da6f97bc98f48102aedf6f29e3815dad5453f2,2024-10-29T15:35:05.717000 +CVE-2022-32503,0,0,0502e59f680c5964f98e4b05a8da6f97bc98f48102aedf6f29e3815dad5453f2,2024-10-29T15:35:05.717000 CVE-2022-32504,0,0,f985a28466775169224400eb27b21a7a82a049f055b74ee3fe4261e86e2a23c4,2024-07-03T01:38:31.860000 CVE-2022-32505,0,0,d68338a48cb6379b7959ddbe908e7d1fc8f4608362b59573f8ed193723734aef,2024-08-19T17:35:04.330000 CVE-2022-32506,0,0,7c3872e68b41f5c55b555638bfe7bcc9ff215c45bf9f77b0ea11d0b9c47308db,2024-08-20T14:35:01.103000 @@ -201691,7 +201692,7 @@ CVE-2022-34466,0,0,85a76098c827f44807472c9050aa9c34b6861f3a702b89bd6b78f3d8f9608 CVE-2022-34467,0,0,cd47bfa6f5e49ff9016c15d080ba88e1e79bd8dc045dc6db1482988187a0fb18,2022-07-20T15:33:35.377000 CVE-2022-34468,0,0,77ad896586149e39a2afb98344879f153efb79a8d0eee250b247497339ea05f2,2022-12-30T18:01:31.813000 CVE-2022-34469,0,0,d3be71ac915c4f5965f10a11beeb43100d2dfbe56e8f9ee217c4853a21b1c08e,2023-01-04T16:41:47.043000 -CVE-2022-3447,0,1,777271e968bba913bbc5521ada37920ac214c21e6feb7ff7fce5a7c71c1f34eb,2024-10-29T15:35:07.713000 +CVE-2022-3447,0,0,777271e968bba913bbc5521ada37920ac214c21e6feb7ff7fce5a7c71c1f34eb,2024-10-29T15:35:07.713000 CVE-2022-34470,0,0,0852e1a30c78ada9d20cab322f1e310f5c2467db5d31cbb964f1a5259162c3f3,2023-01-04T15:52:28.317000 CVE-2022-34471,0,0,a4f20ea698aee3a8aa9c0862fb6f5336283760bb0428ef938a0593a4c0879108,2023-01-04T16:04:16.437000 CVE-2022-34472,0,0,a04a00dc06c1e3a467671361ffa7534fe535a3d7ea6f755da1fde59cfc4c74f1,2023-01-04T15:28:06.480000 @@ -202291,7 +202292,7 @@ CVE-2022-3520,0,0,5c0db1922eb6a1749e4cf82c6edecf7114b50102dd4661fd8b4c295f0f81ef CVE-2022-35201,0,0,a45a663fecb3c00e814bc7b384217d3bbad522459479d4afd6dc563b9b88de8f,2024-02-14T01:17:43.863000 CVE-2022-35203,0,0,aebf17ad08ed8ea5229716240c5e778922d765217451ed0e0919b873b84c0fe2,2024-02-14T01:17:43.863000 CVE-2022-35204,0,0,8a403804d5cfd3b40458a0ffcd362acee182087639c04a063ffcbc494a094d97,2022-08-19T14:47:22.827000 -CVE-2022-35205,0,1,1d034141049f378649b5b29752acfe9c39d416889b33ef5f45cd08d0b4a66965,2024-10-29T15:35:06.720000 +CVE-2022-35205,0,0,1d034141049f378649b5b29752acfe9c39d416889b33ef5f45cd08d0b4a66965,2024-10-29T15:35:06.720000 CVE-2022-35206,0,0,49720cc7c709b5ad216548b5c0b3309be1c5a446165acb7aa71812c30493001e,2023-08-31T00:36:57.233000 CVE-2022-3521,0,0,5d4087931682630895a0dc749c2a320ddfa4eb621e3a6ac3eab58359d6de9b3b,2023-02-23T15:29:14.540000 CVE-2022-35212,0,0,41b6a11502e4e8a67b10a67a2d24fc87779f325adf83ae6031d288aa7a6f6487,2022-08-19T15:01:06.300000 @@ -203689,9 +203690,9 @@ CVE-2022-36797,0,0,90016e57563b430c7b525e8fd47fabd28019c16b067a6bdd01b412d6cadca CVE-2022-36798,0,0,309d7800cb4e1ffad279b761a51715ee05ee0bc213bbfd237d79d5f0595db935,2022-09-23T19:33:35.513000 CVE-2022-36799,0,0,6f5f644d8a556e2f37e914de2c73c0d1c7617369d1ed795238fddfc6c3d69967,2024-10-03T19:35:06.767000 CVE-2022-3680,0,0,4045a251fd074dc1e78a757b3250a9f45dbb1c048a72547f43ae93ad5dd948f3,2023-11-07T03:51:38.153000 -CVE-2022-36800,0,1,486fd5839322b0d5f2337462309abac337ea54afcbff10e8f6f3fe581f46a815,2024-10-29T16:35:02.460000 -CVE-2022-36801,0,1,793b2b4d725f74df2984c70c9c322ee8a0639dc5968470400b2f00be81641f9e,2024-10-29T16:35:03.280000 -CVE-2022-36802,0,1,636712aa86112217531be40a8cad4279d1fcb5d184b683cc081fb1eb29ca1c10,2024-10-29T16:35:04.083000 +CVE-2022-36800,0,0,486fd5839322b0d5f2337462309abac337ea54afcbff10e8f6f3fe581f46a815,2024-10-29T16:35:02.460000 +CVE-2022-36801,0,0,793b2b4d725f74df2984c70c9c322ee8a0639dc5968470400b2f00be81641f9e,2024-10-29T16:35:03.280000 +CVE-2022-36802,0,0,636712aa86112217531be40a8cad4279d1fcb5d184b683cc081fb1eb29ca1c10,2024-10-29T16:35:04.083000 CVE-2022-36803,0,0,8bf391ac2eb3e6ee9d8828e1361ac87e802988d8d37cb0a535af2291dbd1c770,2024-10-02T15:35:01.363000 CVE-2022-36804,0,0,0ca1f04aaa3e26878886d510c1f32bf471ffd055bf07c2485f77648a7440ec06,2024-06-28T13:57:13.930000 CVE-2022-3681,0,0,1233abe7c4aafe7eacd841955e89714c7f64b04fb29227eb9e9865f916fa993c,2023-11-07T19:41:49.927000 @@ -205033,7 +205034,7 @@ CVE-2022-38621,0,0,7e5376116068e534bd5b739452fca37c46477488cabf404b4eb4e4408cb5e CVE-2022-38625,0,0,3c6831c34940089d40acc7513e688c1e4dbb406e6dac4487987a18136063a078,2024-08-03T11:15:55.197000 CVE-2022-38627,0,0,6fa70cf692b77ea18329aa80fa68e4e056fe59b1cc16b0f473d59f8d38738a58,2023-01-10T16:56:35.530000 CVE-2022-38628,0,0,16a1c93b1056c2faca040f777f3d22fff4a353ca0b25d5e20933b4cf855e4fb2,2023-08-08T14:21:49.707000 -CVE-2022-3863,0,1,1c686b884f20606006c3acc13b931d044f0b9859352e2b546ada84ec6f22e430,2024-10-29T15:35:08.557000 +CVE-2022-3863,0,0,1c686b884f20606006c3acc13b931d044f0b9859352e2b546ada84ec6f22e430,2024-10-29T15:35:08.557000 CVE-2022-38633,0,0,fde3605b886bf4f76fb872f28dc2fd5deda34dffe8ab326928c5ebc91e5a9520,2022-09-17T01:50:57.147000 CVE-2022-38636,0,0,8dd2b0164d7a9a956898352540efe936ab700244a63a88781aea9cf76433ae63,2023-11-07T03:50:10.187000 CVE-2022-38637,0,0,35b82a8fef7196b376ae5b13155913192cc93d0f70d18b6c8b2447ab5f447f22,2022-09-16T02:58:05.803000 @@ -206168,7 +206169,7 @@ CVE-2022-4024,0,0,ff3a57f0d476d9607fe3e9a83b97e3aa80fc59409fe1af1adacaa8bcfaccf1 CVE-2022-40242,0,0,db466be0a84044f237f29ef72a5ac9db4cc43fd07a94f370c78169a0a3d16988,2023-07-10T18:44:41.837000 CVE-2022-40246,0,0,bec7539d28c316859712c5d3cab41b522ac82417d048441c9ed698abc3bbecb4,2022-09-26T14:22:04.787000 CVE-2022-40248,0,0,89ce04ffd5b2eaf79a3d163c1817644fa1f4b102448c531310b7cd55ea9bb545,2023-07-10T18:44:33.213000 -CVE-2022-4025,0,1,ea98ad2ec0f6f830d5aa22496db19d531bc303d44cd85bf0778f030b675a4a5e,2024-10-29T16:35:06.953000 +CVE-2022-4025,0,0,ea98ad2ec0f6f830d5aa22496db19d531bc303d44cd85bf0778f030b675a4a5e,2024-10-29T16:35:06.953000 CVE-2022-40250,0,0,4f6facb418ccb991971beb09c80e6ada4e135a191a9044a7470cbe57898a8445,2022-09-24T02:38:05.873000 CVE-2022-40257,0,0,218e8282c39aa935058e5cd97a11f1786a3c98f77c3885bf162b9b84e838293f,2023-07-10T17:43:25.830000 CVE-2022-40258,0,0,1edeac27c60456fafc480760d4cd1def9e0052c64f42508af3ab5acf70d02d70,2023-07-31T19:15:15.630000 @@ -206664,7 +206665,7 @@ CVE-2022-4089,0,0,2975b3ace17a664f1cfbc2ebcd08bbfc2d93d94b89d1430a0935693386730c CVE-2022-40890,0,0,826f5fcb580923e669b2d463900c2768f1dbd884b8a4bd5e44cf32a1b976eebf,2022-10-03T17:53:03.830000 CVE-2022-40895,0,0,8ad58fce9f15e2b2abd3a74a0e6c7fda70fba6094332aef58466c0c415fce5a8,2022-10-07T20:11:10.490000 CVE-2022-40896,0,0,b185f387fea519f76da4721fc650440017d0fd023852bd19afc59f2c5b0631a1,2024-03-28T03:15:07.647000 -CVE-2022-40897,0,1,55636c58cbd144f55a5eb0e8e5c132b0fcb2701eff6e07fadb0bff81750831eb,2024-10-29T15:35:09.530000 +CVE-2022-40897,0,0,55636c58cbd144f55a5eb0e8e5c132b0fcb2701eff6e07fadb0bff81750831eb,2024-10-29T15:35:09.530000 CVE-2022-40898,0,0,5c6bc68bd00225bc811f4eeb16a5a24f9a866920a18f338bafc99f787abe0ba7,2022-12-30T22:15:22.800000 CVE-2022-40899,0,0,b276e4508a71aa68d54ee2387b6b638a3a7bbc43d1ca8fad43c482586bd92329,2023-01-23T18:57:18.740000 CVE-2022-4090,0,0,801c7e0f8782d92bf4038a1ac050b391b16cea80fa38442bf2fd8f751a230f4a,2023-11-07T03:56:54.410000 @@ -210501,7 +210502,7 @@ CVE-2022-4608,0,0,f69509f880e35e178a11911413477eaef967c720f30eb08adc66f5acc28821 CVE-2022-46080,0,0,fe9b2f2a23de7c5102d29ab9bc9b6a0f2eb379ce1e2d5a8ce8acadcffbe0e14b,2023-07-12T14:53:35.557000 CVE-2022-46081,0,0,10dd263b055bb8688d827cd365513fa6234714848594880daa28df023fae41a3,2024-08-03T15:15:33.853000 CVE-2022-46087,0,0,a07060581efe9298121db2233c5c38501954d5c2160fa5042db2ba805035666f,2023-02-06T21:54:50.580000 -CVE-2022-46088,0,1,1a5b0fccd49e1ae8ab5ab9dcdad7a1bef698f8342a3af670bbe8034da0ecde11,2024-10-29T16:35:04.890000 +CVE-2022-46088,0,0,1a5b0fccd49e1ae8ab5ab9dcdad7a1bef698f8342a3af670bbe8034da0ecde11,2024-10-29T16:35:04.890000 CVE-2022-46089,0,0,a389db1543f1a2ff5fae3a5ebf216c4a40482acbc273e2405c2ae12b84cb1029,2024-08-16T17:35:01.040000 CVE-2022-4609,0,0,e70428330dd60a5e25b1dc4109e568b1aced34149fef1cd3984474ebc7588254,2022-12-23T18:44:47.767000 CVE-2022-46091,0,0,6ff24a58a333a49492281b25c366e610950da50d2b34311dcc22df1e4f6200df,2024-08-05T16:35:01.230000 @@ -212229,7 +212230,7 @@ CVE-2022-48623,0,0,903da016b4a21385c85cb533e0b0fbe60d9e83c91876ab8bbe25078b9f102 CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000 CVE-2022-48625,0,0,f6663c1686b1284fd5202202aca248b725343b1c940d427bdd48722330db6bff,2024-08-29T20:35:08.187000 CVE-2022-48626,0,0,fc58451bcf554cb6d7596ed91f1d4bac3d14dee8e91d35aa41459c2e76fb613b,2024-08-27T18:54:45.263000 -CVE-2022-48627,0,1,af11a2eb196858a96609719823f98be7d4508ce9acf219c4ba77f5dbd4bee989,2024-10-29T16:35:05.710000 +CVE-2022-48627,0,0,af11a2eb196858a96609719823f98be7d4508ce9acf219c4ba77f5dbd4bee989,2024-10-29T16:35:05.710000 CVE-2022-48628,0,0,ceea607df19dd86785346a0794b198b9994cba32c0926340c10f946e11d1e532,2024-03-04T13:58:23.447000 CVE-2022-48629,0,0,e891c69ca957bbf297b8083e0219ef44c2d49f5751aae1302d2d546d861aa415,2024-03-21T02:44:43.813000 CVE-2022-4863,0,0,2a3c4b04ec99e4b52a59a1d4f5052958af6425fb87bdb405a14104dd3900f281,2023-01-10T15:19:48.147000 @@ -212239,7 +212240,7 @@ CVE-2022-48632,0,0,604f20ec0eaf6c13c4b3b66792ca33665e6d1e06fdaa3f2397f35f9bec38e CVE-2022-48633,0,0,d1b02d8abcad4acece798c33d4e1bda012ee764a6eb89a127c625e4eb186648a,2024-04-29T12:42:03.667000 CVE-2022-48634,0,0,8b3f149d7efcde225ca801ea6e9ac42f0b447147b0126ce4de49bf2c5e4b3310,2024-04-29T12:42:03.667000 CVE-2022-48635,0,0,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000 -CVE-2022-48636,0,1,bd119ee3a500e8de66c4e55ffa746e94e5dcf276788f5780f1a4b33a00caa150,2024-10-29T16:35:05.977000 +CVE-2022-48636,0,0,bd119ee3a500e8de66c4e55ffa746e94e5dcf276788f5780f1a4b33a00caa150,2024-10-29T16:35:05.977000 CVE-2022-48637,0,0,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000 CVE-2022-48638,0,0,f1f3c62f32abd9dfa0b7d8788d87905580bbfec25eb951765d8861d82d3e8214,2024-04-29T12:42:03.667000 CVE-2022-48639,0,0,4a5ae1aed25211cad58cf1392921491fc3122875f222672a6b19cfd32acf6264,2024-04-29T12:42:03.667000 @@ -212255,7 +212256,7 @@ CVE-2022-48647,0,0,63a2d6011a27e3884bbf52c53c04a6667615b24da49dc1b7925f7441f3b1d CVE-2022-48648,0,0,dfadd22a87307801d0d16b9b01438d2bba84ad33295315fbb2e82d8be6718c71,2024-04-29T12:42:03.667000 CVE-2022-48649,0,0,0a15744c4cfd26154a17feb04c983f0ec779f45173af81b2d41d9c016bdb8dd6,2024-04-29T12:42:03.667000 CVE-2022-4865,0,0,8689164e9cb9dce17b47fc7ba6361df1270fcc55f0fc8450addce9277bb6a8a5,2023-01-06T21:22:00.620000 -CVE-2022-48650,0,1,766619acc76f809ac3f89b4b9fbe9aa75ea430cb3be2d98085e4eead243c1f7c,2024-10-29T16:35:06.770000 +CVE-2022-48650,0,0,766619acc76f809ac3f89b4b9fbe9aa75ea430cb3be2d98085e4eead243c1f7c,2024-10-29T16:35:06.770000 CVE-2022-48651,0,0,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000 CVE-2022-48652,0,0,05a5a1c50a1d4992042ef5994a0d5c1c6f5485af066180e574dbce1a367a6ecb,2024-04-29T12:42:03.667000 CVE-2022-48653,0,0,8f84c0201a079d8a50061e5f0d56ccc48847df28331e9cee5b020fada4dfd712,2024-04-29T12:42:03.667000 @@ -212275,7 +212276,7 @@ CVE-2022-48665,0,0,61f8dd0c53e94318dbff1c099a7764d159a4ff134c1b49d99d2540fba60ac CVE-2022-48666,0,0,a2bc98594445b6df1bd47c97ff822bb8a7beebd8a5e4e345cf76f70dcad5d756,2024-07-29T07:15:02.030000 CVE-2022-48667,0,0,5bbad8b7071d12ed897487a37454167ea6546dbc00672f8a744c08c8f65a23ab,2024-04-29T12:42:03.667000 CVE-2022-48668,0,0,ffa47e0d1e12cf1e004440647944ea09831e32184ce4ba444d32b7e58f5b8e56,2024-04-29T12:42:03.667000 -CVE-2022-48669,0,0,b75e24834cb956f9b083af7948c6a93e9b0d3029023bb994e0c7901a89d4151e,2024-05-01T19:50:25.633000 +CVE-2022-48669,0,1,8ce958067a23f607d74ad3dcda99b5322da4d461e9894c58fa34c110f37456b9,2024-10-29T18:35:00.757000 CVE-2022-4867,0,0,63e49f2f48f56858cc93b1a43514f2600f0d5c18f31355382513a6c3bcb2d646,2023-01-06T21:26:37.597000 CVE-2022-48670,0,0,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000 CVE-2022-48671,0,0,392359edb3c2896ca37146c9f139f1d133a1b3f66bd661c4015d56ed55c4a3b6,2024-05-23T20:26:32.357000 @@ -212576,8 +212577,8 @@ CVE-2022-48944,0,0,78b35f4e96175b0acbd7eb76c8fc345abc146c0623b459d55b4bfe903afbd CVE-2022-48945,0,0,04e7494c867d2745065a695f3c050464fcd7db6e245bb13442273deff488e24a,2024-09-26T13:32:55.343000 CVE-2022-48946,0,0,cfefbc7d174c777888e72ac65260eb61ba1bda7b72b2bde12ab6cdecb8dd5105,2024-10-25T20:13:39.847000 CVE-2022-48947,0,0,6aa8ae8b892b41abda0533803253735a337d5901b14281670a2ddf65e9421084,2024-10-25T20:11:45.473000 -CVE-2022-48948,0,1,15f3501e5ed2e803ee66410086c09d17587cbbbd63f39ff8b472204407dbb8f7,2024-10-29T16:34:03.013000 -CVE-2022-48949,0,1,c5c4280ee91be689a3aa5a6ae86f3e60c23ca211ed0c3133d63b6afe6463dada,2024-10-29T16:32:41.797000 +CVE-2022-48948,0,0,15f3501e5ed2e803ee66410086c09d17587cbbbd63f39ff8b472204407dbb8f7,2024-10-29T16:34:03.013000 +CVE-2022-48949,0,0,c5c4280ee91be689a3aa5a6ae86f3e60c23ca211ed0c3133d63b6afe6463dada,2024-10-29T16:32:41.797000 CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000 CVE-2022-48950,0,0,1b3d55ca4ab6e70eb975939cd1542c8de3ef56155c29da3ff8cb8057a4e2b24e,2024-10-25T20:02:03.240000 CVE-2022-48951,0,0,8553eeb6fe1b212af16ae6d4d7032df2e5b6cc4fac9ad15dcd53ba648d3e070f,2024-10-25T20:01:24.943000 @@ -212689,7 +212690,7 @@ CVE-2022-4913,0,0,12d1631776d7003d6257770a5dffa113086b943ece5101cbbea839babde69e CVE-2022-4914,0,0,4227dde8e4f6e7f7a7a97029324234b6aebafec4f5a051fde4ce1bb058df57dc,2023-08-19T03:15:17.990000 CVE-2022-4915,0,0,7dce1966502761df69c2dafe86f736ea78df21a82c78242f2c6e6554747bb525,2023-08-19T03:15:18.290000 CVE-2022-4916,0,0,11156a0320210ecb533d09665dc4e516646ac7c485716843642ff2a3c6876232,2024-10-02T21:35:09.133000 -CVE-2022-4917,0,1,a3db6b01f014972a342876daa312c0a13383f70ba58f9ba67a003b0b2014ed8b,2024-10-29T16:35:07.910000 +CVE-2022-4917,0,0,a3db6b01f014972a342876daa312c0a13383f70ba58f9ba67a003b0b2014ed8b,2024-10-29T16:35:07.910000 CVE-2022-4918,0,0,be511b580f573f30861de1822e03bbf3b4f7c7355836b2656f724c73cdba85dc,2024-10-02T21:35:10.087000 CVE-2022-4919,0,0,0783d84e35c78a79cc39217e58f1f715e26f0dfc0e3c767292c16cfa09c212ab,2024-10-03T14:35:02.513000 CVE-2022-4920,0,0,4c86d941b74daf1d9a5f5f1b3cdb0d1cb7670a00976fd7f8ad822c91655a5153,2024-10-28T20:35:03.313000 @@ -212698,7 +212699,7 @@ CVE-2022-4922,0,0,7a2b4634322e96d3c241ed34ac0e68d8e19629d7fd1671456894ec86856684 CVE-2022-4923,0,0,761793b67ab54f7909a05bde1bca07eba07ede3d9cf67f8e3148ffe9b421bec4,2023-08-12T06:16:07.170000 CVE-2022-4924,0,0,cdce64e4b7502dd49525556dca8b809e232a384142d6d02d56c2287cddab7d9b,2023-08-12T06:16:27.147000 CVE-2022-4925,0,0,b565aa21efd571a523bfc66e4d7206d9d9762faa86d0f6d4e154592154c7c66b,2023-08-12T06:16:27.777000 -CVE-2022-4926,0,1,8a875b168d2aef44e69b33e49fa6c452030a4e8dddbd5fe21dee135489c5830e,2024-10-29T16:35:09.090000 +CVE-2022-4926,0,0,8a875b168d2aef44e69b33e49fa6c452030a4e8dddbd5fe21dee135489c5830e,2024-10-29T16:35:09.090000 CVE-2022-4927,0,0,cd90fbf6e3ad147b99868787040eab6df93bfa4a7bf5960277ebc0a95a039676,2024-05-17T02:17:03.200000 CVE-2022-4928,0,0,04de84c66b0fbe937e91e213637e43124fa2ec16c4435422751c4379f7343aef,2024-05-17T02:17:03.317000 CVE-2022-4929,0,0,b54b3c33b5580708692b3cff4bd317d8ef46ee0e4d41d31c4ec085b344c44cb9,2024-05-17T02:17:03.423000 @@ -218507,7 +218508,7 @@ CVE-2023-24588,0,0,2ef36532565eb3be85b9be1d03ea17dba2ff521388a0b1d5e9f24cd0fb5ff CVE-2023-24589,0,0,a8570d1496a12370184415bfaaf30a6185d91001fda6cb8951fe6ab851e6a5df,2024-10-10T21:27:18.237000 CVE-2023-2459,0,0,87d0f3af5d9f2f16840cc7c27d343b6c8aa37b4163a5005ca8c8359b9978213f,2023-10-20T20:54:50.567000 CVE-2023-24590,0,0,7d131b3c6d25d723156ac81026080a6db7e78a83c9e0f7a66c7fac1f0c270f4a,2024-01-05T18:33:26.597000 -CVE-2023-24591,0,1,aae36e1b3459141bb0ba0ea798b9a2da88b6c8422d8b36395f2e7c285dabe5c8,2024-10-29T16:15:54.250000 +CVE-2023-24591,0,0,aae36e1b3459141bb0ba0ea798b9a2da88b6c8422d8b36395f2e7c285dabe5c8,2024-10-29T16:15:54.250000 CVE-2023-24592,0,0,4dd8e587d22d415fe23662a0e7b9b2280ec1ea8bece15daca3c1cb5f43b1a9d0,2023-11-28T16:58:37.430000 CVE-2023-24593,0,0,efb8a1c5f27e887a35e026c30a04bbc582bf9fea074d7fd8663e8d531da2813e,2023-11-07T04:08:34.613000 CVE-2023-24594,0,0,390aa57eecd9ddc9a7de9633926b9a4ed86c340b1e61102c75638b7987b8b9e1,2023-10-05T14:59:56.710000 @@ -218884,7 +218885,7 @@ CVE-2023-2507,0,0,fcd576f0c20c0a52967ea862e5b8796a1b771a893544017d1f5d5168de06a5 CVE-2023-25070,0,0,cd49dfc9a1db5c084791fbe7e2bb5085fed018ee725b12b3ed79bd4084e814bd,2023-05-17T16:29:30.600000 CVE-2023-25071,0,0,7f8a43464289f161510c4edc3fcf3ef126d6d9dd8659d9c7d3601f700eb8db4a,2023-11-22T19:23:56.267000 CVE-2023-25072,0,0,5345d8cc0ac6455cb6ea835e2c53c67662b851ae1f85092f9027af2326a5ce31,2023-05-17T16:34:14.120000 -CVE-2023-25073,0,1,d3a8eefe082d084f783df84b78a88c94b3207f5bce59c0744f6450decca0a45c,2024-10-29T16:15:44.283000 +CVE-2023-25073,0,0,d3a8eefe082d084f783df84b78a88c94b3207f5bce59c0744f6450decca0a45c,2024-10-29T16:15:44.283000 CVE-2023-25074,0,0,7407210143704410593b93c59bb0e3f24b08a71d5e85ca45dc846d516af6cdaa,2023-08-01T19:47:47.580000 CVE-2023-25075,0,0,351344e1ff6898608e06ea081f11bc9d64380fb69b2bb87d9f4cff7897dc698d,2023-11-28T16:56:44.577000 CVE-2023-25076,0,0,73c3337b5a2a860ef073dc6503fc5331dd87f825ec47f89159ae4ff7cb742914,2023-05-27T04:15:24.837000 @@ -219608,14 +219609,14 @@ CVE-2023-25940,0,0,287a15e336abf02128dd858aae53f9d56a519ad6a45b3ecc081f83b7d434c CVE-2023-25941,0,0,57993d6e5c051bf730eec40037f77ce1e6290468793e6d031d99e4f3ced0ede0,2023-11-07T04:09:15.427000 CVE-2023-25942,0,0,96956d2db4db0fa83094177c856b64142c1187eccbbab3a5a53997293f9c2d60,2023-11-07T04:09:15.507000 CVE-2023-25944,0,0,5c6e1e2be975a23d9872db5000e04a147aa03d281d3149fea3af9930d3dbec2b,2023-11-07T04:09:15.630000 -CVE-2023-25945,0,1,cfe17a6972cbd1e3cc52da62168ddce58627abf3ef50a3da0efdba68bce9c071,2024-10-29T16:15:35.037000 +CVE-2023-25945,0,0,cfe17a6972cbd1e3cc52da62168ddce58627abf3ef50a3da0efdba68bce9c071,2024-10-29T16:15:35.037000 CVE-2023-25946,0,0,36351b51211f6086546d685331bc1089c9e7b61831c3fbc32b9ecdd8f95782b1,2023-05-30T22:20:58.580000 CVE-2023-25947,0,0,61b472408da0c885e86ff715da8b1879120a825ba50c5f9f000516eaa2a0e7d9,2024-09-09T12:21:53.383000 CVE-2023-25948,0,0,3064d6395082ca991ce30a323e344736e0487c1680a52291f9184bc6dc1b4813,2024-04-22T16:15:12.950000 CVE-2023-25949,0,0,3b707dbe932e491340fc8b681d93c41ddbd815440e7fd02affd04e7d3e2ba6c9,2023-11-20T20:51:01.480000 CVE-2023-2595,0,0,ddd0efce01dda5a53a25edbe25022a938e123a7a3c2516163437a45a411fe558,2024-09-07T12:56:42.300000 CVE-2023-25950,0,0,e76c4a5df57a66294f8bc39e7524fb052892299d01ec7806259de034dbab901f,2023-11-07T04:09:15.983000 -CVE-2023-25951,0,1,cc7d32db0cde343f2dbb64ab3dc3d2cc48eacadef2682aff29af3514ae3b0746,2024-10-29T15:52:44.830000 +CVE-2023-25951,0,0,cc7d32db0cde343f2dbb64ab3dc3d2cc48eacadef2682aff29af3514ae3b0746,2024-10-29T15:52:44.830000 CVE-2023-25952,0,0,463ec8e960958d9e12aae14faa2213415ac314b7ce1af5d976a9825591309d77,2024-05-16T21:15:51.037000 CVE-2023-25953,0,0,5abb1a478f3e66cc9afa5420123d11a3200a4e70c29330cde9432b4b3f700576,2023-05-30T22:18:54.947000 CVE-2023-25954,0,0,a22ef5203d50fc0480af4dc4db46497b5ccc4201f195b9b49e98a817b6f6f318,2023-04-21T17:54:46.243000 @@ -220182,7 +220183,7 @@ CVE-2023-26582,0,0,12c32dcd82d637dcdedca56ca84b2864fc50eca2ce0d9d634578eaab32f20 CVE-2023-26583,0,0,c619025a8a287d6b9878acaa1d9ce72e24537dc38a39411e99d1856c96ad1c52,2023-10-28T03:20:44.597000 CVE-2023-26584,0,0,ebecbb1954e68aaca87b211a6a732faed82b38f5d9d39a0a0adb0aa435f6f45c,2023-10-28T03:20:48.837000 CVE-2023-26585,0,0,6a169d64030402114baa96977dc7f44050b20734c207e4738fbb9a1f046a7b26,2024-10-10T21:26:36.277000 -CVE-2023-26586,0,1,1587480d5153d2111512d0c6ac8d8ba3bcaed5605b8c8351ff3520a565add747,2024-10-29T15:58:04.433000 +CVE-2023-26586,0,0,1587480d5153d2111512d0c6ac8d8ba3bcaed5605b8c8351ff3520a565add747,2024-10-29T15:58:04.433000 CVE-2023-26587,0,0,68f5d814568994653ae044c5e6f08404578310edae7342625238728fb686b87f,2023-11-07T04:09:40.973000 CVE-2023-26588,0,0,8d09e7de4a8174ad99c8db79151914941653e52f8e566e080f9908dd283d2aa8,2023-04-18T19:37:21.610000 CVE-2023-26589,0,0,4644ea6b391eb80feae3f8ad1321a56d547bc438f6de7ff9a9ab5f2c9ac10df8,2023-11-20T20:50:48.007000 @@ -221545,7 +221546,7 @@ CVE-2023-28370,0,0,de3582dd1096d81790e47f86e8d01523a06fbefe12ffcc4c13f69b64aa034 CVE-2023-28371,0,0,ce0db46339d119df5b173e4dd51d0445d33818b0b4f15f49c2da5f8c8034e485,2023-11-07T04:10:31.193000 CVE-2023-28372,0,0,5e32016ac1ab162878bbdfc06fd753c455aa8ed452229c8bacc32254e390279a,2024-09-20T15:35:06.010000 CVE-2023-28373,0,0,47ca9e35fd3782216fc051f00f61f9fa0b7104797240daf3baaadefda49c4509,2023-10-05T15:39:04.883000 -CVE-2023-28374,0,1,93cd045f58f8292dac4292b3a64d953136db578e2b56b64dcbe2d0f720fd91f5,2024-10-29T15:39:02.053000 +CVE-2023-28374,0,0,93cd045f58f8292dac4292b3a64d953136db578e2b56b64dcbe2d0f720fd91f5,2024-10-29T15:39:02.053000 CVE-2023-28375,0,0,afa039314dadbdd9e9ba9f14ca38e1f298f32bca46adcfd0a2da113404317d23,2023-11-07T04:10:32.550000 CVE-2023-28376,0,0,aebeaeb3f0bed5466239494670d221bf2d002a6c164e9ace4ed7729ffc2f8792,2023-12-21T22:15:13.493000 CVE-2023-28377,0,0,bf392347f00e402c406ccbce20e5620a8c6121065b8f961cdb4151ed7212730c,2023-11-20T20:49:59.327000 @@ -221580,7 +221581,7 @@ CVE-2023-28402,0,0,69fdfbbddfac680137ae686304ed53949adbd271f7d5098f3a71c655e412c CVE-2023-28404,0,0,a6379d060fcb4fe65d0af0b2a2bce81b3e22cfedbed595c0a27f252c044e1405,2023-11-30T15:12:16.473000 CVE-2023-28405,0,0,7b8aa1d5c1b93aa240bb48f7abe5975e8794c64aff1950e2e537205cadc99443,2023-11-07T04:10:34.020000 CVE-2023-28406,0,0,f67b5150e530698712d739fea800c70b8018451a1cafab19e4ef7cf9114abed8,2023-10-05T15:52:29.633000 -CVE-2023-28407,0,1,8287d29206ea11d8f6b81f22f9c07fb17c0c17a52711bfa2d25fe7c7e3dcc767,2024-10-29T15:27:09.650000 +CVE-2023-28407,0,0,8287d29206ea11d8f6b81f22f9c07fb17c0c17a52711bfa2d25fe7c7e3dcc767,2024-10-29T15:27:09.650000 CVE-2023-28408,0,0,ccbc75609a6937eef1c531b29dff1a73be110f4a78793ea3ca32985fbe2c2194,2023-05-30T16:36:15.673000 CVE-2023-28409,0,0,3632c4e5cd2c9eed37a9af7182abe6c0cccf5f5954bb34ef52e10e80ebadcd03,2023-05-30T16:36:27.643000 CVE-2023-2841,0,0,98ae6501a65ac08d4a0c246ac6c6fea551b70d7ab39b6993168d0dd2e95a4170,2023-11-30T04:58:34.337000 @@ -221883,11 +221884,11 @@ CVE-2023-28711,0,0,9a7e4692df4128407920abfd535c6e1e6ea2e2404eb6b544486446f8035d5 CVE-2023-28712,0,0,48cede95267e940bcf25c0c4d4718d225f1a658760a29a9cf30284758c8924a6,2023-11-07T04:10:49.617000 CVE-2023-28713,0,0,2fb09d63fae7527d1926c34ea4251376e037b7841aef4deb35a0f81acbe0ed9f,2023-06-08T13:48:05.117000 CVE-2023-28714,0,0,88063d4bdd18fdf40526b91d8cece6c00c174929be7d549860254d72024001f1,2024-10-17T14:35:12.920000 -CVE-2023-28715,0,1,3ea4cb23c984e1dc7e21ba30efabd581923443dd7272627ccdfacaa6d8fb32bf,2024-10-29T16:16:01.973000 +CVE-2023-28715,0,0,3ea4cb23c984e1dc7e21ba30efabd581923443dd7272627ccdfacaa6d8fb32bf,2024-10-29T16:16:01.973000 CVE-2023-28716,0,0,e4045a53e3ed408d3cf4428ed05d8bc5361e8856e88f1fb66271a1cd958e92a2,2023-11-07T04:10:49.930000 CVE-2023-28718,0,0,e4b9a472339a4b19aed6c313163ced2de35df6cac5febd4f5946426a1ac5017a,2023-11-07T04:10:50.030000 CVE-2023-2872,0,0,09c0e7309a2b4d2af8176a5355a5ab1104607ddafe1d323feddfb7fed68a2e86,2024-05-17T02:23:19.867000 -CVE-2023-28720,0,1,4ecff409d4fd7cf0ea131f7d92ef8c9a093746a7880694e15ec10d13e3f7bcf2,2024-10-29T16:06:24.940000 +CVE-2023-28720,0,0,4ecff409d4fd7cf0ea131f7d92ef8c9a093746a7880694e15ec10d13e3f7bcf2,2024-10-29T16:06:24.940000 CVE-2023-28722,0,0,cb25a71dbb20945e84dce5a2ec951c7fe1080311ea7386f1af7e04d95f27987b,2024-01-30T14:47:58.587000 CVE-2023-28723,0,0,a8a40e8e5a6b2a8bcfede9efb54f5439d03b0015e1bcdbfa70cf3ac7f510d3b9,2023-11-20T20:59:22.650000 CVE-2023-28724,0,0,e3d8326e0af144f282612b2956f6d207661d6a8c15fd1ea13901eac5194150e6,2023-06-09T08:15:10.027000 @@ -224202,7 +224203,7 @@ CVE-2023-31994,0,0,55b495c701a3afcb9a0613c5692bde0c35418af8cc27d0a48037c62c14add CVE-2023-31995,0,0,ccde77b0a8aedc74cf8f2e7a2e5bf0d30fbc042d38f31a7d36b28b5a25b17a2a,2023-05-30T18:45:24.693000 CVE-2023-31996,0,0,ee8783260109f42b80f3819341b3e52a17c76066d374cbf1298bbb942d1a3738,2023-05-31T00:29:23.163000 CVE-2023-31997,0,0,d8cd637d415097d91fa487a3c2d4dd91d84ac1e995cbe2afb36874500d610fa3,2023-07-11T16:19:54.627000 -CVE-2023-31998,0,1,0cb7a2f5ff71486384a9d0f64eaa121057876713e622d0a1405873cb11a83cd3,2024-10-29T16:35:10.213000 +CVE-2023-31998,0,0,0cb7a2f5ff71486384a9d0f64eaa121057876713e622d0a1405873cb11a83cd3,2024-10-29T16:35:10.213000 CVE-2023-31999,0,0,fffa3ed6fbd25c3d86ee6b68528fce8a50751b49e144aa6b4f785f85126f6b98,2023-07-17T18:49:36.997000 CVE-2023-3200,0,0,973499c3ddf1024c520b61f7f3b565541ca97ac2ac3665738bbce9dd15b42507,2023-11-07T04:18:12.337000 CVE-2023-32000,0,0,441e6a2e0cc9dc5b1396d6f7e1bac793503283d1f850c76ce8a3c0ae89468dcc,2023-07-13T19:14:34.663000 @@ -224828,7 +224829,7 @@ CVE-2023-32614,0,0,a784f55ff10684ff0982e590005de61c2c9f48fb842d9b782491c6446577d CVE-2023-32615,0,0,091c09c0f2f1329fa59c5332eabb3854daaef309b38ebf1cc8ec5795c893e63f,2023-09-08T17:23:31.060000 CVE-2023-32616,0,0,d3aebc90f3ffc63473146e75b263a0746735e522cae3aae445f73fd478ee1866,2023-12-01T20:55:14.250000 CVE-2023-32617,0,0,55304cf8798a4bf1924f390b38e9f9f7d42946f5d339841e013e0604cc90b4d6,2023-11-07T04:14:37.857000 -CVE-2023-32618,0,1,9452291064e5b607b4e57110fdacb7939863adb82673795a43470c75eb081e60,2024-10-29T16:15:14.280000 +CVE-2023-32618,0,0,9452291064e5b607b4e57110fdacb7939863adb82673795a43470c75eb081e60,2024-10-29T16:15:14.280000 CVE-2023-32619,0,0,efedb5478e604f4427316aad5814054fb30dfe5a182f27be16e5658b3f9c9d2e,2024-09-26T21:35:17.523000 CVE-2023-3262,0,0,0211d95fb873faeefc7598b055ba57ab843a16b5034ef3301028eaae024fec2c,2023-08-25T06:15:09.797000 CVE-2023-32620,0,0,8d7d3fd55c1278b59cba81bffb9150a561d52098456668ec6539b6e54441b6c9,2023-07-06T23:39:14.747000 @@ -224852,16 +224853,16 @@ CVE-2023-32638,0,0,b212d7a25e497a363d9f2a5ffe9d57abf217be45607a360ea76b90ce98fe7 CVE-2023-32639,0,0,92fa33da269173c6591f736230fcaf4815d5f3960de4edde9bb1cfd769e5d700,2023-08-01T20:16:48.813000 CVE-2023-3264,0,0,81a7ddcdbbc6cfe1d08a4283bf1b5d12c3ca8e0f0af12b5e935928a7ff13618d,2023-08-25T06:15:10.350000 CVE-2023-32641,0,0,f8b6537ed8dfdfc5779178109225484b016c4959cb75be0c6ac546709ac26e3f,2023-11-21T20:29:33.007000 -CVE-2023-32642,0,1,ebd938a9851446aa8c073a3ae03c065d0fe004d2e885f0493c52e0e4a27a1dfd,2024-10-29T16:06:08.280000 +CVE-2023-32642,0,0,ebd938a9851446aa8c073a3ae03c065d0fe004d2e885f0493c52e0e4a27a1dfd,2024-10-29T16:06:08.280000 CVE-2023-32643,0,0,d9aaa87dfc0b26a97d073d7950e12f1b9ce4ce7f2b4c69d5a00ae687ddb0388f,2024-04-26T09:15:07.127000 -CVE-2023-32644,0,1,29b413808adeacc10c17a60006750f210364fa4d4d01cf79b0549734745c5d63,2024-10-29T16:07:20.577000 +CVE-2023-32644,0,0,29b413808adeacc10c17a60006750f210364fa4d4d01cf79b0549734745c5d63,2024-10-29T16:07:20.577000 CVE-2023-32645,0,0,857d6cc902eefc1d9512ca3bece7549ec7eef38c002db86a230c5d650c8de20d,2023-10-12T22:27:09.257000 CVE-2023-32646,0,0,a0e89ebe4d85458421245d42892ba840a989aa0a3ab5ac0c5b07fd3fb2b868da,2024-10-25T13:54:38.737000 CVE-2023-32647,0,0,d4be98a2699461c5cf8ecfffa4244f2c965da061cb23b2d8520d4bcc880a524d,2024-10-25T21:12:10.953000 CVE-2023-32649,0,0,22b9514becd10eb679dd28ac11c5883dd073215affaee5996a16965af56cdacc,2024-09-20T11:15:13.117000 CVE-2023-3265,0,0,471c4818cf3d140a8514e2ffc1948be656fcb1771a62c82080073ff1643bcfa6,2023-08-22T16:20:24.977000 CVE-2023-32650,0,0,bebe035dcd601dd36e4c165904cd4a21f7ee809614ac45add18da3be91ede908,2024-04-09T21:15:08.027000 -CVE-2023-32651,0,1,15cae880959606791d281d2a999fc6c1018e955314d3e9eee4ca85b9d8cc5d8a,2024-10-29T15:58:52.823000 +CVE-2023-32651,0,0,15cae880959606791d281d2a999fc6c1018e955314d3e9eee4ca85b9d8cc5d8a,2024-10-29T15:58:52.823000 CVE-2023-32652,0,0,89d62d8cbf3ff6917490601f8fa32dd32362143953101f10f08633a3aeb94183,2023-07-13T22:40:26.373000 CVE-2023-32653,0,0,6b040df9d66908279be214b2ffddc148c7a8f2359c111265d6156e2ec3857e57,2023-09-26T16:26:41.753000 CVE-2023-32654,0,0,8f48e35acc65a14d839554aa90866cb076315fe8c12cbdf05fa2a269af2eaace,2023-08-03T17:00:15.653000 @@ -225435,7 +225436,7 @@ CVE-2023-33285,0,0,346fa2aebff3b26e0dce2415d6b55e51dd2abe88b804a2ec163b1e68a3cbb CVE-2023-33287,0,0,70d0ca72b61a84f71b61b504883cf3dfcdbe7867b29c7e605eb36ca8df5fefa5,2023-06-08T01:26:27.440000 CVE-2023-33288,0,0,6e9d4ead552c3a0ba41f51c29d0a89ad413f57965894731b38b2e51f2a1622af,2023-11-07T04:14:48.630000 CVE-2023-33289,0,0,332faade8248ed04cde9e44917be14c9483113c17b05cf9f234a56b4d5484390,2023-06-28T16:44:05.340000 -CVE-2023-3329,0,0,0937e9b9fe48ca1168f5f87604ce426029830c1f5aa7ff568fdba333c0642f50,2023-11-07T04:18:31.170000 +CVE-2023-3329,0,1,e05aa6061a406908952f348db2436efeb6f700b85bc2d9a87e8c493b2a301257,2024-10-29T18:35:02.750000 CVE-2023-33290,0,0,53581d74a4614054c7e40cff2a64bb5baac85c4040f2c05262fe63d04e3e8a25,2023-06-21T16:06:56.787000 CVE-2023-33291,0,0,e9db5278b53d838c69e38b9c0ca1574d9600832eb966ddf8cf2cff4260f638e5,2023-06-03T04:27:48.593000 CVE-2023-33293,0,0,aaba53a5bd9606bf2b9ebb8058082a8f9430e4008d1677208c38c998718dc513,2023-05-30T15:18:16.863000 @@ -225786,7 +225787,7 @@ CVE-2023-33871,0,0,96c8ccbff62f4d12f55c1a905b7d0a1b516165541956dc1cc67fcf6b6e21d CVE-2023-33872,0,0,92cd4375c88626a6b81d41637ee6ce9adc07c40c298d7663144d91807417598f,2023-11-21T19:57:06.720000 CVE-2023-33873,0,0,d1ccb40050da5992e5ffdd027a839611bfa1cd04d6a7680944ff558dbe7f266c,2023-12-08T17:27:53.197000 CVE-2023-33874,0,0,53dd71954624e7f0e35cc175ad3c364b00687488d23d7af14508dd738d87fb45,2023-11-20T20:56:52.927000 -CVE-2023-33875,0,1,6d0897ef7f90024fefd308e6313ea71d7f4c1d60dc6e11cc75e33249be79a7db,2024-10-29T16:07:31.717000 +CVE-2023-33875,0,0,6d0897ef7f90024fefd308e6313ea71d7f4c1d60dc6e11cc75e33249be79a7db,2024-10-29T16:07:31.717000 CVE-2023-33876,0,0,1f5e615fb6f189959baf08eff7f09ee64f1021f4aded056d2172c6c1365b26d9,2023-09-15T19:15:07.867000 CVE-2023-33877,0,0,df8d1b902c949c0ebfa7b1733bc104db13c4e5e0f2f64118b58d61599bc73ad8,2023-11-07T04:15:26.310000 CVE-2023-33878,0,0,89163a001b62ea76859f3f0ca50a8fe42240e8a6f46979c1bd65040ff798b393,2023-11-20T20:57:36.867000 @@ -226260,7 +226261,7 @@ CVE-2023-34348,0,0,c3721c995208e3f2fba199a7a9f2dc4688470ecb2a3fb2aa5b403b1f7f5cc CVE-2023-34349,0,0,5a2000cb88a1bdf2b9e1bb2db28bc583608d6ef725619d6974b5080e5a41d1cf,2023-11-07T04:15:34.220000 CVE-2023-3435,0,0,acaf2567930e21a39b5931b68fe58590cbe4d49b5ff713b0021a83d0dd7de88b,2023-11-07T04:18:43.933000 CVE-2023-34350,0,0,998ba2d7b58ed4c07ef935523c6896f04bd8cb3865e83439bda7c2269fc50724,2023-11-21T19:57:25.250000 -CVE-2023-34351,0,1,77be96e9581a2f4d486e938e0678e1bf3918b8f30cd0408a42d848ca68cefc21,2024-10-29T16:14:22.147000 +CVE-2023-34351,0,0,77be96e9581a2f4d486e938e0678e1bf3918b8f30cd0408a42d848ca68cefc21,2024-10-29T16:14:22.147000 CVE-2023-34352,0,0,76b9ab97dbc9d354985a88047830f11302a51958cf16d6d556c0f8c8e157d165,2023-09-09T03:47:04.510000 CVE-2023-34353,0,0,0a1d8a45ea043b23b3674f7d180d2f4046d4e59e299fe92216f195c7b7f54941,2023-09-08T17:34:45.550000 CVE-2023-34354,0,0,1861a1d1a0cb62011e5248413b4f8c9814257b12f9c27b7fe9ea906f72e51bb1,2023-10-17T20:43:40.507000 @@ -226588,7 +226589,7 @@ CVE-2023-34979,0,0,e633852ec5c5cdbd8daa52e407fd8518b14c0a8225c22834c0bee36f7e5f7 CVE-2023-34980,0,0,7421b70c66abd07a5d88b0843ee0000c9380414adbb83621b8449b4538a68f8d,2024-03-08T21:19:43.127000 CVE-2023-34981,0,0,9cb446cb67a297b7875e90260c6189a612aef964e8f554929592973a9722c1f1,2024-10-09T15:35:05.653000 CVE-2023-34982,0,0,69ddd85a34f25c63fa63f83f2232e3dfa5c88ebfb8548a87e8b550ae4963b78c,2023-12-08T18:53:18.187000 -CVE-2023-34983,0,1,64ec24801d869566a3785ff66950b621f6871d2cbffae4033a64d9b3fde0f62b,2024-10-29T16:02:23.737000 +CVE-2023-34983,0,0,64ec24801d869566a3785ff66950b621f6871d2cbffae4033a64d9b3fde0f62b,2024-10-29T16:02:23.737000 CVE-2023-34984,0,0,570a947501d26249f350f1523e7ac826fb9b3f47429ec107901e1cec07cf2408,2023-11-07T04:15:51.207000 CVE-2023-34985,0,0,1e78056c68bd89b8ed5a4148325a465af2835ce3f3014b99acdbadd1dcf00e31,2023-11-07T04:15:51.367000 CVE-2023-34986,0,0,2479d12cac4654f348c5e1ce7265bedb7a6cb523557d9e8e98c0624b9e477e92,2023-11-07T04:15:51.533000 @@ -226652,9 +226653,9 @@ CVE-2023-35055,0,0,d31984f9289e50a43d74ddeec2846848a1afbb8b161ae95ba93ae56b208a1 CVE-2023-35056,0,0,73dece02e29995c731269a7a67d1c88c83a5361af6322a9faf3bd7eb7ae2b904,2023-10-12T22:47:22.200000 CVE-2023-35057,0,0,98e2fb42fc2e84207ce5441e63e4496870c58b19183a5b59337c1c0fd3a9ddad,2024-04-09T21:15:08.497000 CVE-2023-3506,0,0,367377c9bba5afeee6f9171fa21ddbb7e9422993b864f6a4f1f6e476896ec11e,2024-05-17T02:27:32.850000 -CVE-2023-35060,0,1,5a5c7996bd8718abd9847dd108af7d0d0fae165bab7b06c0a1c6e55c7ef34a83,2024-10-29T16:14:35.197000 +CVE-2023-35060,0,0,5a5c7996bd8718abd9847dd108af7d0d0fae165bab7b06c0a1c6e55c7ef34a83,2024-10-29T16:14:35.197000 CVE-2023-35061,0,0,67368fc6f67d8016fc8675b30aa4a78c23d6bbf91f44869540438aa22261d32e,2024-08-14T14:15:13.110000 -CVE-2023-35062,0,1,5045906837f23f74ca68de848256a6e44b10819527e7d0c0af23af8a3443e329,2024-10-29T16:14:45.247000 +CVE-2023-35062,0,0,5045906837f23f74ca68de848256a6e44b10819527e7d0c0af23af8a3443e329,2024-10-29T16:14:45.247000 CVE-2023-35064,0,0,0655a76ebeec87bff84b81b0a62c9a549b374b5d3119a857ea6661f327de42cc,2023-06-23T19:21:19.787000 CVE-2023-35065,0,0,183bd8b63fbbd78df83768da9cd4bd10fb9594d0b0f96457370c7de1cc2cb34b,2023-09-11T18:30:59.393000 CVE-2023-35066,0,0,8cbd857d976a75c8ce74b9aea74a9c44f5836c966dd49214597d5479e80f4e4a,2023-07-31T18:10:22.557000 @@ -226955,10 +226956,10 @@ CVE-2023-35673,0,0,af7a2faf5f17208be8e9b27e9e2cec66d6cafcd9d2d31f5c5d0ef58b562e4 CVE-2023-35674,0,0,63d50b140777b09745cba48ef9f56f33eb5c7cfc093f659778c3fc8ec1ef810c,2024-09-30T01:35:19.420000 CVE-2023-35675,0,0,dd907efec7bb9661ca3412922449fce7a3a8de3faadf9ff8a1de1fa932b2f6b1,2023-09-13T17:40:35.963000 CVE-2023-35676,0,0,4f46b1bdafea48d731ba296299a9f54c45fec7c2e74d32462c1c58fd4e63e3a8,2024-09-26T15:35:17.767000 -CVE-2023-35677,0,0,c582e41061bdaab22d2ba8536d5eb2163e13ae1e498284896f8f230289ed877e,2023-09-13T17:39:58.473000 +CVE-2023-35677,0,1,96a324f86235abb123254deb4f17fe6c9cee6f46fe6cf833409157f486f104d4,2024-10-29T18:35:00.990000 CVE-2023-35679,0,0,253a86941c9d14de34abc41b4a6f9cdbb792759a76539299020cca5163a19f58,2023-09-13T17:39:43.833000 CVE-2023-3568,0,0,16fc4b2c4899ec32532ab1977d49aa0a92cf21f20ade7158957493db49fc0558,2024-07-12T14:17:46.530000 -CVE-2023-35680,0,0,71413d949900f44c70c5d12cda750b0a85e3c08c3ffa75e813a0dfe746958509,2023-09-13T17:39:23.453000 +CVE-2023-35680,0,1,987c41cb842fed8c3331802116dc58ae370add08e161604b2c7a66a465881665,2024-10-29T18:35:01.837000 CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd39c7,2023-09-13T14:39:48.377000 CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000 CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000 @@ -227044,7 +227045,7 @@ CVE-2023-35763,0,0,a1dde759b107bbb45fb117f852bced52176d7c1f1847cf500e4e2553b06e0 CVE-2023-35764,0,0,4273457863900c89f2f64f75a391c06d862e4dd907c30b5ae17770d0f4c54015,2024-08-12T21:35:01.167000 CVE-2023-35765,0,0,a8b212702a1999fbcfa726e6e1cc103b6c211f8d08f9c77445353ae69ee59d53,2023-07-13T22:38:39.083000 CVE-2023-35767,0,0,e035cc07419fd301ca88f2f05ef9f29def8e5d41b5af5a083c2d8d328a038e3a,2023-11-15T16:17:04.597000 -CVE-2023-35769,0,1,fcb2c5b48058ae9dac4783173eff35516b5713fe1b7b5c148cc33680fb827560,2024-10-29T16:14:53.857000 +CVE-2023-35769,0,0,fcb2c5b48058ae9dac4783173eff35516b5713fe1b7b5c148cc33680fb827560,2024-10-29T16:14:53.857000 CVE-2023-3577,0,0,5057fd0385c77c94a2dfb96a9ce23eb3eaf6c0650c2562c0c3df3270b3582d9c,2023-07-27T20:04:24.007000 CVE-2023-35772,0,0,5152cff8d2f7608d8973790cf549ff56d53dcdb19d5d781ccfb0c5282ddb2fed,2023-06-27T09:16:29.973000 CVE-2023-35773,0,0,ca11c3c74b840f104c93ae82355752873e1e4cc95e3fa6ae28b9de379242ec03,2023-07-18T19:02:54.077000 @@ -227588,7 +227589,7 @@ CVE-2023-36489,0,0,dc3b2a16fb93102da57c7283fbace2014f377f0bd7bc62fc2588a28c19875 CVE-2023-3649,0,0,e5601b17dd56710e279a251177061f0fafab9b420c2e2a77a3dbf0de88036ac3,2023-07-25T18:20:46.537000 CVE-2023-36490,0,0,212625366332af3d57eec534d617401802f3ed4def9de6e9a6bbc60e2168ff1f,2024-10-25T19:40:43.417000 CVE-2023-36492,0,0,a6fdf1b6c1920694305ae38a0209cc3b60add5c0d6876bff239d05fef669fc26,2023-09-08T16:48:06.590000 -CVE-2023-36493,0,1,c348d4c68fd389a96a87dce3aafa6f0e26d324e20230fac1cb6c0504c7baf085,2024-10-29T16:15:03.767000 +CVE-2023-36493,0,0,c348d4c68fd389a96a87dce3aafa6f0e26d324e20230fac1cb6c0504c7baf085,2024-10-29T16:15:03.767000 CVE-2023-36494,0,0,11b002c7660baf795f5041a7c39da6a423e11c613352f9cd1ef2e12fe703cd9a,2023-08-07T20:03:35.267000 CVE-2023-36495,0,0,28d1369c4f5d20cb9ac086ea97a0157af8f08160700d1f657cff8ddec1450159,2023-08-03T16:59:42.207000 CVE-2023-36496,0,0,91060cbffad2b263559dece756f0fa782e65c393652585e2593d2c58407be6e8,2024-02-09T19:47:24.757000 @@ -240746,7 +240747,7 @@ CVE-2023-6486,0,0,f30b4f91411f6d838e99a6d7d4e0f648fa3f917770bbcb5921078f6f74e39b CVE-2023-6487,0,0,0400727c4be78a4437d7bab9f01463a335bba30bb6a0fbdcf4b814b871937056,2024-05-22T12:46:53.887000 CVE-2023-6488,0,0,69d54387deab2db88978d844ce91bb01950b5f879635a3ee4d2c3e5acadc4ce7,2023-12-22T19:30:36.993000 CVE-2023-6489,0,0,18aabb1d7ecee57048bc26cc9eeba74364244cb824c8d03f99a9ed281d8a1d5a,2024-10-03T07:15:25.407000 -CVE-2023-6491,0,0,d1c389cf0071b7d23a4a5f66316e02e0fbf972a9c4ca1443544954ab02437a26,2024-06-07T14:56:05.647000 +CVE-2023-6491,0,1,6bfbb08fd448511783bd433c7fcbc4b217d245487c97d681d2df06fb699ba193,2024-10-29T17:59:12.477000 CVE-2023-6492,0,0,1851fea27d9ba20b4d9d04875b636eb1c88a0f2bb9cbd0f884c78de5da3ee920,2024-06-17T12:43:31.090000 CVE-2023-6493,0,0,dfdf9a07fa82a52f51f58783c334348e9f4e2ad4cc59d93f5110b998219c24a7,2024-01-10T15:10:40.807000 CVE-2023-6494,0,0,80dcbf3f6d7d049ebe223948e82130bdff4600f7af5680262795b83b3fc9c537,2024-07-11T15:05:17.510000 @@ -241235,7 +241236,7 @@ CVE-2023-7043,0,0,631516d4137929bddc551c24967ad607585a3a4a643a006531f43d1639a14d CVE-2023-7044,0,0,42a96d312ac1ab60458f9e3f29deb24de87d15012229bb07eb2dcbd172c0240e,2024-01-10T16:12:34.983000 CVE-2023-7045,0,0,56f72b8799718b9a57c25f98da5738945d9d62f196c72ae2e5b5400f5c5f902c,2024-05-24T01:15:30.977000 CVE-2023-7046,0,0,1325b623fc707ac674099e6d171e788fc0b1271e372288eb5bdf13523bf4b8ca,2024-04-10T13:24:00.070000 -CVE-2023-7047,0,0,df412ac3889a701032edbec4023d6825e5fec0bc08c785aea05e4842aa327410,2024-01-04T18:37:04.157000 +CVE-2023-7047,0,1,f1965492a368ae5a03391039868b810a276148507878bf44dcae6e2073c1c108,2024-10-29T17:35:02.770000 CVE-2023-7048,0,0,083baa3f6965f5009fe64187caefcf38bee2f72058b5af742496e5b61251d78e,2024-01-17T22:32:55.657000 CVE-2023-7049,0,0,d1a1bd4afe9a5ad3f4e40bc7a2a260ca6671c9e46632ad87c5a02d99799583f5,2024-08-19T13:00:23.117000 CVE-2023-7050,0,0,4bac6368bd056bdc5019cf32a62705315940d90e07b309dce57a8f7c89dab9f8,2024-05-17T02:34:05.373000 @@ -242353,7 +242354,7 @@ CVE-2024-10004,0,0,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530 CVE-2024-10008,0,0,93a7056d3eedb0f45bdd1f80f18e9d31f27172cc24baaadb6be41dc083092214,2024-10-29T14:34:04.427000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10011,0,0,b82cad7a266ac941493a6589c7af0eff273fe2e36d28fba66b1420614eed8185,2024-10-25T12:56:07.750000 -CVE-2024-10014,0,1,e8d1f2b2bcba8c55790a5ab025cb991579911523f1b20331581610c1fd5c2ad1,2024-10-29T16:58:48.127000 +CVE-2024-10014,0,0,e8d1f2b2bcba8c55790a5ab025cb991579911523f1b20331581610c1fd5c2ad1,2024-10-29T16:58:48.127000 CVE-2024-10016,0,0,21d0091eaff7fe7567d1651c36c431401391330eaae7a5e6c3e21a28cc10ea9f,2024-10-25T12:56:07.750000 CVE-2024-10018,0,0,2aa14605c63d984e9b2fdfd4b3872cd3e6ce36a0ab239799435cd07454bf385f,2024-10-16T18:35:03.460000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 @@ -242381,7 +242382,7 @@ CVE-2024-1007,0,0,bb97efced7fb486712fbb95488bae5086c8742bff2dc7feb7593b966188b1c CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552301,2024-10-22T14:19:40.597000 CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000 CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000 -CVE-2024-10073,0,0,36e7a75e8440250867ac4ab2920540c9c319ac3650023a2029f396b9acec7ea2,2024-10-18T12:52:33.507000 +CVE-2024-10073,0,1,9ac62420226c9fe9ed2bbe058542cdb11512629d78e7df28a3c14d1c56a17916,2024-10-29T17:18:17.690000 CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000 CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000 CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000 @@ -242452,7 +242453,7 @@ CVE-2024-10181,0,0,e508d85fb29127dc9615d55a59c4f686aa113b77b39ab8d7dcfaa4fd4cd2c CVE-2024-10183,0,0,120f83031d6b056b9464662cc23a397a8370d5b6b85b4ebf16896e12042e7ae6,2024-10-23T15:12:34.673000 CVE-2024-10184,0,0,82e323cdb696d7fc911e7053501b005fcd00bb282537fcf739cadb894187d0e9,2024-10-29T14:34:04.427000 CVE-2024-10185,0,0,ca6dfd9088b0219f97894c0990b4ec594d404f7f2fe7b73023fa5dc239e3eb40,2024-10-29T14:34:04.427000 -CVE-2024-10189,0,1,44ab01729f421efaf03808ae973a9923c5f8c6b41f07f8511cb89b2ff9a7419b,2024-10-29T15:27:55.550000 +CVE-2024-10189,0,0,44ab01729f421efaf03808ae973a9923c5f8c6b41f07f8511cb89b2ff9a7419b,2024-10-29T15:27:55.550000 CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000 CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000 CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000 @@ -242484,7 +242485,7 @@ CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b4 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 CVE-2024-10266,0,0,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 -CVE-2024-10276,0,0,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000 +CVE-2024-10276,0,1,913e45b2b0c4a67a031924d52b79fd99196e0bfd1eaceb610aead0724000ee9a,2024-10-29T18:15:05.140000 CVE-2024-10277,0,0,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000 CVE-2024-10278,0,0,56ee6a4da4de5c0e9a8258a03df3a3a9b6b90c37d9c7631850f400938a22db00,2024-10-23T15:12:34.673000 CVE-2024-10279,0,0,e64edd41252858e04d752ad843858b5ee1ffab4901d78e52b3de9d4b7b86a8b2,2024-10-23T15:12:34.673000 @@ -242600,20 +242601,20 @@ CVE-2024-10447,0,0,3d23036486de2cfd5c946a364af9798880f8285c7930da486574aaa8ca05b CVE-2024-10448,0,0,8592ee07b49e81610af100bc63f005e0b694650efb1b3544bc63d15b3705903e,2024-10-29T14:34:50.257000 CVE-2024-10449,0,0,37c2bcaf33d85978782c73468306745d1914d0da52c07cf95c1e143ce9f51251,2024-10-29T14:34:50.257000 CVE-2024-10450,0,0,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 -CVE-2024-10452,1,1,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b366238480a,2024-10-29T16:15:04.593000 +CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b366238480a,2024-10-29T16:15:04.593000 CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 CVE-2024-10458,0,0,7226d5d845dae2d50cf0c67a709b76b4ee40123526a8a54fcaba4953dcdb6c62,2024-10-29T14:34:04.427000 CVE-2024-10459,0,0,9d75223b7f4d8772f198dec4be94083c31b07915596609c3d6e28cafba36747c,2024-10-29T14:34:04.427000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 CVE-2024-10460,0,0,b3dcc9daf7d6e1ca6a6660329788291f6c0dafaa9a6365aab9b6d0c1d3013608,2024-10-29T14:34:04.427000 CVE-2024-10461,0,0,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000 -CVE-2024-10462,0,1,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000 -CVE-2024-10463,0,1,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000 -CVE-2024-10464,0,1,226d7a8498ceefc9403bcdc6921e29827150084c4c3e7048cfed5daa3ccfcf4c,2024-10-29T15:35:14.420000 -CVE-2024-10465,0,1,dc7ed0592a40fad02af55f50011ae4cb76440db4e16f8699e799457b405cb6e4,2024-10-29T15:35:15.247000 -CVE-2024-10466,0,1,63489517342254eb5db891b401be80f9748fc25d7cc27e56635baf0153cb523d,2024-10-29T15:35:16.103000 -CVE-2024-10467,0,1,7e4e71c60edecf9e458ee9a62bd8a9b75d5e9aa73408c25490c4535f84e333c0,2024-10-29T15:35:17.013000 -CVE-2024-10468,0,1,036adcfbbc7bf9f9c9537432c8783c40b87e341a47dda57c9e37f244069e8a6e,2024-10-29T15:35:17.917000 +CVE-2024-10462,0,0,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000 +CVE-2024-10463,0,0,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000 +CVE-2024-10464,0,0,226d7a8498ceefc9403bcdc6921e29827150084c4c3e7048cfed5daa3ccfcf4c,2024-10-29T15:35:14.420000 +CVE-2024-10465,0,0,dc7ed0592a40fad02af55f50011ae4cb76440db4e16f8699e799457b405cb6e4,2024-10-29T15:35:15.247000 +CVE-2024-10466,0,0,63489517342254eb5db891b401be80f9748fc25d7cc27e56635baf0153cb523d,2024-10-29T15:35:16.103000 +CVE-2024-10467,0,0,7e4e71c60edecf9e458ee9a62bd8a9b75d5e9aa73408c25490c4535f84e333c0,2024-10-29T15:35:17.013000 +CVE-2024-10468,0,0,036adcfbbc7bf9f9c9537432c8783c40b87e341a47dda57c9e37f244069e8a6e,2024-10-29T15:35:17.917000 CVE-2024-10469,0,0,ce754100df9ffde1a5a074de2751b11dd6f964ca496b3df4282e24ff877dc047,2024-10-29T14:34:50.257000 CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000 CVE-2024-10474,0,0,37703d08df776f2812fd2ada14ad66d475779a685531687aea7bcbacb1785dcb,2024-10-29T14:35:17.140000 @@ -242622,6 +242623,7 @@ CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46 CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000 +CVE-2024-10491,1,1,bcf9eb04580934858978db75a48b33b2b8a0e47c12b6f521cfeb7a488154906e,2024-10-29T17:15:03.853000 CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 @@ -243553,7 +243555,7 @@ CVE-2024-20036,0,0,18c14171323f00b186271c31528dc99e37fd9b9059fcf223ab21b79a7fd11 CVE-2024-20037,0,0,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000 CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000 CVE-2024-20039,0,0,16957c5f03c6deb27e91c56e5a56c47ab9ce0361bbd04c3b1e9fc45aae937591,2024-08-01T15:35:05.340000 -CVE-2024-2004,0,1,c2bb8f329a7d72a8f958bf6961e7ab1c1b13f0fe82c58ad2a8b0b0c03f602ab5,2024-10-29T16:35:12.027000 +CVE-2024-2004,0,0,c2bb8f329a7d72a8f958bf6961e7ab1c1b13f0fe82c58ad2a8b0b0c03f602ab5,2024-10-29T16:35:12.027000 CVE-2024-20040,0,0,7794263a0ff9ef7a9a293c11fabe2693e4a31f8e28a938c194a6c9b335ae777e,2024-04-01T12:49:09.583000 CVE-2024-20041,0,0,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000 CVE-2024-20042,0,0,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000 @@ -243868,7 +243870,7 @@ CVE-2024-20478,0,0,7159d6f0353997233b844f180b9acaa4a22410a663dfe8445f14235dd4611 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 CVE-2024-20480,0,0,1929c3dc705e1e48392e67050891180fdb659aa9ab6d1d255c10d5b0e58c773c,2024-10-03T20:07:33.900000 -CVE-2024-20481,0,0,744395bbf856aa6d6fb62caedc65d809b92b57a2e800d1268b1fc2e93488fecb,2024-10-25T12:56:07.750000 +CVE-2024-20481,0,1,767ae1c0f6a7066da50f07948c514a10ef87b2b329ab72db1baf3efae941c3eb,2024-10-29T17:47:44.083000 CVE-2024-20482,0,0,c505bd145f9bf1b6b0a0c01302a4586adad5dfa33086e10ef815e7cb1d8f4913,2024-10-25T12:56:07.750000 CVE-2024-20483,0,0,7bbf4d5b1e3697b5bad7f81531333e630361007007985921b04d8f51e2bedc77,2024-10-03T01:44:17.827000 CVE-2024-20485,0,0,5676d455c5c74a14ae9e8ea761092b4ccea7f25b150dd70cffdd2f214235258c,2024-10-25T12:56:07.750000 @@ -245120,7 +245122,7 @@ CVE-2024-21917,0,0,26b80a891f430a1a7f15438662f05666dcf386f7141a1aed04c90316da82e CVE-2024-21918,0,0,742b173c7dcca847586b3391775dbdbe8cf845cb3792806068b182f51bb9a05c,2024-03-26T17:09:53.043000 CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eedea1,2024-03-26T17:09:53.043000 CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000 -CVE-2024-2193,0,1,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000 +CVE-2024-2193,0,0,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000 CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000 CVE-2024-2195,0,0,bb0953f36325af10b37984088b8b1459185284ada2095a83a3bbf8eda597a9b0,2024-04-10T19:49:51.183000 CVE-2024-2196,0,0,8ec133a9075bc1567c504d98dff21f157cca962585a8b4ec57dc32003f56e460,2024-04-10T19:49:51.183000 @@ -245594,7 +245596,7 @@ CVE-2024-22520,0,0,57a4a0e95e01ac29a1644bc8dd95e1182aab0ee098645584e77b48608e2ef CVE-2024-22523,0,0,4d1bedf12f65c21e553a2d1d3b166e89d2d1d69d220c5bbcba3c4d692b00d258,2024-02-05T18:45:22.323000 CVE-2024-22524,0,0,ab2cdf019dd6c1da16c352738080a65ad88b074a9cf957a8b3e123f9ca828169,2024-10-15T20:41:01.773000 CVE-2024-22525,0,0,1a5690a22b6c338f7360e479d85cb27bc0ae0b34f0612e2bb4f2c7ef138f544c,2024-10-15T20:37:23.253000 -CVE-2024-22526,0,1,693d062ddd73b2e0329dfe7dbfad844d682b6d21f4e04b1bec7a785e36e89ac5,2024-10-29T15:35:19.067000 +CVE-2024-22526,0,0,693d062ddd73b2e0329dfe7dbfad844d682b6d21f4e04b1bec7a785e36e89ac5,2024-10-29T15:35:19.067000 CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba76ad,2024-01-31T18:42:44.573000 CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000 CVE-2024-22532,0,0,de186662f33e74d83cd8fffe00aab46fcd2955cb2806c1da45608ae2427d3c0c,2024-08-01T13:46:58.680000 @@ -246595,7 +246597,7 @@ CVE-2024-24015,0,0,6dd8da6fd758089d629fcd12838913dcde6db052a6374d2b8f5793d22fe99 CVE-2024-24017,0,0,81c6774a56f1a586f4f906f1f0b789f480a61b64162df23776574dcc345f003f,2024-08-01T13:47:23.277000 CVE-2024-24018,0,0,66626bf92ddfad532b99d0b35acef3a9eaf6184c69914a430432ce2d48a53bb9,2024-02-10T04:01:03.227000 CVE-2024-24019,0,0,f7d524e99ee9469f902506a2564eea181d03a93dd9aaf0d0017baf7a52b53e6f,2024-02-10T04:05:08.660000 -CVE-2024-2402,0,0,df08564cd50bc510e33f7e2bf771c364246af0166a116c323f50615d32c9f1bb,2024-04-24T13:39:42.883000 +CVE-2024-2402,0,1,de84edd7aa83f5c9dfbf4bf08a3744a558172d278922cd4b0bbc8dde752ca26c,2024-10-29T17:35:05.720000 CVE-2024-24021,0,0,9ff2fcb0b3f701136e7c1af508590d1c0d49240ce75f0784418e54285102806a,2024-02-10T04:00:25.390000 CVE-2024-24023,0,0,642c4f33e7e273d8ffe2e62be3ad44d72d9be38908b4529fcd373e9d68112f1c,2024-08-26T20:35:12 CVE-2024-24024,0,0,54797987dfab0043520f2b481266093ad88b83f5fdd601dd22b176c0ad5e0032,2024-08-19T20:35:02.680000 @@ -246672,10 +246674,10 @@ CVE-2024-24186,0,0,5a579d13423508550990c499595359bab96d5e71f3e2468ac12440495b705 CVE-2024-24188,0,0,f039657d8a519295dbe9d8b913550e51e3da4171c20796692de50c30be3792df,2024-02-10T04:04:38.810000 CVE-2024-24189,0,0,4341dec91a6c4ea964ce95e8e93498362b7b635156f701f9e5b916d3cca9d99d,2024-02-10T04:04:19.630000 CVE-2024-2419,0,0,5fcca91de88b5162a5d5aeb9dd468155ecc506341b89e036ecb778a50946c5eb,2024-04-17T16:15:08.470000 -CVE-2024-24192,0,0,95561e26a2c5d88d916366781deb23d17981ab28ae80eb389863f58396330b20,2024-06-07T14:56:05.647000 +CVE-2024-24192,0,1,5f5743ea32ad6f3a178d4076fc71d41014a2b5278f5ece1e273f777397eff487,2024-10-29T18:25:10.853000 CVE-2024-24194,0,0,6e4b565f8b358bea94fb9302f51a0554b1c64f689126d61ef7288c2abd366315,2024-08-23T19:35:08.380000 -CVE-2024-24195,0,0,27a96813936cec6833414370d612b8d8437a2d6d783291e3d87ae5c3f18a6360,2024-06-07T14:56:05.647000 -CVE-2024-24198,0,0,89bf99a096d242b773b4065a04eb49ef0fbc76e97974c5cdd5f984caaf83efdd,2024-06-07T14:56:05.647000 +CVE-2024-24195,0,1,699de951a7724eaa9ddff4f109dd98dd6b0da1c456245391dd7c4f18986cf968,2024-10-29T18:24:07.370000 +CVE-2024-24198,0,1,86dfd44006b9adb863db60277804fa4a82e3dd0260045a4e72a376b198931477,2024-10-29T18:45:47.057000 CVE-2024-24199,0,0,7ba43404c5022da254878ea129b205d46b0f249a8f3526c8415be3cc2a20e0ce,2024-06-07T14:56:05.647000 CVE-2024-2420,0,0,13b83832dbf3c227f1bb0a786d7224f8bb2d919ddb4e3730a2d048cbbb3f3674,2024-05-30T18:18:58.870000 CVE-2024-24202,0,0,668325610a66240d6d1186abf034222333d655c33a74fab67ccef821464427c8,2024-08-19T20:35:04.473000 @@ -247207,7 +247209,7 @@ CVE-2024-25075,0,0,bfed480b2306172449fd442aea4561660fa83ab81e8f534c8111cd2e1f0d7 CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000 CVE-2024-25077,0,0,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000 CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 -CVE-2024-25079,0,1,747dcc74f114c461c43dc15d8c7262cc52b3ea0a47dd0c2658850379b94eaa9d,2024-10-29T15:35:19.873000 +CVE-2024-25079,0,0,747dcc74f114c461c43dc15d8c7262cc52b3ea0a47dd0c2658850379b94eaa9d,2024-10-29T15:35:19.873000 CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000 CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000 CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 @@ -247504,7 +247506,7 @@ CVE-2024-2556,0,0,d03e7f1784653a97f31dc4e2fd10447d6f2db7c14a279d58208c6467bb9e5b CVE-2024-25560,0,0,e7b7bd3b9b2bd4e7d45c7cc73f2078dfc39996dd7babf1c9bfbdcc4206fa2bb7,2024-05-08T17:05:24.083000 CVE-2024-25561,0,0,76009d8f511bac009453b1046a38e646e70f224b7d5698b6c84d95afebbbc42c,2024-09-12T18:50:32.413000 CVE-2024-25562,0,0,691463f616aff0c576eb38540790057cbc3fed7a44a49e5b85921154797d7fac,2024-08-31T03:40:47.857000 -CVE-2024-25566,1,1,bce4d48f91d3f108155e5a85bfef4dd59d760dcc7bad1735d165b1e6f1aaf94c,2024-10-29T16:15:04.947000 +CVE-2024-25566,0,0,bce4d48f91d3f108155e5a85bfef4dd59d760dcc7bad1735d165b1e6f1aaf94c,2024-10-29T16:15:04.947000 CVE-2024-25567,0,0,312765bfd106474db1f5aba6392fe2ea9517594a364566ff599d59e6c885b134,2024-03-22T12:45:36.130000 CVE-2024-25568,0,0,1f3b68eecdadc5fc067f1c6a6f3d0aecf716d94021ea1c3d5bfe3c2dbc91ce3d,2024-08-01T13:47:46.990000 CVE-2024-25569,0,0,dea2ee3f4df79c480f034907a060b1ff1648e15e76705f9587fe4b45a7f69cdc,2024-05-05T03:15:07.033000 @@ -247604,7 +247606,7 @@ CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e0 CVE-2024-25673,0,0,020bf3214c5ffa87859d3ca28dd29461160bdf033b62023050f62c5799071658,2024-09-24T19:08:32.737000 CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000 CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000 -CVE-2024-25676,0,0,a08186e93b8e72e7d0fccd86e2d99f3ceb03caa74e9fe0fb3ce31f97ab303d23,2024-05-02T13:27:25.103000 +CVE-2024-25676,0,1,e1c339d977188c227b8d7765d78710c2237053c6caa92049e6e94ad2d15a2ce2,2024-10-29T18:35:03.590000 CVE-2024-25677,0,0,89ae1e71ce0f9721b50106e0a4f1d73d4234e37c3823e6f368eaa275cdd88dfa,2024-02-15T19:43:24.983000 CVE-2024-25678,0,0,73a90dfe7018508f2c5748a1f15a22c5b27a554d514f84b241713ad39d9cc947,2024-02-15T18:45:09.663000 CVE-2024-25679,0,0,336671d7a9b81f2d934eec43295d86632d4115fa00ebe07b3b7b7b64cbb71b0d,2024-02-15T18:44:40.547000 @@ -249365,7 +249367,7 @@ CVE-2024-27835,0,0,80c6d96e906c8635ef6969508bf139f1543eebf14051cd8c997c4c8052553 CVE-2024-27836,0,0,cebab4c068470dfdc9e3a5c62e87416155cf98a1f8670f21b2ee301fe7d874e0,2024-07-03T16:28:15.957000 CVE-2024-27837,0,0,7e4bb4d9cc28d81f3afe01a685bcf2ea16ed26bf202a4b18649d6d977d69ced8,2024-07-03T01:51:08.273000 CVE-2024-27838,0,0,8f1cf242351f952c736e479e56e5138c5bf243d831755b412d2f2a5f48580c71,2024-07-03T16:27:38.277000 -CVE-2024-27839,0,1,891df2bd84a9a6425c499d13aed0ec4c8f680e0da574abab21725bb972850e0e,2024-10-29T15:35:20.747000 +CVE-2024-27839,0,0,891df2bd84a9a6425c499d13aed0ec4c8f680e0da574abab21725bb972850e0e,2024-10-29T15:35:20.747000 CVE-2024-2784,0,0,ac18ac10d4d26cbc8cc67c7d846cc7c2e5e5aeca34baa26ce3c69d9886b607fc,2024-05-24T13:03:11.993000 CVE-2024-27840,0,0,c861029ec7979509d3bf8ebb217fb6334f481422c29598e90c453a01f61edeca,2024-07-03T16:27:03.590000 CVE-2024-27841,0,0,c196712b25e7bd8d66323b49a59c084563ec41f23c04da910219b17a17279957,2024-07-03T01:51:10.377000 @@ -249542,11 +249544,11 @@ CVE-2024-28014,0,0,16fb600a35cd34a3bc2910bc5d71fb1c433afeb8bbc697318d98ea82c7efb CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000 CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 -CVE-2024-28020,0,1,5ccea74a65d1527e40fd5cf2e549b4f1d5fd1053b3c9cfb7acd6b24d27d3fa46,2024-10-29T15:15:09.207000 -CVE-2024-28021,0,1,d3b281f790deb0e028449c0547c897de30755152601ff8bfb79129f9a9b610f6,2024-10-29T15:15:09.347000 -CVE-2024-28022,0,1,ef2a0f9ac5b24286c03f1b67f9788efcbdfb6eb0e52bbe5a2ede8ed5d36c64a2,2024-10-29T15:15:09.573000 +CVE-2024-28020,0,0,5ccea74a65d1527e40fd5cf2e549b4f1d5fd1053b3c9cfb7acd6b24d27d3fa46,2024-10-29T15:15:09.207000 +CVE-2024-28021,0,0,d3b281f790deb0e028449c0547c897de30755152601ff8bfb79129f9a9b610f6,2024-10-29T15:15:09.347000 +CVE-2024-28022,0,0,ef2a0f9ac5b24286c03f1b67f9788efcbdfb6eb0e52bbe5a2ede8ed5d36c64a2,2024-10-29T15:15:09.573000 CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000 -CVE-2024-28024,0,1,b0c6ecf3013967d3efc0618c902b41d32c3ab34672126ec38ab8cb1948f54213,2024-10-29T15:15:09.697000 +CVE-2024-28024,0,0,b0c6ecf3013967d3efc0618c902b41d32c3ab34672126ec38ab8cb1948f54213,2024-10-29T15:15:09.697000 CVE-2024-28029,0,0,9e4bd22dac92b2ff82c0b0c8dd5314b634ca4785041ee3b60958f95130ac218e,2024-10-17T19:15:22.063000 CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000 CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000 @@ -250940,7 +250942,7 @@ CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f57 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 CVE-2024-30122,0,0,b78e8f60e4d0df5148447073604013d9d8b1860e36c446b761d204643c69cb09,2024-10-25T12:56:36.827000 -CVE-2024-30124,0,1,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000 +CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000 CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000 CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e7b5,2024-09-26T13:32:02.803000 @@ -252128,7 +252130,7 @@ CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed2 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 -CVE-2024-31714,0,1,fca8cf3535ce1faab64a922bcd70a563f448d5faacc7ae78e0f09ff9c9198506,2024-10-29T15:35:23.120000 +CVE-2024-31714,0,0,fca8cf3535ce1faab64a922bcd70a563f448d5faacc7ae78e0f09ff9c9198506,2024-10-29T15:35:23.120000 CVE-2024-3172,0,0,05dc82f6f22e88fbd8d06dbea6edbb204f6f1a0b12363688b71e4a27893b8a6f,2024-07-18T15:02:46.477000 CVE-2024-3173,0,0,0a00fa791c0beedd2224ddcaad68b63d69d779d7d822291cdbf8a4dfac758ac8,2024-08-01T13:56:25.427000 CVE-2024-3174,0,0,cc93afb1fba4ed5cb1d1b58e07131fbee1642590e2326d02f843f51030b35ac2,2024-08-01T13:56:26.347000 @@ -252757,7 +252759,7 @@ CVE-2024-32611,0,0,abc754efada8aafebf0fe0506c081c90cf76bdf375a890d26aade6a81a7fb CVE-2024-32612,0,0,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 CVE-2024-32613,0,0,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 CVE-2024-32614,0,0,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 -CVE-2024-32615,0,1,ff1ddfb3437efea546936b4400a705ebe4cd91e94f67802790a54811aa3f4160,2024-10-29T15:35:24.107000 +CVE-2024-32615,0,0,ff1ddfb3437efea546936b4400a705ebe4cd91e94f67802790a54811aa3f4160,2024-10-29T15:35:24.107000 CVE-2024-32616,0,0,3470660bc21c15733b68c010ee9c1a1f6e6a37d50582163cfc4fb2ca8bf712a0,2024-07-03T01:56:48.773000 CVE-2024-32617,0,0,9808be4dd950599e3382ef2e43dc1ef6572adf7dec30285db7d549529012275c,2024-08-20T14:35:15.603000 CVE-2024-32618,0,0,56dab34cac4614715d8aac7022fd1103f44443bc68e99df871e1adb6c0e5eb8d,2024-07-03T01:56:49.560000 @@ -253013,7 +253015,7 @@ CVE-2024-32876,0,0,8a2a937b5bb789a06f1b910a6e7251f42791b60b4d46c3846bf785e13f1c5 CVE-2024-32877,0,0,7f7dbd86b3341b766ca5f99c5f601e528712f8c9efd5934029d4fb31e4ebb756,2024-05-31T13:01:46.727000 CVE-2024-32878,0,0,4eb2015e7db57db77c843b6c80b50f5aca6814f486e5f807ded849f6013237af,2024-04-29T12:42:03.667000 CVE-2024-32879,0,0,508c215f23d679b62226be2a6ee13d4db437b14d64001cf50facd812cf5bf65b,2024-04-25T13:18:20.370000 -CVE-2024-3288,0,0,82d5fdaed02e5060b7efb5b6194caeaed93f31f91dcc8082c0c91311b40065ea,2024-06-07T14:56:05.647000 +CVE-2024-3288,0,1,6c2c38160834c2f9324d6f6b0e9d71b9e3f99f123a1f5787e4af8f8df6f900c1,2024-10-29T17:52:30.007000 CVE-2024-32880,0,0,82299b1373137a25af0fecd2e6ce5b08025fe9939bd4a98c7ddeafbd0e90647f,2024-04-26T19:59:19.793000 CVE-2024-32881,0,0,d8c07ebc677d8eb073520c9ca316aef2ad519bc36edc394076186ae12ed97d2a,2024-04-29T12:42:03.667000 CVE-2024-32882,0,0,8a97faf6ffed5ca47beef857830dc3d4291f8dfdcc63d173b880ecd48671129b,2024-05-02T13:27:25.103000 @@ -253075,7 +253077,7 @@ CVE-2024-32937,0,0,652f451b71d39d99a50a831c1d05a67aee4d871187572c128dccbf3c57743 CVE-2024-32939,0,0,231a2fa1e4d14286f5b9a08c8a32a2999ba97abf4192ef0188114e2b4511697a,2024-08-23T16:17:54.027000 CVE-2024-32940,0,0,b139056212e274cc43b1d8561af3c4d12757c7b4882dc265ebef55266df1f735,2024-09-23T14:44:21.763000 CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 -CVE-2024-32944,0,1,d0ec70387311640eb8535227f7e724b82fb2d27427be3369ff836aae4b979014,2024-10-29T15:35:25.073000 +CVE-2024-32944,0,0,d0ec70387311640eb8535227f7e724b82fb2d27427be3369ff836aae4b979014,2024-10-29T15:35:25.073000 CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000 CVE-2024-32947,0,0,f4d3388d21b25a6b8abe5d47eaf1495f0195fc32275d8a68f778018af0164235,2024-04-24T17:16:50.397000 CVE-2024-32948,0,0,acdecd5f4ed0b407d74ae76d69c5bf1c1216a53f69bd869825d06aa6433de1ea,2024-04-24T13:39:42.883000 @@ -253239,9 +253241,9 @@ CVE-2024-33217,0,0,931f6caed27deca16afe48992fe19ff3bc360241c91b6cd818528eeb486c2 CVE-2024-33218,0,0,ee7d69983b37f9c6bf7e7a7a1874f78caedf9c878645e11206579f136a2c86ea,2024-08-01T13:51:46.453000 CVE-2024-33219,0,0,88db41ff645af4eb9aa3c0f9c25ab5a9fdf513c3fdf3a77e4c6808a67dc97b30,2024-08-20T15:35:08.557000 CVE-2024-3322,0,0,0211b467f4713c75ff39403f3818e6215f0f1e1d98c20a10ac87836ae1ccbec9,2024-10-17T20:20:34.677000 -CVE-2024-33220,0,1,0c40f36bca42b909f92e46671b69f1180151365a84588a62b8ec4bef1b8a26a6,2024-10-29T15:35:25.910000 +CVE-2024-33220,0,0,0c40f36bca42b909f92e46671b69f1180151365a84588a62b8ec4bef1b8a26a6,2024-10-29T15:35:25.910000 CVE-2024-33221,0,0,4c13ec1b720b7ec2ce94f445e942c2447ba67f3bae626d7dba251fb8b3437798,2024-08-01T13:51:47.243000 -CVE-2024-33222,0,1,909dc7e1cc7c5c5ef2203c7c2d648f88dca440e7d1906a5523724669aeb21ef2,2024-10-29T15:35:26.137000 +CVE-2024-33222,0,0,909dc7e1cc7c5c5ef2203c7c2d648f88dca440e7d1906a5523724669aeb21ef2,2024-10-29T15:35:26.137000 CVE-2024-33223,0,0,726547f01cfae605317c6cfc99e2ef83243702d32495b560ecee9146a4a7a5c6,2024-08-29T20:36:42.837000 CVE-2024-33224,0,0,86736ad02528ece16e9971b6f9b2a1db298eb6e0829065eacffc71f386f1e027,2024-08-25T15:35:02.580000 CVE-2024-33225,0,0,71b85a02954864b84a33d179172a4f4b399e9e17bddb78acf1c5edd324250d90,2024-08-26T19:35:28.963000 @@ -253916,9 +253918,9 @@ CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d CVE-2024-34195,0,0,e936f15231dfa4d6a6e17686f81aced8b75779a489cec0fad79bd9273174e57c,2024-08-30T15:59:08.873000 CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000 CVE-2024-34198,0,0,64762b78b18144217b11a78982a1bc311c217ced71d9dd99c5d6d58d14f2ea5c,2024-08-29T20:36:45.497000 -CVE-2024-34199,0,1,60254b455db0af6c528639aa0e6ce70e6f6d96dfc712173ecda7bba1e59f824c,2024-10-29T15:35:26.360000 +CVE-2024-34199,0,0,60254b455db0af6c528639aa0e6ce70e6f6d96dfc712173ecda7bba1e59f824c,2024-10-29T15:35:26.360000 CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000 -CVE-2024-34200,0,1,04a6ef60f33af4d5210cca15ac720f37385f5f3834d1055c11935c81c70d37a9,2024-10-29T15:35:27.197000 +CVE-2024-34200,0,0,04a6ef60f33af4d5210cca15ac720f37385f5f3834d1055c11935c81c70d37a9,2024-10-29T15:35:27.197000 CVE-2024-34201,0,0,331c15ea4d8678817fc4a039b90628979e4d12ceb52da635433fde95bd8259d3,2024-07-03T01:59:31.177000 CVE-2024-34202,0,0,10e2af653aecf5939b67ff5397946eb97268ba48cfc20999e9653a29203a02fa,2024-07-03T01:59:31.937000 CVE-2024-34203,0,0,7c4fea643e6e97753f9c8250ce54a3db82e8ad36a97a2537629259caa2f68d04,2024-07-03T01:59:32.703000 @@ -253938,7 +253940,7 @@ CVE-2024-34218,0,0,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5 CVE-2024-34219,0,0,e4a328632092998fdaa790d0453e25d1d23aa6d18db916c9ed2e43dfb23e65b7,2024-08-08T21:35:14.163000 CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c2e,2024-05-17T02:39:54.907000 CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000 -CVE-2024-34221,0,1,4fc0fe5a0a7d481229d82414975559b5ce7e394eebb1a6cc6af7f54bf077ba48,2024-10-29T15:35:28.087000 +CVE-2024-34221,0,0,4fc0fe5a0a7d481229d82414975559b5ce7e394eebb1a6cc6af7f54bf077ba48,2024-10-29T15:35:28.087000 CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000 CVE-2024-34224,0,0,bc6821e7a1a1197e8806ef37396dfb61f1b6fcbd255743a94622a514f32eb2a4,2024-09-03T19:35:12.227000 @@ -254480,7 +254482,7 @@ CVE-2024-34947,0,0,1639e64ad64e3efff06c97dd9d715badbd33e6d8d7c52e5aa73aac445f5ce CVE-2024-34948,0,0,df6cbd6bc290a474122249ff224542f11fc34eaa4b942caf57452628541cff09,2024-08-15T17:35:06.870000 CVE-2024-34949,0,0,153f526975e57cbda3da567b214cb11ac9a77a410da95e9aba96a02a87ca6108,2024-08-08T15:35:11.187000 CVE-2024-3495,0,0,2d01763d9fd00934d213846ccfe97dfaae5495029603a64e4efbf7d1d6ec8266,2024-05-22T12:46:53.887000 -CVE-2024-34950,0,1,bf808bbd8cae13fe5f84d0730b437576c0bad33c46386657fbf453c3bef28192,2024-10-29T15:35:28.890000 +CVE-2024-34950,0,0,bf808bbd8cae13fe5f84d0730b437576c0bad33c46386657fbf453c3bef28192,2024-10-29T15:35:28.890000 CVE-2024-34952,0,0,0b3ec7ed40085393e2071bc6d9d415733ee6d2bb94374bd8520452bf0007770e,2024-05-20T15:17:54.513000 CVE-2024-34953,0,0,9b4f59e590af18fd55ab03e8f9e2f9ac1fc4af0855347fdb3f9d86b63ec479e7,2024-07-03T02:01:02.633000 CVE-2024-34954,0,0,45e121e6345d7be55b9749f21543978dc6493002df1fa3a1d0cfcf004930bd3b,2024-07-03T02:01:03.443000 @@ -254490,7 +254492,7 @@ CVE-2024-34958,0,0,7772d236e28ce720831d1562351692ec3fb0f968280070f3d688477618524 CVE-2024-34959,0,0,5772ca0dd874715925cf4da6c25b5b6ba5531d062cdf4f1c5ebda80fd41560f3,2024-07-03T02:01:05.837000 CVE-2024-3496,0,0,bef13f538775198780ddc65a6f3a5a754b7e93a7523db13d7bd4c988bca6518d,2024-06-17T12:42:04.623000 CVE-2024-3497,0,0,7d099a902008f089d528b5135b45cb3cd9096ecc424d31781cee90aaac2e8bc3,2024-06-17T12:42:04.623000 -CVE-2024-34974,0,1,aa2fa3e6ce07c2bee572e27c98d1900e34205a1191d0f2b25fbb0f6abd1d875f,2024-10-29T15:35:29.703000 +CVE-2024-34974,0,0,aa2fa3e6ce07c2bee572e27c98d1900e34205a1191d0f2b25fbb0f6abd1d875f,2024-10-29T15:35:29.703000 CVE-2024-3498,0,0,1bc889e2e4668da9efb5b9dc009d274763e07092723971fbb26429901567412c,2024-06-17T12:42:04.623000 CVE-2024-34982,0,0,f411980c41fd405ef054f005411d2e1bcd318bde8c4ea15ac24cbc2eaadfce67,2024-08-01T13:52:29.093000 CVE-2024-34987,0,0,03a5b418cd2390173d5812103a575b1e25420d9d2e685e51b3f5e41dcf445202,2024-08-14T20:35:11.203000 @@ -255630,7 +255632,7 @@ CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14 CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000 CVE-2024-36517,0,0,f6ee0eedf2e64a55166ea4be64f622599a7d65058d16696b7490edcac4631238,2024-08-27T13:29:02.527000 CVE-2024-36518,0,0,064cad3de67032c4f830b8ce3196cfd8df79e51094d50317231dcf250dd1a617,2024-08-12T13:41:36.517000 -CVE-2024-3652,0,0,df71e97982cfb8bbdea2c8b53979ee8792aae4a73aef6703ec1b621d3f12e772,2024-05-01T17:15:37.793000 +CVE-2024-3652,0,1,75034171ecec6977e07b3b6c2d385dadd9a9e6c86e2ca512d7ca4524455b812d,2024-10-29T18:35:08.263000 CVE-2024-36522,0,0,86674e42114231d1026f4ff35fe6fe6affeea594b7c00b1a81ef4e17dc0fe83d,2024-08-01T13:52:58.033000 CVE-2024-36523,0,0,509aa41f79d639bcf8d1da94de1df3fba083ad2047ce4b8c7f980f34318ba2c7,2024-09-06T17:35:10.403000 CVE-2024-36526,0,0,1ddb30b565e6d7a152e00264224393d020c0bb948b7f968c326e2d1f8170cd41,2024-08-01T13:52:58.227000 @@ -256449,9 +256451,9 @@ CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 CVE-2024-37844,0,0,e92866aea9b310ce4b128c5f2fa285465297f99b6b41a105e42d6be7945f9dd4,2024-10-28T14:35:11.803000 -CVE-2024-37845,0,0,054a6072dc8ab54d610e2b3f2c29f97046b92a0876dd6ecd1410a728d1873bb2,2024-10-28T13:58:09.230000 -CVE-2024-37846,0,0,3437b78e714c7e9ceb537e84ce66652263795efe659f7162726740702f485008,2024-10-28T13:58:09.230000 -CVE-2024-37847,0,0,76f8cf7b15c8d7d096666723fbbcb017f84479ee5a8899e203ee3f5fd8ea8447,2024-10-28T13:58:09.230000 +CVE-2024-37845,0,1,2fbb245c05e69100edbeb6bd8d6ef93427bfd7db32c67bd81b3947a76ff82479,2024-10-29T18:35:04.397000 +CVE-2024-37846,0,1,0a771dd4297ecb7d6b521e019dc9e4e37262258e8937f6940b3754658324b8b2,2024-10-29T18:35:05.693000 +CVE-2024-37847,0,1,4a1f07d2568b8def7f98c67a4d243c1afbe30f9de21a43af0fc95c8f1b1da6c5,2024-10-29T18:35:06.983000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,e84209989b24c941d7c6f3eae4d5a1283a6975747744d670fcd7c761c7276a68,2024-04-15T19:12:25.887000 @@ -256991,7 +256993,7 @@ CVE-2024-38472,0,0,0483e32b4907ebc7f547fb87caf5b24bef6a9183e30ea4e30b4ad6dc0faa9 CVE-2024-38473,0,0,36c5b6d67728da1356289c3874d586ffc56f76a7fbb2f457e14a9e4a12de691d,2024-08-01T13:54:52.397000 CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f2035049e0,2024-08-21T15:03:30.407000 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 -CVE-2024-38476,0,0,4e8c0d3d798258cbdd0e17d29bc51a96bcf1447e3dd9c6b865634f54cdf942e1,2024-08-21T15:08:56.040000 +CVE-2024-38476,0,1,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 @@ -257959,7 +257961,7 @@ CVE-2024-39866,0,0,0bddfcc7166db633e0a49dd296f68c67d479c22344839cf47c4ff170603ef CVE-2024-39867,0,0,e0b523c69bf41895d3df037f6b822ca9285a09b8d9cfe0acfc9c28f6f1b409a8,2024-09-09T15:19:17.710000 CVE-2024-39868,0,0,78ccb1e363b02e6a5457d10d342090c91e1ddd9c3baeb364919e295c1513db63,2024-09-09T15:20:25.113000 CVE-2024-39869,0,0,2a98a7966dea8b84e0420990ca6ca60d60610e5bb2ffa0b0ee856d0ac6bd32db,2024-09-09T15:20:59.443000 -CVE-2024-3987,0,0,561d9a131ce362c85fc0fb8dcbece381148b635d585315cae7f10b34598b7939,2024-06-07T14:56:05.647000 +CVE-2024-3987,0,1,6e75bcf458cbd86b744a3128ca96cbf4d5aa90652e310d97d76d92283acdeb7c,2024-10-29T18:39:09.830000 CVE-2024-39870,0,0,f4f5a1b62a4e2b774cca66ba202d2df839e4383c1fab2dd1630fb0ec5e81e380,2024-09-09T15:21:43.183000 CVE-2024-39871,0,0,e3e081733d59550559abd98a1a1d3b568ae09bad776342114b1a824ad3292212,2024-09-06T18:32:01.667000 CVE-2024-39872,0,0,574f41ececf7bb009ac85776aa8f840f96c77ee6418907d60f3992a2c5c0d4e8,2024-09-09T15:24:26.130000 @@ -258318,7 +258320,7 @@ CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000 -CVE-2024-40746,0,1,eead0b50026ce20d26effd54607d8bf55992b18b9630c4426d5bb7acadcc3473,2024-10-29T15:34:22.100000 +CVE-2024-40746,0,0,eead0b50026ce20d26effd54607d8bf55992b18b9630c4426d5bb7acadcc3473,2024-10-29T15:34:22.100000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-40754,0,0,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000 @@ -258349,7 +258351,7 @@ CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9a CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40790,0,0,f74af1b6450b7abb69693b13c877ce53db126e23128080b9a116672c6aa27da8,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,1462bf4b5845ed6535d6a4bb5a36a3a889e0ddd7f70e74baa361a7ba6c70fe5c,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,0,a4c457b66231f97ca463d7d02b628d2b46a4a30858400c9b7714b3c6ea34d1d2,2024-10-29T14:34:50.257000 +CVE-2024-40792,0,1,a2585380a94744be6a95f288afe3479213e76d2dc54ce4f58c8ac2539e20051b,2024-10-29T17:28:34.383000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 @@ -258368,7 +258370,7 @@ CVE-2024-40806,0,0,de19bdc26ad947be78b25439a4c081cef03a9ac0cf8596ce40e06ed665906 CVE-2024-40807,0,0,a57ec3a3bb089ed252f2f8c175043165750e676422e4f67fbb537c1821f4ad1a,2024-08-15T16:35:50.210000 CVE-2024-40809,0,0,9737181761f09811942af1648871be698e164a1e26e2d7cb09625587b1583d46,2024-08-15T16:26:51.523000 CVE-2024-4081,0,0,2b1a13825488c3123a899d577616f27ebfa5f72481cbd0378e19b046630c7604,2024-09-12T16:43:42.490000 -CVE-2024-40810,0,1,3f87576f34754b2cf4ae86b48cc9a57d65480dea4d8475b6babd083933d8e04a,2024-10-29T15:21:56.947000 +CVE-2024-40810,0,0,3f87576f34754b2cf4ae86b48cc9a57d65480dea4d8475b6babd083933d8e04a,2024-10-29T15:21:56.947000 CVE-2024-40811,0,0,58a2466a72dd67097326f2c18b9b99f24e15edfadd201715f3a11dc5fe430f0a,2024-08-01T13:58:09.693000 CVE-2024-40812,0,0,c246dcffc924270886f6bb5d99cc189e11e554cbf0acf5a0b6d7c76bf5b7cabf,2024-08-15T16:26:53.560000 CVE-2024-40813,0,0,eaec9d679620cbe04b5224752ba0981027a92f3e1bca89f18faeb08b9aaf1ce7,2024-08-15T16:15:52.613000 @@ -258409,10 +258411,10 @@ CVE-2024-40847,0,0,ac34ef361fd419d2c48bb6c61015668892d59a23316cf5cdc2086e1759e39 CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d92f,2024-09-24T15:57:03.893000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000 -CVE-2024-40851,0,0,25e5ec0f74dfefb8e795767adb9b7cbd92969119bc9336f0829dfa6a107177c8,2024-10-29T14:34:50.257000 +CVE-2024-40851,0,1,d166c2651cf2b1d0771f62424448f43af8bd64c88c74e8ac42bdfd1d1ad76720,2024-10-29T17:42:35.217000 CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000 CVE-2024-40853,0,0,1edd93b2cd04ef970830591d2fe9edf915eff310e2a5aa02f2d62ec6f87bce5e,2024-10-29T14:34:50.257000 -CVE-2024-40855,0,0,98eabe05e31ce8cc5e2afa7999e4c42a9d8250babdab092c0d84feb33fa2f26d,2024-10-29T14:34:50.257000 +CVE-2024-40855,0,1,90f4bd8e2db22cf8648d6901c6c3a67ee009b99fe00cc69ba2463d3c3905a513,2024-10-29T17:42:18.573000 CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000 CVE-2024-40859,0,0,e6bef66eff66d00ffd29922d241a25fd31e85836830114d7614152c90136861b,2024-09-24T20:31:34.780000 @@ -258423,7 +258425,7 @@ CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe8 CVE-2024-40863,0,0,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000 CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000 CVE-2024-40866,0,0,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000 -CVE-2024-40867,0,0,611f5e093ce725c56f21401987cb4ebb55c10ccc4802784536e85daa483d258d,2024-10-29T14:34:50.257000 +CVE-2024-40867,0,1,418d9aef813de30f90d877d2952e25f28770cbde3e1a9bc98675621dc13ec6bb,2024-10-29T17:41:59.300000 CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 @@ -258899,8 +258901,8 @@ CVE-2024-41611,0,0,8ae08bbc5635b26df3869144a2b3bde07b8fa7e9c586a9249f8dfa55a99d4 CVE-2024-41613,0,0,775a6c9724ba70bc56dce8939e74722c2b403153bd1f36f976e189d003a6a574,2024-08-14T18:13:25.017000 CVE-2024-41614,0,0,97dd4cb6722c16dd67b90bd84237880c8504a680bb995ffa9e8927a86d821a05,2024-08-14T18:14:16.073000 CVE-2024-41616,0,0,a87f80cfe19fdc1adad71691ba6015b314ae0892eefb4d086c289749db2f63df,2024-08-07T20:54:20.793000 -CVE-2024-41617,0,0,d454369fb9478c459444e405c97dace29ea2373b8b92830241d88775a2071739,2024-10-25T12:56:07.750000 -CVE-2024-41618,0,0,7bce50e0a2127f666aaceae19714c4b43168d90d1b219b47e6f33ff7b607fdd9,2024-10-25T12:56:07.750000 +CVE-2024-41617,0,1,61baa558004fe3e2a94e7dd33896f0442316de7e93851c52a26c6fa34b5b1e13,2024-10-29T17:35:07.133000 +CVE-2024-41618,0,1,8623058b3efd2e6d61642d389eedf719180dd306bd54a3511e002fca28168d4f,2024-10-29T17:35:08.150000 CVE-2024-4162,0,0,1a4f39929c1df6d420ff35b2d8de51a57c5e5378a57b6e7a1a35abc1b5a3dc57,2024-05-08T13:15:00.690000 CVE-2024-41622,0,0,44ca2934b754519243a779c6615220559421c07f2d4e7de3fb58db6e584b3b36,2024-08-30T14:55:54.423000 CVE-2024-41623,0,0,c5ad0592f1bc8234d1c1b4349fa5edc0884d162d738c86d78b923fc809fc8e63,2024-08-23T15:35:07.653000 @@ -259183,7 +259185,7 @@ CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 CVE-2024-42011,0,0,6c3467251e164c596233c97e56a2ece8699104c8d56c773b7e497bb18011c226,2024-10-29T14:34:50.257000 -CVE-2024-42017,0,1,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000 +CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000 CVE-2024-42018,0,0,48c29334c5da2098d436407e3b178f068ba556edf0bd6315b98cc5d6fe724ba8,2024-10-15T12:58:51.050000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 @@ -259597,7 +259599,7 @@ CVE-2024-42504,0,0,73b4e7fd81224455554066b5ec07433b0220ee7fb806342f0ac7873775612 CVE-2024-42505,0,0,2fcd58f857ce6c82725ed74b63d72047c82b9583f361cc1246e436db45ee28c1,2024-09-26T13:32:02.803000 CVE-2024-42506,0,0,a50836bc4b1264acacafbcc6caa08df43b3dfb5e0abc0c4e6db32750472d07f5,2024-09-26T13:32:02.803000 CVE-2024-42507,0,0,b57055df85850f2ee370e2a3273bd68424b888342bc78e94d00bb509124921a9,2024-09-26T13:32:02.803000 -CVE-2024-42508,0,0,4c1ae890f2c3f0db62db47cdcba2c7ec1dc0cee4a414a788be9754d3fe7b5259,2024-10-21T17:10:22.857000 +CVE-2024-42508,0,1,2c3ef74dc61a212f49afeae18d3d774e8682eccbc5f7d8b0e3beb27e142f7cd6,2024-10-29T17:38:49.330000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-42514,0,0,a1f5f6b924755707c5bb385a67dc5d2ee260ba09c0f77899dd6a3e1d47eee9c5,2024-10-07T19:37:19.973000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 @@ -260397,13 +260399,13 @@ CVE-2024-43834,0,0,76e2d6369e7d6ad23c4c79e5f16adb028cca8d18769694b501fae11b3f998 CVE-2024-43835,0,0,a46066252489ca07ac33084bac581d7b6db1ff03c684ec702a7865c83c61bd6f,2024-09-12T12:15:48.653000 CVE-2024-43836,0,0,e20113b16d82c5c2e4bb122ce52a725f5444590d487c2fb8daa577de32ce154c,2024-08-22T15:43:26.303000 CVE-2024-43837,0,0,2029cea2c86194c36b6c131e1ea74e1961ace80d0c79989b0fb86fab2b65d1ae,2024-08-22T15:44:03.417000 -CVE-2024-43838,0,1,2480a954d968f3e267b20a4110dfe9f9920a54770c095c0be83be1f10105947b,2024-10-29T16:24:43.273000 +CVE-2024-43838,0,0,2480a954d968f3e267b20a4110dfe9f9920a54770c095c0be83be1f10105947b,2024-10-29T16:24:43.273000 CVE-2024-43839,0,0,8837353b52a881be05b25b7fd8ffdec6b5f99540c518bf74d996a0bee6721fa2,2024-08-19T12:59:59.177000 CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000 -CVE-2024-43840,0,1,e4dee48acba0e5711e0c8205d3b661f6b97f71218e390f4e82cb7dedbc331581,2024-10-29T16:25:29.913000 -CVE-2024-43841,0,1,bf8d4686e51a52f9db93a5ddb1bee22d70913c2b3675a4f4a06e184495fdf67a,2024-10-29T16:27:14.167000 +CVE-2024-43840,0,0,e4dee48acba0e5711e0c8205d3b661f6b97f71218e390f4e82cb7dedbc331581,2024-10-29T16:25:29.913000 +CVE-2024-43841,0,0,bf8d4686e51a52f9db93a5ddb1bee22d70913c2b3675a4f4a06e184495fdf67a,2024-10-29T16:27:14.167000 CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000 -CVE-2024-43843,0,1,545b772e9cf47fc9b674664ed9b444ec7d64feb9f3dd7cbec712c75fc0e49fff,2024-10-29T16:29:16.960000 +CVE-2024-43843,0,0,545b772e9cf47fc9b674664ed9b444ec7d64feb9f3dd7cbec712c75fc0e49fff,2024-10-29T16:29:16.960000 CVE-2024-43844,0,0,f8e0e9c6309b78819993f04abd3f0fabe15d23e7d433454c8fc7a70ef34d9adc,2024-10-25T19:49:05.987000 CVE-2024-43845,0,0,caaa023c02e31720553b20117af210f2452fe00e9e2b31c2df183843a916f65c,2024-10-25T19:51:07.187000 CVE-2024-43846,0,0,f266cac61831a851876149b3774436f495d75f984b51eb837eba29752a3f1863,2024-10-25T19:52:01.380000 @@ -260651,11 +260653,11 @@ CVE-2024-44116,0,0,f539024555f2c30aff387b07786f96ec82aa197562db4318d2a4d0edb7b50 CVE-2024-44117,0,0,e1e7d2c07b8cb4271ea5948f1fafb7d04df2168a6fe40662a14c8cff93dd2ef2,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 -CVE-2024-44122,0,0,1340f3ecd616551294893c5095ac9698cf86e08271dc9bf65a4c6024a5af8f09,2024-10-29T14:34:50.257000 -CVE-2024-44123,0,0,e1755eb06b144b6cfbd6699d6335d3e8b6cdb9c2aa5401ff7c6a1ed48732203a,2024-10-29T14:34:50.257000 +CVE-2024-44122,0,1,1e9fa52c3aa8426c7e5b8d77a9c61659bbf7250c9743ea15e0507a8d110f05fc,2024-10-29T17:38:18.457000 +CVE-2024-44123,0,1,88d0bce5752b63476feb00eb01b30d0d91ea73a13fa7bca943baa86634d2287a,2024-10-29T17:37:15.990000 CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000 CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000 -CVE-2024-44126,0,0,90938a085a57c8cfb05cb5bb5b13e40f51df0d29110ab06b74c77b3df02fc0e9,2024-10-29T14:34:50.257000 +CVE-2024-44126,0,1,e3f13534f1bb95a079835f7c6785dffc552a7bdc61a3a3fa27781c0dd79d152d,2024-10-29T17:35:48.850000 CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000 CVE-2024-44128,0,0,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000 CVE-2024-44129,0,0,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000 @@ -260666,10 +260668,10 @@ CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000 CVE-2024-44135,0,0,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000 -CVE-2024-44137,0,0,79d8c21f444be873db08890a2861623fa980ff76aca5b482418334247708e8fe,2024-10-29T14:34:50.257000 +CVE-2024-44137,0,1,a1303ac7097be287e1eaadfa4d5badf532f6156271b2f456a656e51bb1656681,2024-10-29T17:35:23.423000 CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,57715e2d990f9d527737048c7f2d3ad8cfd6106560321ec000dbd72a512ea712,2024-10-25T12:56:07.750000 -CVE-2024-44144,0,0,c716c024cea4546575d5c46874888b6e9317a1b578a46335bd5629680a0b269c,2024-10-29T14:34:50.257000 +CVE-2024-44144,0,1,9f7daf7d2cbfe1fd78cead72648026b3b7c156cb5bc9c8b929e32f9d13902247,2024-10-29T17:34:55.923000 CVE-2024-44145,0,0,61196886e731f714891067a20c53eefb6667f07cb96b5fcd610eb0fa4c068181,2024-10-29T14:34:04.427000 CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000 CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000 @@ -260679,11 +260681,11 @@ CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb218 CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000 CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000 CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000 -CVE-2024-44155,0,0,666f08a4095b9d1c3f09991e8f388be769c689973d6ac2d0e961fcf952e9a9b6,2024-10-29T14:34:50.257000 -CVE-2024-44156,0,0,9f35e2868655885b1503d4332ff3a4cdc9357da07044a4d25396a3baa5f3decb,2024-10-29T14:34:50.257000 +CVE-2024-44155,0,1,bc69f7eda0ccc25d9ce40996abffd50dd53eb3f764e8a2b160a1b820e4079129,2024-10-29T17:34:16.487000 +CVE-2024-44156,0,1,c7b3823189e90823d63dfcd6d29d891ddc5936a4d7c2355696b7ee8e9b86261b,2024-10-29T17:33:51.597000 CVE-2024-44157,0,0,97a910630a3e98feb305f0a101a5c0c80098e87c8c858ed1c75250af3ffe7b5f,2024-10-27T02:35:03.400000 CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000 -CVE-2024-44159,0,0,961c4250cb7c3a2d662931ad9064a8a8cfcd8fa14ac4e1e987158bf2e3a0a46d,2024-10-29T14:34:50.257000 +CVE-2024-44159,0,1,112c99577483027f4f4d46361803a0ef723bdb32f41c221ffcbe92ee2303dbad,2024-10-29T17:33:37.147000 CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000 CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000 CVE-2024-44162,0,0,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000 @@ -260697,7 +260699,7 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 CVE-2024-44170,0,0,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000 -CVE-2024-44174,0,0,0223165b1cbe06673786506076d3de8e8eb0dad3d24b6ddf78b08de38f2de840,2024-10-29T14:34:50.257000 +CVE-2024-44174,0,1,d2cb0e7ad84890f6139370595ba064d76537c6c7d2d5c9be0cdbe685157f9470,2024-10-29T17:33:16.540000 CVE-2024-44175,0,0,0805e9680cd4598d38e2619ed87e7fe43d1a4e74e8e872e4630253007f322a07,2024-10-29T14:34:50.257000 CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000 @@ -260708,7 +260710,7 @@ CVE-2024-44181,0,0,6968e89bcc34da95b275f481a5e61eaf93b419f4e1f0ac49b3eaa4255a65d CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988b16,2024-09-24T16:52:49.767000 CVE-2024-44183,0,0,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000 CVE-2024-44184,0,0,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000 -CVE-2024-44185,0,1,8473ea59582fac16714f99db767193dfeb6d727db3a0eec56d667af7073d7402,2024-10-29T15:22:45.677000 +CVE-2024-44185,0,0,8473ea59582fac16714f99db767193dfeb6d727db3a0eec56d667af7073d7402,2024-10-29T15:22:45.677000 CVE-2024-44186,0,0,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000 CVE-2024-44187,0,0,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000 CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136ffb2,2024-09-24T20:38:27.090000 @@ -260725,8 +260727,8 @@ CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f3 CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000 CVE-2024-44203,0,0,fe3ae1b04117351d872ca462cd193c59f091d3699ff66923561d7699fb5cc5d4,2024-10-29T14:34:50.257000 CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000 -CVE-2024-44205,0,1,e33dfb139154886257e161081c01cc4f82c900563ff347637d97391b0de316f3,2024-10-29T15:27:08.630000 -CVE-2024-44206,0,1,0dee03077037b5bedfd5810735cd4c9d1f4f0ec504b17081ef96258683a63d8b,2024-10-29T15:31:02.493000 +CVE-2024-44205,0,0,e33dfb139154886257e161081c01cc4f82c900563ff347637d97391b0de316f3,2024-10-29T15:27:08.630000 +CVE-2024-44206,0,0,0dee03077037b5bedfd5810735cd4c9d1f4f0ec504b17081ef96258683a63d8b,2024-10-29T15:31:02.493000 CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000 CVE-2024-44208,0,0,d9c90ab83e9966704661dc1dbbaf16880493e16688d4cb3e4d97fb1b40b33aaf,2024-10-29T14:34:50.257000 CVE-2024-44213,0,0,8f3af05cc28637515ddd7c72b05e054e2da62bf3199c29442c79bb3fd6a47a3a,2024-10-29T14:34:50.257000 @@ -260881,7 +260883,7 @@ CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000 CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc1915,2024-09-20T13:15:19.850000 CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000 -CVE-2024-44667,0,1,e43a813befca048ea5f49bd98c811f22bdfab3b63e771950591cc913fc9d6486,2024-10-29T16:35:13.953000 +CVE-2024-44667,0,0,e43a813befca048ea5f49bd98c811f22bdfab3b63e771950591cc913fc9d6486,2024-10-29T16:35:13.953000 CVE-2024-4467,0,0,57c2229fa6c3e84bff363dc59d2c80befb785107da1c6be3c514b7e8bc55ed5c,2024-09-13T22:15:02.260000 CVE-2024-44674,0,0,78532ab5feb22da158d1ca77bfa4a9481318fd90b7728fb7942741a2fe56392d,2024-10-10T12:57:21.987000 CVE-2024-44676,0,0,b0f0617031a60967a8b797cadadb8c5f870cf4ed39d40d10e892a55bec1fea8b,2024-09-25T19:20:25.073000 @@ -262211,7 +262213,7 @@ CVE-2024-47063,0,0,ef8c248d98e47bb74e839363585e029685cdee789de6732fef6e4d24b3b66 CVE-2024-47064,0,0,21420490a45b8aaefdc1b6d4bd2c7e4a0799d2dee64a3d505838007bd45e04be,2024-10-04T13:51:25.567000 CVE-2024-47066,0,0,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000 CVE-2024-47067,0,0,11c88cd23cf1a822b362b5c4da6e6e5aad4cf4ba8be6cf32fd08cc0b90e2e962,2024-10-04T13:51:25.567000 -CVE-2024-47068,0,1,264a648ddebf754f99098ce6835c5c225a8b5d43bf206a3d80cb7c7fc0e3a5d3,2024-10-29T16:15:05.583000 +CVE-2024-47068,0,0,264a648ddebf754f99098ce6835c5c225a8b5d43bf206a3d80cb7c7fc0e3a5d3,2024-10-29T16:15:05.583000 CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000 CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000 @@ -262451,7 +262453,7 @@ CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190 CVE-2024-47481,0,0,c62f751f5883956274ffbb7fb20d002a8639b328715d32e48ced4180b14f0e12,2024-10-25T12:56:07.750000 CVE-2024-47483,0,0,0f4b7569df71b2649716d0de895970912d67c410a2793dbed81cec8c0843ce79,2024-10-25T12:56:07.750000 CVE-2024-47485,0,0,70c31bc26651c666f1f81bb314c02989bd53a835a51d6fdce38b5fab47a41c05,2024-10-22T16:23:22.890000 -CVE-2024-47486,0,1,43958a0e891d7258e97449cddb5a6fc0daab4c3d3966c24c551afbcbc8a15ca8,2024-10-29T15:35:31.557000 +CVE-2024-47486,0,0,43958a0e891d7258e97449cddb5a6fc0daab4c3d3966c24c551afbcbc8a15ca8,2024-10-29T15:35:31.557000 CVE-2024-47487,0,0,89e5f946b42ae69712fe53b468ea8b777288a7068d88dd6a3031473d76e487d6,2024-10-22T16:10:08.027000 CVE-2024-47489,0,0,b60e5447ef49080d8bcb541a004c5061338369ecebcb53ef8b0c02387b615511,2024-10-15T12:58:51.050000 CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000 @@ -262756,7 +262758,7 @@ CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2 CVE-2024-47880,0,0,2aa03bc0f7d4d0c41d7c5b5270f0ebbd14a95aa63bdaf3ae3d1fe08d4da240e2,2024-10-25T12:56:07.750000 CVE-2024-47881,0,0,0ca7d0c4ea2ef98dc6fa44b67e25e5f8500f3dd12648b54a5ed0735593ea5d45,2024-10-28T14:14:02.157000 CVE-2024-47882,0,0,4b03398d595b6f930af95937fe2262f7f6cefa2a162c2aed1edc416b90ac1433,2024-10-28T14:26:11.707000 -CVE-2024-47883,0,1,83a589cc0dbabc4ecea54b79d6959561de3acb3cdc41dd039a81f860b3c45f3b,2024-10-29T15:38:11.573000 +CVE-2024-47883,0,0,83a589cc0dbabc4ecea54b79d6959561de3acb3cdc41dd039a81f860b3c45f3b,2024-10-29T15:38:11.573000 CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000 CVE-2024-47885,0,0,0d40ba494c86913544c4c9553c55befe8904b360cb2214c55ae6a6aeadb78d12,2024-10-15T12:57:46.880000 CVE-2024-47887,0,0,a738abaa50c0f4cc119f2ab1db4d555ac635e57265d1892adcc800cfdded0011,2024-10-18T12:53:04.627000 @@ -262876,11 +262878,11 @@ CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000 -CVE-2024-48218,0,0,0ba983b4665cb686519677630258728519fd7192c68f50d011004da59ce43ae6,2024-10-28T13:58:09.230000 +CVE-2024-48218,0,1,4df2a1737bc3ceef8118ffc8f43bf6e7bfd49691ee8956737c4244a24a4c0e36,2024-10-29T18:35:08.783000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 -CVE-2024-48222,0,0,fbb8784b3248d06b2baf565581a8ea0b16d6c2ad97cdfed79091f1cdb8115874,2024-10-28T13:58:09.230000 -CVE-2024-48223,0,0,33fa893aad183f1039c8d411316d75269791deda05064f1d2dad9f58c33dd897,2024-10-28T13:58:09.230000 -CVE-2024-48224,0,0,cce219342a85292610288d11f85dc40d375d9fd0e9332c2948bd858d2af4dd63,2024-10-28T13:58:09.230000 +CVE-2024-48222,0,1,97fd76ae3dd28f1e5888fec68e340e9e5e41841170d874971e984dd4b28f68c5,2024-10-29T18:35:10.053000 +CVE-2024-48223,0,1,a9b041f56d6046d662d47741900d11180ff109d214fa15a9b38fe6f39c8abe71,2024-10-29T18:35:11.373000 +CVE-2024-48224,0,1,c634fb714a989ce5fdfe470e52e395775fab9b0ab26c37c53b870c4afe668500,2024-10-29T18:35:12.697000 CVE-2024-48225,0,0,a8831170e3eda9980baee63e48cc804c9b2092188511bc7b12f356f931e0b4b8,2024-10-28T21:35:18.743000 CVE-2024-48226,0,0,4cb662eb4f15899ccf7a0dbcb626d5a6b1f5cd6d5d2bcdd68aafd729b2a4945d,2024-10-28T21:35:19.080000 CVE-2024-48227,0,0,d2fa684dbc5ea7a1fe7a4ea371675722e3492c6e4916e182a238767c00f4362b,2024-10-28T21:35:20.360000 @@ -263084,7 +263086,7 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923 CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 -CVE-2024-48921,1,1,7a337822bc8d79bfd55b0eb44f807ad13df85f056a7c48a477bfb4bc74aa157a,2024-10-29T15:15:10.593000 +CVE-2024-48921,0,0,7a337822bc8d79bfd55b0eb44f807ad13df85f056a7c48a477bfb4bc74aa157a,2024-10-29T15:15:10.593000 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000 CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000 @@ -263104,6 +263106,7 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5 CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000 CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 +CVE-2024-48955,1,1,c96a5ce1c87b3d5a9b2b4d5d855b7232ba502145857e0669df496ee4162c9fc6,2024-10-29T18:15:05.690000 CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000 CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 @@ -263115,7 +263118,7 @@ CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32f CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 -CVE-2024-4902,0,0,7f8b77ed84307cdcb60cae6a3466b6bcba2b973c54c448794e132a0751a1718b,2024-06-07T14:56:05.647000 +CVE-2024-4902,0,1,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 CVE-2024-49023,0,0,9f037b5f7ba370d94cf43694c94339d7393d2d61a5cb700dc6fe38d18df30faa,2024-10-18T17:01:32.803000 CVE-2024-4903,0,0,9834633a0ed5c23d729720f750c23f97a9d35acd2a8ef750805e2c39c4f8bfe7,2024-06-07T20:15:11.967000 CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000 @@ -263142,7 +263145,7 @@ CVE-2024-49209,0,0,7815188905707c2f76092b0250e46fa9658c3c02368a05bd7a2ebfc97747d CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49210,0,0,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000 CVE-2024-49211,0,0,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000 -CVE-2024-49214,0,1,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000 +CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000 CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 CVE-2024-49217,0,0,d03ae3ae7bb906a5c0350c53ea3af5b288e7f6463b03cb7a32bb31d9e72767bc,2024-10-18T12:52:33.507000 @@ -263203,7 +263206,7 @@ CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b36 CVE-2024-49270,0,0,616a2e437b03b1730ae710990d1f9b5d13bcf5a41263b98d33736d5e3831391d,2024-10-16T16:38:14.557000 CVE-2024-49271,0,0,6fd9d076a620483355861bd31b6d3fba7a6e8c77968d9b9b52f107ebea5c9f8b,2024-10-16T16:38:14.557000 CVE-2024-49272,0,0,ce388816844d0bf419ecca70bd1847b8484ab313dd293704a8265f36084e981a,2024-10-22T18:40:40.787000 -CVE-2024-49273,0,1,8905bf104e2ffbfb71302aa76b6e12e02aad22935d4854b226e494085e2d9a7b,2024-10-29T15:48:10.617000 +CVE-2024-49273,0,0,8905bf104e2ffbfb71302aa76b6e12e02aad22935d4854b226e494085e2d9a7b,2024-10-29T15:48:10.617000 CVE-2024-49274,0,0,096f2f284546af0d97e6ddfaac32f5bc2a7003315ce6be804bf83fbc016caf5b,2024-10-22T18:39:19.980000 CVE-2024-49275,0,0,55aff7f12be858e4d39e3782edf366ff64e3f42849d1ad1a14e88de49c5d3432,2024-10-22T18:36:53.817000 CVE-2024-49276,0,0,6a6b58791e9512e826c457e3bee8f08f7b1de60db24c986554adb1b116c01f0f,2024-10-18T12:52:33.507000 @@ -263219,13 +263222,13 @@ CVE-2024-49284,0,0,bec1f0da1bcb0850e4841345e95550bca16d99530b59e5207d183ff1f4e1c CVE-2024-49285,0,0,6f46c329c3d1526d526943e0333d6d72992c68afd2913a4ef362b73e606f2e17,2024-10-18T12:52:33.507000 CVE-2024-49286,0,0,8c28a82bd9391036ea30ce185d824d073b6f340cb9bbf2f8121b077632895379,2024-10-23T16:13:37.823000 CVE-2024-49287,0,0,0066d2fce1ed85532c90a9906dc911278ca46d873038b8dcfb2d0c4b3b95c685,2024-10-18T12:52:33.507000 -CVE-2024-49288,0,1,055bd249458244bab70c983c1fbb1ef5aa3a8c0c5ac3a999718f04e096ffc581,2024-10-29T16:59:05.867000 +CVE-2024-49288,0,0,055bd249458244bab70c983c1fbb1ef5aa3a8c0c5ac3a999718f04e096ffc581,2024-10-29T16:59:05.867000 CVE-2024-49289,0,0,1007ec713acd15fdb5c2262f73a22207aad725968297cd9b79b0f4fcd3d741cb,2024-10-18T12:52:33.507000 CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000 CVE-2024-49290,0,0,ccbfae725612d034db518fc020b12b0de83319514a2d0a5b3be41c3ff9bf8173,2024-10-22T18:35:55.413000 CVE-2024-49291,0,0,44e011055ffcc94f31147e91008bfca453f458c355b4c10d5e081a4748d73d9a,2024-10-18T12:52:33.507000 CVE-2024-49292,0,0,5f09a14990b6c411313ed3c0517e00101a5bacb90324a262f26a26dc9ec6f772,2024-10-18T12:52:33.507000 -CVE-2024-49293,0,1,730bfb95d823a7f3fc4a00e35d04f3989283733e6763e5f3ae190a1bab038044,2024-10-29T15:07:39.407000 +CVE-2024-49293,0,0,730bfb95d823a7f3fc4a00e35d04f3989283733e6763e5f3ae190a1bab038044,2024-10-29T15:07:39.407000 CVE-2024-49295,0,0,2233f6c9986d9f1a990d0d54b1c1d91ca1475b5db77026f702ef776949b63fa2,2024-10-18T12:52:33.507000 CVE-2024-49296,0,0,f1042f70e89016c7f4e9d2a0f572f4f930b555774f6b329b232673bc13de033a,2024-10-18T12:52:33.507000 CVE-2024-49297,0,0,c01c0683901cb1b114e43805eef512c87c392594a83094740c5f93a462c76e65,2024-10-18T12:52:33.507000 @@ -263253,7 +263256,7 @@ CVE-2024-49318,0,0,02cca54ff58508f7015bdc78b225c5402ac891d24584c9a2512f1a35e3987 CVE-2024-49319,0,0,42677cde087b60b4589de437a49f5349c2181024ba44b1ead05df0b607435f60,2024-10-18T12:52:33.507000 CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b37,2024-05-17T02:40:43.357000 CVE-2024-49320,0,0,f646a0aed9b94f9c2a4b6085270ae6d0667dce332670da7784078783e12bfcb6,2024-10-18T12:52:33.507000 -CVE-2024-49321,0,1,7280805f370c92996f00d5aa4da8af9bce0a6b241cfd99a9258428d3a74ed661,2024-10-29T15:20:12.503000 +CVE-2024-49321,0,0,7280805f370c92996f00d5aa4da8af9bce0a6b241cfd99a9258428d3a74ed661,2024-10-29T15:20:12.503000 CVE-2024-49322,0,0,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000 CVE-2024-49323,0,0,2f124cdc22e81391d598884667e36f6fa2d8c8661fccd4b5b6bdeb72951248d2,2024-10-23T16:05:49.617000 CVE-2024-49324,0,0,2794d0fa1220cbc25924e4f7f45b2c0f87b574911fff8706f118c7c8b3b48c92,2024-10-24T16:11:41.700000 @@ -263428,8 +263431,8 @@ CVE-2024-49761,0,0,91dbe3ae22d59346162697cdf21d954a80519158ed01f8f13e3e3e00f37e4 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 CVE-2024-49766,0,0,5a8c5c0a2bd94e828f2c3a22888613b17d32cf5a4207ce143b3606496d9774b9,2024-10-28T13:58:09.230000 CVE-2024-49767,0,0,ef1423fe811e432f28d0c3f95d411793ec90858ffbf4947a2737bd5fe1b70dce,2024-10-28T13:58:09.230000 -CVE-2024-49768,1,1,8b43ec3e180036c3aca9d7dd6d01385965f11b81903643de2b418280062390c8,2024-10-29T15:15:11.440000 -CVE-2024-49769,1,1,6e0e0b59d53b97879b39c29d5eb2735eeb78be9d68c4ab745f2b599da8813ebe,2024-10-29T15:15:12.030000 +CVE-2024-49768,0,0,8b43ec3e180036c3aca9d7dd6d01385965f11b81903643de2b418280062390c8,2024-10-29T15:15:11.440000 +CVE-2024-49769,0,0,6e0e0b59d53b97879b39c29d5eb2735eeb78be9d68c4ab745f2b599da8813ebe,2024-10-29T15:15:12.030000 CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 CVE-2024-49771,0,0,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 @@ -263562,7 +263565,7 @@ CVE-2024-49967,0,0,f92f6192704c8d30fb1b877d6399c880863ff64783a228d60dfdd51b9d90f CVE-2024-49968,0,0,19a93f4a6384a37e0e479ce1fc4610aee20a39bc275896118b96ca5904112124,2024-10-23T15:13:25.583000 CVE-2024-49969,0,0,87996c90e1672445fe5815f19cbdae838e57430f8b66f0e3e569e0c7abd0a9cb,2024-10-25T20:15:51.520000 CVE-2024-4997,0,0,8869d8cee41a7f38be4f03ad1383841d0fd18dd2f92c0e8b0f0fd7c6f2096580,2024-06-04T16:57:41.053000 -CVE-2024-49970,0,1,638a6e5f6f7a4a7972cb76754ec52808db9beef3f8062893a90ac926493da3ef,2024-10-29T15:57:41 +CVE-2024-49970,0,0,638a6e5f6f7a4a7972cb76754ec52808db9beef3f8062893a90ac926493da3ef,2024-10-29T15:57:41 CVE-2024-49971,0,0,60c83f32ab70eca3cd14f38dc4040565edae34a7c11d6016f53aaf212ad0bc15,2024-10-23T15:13:25.583000 CVE-2024-49972,0,0,985809352bdfeb655e911cb32258e8e8a65029ce7fe386242f6e0bc275afc60f,2024-10-23T15:13:25.583000 CVE-2024-49973,0,0,cbc8317e69e991b61b33286118a69f0b5499d236a65e0770daff1dbdf352cd5d,2024-10-23T15:13:25.583000 @@ -263570,14 +263573,14 @@ CVE-2024-49974,0,0,4d1ad9e69552c2546e3ebc37028a81d020f8c81c7e81067843bb3e0268b54 CVE-2024-49975,0,0,de9d4372aecbebb1ac36a8d6bd20891e93dd433b503ae45f7f641c708149f769,2024-10-25T20:15:21.160000 CVE-2024-49976,0,0,7d789ab3b505b06d9a92626022d239eccb66342a26f5e0408c14647cf8cd1540,2024-10-25T20:14:03.387000 CVE-2024-49977,0,0,1fa968b4b6ffe89f61827f270e7cc697b9e8aa1241eadd73e01f50d4c563edc5,2024-10-25T20:03:36.737000 -CVE-2024-49978,0,0,d1d022627966490e425b664f8063a108568b0f5033ee2065467ad5efe1a2a3e8,2024-10-23T15:13:25.583000 -CVE-2024-49979,0,0,af031dedc92de72c54d427a92e62fc2853294f38d0fdf026f9d854688a1c6e3a,2024-10-23T15:13:25.583000 +CVE-2024-49978,0,1,f3d61134b9c5d10fd2ab4e39b19ef4b5767227435be40207fd8a06c0cd6a1116,2024-10-29T18:01:43.080000 +CVE-2024-49979,0,1,f8baa0b1d12557a520a3d58ee95542c5e5816ff4eafb95d3e16fe1836897fae6,2024-10-29T18:02:14.197000 CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92b4,2024-05-17T16:15:08.160000 CVE-2024-49980,0,0,1b7f876e1e74006c4cbc36f26a364fbc1043d115c2b25809299afdde070e9fbd,2024-10-23T15:13:25.583000 CVE-2024-49981,0,0,be8906564b57b0b9a043fe42c3d38b8548c4c2cbb0858120a7fa2fad8e2b8ee7,2024-10-25T14:56:40.073000 CVE-2024-49982,0,0,1ae51728dfad6dc77da9a9af15e226c1ee61eeb30c84012b23419f82a91617a3,2024-10-25T15:08:03.790000 -CVE-2024-49983,0,1,9274e8e7a27d798fd4c38e26ef366e23490e6efa1ece0fb652aec8a9e521a033,2024-10-29T16:23:31.943000 -CVE-2024-49984,0,1,44bbefb1c9b0fa3991d8d00fdccc0a477c2a15ae2838387996afee04a422cbc3,2024-10-29T16:22:25.833000 +CVE-2024-49983,0,0,9274e8e7a27d798fd4c38e26ef366e23490e6efa1ece0fb652aec8a9e521a033,2024-10-29T16:23:31.943000 +CVE-2024-49984,0,0,44bbefb1c9b0fa3991d8d00fdccc0a477c2a15ae2838387996afee04a422cbc3,2024-10-29T16:22:25.833000 CVE-2024-49985,0,0,737ec1b651784d094b345c7c186c8a413f48e3fd02bb539872da5bf851174c95,2024-10-28T16:22:29.887000 CVE-2024-49986,0,0,1069db2199b30e02a56c3460641141ec41e9f11ee8af8a2794866b64042f2043,2024-10-25T20:02:54.517000 CVE-2024-49987,0,0,7825fe9d4de7029121e6c0f770d84a0a58ddbd606a7f766c220913055561ec36,2024-10-28T16:23:44.477000 @@ -263591,9 +263594,9 @@ CVE-2024-49993,0,0,173745e8fc0b2f51f6583b765f43b75fc7379f37eeab514e19093d1e0bbc2 CVE-2024-49994,0,0,b259470c6938b01fe0b06a9ea53deb1f1b59fb7f77762cb60813754903d6329f,2024-10-25T14:52:32.877000 CVE-2024-49995,0,0,dda237a1fe4774b5eebf428932a14ed6406dee0beb5398e416cf454331edef02,2024-10-28T17:07:51.270000 CVE-2024-49996,0,0,81c0545f780fa695d599970a227ba85a22409c164ec567cfb530b43ba7149524,2024-10-25T19:56:10.320000 -CVE-2024-49997,0,1,cf5723beb2d565000e47548f495cd0fbfb40a16e23a8183bd208246596745eee,2024-10-29T16:20:49.107000 +CVE-2024-49997,0,0,cf5723beb2d565000e47548f495cd0fbfb40a16e23a8183bd208246596745eee,2024-10-29T16:20:49.107000 CVE-2024-49998,0,0,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000 -CVE-2024-49999,0,0,78b6148f41a15652bfa26256a49a5e5917d5dbd35564ac4e51ba7d691f423879,2024-10-23T15:13:25.583000 +CVE-2024-49999,0,1,c4d5cc08a6fa2bfc1b546ebac4901fe5a0eb0ff16c4c5bfcd1daaaba7805a557,2024-10-29T18:03:40.857000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 CVE-2024-50000,0,0,40a554287361de92ee1140e71e9aeb78cfdfe71967eace32a2e7d700fc182c42,2024-10-25T19:55:55.357000 CVE-2024-50001,0,0,886b8a582aeed728b3b4fd74e088fd22423f5fc4d8231c2d820afabe46d603d5,2024-10-23T15:13:25.583000 @@ -263665,7 +263668,7 @@ CVE-2024-50063,0,0,1d1881a47d554fc29d203efb6c8521669e1b28611f2bbf99ab231399dab59 CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7eab,2024-10-23T21:49:29.423000 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 -CVE-2024-50067,0,1,24c4c2a9f57cbbf60955a0b70b9105797845f089603805c65d417718be190cc3,2024-10-29T16:30:44.217000 +CVE-2024-50067,0,0,24c4c2a9f57cbbf60955a0b70b9105797845f089603805c65d417718be190cc3,2024-10-29T16:30:44.217000 CVE-2024-50068,0,0,fa1ea3e6f599930bfb2d31adb8599332b75a045a05a427c5acbfef84f36f4dea,2024-10-29T14:34:04.427000 CVE-2024-50069,0,0,e0d06dfcabcc31158b42dd1756b72698f3ce1bc24c6ee15265e842e9564c6424,2024-10-29T14:34:04.427000 CVE-2024-50070,0,0,18255d00f69620f2a638568afe228ad3578ea04a84acf63eb1e68ce68ed74c13,2024-10-29T14:34:04.427000 @@ -263711,7 +263714,7 @@ CVE-2024-50311,0,0,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c CVE-2024-50312,0,0,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 -CVE-2024-50334,1,1,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000 +CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 @@ -263722,7 +263725,7 @@ CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637 CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000 CVE-2024-50407,0,0,f9688f4b448fa6261be66d0317a572bd7a88062577e578fa12fbb434c00a6869,2024-10-29T14:34:04.427000 -CVE-2024-50408,0,1,42895de3e084cedaf6647f131c47bd546b78f0bd37cacbb2a46053fdc5504c96,2024-10-29T16:01:08.447000 +CVE-2024-50408,0,0,42895de3e084cedaf6647f131c47bd546b78f0bd37cacbb2a46053fdc5504c96,2024-10-29T16:01:08.447000 CVE-2024-50409,0,0,d7ec10c5e1543bca47bfdf414d287c32f5601d40bab44b017b5b1321eddc073f,2024-10-29T14:34:04.427000 CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000 CVE-2024-50410,0,0,b0e5f19d3e850e75bae53f582d220aeb13e9ae300eafba739d117cde04cd904e,2024-10-29T14:34:04.427000 @@ -263731,7 +263734,7 @@ CVE-2024-50412,0,0,631b195ca92c8239dedf128815fcbb14f2f3794e78d494b800069471ed0f1 CVE-2024-50413,0,0,7bd7e93e9534d8f928af3202deae1fbb2549aee1ab43b478d04f1c666ef4a515,2024-10-29T14:34:04.427000 CVE-2024-50414,0,0,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6e78,2024-10-29T14:34:04.427000 CVE-2024-50415,0,0,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000 -CVE-2024-50416,0,1,d6fa8ee755917351e975e2572b208d1eff8656e05d108ea493511ed3f6bbfdc0,2024-10-29T16:02:10.660000 +CVE-2024-50416,0,0,d6fa8ee755917351e975e2572b208d1eff8656e05d108ea493511ed3f6bbfdc0,2024-10-29T16:02:10.660000 CVE-2024-50418,0,0,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000 CVE-2024-5042,0,0,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000 CVE-2024-50420,0,0,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000 @@ -263751,7 +263754,7 @@ CVE-2024-50439,0,0,a4ab7802095fd3f3ddba5a98cd5ff96e477c6dc16130bc7735e2720027fd6 CVE-2024-5044,0,0,a4e177741479e530ad4105167bd81efc2f0690ac50664dc5a5f1c197ba9e227b,2024-06-04T19:20:57.117000 CVE-2024-50440,0,0,d16b0a66995b7152dbf6636c54994a2845eea5e628000309614e635be4aaed58,2024-10-29T14:34:50.257000 CVE-2024-50441,0,0,fa3535407c4df4f136174ab7a3bfffe4262ed285d5efdc948f074837395d4dbe,2024-10-29T14:34:50.257000 -CVE-2024-50442,0,1,666bbf20a669cebf02b3631074982e930833bf3617b341b3c93380d86c5ba3a2,2024-10-29T16:04:29.950000 +CVE-2024-50442,0,0,666bbf20a669cebf02b3631074982e930833bf3617b341b3c93380d86c5ba3a2,2024-10-29T16:04:29.950000 CVE-2024-50443,0,0,180e825e47af6aa7fd93ef1820ce36fbe1349a43a10b0578a9c8d2057b8d6ac7,2024-10-29T14:34:50.257000 CVE-2024-50445,0,0,93d89254abe8d40bb096b13dda2339158b8c0b9fc53ca7e36a35764b3a308f3e,2024-10-29T14:34:50.257000 CVE-2024-50446,0,0,93fc12db73b1a11c3d258d0474f684d854db3cd3ac5ae3a6af4f2ed00f2ab977,2024-10-29T14:34:50.257000 @@ -263759,18 +263762,20 @@ CVE-2024-50447,0,0,fe40e9143b13f8e1f69a66378622848e38fb6faae543e2bbf63f254032c95 CVE-2024-50448,0,0,cc688c2531021780281369f6ec6cb194413205dbce8f2efb8d8db3f406e21f55,2024-10-29T14:34:50.257000 CVE-2024-50449,0,0,3429d02802ce52441f57341c160ef52c98eb06b4e6bb46b5301d5d27cda8788f,2024-10-29T14:34:50.257000 CVE-2024-5045,0,0,2cc3bc060710a5f4f076b17bfc4c763ffc9b4201a30a5ba725a69c9c0d38befe,2024-06-20T20:15:20.153000 -CVE-2024-50450,0,1,7fc26bfa183b8562e84f6ef3fdd2ced88c72fd71cbb7684963fe6a0f34f112bc,2024-10-29T16:05:40.250000 +CVE-2024-50450,0,0,7fc26bfa183b8562e84f6ef3fdd2ced88c72fd71cbb7684963fe6a0f34f112bc,2024-10-29T16:05:40.250000 CVE-2024-50451,0,0,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000 CVE-2024-50453,0,0,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000 CVE-2024-50457,0,0,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000 CVE-2024-50458,0,0,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000 +CVE-2024-50459,1,1,eea4813483e9d2e8960b2a9dc9cf62e677f3b1f5e321cd5005ec12a761726039,2024-10-29T17:15:04.423000 CVE-2024-5046,0,0,61eff6fbe16c762ff136f32fbf7c7454761f98bd61a41d7bf57a3431cdb819c7,2024-06-04T19:20:57.247000 CVE-2024-50460,0,0,82d4ab7fefa246ce57a72383ca35008e1c66070e05dd2e7ddad07c6838704d66,2024-10-29T14:34:50.257000 CVE-2024-50461,0,0,e926adc646135f96a8c30b094b43a59a8c4d2ffe68507adf959cf049381e29b7,2024-10-29T14:34:50.257000 CVE-2024-50462,0,0,4ccfb8409add318d1d381a3ba39c166e299f826cc0027453ac31d88195954a9c,2024-10-29T14:34:50.257000 -CVE-2024-50463,0,1,41f5357ec154cc687872e4ff2451d70da03c70ee2d1be893e9fa2dcf4c51e71e,2024-10-29T16:25:01.827000 +CVE-2024-50463,0,0,41f5357ec154cc687872e4ff2451d70da03c70ee2d1be893e9fa2dcf4c51e71e,2024-10-29T16:25:01.827000 CVE-2024-50464,0,0,cf609d0bd47c8857d574d513c156d84098d01d1e1d4103f4808d20a068af8082,2024-10-29T14:34:50.257000 CVE-2024-50465,0,0,00483e074c079de056773fdab6eb221b7f1834669791e4a86b920536bcd400c0,2024-10-28T13:58:09.230000 +CVE-2024-50466,1,1,28d02b3d6bf24b3bb895029fd1d597a0dbe23f51eb3bd7b79c96bee1ce74f4ef,2024-10-29T17:15:04.640000 CVE-2024-50467,0,0,4552ef78134a17bc23e57cbfd601f4e3eea4839d3e1dfc8a1846ef7af61ace53,2024-10-29T14:34:50.257000 CVE-2024-50468,0,0,dcb5fc7c0ad36e7911e6c02d0d96134d3b094fc419a37a9b5d1969d6d7f9c083,2024-10-29T14:34:50.257000 CVE-2024-50469,0,0,abcf4835413ee0cc04940d284cf5f3c90b0ebd44c44430c8cbae403d769d726a,2024-10-29T14:34:50.257000 @@ -263791,7 +263796,7 @@ CVE-2024-50482,0,0,4c46db4544a2adb3c3153011ed323f9f2e4e58f44e74fcdad316d5a91a78a CVE-2024-50483,0,0,dc34782ca3b1404a071528e59ae2af91e68795a468368cf730f902ebe6c7f1c8,2024-10-28T13:58:09.230000 CVE-2024-50484,0,0,fb5831468b35cba53c55a495474b64b7a8b6ec35859af8dabef2b71806e20ffa,2024-10-29T14:34:04.427000 CVE-2024-50485,0,0,9ed12dd296d38fb6cbdb7c8752c66128ce6bd15ef5deace517d3530a40748c87,2024-10-29T14:34:04.427000 -CVE-2024-50486,0,1,2469de3018a70da3d3ba9f22de0bba39364400ac5239e2e8af62e693ee3e1607,2024-10-29T16:07:03.833000 +CVE-2024-50486,0,0,2469de3018a70da3d3ba9f22de0bba39364400ac5239e2e8af62e693ee3e1607,2024-10-29T16:07:03.833000 CVE-2024-50487,0,0,0c4a1a3926921a2bcae14c8f09af31d6eb548ac4221df28e381f9c80ff644140,2024-10-28T13:58:09.230000 CVE-2024-50488,0,0,40d73b73129fb31724f8cd6a2898439824447d424f82ee41cc22f4a5e1f15204,2024-10-28T13:58:09.230000 CVE-2024-50489,0,0,39cf546ab4f49bcf53bc1df298c27ba2dc398fce12e81fa0caf07e0bcec9f312,2024-10-28T13:58:09.230000 @@ -263815,17 +263820,17 @@ CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635e CVE-2024-50550,0,0,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 CVE-2024-5057,0,0,6ac23c507e757b24b72de98245da87576f9a2b62e0f8d57278541740a6070ccf,2024-09-20T19:31:39.437000 -CVE-2024-50573,0,0,62b7a59f6b72947509f942a7a6ce94757dabc683ee1247a240dd34e5fae47c4a,2024-10-28T13:58:09.230000 -CVE-2024-50574,0,0,4ec596b387d5872816158e2c82e6ebad5995dd44a68e41aac93603d25317f6ba,2024-10-28T13:58:09.230000 -CVE-2024-50575,0,0,582a2ef39d11e764e7ddf5000a9957695f23ed264772ff02f0ac950336e5ec6f,2024-10-28T13:58:09.230000 -CVE-2024-50576,0,0,ccbac97c3f2e006517c80239a3dd586dd3bd45768e3f1230a143dad4102d306f,2024-10-28T13:58:09.230000 -CVE-2024-50577,0,0,442a15f04cc06a67c641e7c9b8568c9109969334ccb5d754022b63ffe5c26cbe,2024-10-28T13:58:09.230000 -CVE-2024-50578,0,0,e1ddc2c5f3abd018a4fad575ed85807f418295249f49f986f18ee913f8543dad,2024-10-28T13:58:09.230000 -CVE-2024-50579,0,0,80a3670b1622edca81c846162fa02574599bb951ce53331d6b428ae97b263980,2024-10-28T13:58:09.230000 +CVE-2024-50573,0,1,6166bba949b905ceb4319678694597e7477dff6436071dabfbd162d318e60f8a,2024-10-29T17:12:14.760000 +CVE-2024-50574,0,1,b4c85ee17cab7a2dc3355aa11a3a7bb2af1a1df68c9041971813110ae5b2fe8a,2024-10-29T17:16:11.277000 +CVE-2024-50575,0,1,fc32d20f0e12c8f088f3b45de0e6be389ad7ff627245b3eedb03a983727ced9c,2024-10-29T17:18:26.957000 +CVE-2024-50576,0,1,e65c7c04bfc9eeffadec88ef925ee437dd09576ddef413ae03cff5080e57b8d2,2024-10-29T17:18:08.373000 +CVE-2024-50577,0,1,1ae1c98455304e03c86795b0b0797e69b9be8f4f00bfc6ca75dbac1131e8d554,2024-10-29T17:18:02.127000 +CVE-2024-50578,0,1,6ec0931fb10b85f3988f728576d721b0819731aa2bc7455c72c7d06854b7d9e6,2024-10-29T17:17:53.960000 +CVE-2024-50579,0,1,8bdb4d7fbba4f77c00e2d29f79c5dc0ea8d516735bb22f5f3096b24aec948c36,2024-10-29T17:17:46.297000 CVE-2024-5058,0,0,d66647bea5b47dc02b284e54d31404fc6795bd8a11a408fc146959769533c076,2024-06-24T19:18:35.517000 -CVE-2024-50580,0,0,13745ef95ae0308210f5ea837b6a96093c730d0d4f6265fc5a5cc0429109e2e4,2024-10-28T13:58:09.230000 -CVE-2024-50581,0,0,2ab609d1fe4b0420885eaa097c3dcb1d4d45fc7624f1f02cc78e70daf9cfe9ca,2024-10-28T13:58:09.230000 -CVE-2024-50582,0,0,2515beb6dcf713fd3c1e861efd4e1216d28cc28b33ff0681a08bc80b2d2b585c,2024-10-28T13:58:09.230000 +CVE-2024-50580,0,1,5b968edfe9310465a4a61d2a3470b2d0d4ec8adbdbfce2d72a22506917527d5b,2024-10-29T17:17:29.440000 +CVE-2024-50581,0,1,e5fb4cee2b881a0a54f5919c2bacd493c5e5939555d4d28ee9d7fe9ce108f7ac,2024-10-29T17:17:20.747000 +CVE-2024-50582,0,1,8ee09c1822530ab12253edb2ea8a5293a80f3664e0faaa7e73f6ab343465ff36,2024-10-29T17:16:46.007000 CVE-2024-50583,0,0,db2a2ad9d7e60027a7a0abb846b837f27b8194afb56c33e89ab55cbf708c9a52,2024-10-25T21:35:08.253000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 @@ -264344,7 +264349,7 @@ CVE-2024-5607,0,0,ae3ce9023a2ae1c6b37a7951db185bd6eb638714bf41f7bd2c0952a1652352 CVE-2024-5608,0,0,91d3b8760217c3d2e17ddc8bd099d48bf3bda4341e3d053182f418df616ce552,2024-10-25T12:56:07.750000 CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93d1,2024-06-06T19:16:09.920000 CVE-2024-5611,0,0,257f707c49e1adeab5f30937de3668453c65dc87c2e8ac71cda38f1fe1bbc4e5,2024-06-17T12:42:04.623000 -CVE-2024-5612,0,0,c48d9d85ab6fb6f375c9bae41bb41f013f62cc7d97e523d92c986f223f9ac364,2024-06-07T14:56:05.647000 +CVE-2024-5612,0,1,28ceb837b16c04d60c80c2106288728343a6af941bee1c42d1e76e6ac30c4a71,2024-10-29T18:05:42.823000 CVE-2024-5613,0,0,d9550d95a21bd950ae7717d597381d24b04054ec554e6d52d8ed280e70034f18,2024-06-10T02:52:08.267000 CVE-2024-5614,0,0,3235a098278ef12466faacc7eb682cba1cb99cc913b9ed567c082bb65c13d254,2024-07-29T14:12:08.783000 CVE-2024-5615,0,0,0b80425a78ce7696e161012e7d95058779d0861d3b6927cc392e7a553c227a9e,2024-06-11T17:55:16.103000 @@ -266329,7 +266334,7 @@ CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52e CVE-2024-7979,0,0,7197dd548ee44d45e84f2f2c61d6a52a80bd0fd2ed16f305497f42e667362bae,2024-08-26T15:13:19.383000 CVE-2024-7980,0,0,cda5d0604d61479305f3aa6d24c7a46f2d1d2a7e936538d9b59a5f61a8d4d4b3,2024-08-26T15:14:10.730000 CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000 -CVE-2024-7985,1,1,0ccddadc1691019ae8034fc6395191a1e6135cc582660ad5f7e788c298ddf873,2024-10-29T16:15:06.180000 +CVE-2024-7985,0,0,0ccddadc1691019ae8034fc6395191a1e6135cc582660ad5f7e788c298ddf873,2024-10-29T16:15:06.180000 CVE-2024-7986,0,0,a43751c0931e4929788be7df13e0b692f335646e8ba6bbd66f7625d734a5daf5,2024-08-23T16:18:28.547000 CVE-2024-7987,0,0,76927c94eae9954117a932c513da8aebd30f47001e85e588d746e509b6294d24,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,f1ca0f1a43359526a6c9585e72942b31e1455ffa80a01c452c09ecf831a670e6,2024-08-26T18:35:14.617000 @@ -266954,7 +266959,8 @@ CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc5 CVE-2024-8920,0,0,42fc84557f46536ee5298e40d09a285310a4aead85db529ff9c7f89249448d09,2024-10-18T12:52:33.507000 CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 -CVE-2024-8923,1,1,d929bf8fea44a42c72702483ecd4b30f26b21f5148486e4adb94932ff36ba094,2024-10-29T16:15:06.417000 +CVE-2024-8923,0,1,1a1c008c7cd10c982e2e742709b2930fd5916241742fc2a1b2a9a4a46bfb6b34,2024-10-29T17:15:04.870000 +CVE-2024-8924,1,1,329d97b4ddecec7a888f06c50c8c22d832c133b4f48330aff42c5aebe55b0404,2024-10-29T17:15:04.983000 CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 @@ -267359,9 +267365,9 @@ CVE-2024-9585,0,0,51bc02706f102b87905f6aabb2c8a9fcc3c7b76d44b671d05f95ce83ace331 CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000 CVE-2024-9588,0,0,17edfb44b6dceb63c8cfe98df84bd537badbdd9e7eab4717bc301aff2d50d2c8,2024-10-25T21:15:39.970000 -CVE-2024-9589,0,1,39afa64c0fe2a317a8959b276ea9fa5d62f4bfd393e1c38cfe8c40def7eb0f61,2024-10-29T16:07:54.387000 -CVE-2024-9590,0,1,3ea221ce5737c7461b642f4b40c8f88f2882c3fc1e287dc4995c8dfdd067fbb4,2024-10-29T16:07:43.737000 -CVE-2024-9591,0,1,52d0197d17e908729023f30744d453ad1a46477297400d8fb8b5026f822177e2,2024-10-29T16:04:23.463000 +CVE-2024-9589,0,0,39afa64c0fe2a317a8959b276ea9fa5d62f4bfd393e1c38cfe8c40def7eb0f61,2024-10-29T16:07:54.387000 +CVE-2024-9590,0,0,3ea221ce5737c7461b642f4b40c8f88f2882c3fc1e287dc4995c8dfdd067fbb4,2024-10-29T16:07:43.737000 +CVE-2024-9591,0,0,52d0197d17e908729023f30744d453ad1a46477297400d8fb8b5026f822177e2,2024-10-29T16:04:23.463000 CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000 CVE-2024-9593,0,0,02cbbab3c962db41b4f7d8f2fd2455e47a515515a926a898431a74600b7b719f,2024-10-29T13:40:23.983000 CVE-2024-9594,0,0,76152af657dea527c4e562a1c5799c4834f4bf18cf4ca885159373bfd78ad4ca,2024-10-16T16:38:14.557000 @@ -267549,4 +267555,7 @@ CVE-2024-9984,0,0,8e8b1dff68b77e14ce417f91873fee227d0458654a790688014355062c7539 CVE-2024-9985,0,0,35f031595deb3bfd21882874fada51cff590c3c6a37f03f4259fa4136f5b9157,2024-10-16T22:02:08.117000 CVE-2024-9986,0,0,f83b3609bd670a0cfc3a1c687a45465cc896c6d69e9f1c37efb33a43ca882e79,2024-10-21T13:07:47.700000 CVE-2024-9987,0,0,b4e78fb8d0c1bab610593085dcb79fb387a1d85dc24b4ac387edaf5184ee7742,2024-10-25T19:06:35.350000 +CVE-2024-9988,1,1,58433c05029d9c569d3f28a63e34b08c51240dd4434ea3e597388fdae5562825,2024-10-29T17:15:05.227000 +CVE-2024-9989,1,1,320ed77d3aa97170fc244ba74fe5ddfc3438f8cf8230ad18b3c7ebec643706e9,2024-10-29T17:15:05.463000 +CVE-2024-9990,1,1,94018f02836bf5c840641be68f5ed07996d46dbd4d58aab5bb268a59dd3443d9,2024-10-29T17:15:05.707000 CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820e2,2024-10-28T13:58:09.230000