From d99b00e1d3250dfca8733e93f760b9dc527395bf Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 15 Oct 2024 20:03:18 +0000 Subject: [PATCH] Auto-Update: 2024-10-15T20:00:18.097712+00:00 --- CVE-2015/CVE-2015-89xx/CVE-2015-8963.json | 38 ++- CVE-2016/CVE-2016-68xx/CVE-2016-6817.json | 34 ++- CVE-2016/CVE-2016-87xx/CVE-2016-8747.json | 24 +- CVE-2016/CVE-2016-94xx/CVE-2016-9428.json | 34 ++- CVE-2019/CVE-2019-139xx/CVE-2019-13990.json | 34 ++- CVE-2019/CVE-2019-176xx/CVE-2019-17661.json | 34 ++- CVE-2019/CVE-2019-182xx/CVE-2019-18279.json | 24 +- CVE-2020/CVE-2020-280xx/CVE-2020-28049.json | 32 ++- CVE-2020/CVE-2020-356xx/CVE-2020-35662.json | 34 ++- CVE-2020/CVE-2020-55xx/CVE-2020-5529.json | 32 ++- CVE-2021/CVE-2021-281xx/CVE-2021-28117.json | 24 +- CVE-2021/CVE-2021-346xx/CVE-2021-34620.json | 24 +- CVE-2022/CVE-2022-281xx/CVE-2022-28136.json | 34 ++- CVE-2022/CVE-2022-305xx/CVE-2022-30550.json | 24 +- CVE-2022/CVE-2022-427xx/CVE-2022-42716.json | 34 ++- CVE-2022/CVE-2022-450xx/CVE-2022-45048.json | 24 +- CVE-2022/CVE-2022-451xx/CVE-2022-45135.json | 24 +- CVE-2023/CVE-2023-275xx/CVE-2023-27530.json | 32 ++- CVE-2023/CVE-2023-290xx/CVE-2023-29075.json | 24 +- CVE-2023/CVE-2023-305xx/CVE-2023-30577.json | 32 ++- CVE-2023/CVE-2023-310xx/CVE-2023-31038.json | 24 +- CVE-2023/CVE-2023-310xx/CVE-2023-31039.json | 24 +- CVE-2023/CVE-2023-320xx/CVE-2023-32007.json | 24 +- CVE-2023/CVE-2023-361xx/CVE-2023-36189.json | 32 ++- CVE-2023/CVE-2023-372xx/CVE-2023-37203.json | 22 +- CVE-2023/CVE-2023-384xx/CVE-2023-38408.json | 32 ++- CVE-2023/CVE-2023-384xx/CVE-2023-38428.json | 34 ++- CVE-2023/CVE-2023-39xx/CVE-2023-3997.json | 4 +- CVE-2023/CVE-2023-453xx/CVE-2023-45363.json | 32 ++- CVE-2023/CVE-2023-454xx/CVE-2023-45463.json | 34 ++- CVE-2023/CVE-2023-455xx/CVE-2023-45539.json | 32 ++- CVE-2023/CVE-2023-458xx/CVE-2023-45802.json | 10 +- CVE-2023/CVE-2023-45xx/CVE-2023-4571.json | 4 +- CVE-2023/CVE-2023-469xx/CVE-2023-46956.json | 34 ++- CVE-2023/CVE-2023-486xx/CVE-2023-48655.json | 32 ++- CVE-2023/CVE-2023-488xx/CVE-2023-48848.json | 34 ++- CVE-2023/CVE-2023-489xx/CVE-2023-48910.json | 34 ++- CVE-2024/CVE-2024-18xx/CVE-2024-1873.json | 60 +++- CVE-2024/CVE-2024-223xx/CVE-2024-22326.json | 87 +++++- CVE-2024/CVE-2024-248xx/CVE-2024-24879.json | 47 +++- CVE-2024/CVE-2024-248xx/CVE-2024-24880.json | 47 +++- CVE-2024/CVE-2024-26xx/CVE-2024-2624.json | 67 ++++- CVE-2024/CVE-2024-299xx/CVE-2024-29946.json | 12 +- CVE-2024/CVE-2024-29xx/CVE-2024-2965.json | 60 +++- CVE-2024/CVE-2024-303xx/CVE-2024-30373.json | 60 +++- CVE-2024/CVE-2024-328xx/CVE-2024-32873.json | 62 +++- CVE-2024/CVE-2024-355xx/CVE-2024-35584.json | 29 ++ CVE-2024/CVE-2024-362xx/CVE-2024-36264.json | 6 +- CVE-2024/CVE-2024-367xx/CVE-2024-36730.json | 63 ++++- CVE-2024/CVE-2024-367xx/CVE-2024-36735.json | 63 ++++- CVE-2024/CVE-2024-369xx/CVE-2024-36983.json | 12 +- CVE-2024/CVE-2024-369xx/CVE-2024-36984.json | 12 +- CVE-2024/CVE-2024-369xx/CVE-2024-36985.json | 12 +- CVE-2024/CVE-2024-369xx/CVE-2024-36991.json | 14 +- CVE-2024/CVE-2024-369xx/CVE-2024-36997.json | 12 +- CVE-2024/CVE-2024-371xx/CVE-2024-37153.json | 63 ++++- CVE-2024/CVE-2024-371xx/CVE-2024-37154.json | 56 +++- CVE-2024/CVE-2024-413xx/CVE-2024-41344.json | 21 ++ CVE-2024/CVE-2024-464xx/CVE-2024-46468.json | 39 ++- CVE-2024/CVE-2024-471xx/CVE-2024-47135.json | 67 ++++- CVE-2024/CVE-2024-471xx/CVE-2024-47136.json | 67 ++++- CVE-2024/CVE-2024-482xx/CVE-2024-48249.json | 39 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48253.json | 41 ++- CVE-2024/CVE-2024-482xx/CVE-2024-48259.json | 41 ++- CVE-2024/CVE-2024-486xx/CVE-2024-48624.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48769.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48772.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48777.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48778.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48784.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48786.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48787.json | 39 ++- CVE-2024/CVE-2024-487xx/CVE-2024-48788.json | 39 ++- CVE-2024/CVE-2024-489xx/CVE-2024-48915.json | 24 +- CVE-2024/CVE-2024-489xx/CVE-2024-48933.json | 59 +++- CVE-2024/CVE-2024-48xx/CVE-2024-4889.json | 50 +++- CVE-2024/CVE-2024-57xx/CVE-2024-5749.json | 56 ++++ CVE-2024/CVE-2024-70xx/CVE-2024-7038.json | 62 +++- CVE-2024/CVE-2024-86xx/CVE-2024-8690.json | 18 +- CVE-2024/CVE-2024-93xx/CVE-2024-9341.json | 6 +- CVE-2024/CVE-2024-94xx/CVE-2024-9469.json | 82 +++++- CVE-2024/CVE-2024-94xx/CVE-2024-9473.json | 70 ++++- CVE-2024/CVE-2024-97xx/CVE-2024-9794.json | 66 ++++- CVE-2024/CVE-2024-97xx/CVE-2024-9796.json | 60 +++- CVE-2024/CVE-2024-97xx/CVE-2024-9797.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9804.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9805.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9808.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9809.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9810.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9811.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9812.json | 71 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9813.json | 66 ++++- CVE-2024/CVE-2024-98xx/CVE-2024-9859.json | 37 ++- CVE-2024/CVE-2024-99xx/CVE-2024-9973.json | 66 ++++- CVE-2024/CVE-2024-99xx/CVE-2024-9974.json | 67 ++++- README.md | 75 +++-- _state.csv | 295 ++++++++++---------- 98 files changed, 3762 insertions(+), 513 deletions(-) create mode 100644 CVE-2024/CVE-2024-355xx/CVE-2024-35584.json create mode 100644 CVE-2024/CVE-2024-413xx/CVE-2024-41344.json create mode 100644 CVE-2024/CVE-2024-57xx/CVE-2024-5749.json diff --git a/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json b/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json index 62aa5073061..10ac575fcc9 100644 --- a/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json +++ b/CVE-2015/CVE-2015-89xx/CVE-2015-8963.json @@ -2,8 +2,8 @@ "id": "CVE-2015-8963", "sourceIdentifier": "security@android.com", "published": "2016-11-16T05:59:02.890", - "lastModified": "2023-12-14T14:06:01.427", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:01.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,20 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + }, + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-68xx/CVE-2016-6817.json b/CVE-2016/CVE-2016-68xx/CVE-2016-6817.json index b3860aaf3bc..248a5a479b8 100644 --- a/CVE-2016/CVE-2016-68xx/CVE-2016-6817.json +++ b/CVE-2016/CVE-2016-68xx/CVE-2016-6817.json @@ -2,7 +2,7 @@ "id": "CVE-2016-6817", "sourceIdentifier": "security@apache.org", "published": "2017-08-10T22:29:00.233", - "lastModified": "2023-12-08T16:41:18.860", + "lastModified": "2024-10-15T19:35:07.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2016/CVE-2016-87xx/CVE-2016-8747.json b/CVE-2016/CVE-2016-87xx/CVE-2016-8747.json index 847ebcccc7c..7952c035325 100644 --- a/CVE-2016/CVE-2016-87xx/CVE-2016-8747.json +++ b/CVE-2016/CVE-2016-87xx/CVE-2016-8747.json @@ -2,7 +2,7 @@ "id": "CVE-2016-8747", "sourceIdentifier": "security@apache.org", "published": "2017-03-14T09:59:00.253", - "lastModified": "2023-12-08T16:41:18.860", + "lastModified": "2024-10-15T19:35:07.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", diff --git a/CVE-2016/CVE-2016-94xx/CVE-2016-9428.json b/CVE-2016/CVE-2016-94xx/CVE-2016-9428.json index 5082b7bb283..703ec3c33b3 100644 --- a/CVE-2016/CVE-2016-94xx/CVE-2016-9428.json +++ b/CVE-2016/CVE-2016-94xx/CVE-2016-9428.json @@ -2,7 +2,7 @@ "id": "CVE-2016-9428", "sourceIdentifier": "cve@mitre.org", "published": "2016-12-12T02:59:17.843", - "lastModified": "2023-12-29T18:38:04.570", + "lastModified": "2024-10-15T19:35:08.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -74,6 +96,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json b/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json index 9e9eb868fb2..4ff122928bf 100644 --- a/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json +++ b/CVE-2019/CVE-2019-139xx/CVE-2019-13990.json @@ -2,8 +2,8 @@ "id": "CVE-2019-13990", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-26T19:15:11.730", - "lastModified": "2023-12-22T16:35:35.523", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:09.210", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-176xx/CVE-2019-17661.json b/CVE-2019/CVE-2019-176xx/CVE-2019-17661.json index 19b84134f24..77c84cc692e 100644 --- a/CVE-2019/CVE-2019-176xx/CVE-2019-17661.json +++ b/CVE-2019/CVE-2019-176xx/CVE-2019-17661.json @@ -2,8 +2,8 @@ "id": "CVE-2019-17661", "sourceIdentifier": "cve@mitre.org", "published": "2019-11-08T18:15:13.527", - "lastModified": "2024-02-14T17:00:29.027", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:12.793", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-1236" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-182xx/CVE-2019-18279.json b/CVE-2019/CVE-2019-182xx/CVE-2019-18279.json index 0e220083df6..71041169cba 100644 --- a/CVE-2019/CVE-2019-182xx/CVE-2019-18279.json +++ b/CVE-2019/CVE-2019-182xx/CVE-2019-18279.json @@ -2,8 +2,8 @@ "id": "CVE-2019-18279", "sourceIdentifier": "cve@mitre.org", "published": "2019-11-13T18:15:11.000", - "lastModified": "2023-12-08T18:54:42.680", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:14.120", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-280xx/CVE-2020-28049.json b/CVE-2020/CVE-2020-280xx/CVE-2020-28049.json index dbf9889ac26..e147c0a0304 100644 --- a/CVE-2020/CVE-2020-280xx/CVE-2020-28049.json +++ b/CVE-2020/CVE-2020-280xx/CVE-2020-28049.json @@ -2,7 +2,7 @@ "id": "CVE-2020-28049", "sourceIdentifier": "cve@mitre.org", "published": "2020-11-04T19:15:12.137", - "lastModified": "2024-02-03T07:15:14.473", + "lastModified": "2024-10-15T18:35:01.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-356xx/CVE-2020-35662.json b/CVE-2020/CVE-2020-356xx/CVE-2020-35662.json index b5510249445..324bef71aff 100644 --- a/CVE-2020/CVE-2020-356xx/CVE-2020-35662.json +++ b/CVE-2020/CVE-2020-356xx/CVE-2020-35662.json @@ -2,8 +2,8 @@ "id": "CVE-2020-35662", "sourceIdentifier": "cve@mitre.org", "published": "2021-02-27T05:15:13.753", - "lastModified": "2023-12-21T18:22:07.907", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:21.893", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-55xx/CVE-2020-5529.json b/CVE-2020/CVE-2020-55xx/CVE-2020-5529.json index 1d846e0f3e9..b9fbcb7d30d 100644 --- a/CVE-2020/CVE-2020-55xx/CVE-2020-5529.json +++ b/CVE-2020/CVE-2020-55xx/CVE-2020-5529.json @@ -2,7 +2,7 @@ "id": "CVE-2020-5529", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2020-02-11T12:15:21.210", - "lastModified": "2023-12-07T17:56:27.147", + "lastModified": "2024-10-15T19:35:22.773", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-665" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-281xx/CVE-2021-28117.json b/CVE-2021/CVE-2021-281xx/CVE-2021-28117.json index f3d0e745679..775dc4a9934 100644 --- a/CVE-2021/CVE-2021-281xx/CVE-2021-28117.json +++ b/CVE-2021/CVE-2021-281xx/CVE-2021-28117.json @@ -2,8 +2,8 @@ "id": "CVE-2021-28117", "sourceIdentifier": "cve@mitre.org", "published": "2021-03-20T21:15:11.827", - "lastModified": "2023-12-28T16:24:49.047", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:02.437", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-346xx/CVE-2021-34620.json b/CVE-2021/CVE-2021-346xx/CVE-2021-34620.json index ccbd21c13b6..af42279f9f3 100644 --- a/CVE-2021/CVE-2021-346xx/CVE-2021-34620.json +++ b/CVE-2021/CVE-2021-346xx/CVE-2021-34620.json @@ -2,8 +2,8 @@ "id": "CVE-2021-34620", "sourceIdentifier": "security@wordfence.com", "published": "2021-07-07T13:15:08.463", - "lastModified": "2022-11-07T16:37:09.160", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:23.910", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json b/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json index 859f77a973f..4c3f49eaa15 100644 --- a/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json +++ b/CVE-2022/CVE-2022-281xx/CVE-2022-28136.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28136", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2022-03-29T13:15:08.187", - "lastModified": "2023-12-21T01:42:53.653", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:24.497", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-305xx/CVE-2022-30550.json b/CVE-2022/CVE-2022-305xx/CVE-2022-30550.json index fa6685228fa..12475fc8d5c 100644 --- a/CVE-2022/CVE-2022-305xx/CVE-2022-30550.json +++ b/CVE-2022/CVE-2022-305xx/CVE-2022-30550.json @@ -2,8 +2,8 @@ "id": "CVE-2022-30550", "sourceIdentifier": "cve@mitre.org", "published": "2022-07-17T19:15:18.540", - "lastModified": "2024-01-12T20:47:18.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:25.430", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-427xx/CVE-2022-42716.json b/CVE-2022/CVE-2022-427xx/CVE-2022-42716.json index 38ebb9ede1f..d94711ddbac 100644 --- a/CVE-2022/CVE-2022-427xx/CVE-2022-42716.json +++ b/CVE-2022/CVE-2022-427xx/CVE-2022-42716.json @@ -2,8 +2,8 @@ "id": "CVE-2022-42716", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-12T20:15:10.713", - "lastModified": "2023-12-14T20:02:26.400", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:25.727", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-450xx/CVE-2022-45048.json b/CVE-2022/CVE-2022-450xx/CVE-2022-45048.json index aebae010b15..49b3c6ce5ec 100644 --- a/CVE-2022/CVE-2022-450xx/CVE-2022-45048.json +++ b/CVE-2022/CVE-2022-450xx/CVE-2022-45048.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45048", "sourceIdentifier": "security@apache.org", "published": "2023-05-05T08:15:09.080", - "lastModified": "2023-05-11T14:26:43.060", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:26.733", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 } ] }, diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json index c3cffa4308f..64d9125cf46 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45135.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45135", "sourceIdentifier": "security@apache.org", "published": "2023-11-30T08:15:07.063", - "lastModified": "2023-12-05T18:14:31.810", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:03.893", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json index 5471f6774e9..cb45a449601 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27530", "sourceIdentifier": "support@hackerone.com", "published": "2023-03-10T22:15:10.497", - "lastModified": "2023-12-08T22:15:07.603", + "lastModified": "2024-10-15T19:35:28.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29075.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29075.json index b215b3677e4..60c243261c9 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29075.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29075.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29075", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-11-23T04:15:07.340", - "lastModified": "2023-11-30T02:20:10.977", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:05.263", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-305xx/CVE-2023-30577.json b/CVE-2023/CVE-2023-305xx/CVE-2023-30577.json index 284ef50bfa6..2435dd4e3f3 100644 --- a/CVE-2023/CVE-2023-305xx/CVE-2023-30577.json +++ b/CVE-2023/CVE-2023-305xx/CVE-2023-30577.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30577", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-26T17:15:10.227", - "lastModified": "2023-12-03T11:15:09.093", + "lastModified": "2024-10-15T19:35:29.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-88" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json index 8ba8ad7acf2..715fb572613 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31038.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31038", "sourceIdentifier": "security@apache.org", "published": "2023-05-08T09:15:09.280", - "lastModified": "2023-05-15T16:10:47.323", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:30.310", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json index 54cb6b35f3f..dedcec3f842 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31039.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31039", "sourceIdentifier": "security@apache.org", "published": "2023-05-08T09:15:09.637", - "lastModified": "2023-05-12T02:03:27.397", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:30.543", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json index b79ea3f974b..4f5da09c1f8 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32007.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32007", "sourceIdentifier": "security@apache.org", "published": "2023-05-02T09:15:10.207", - "lastModified": "2023-05-10T20:16:41.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:05.553", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-361xx/CVE-2023-36189.json b/CVE-2023/CVE-2023-361xx/CVE-2023-36189.json index ed3b55ce2ba..1aec7d3a5a0 100644 --- a/CVE-2023/CVE-2023-361xx/CVE-2023-36189.json +++ b/CVE-2023/CVE-2023-361xx/CVE-2023-36189.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36189", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-06T14:15:10.707", - "lastModified": "2023-12-26T18:15:07.903", + "lastModified": "2024-10-15T19:35:31.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37203.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37203.json index a877bc18622..99a79c30c0b 100644 --- a/CVE-2023/CVE-2023-372xx/CVE-2023-37203.json +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37203.json @@ -2,7 +2,7 @@ "id": "CVE-2023-37203", "sourceIdentifier": "security@mozilla.org", "published": "2023-07-05T10:15:09.687", - "lastModified": "2024-01-07T11:15:12.023", + "lastModified": "2024-10-15T19:35:32.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json index 0a7b81ed897..435691ee330 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38408.json @@ -2,7 +2,7 @@ "id": "CVE-2023-38408", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-20T03:15:10.170", - "lastModified": "2024-04-04T06:15:08.430", + "lastModified": "2024-10-15T19:35:32.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-428" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json b/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json index 3413976fcef..f81383079b6 100644 --- a/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json +++ b/CVE-2023/CVE-2023-384xx/CVE-2023-38428.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38428", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-18T00:15:09.577", - "lastModified": "2023-12-15T15:47:05.687", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T19:35:33.587", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json b/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json index ee280625309..10262cf3b7b 100644 --- a/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json +++ b/CVE-2023/CVE-2023-39xx/CVE-2023-3997.json @@ -2,13 +2,13 @@ "id": "CVE-2023-3997", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-07-31T17:15:10.110", - "lastModified": "2024-04-10T01:15:15.117", + "lastModified": "2024-10-15T19:15:16.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Splunk SOAR versions lower than 6.1.0 are indirectly affected by a potential vulnerability accessed through the user\u2019s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user\u2019s action." + "value": "Splunk SOAR versions 6.0.2 and earlier are indirectly affected by a potential vulnerability accessed through the user\u2019s terminal. A third party can send Splunk SOAR a maliciously crafted web request containing special ANSI characters to cause log file poisoning. When a terminal user attempts to view the poisoned logs, this can tamper with the terminal and cause possible malicious code execution from the terminal user\u2019s action." } ], "metrics": { diff --git a/CVE-2023/CVE-2023-453xx/CVE-2023-45363.json b/CVE-2023/CVE-2023-453xx/CVE-2023-45363.json index 22f14eba5d1..007929a7de5 100644 --- a/CVE-2023/CVE-2023-453xx/CVE-2023-45363.json +++ b/CVE-2023/CVE-2023-453xx/CVE-2023-45363.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45363", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-09T05:15:09.220", - "lastModified": "2023-11-28T13:15:07.313", + "lastModified": "2024-10-15T18:35:06.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-454xx/CVE-2023-45463.json b/CVE-2023/CVE-2023-454xx/CVE-2023-45463.json index c444db73738..46091a742ba 100644 --- a/CVE-2023/CVE-2023-454xx/CVE-2023-45463.json +++ b/CVE-2023/CVE-2023-454xx/CVE-2023-45463.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45463", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-13T13:15:11.987", - "lastModified": "2023-12-08T21:01:43.550", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:08.103", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-455xx/CVE-2023-45539.json b/CVE-2023/CVE-2023-455xx/CVE-2023-45539.json index 789adcacae9..043031d8268 100644 --- a/CVE-2023/CVE-2023-455xx/CVE-2023-45539.json +++ b/CVE-2023/CVE-2023-455xx/CVE-2023-45539.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45539", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-28T20:15:07.817", - "lastModified": "2023-12-14T17:15:07.860", + "lastModified": "2024-10-15T18:35:08.890", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json index 5d201f42cd4..aecdf570db1 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45802.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45802", "sourceIdentifier": "security@apache.org", "published": "2023-10-23T07:15:11.330", - "lastModified": "2024-10-14T09:15:02.967", - "vulnStatus": "Modified", + "lastModified": "2024-10-15T18:42:31.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,7 +41,7 @@ }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -51,12 +51,12 @@ ] }, { - "source": "nvd@nist.gov", + "source": "security@apache.org", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-770" + "value": "CWE-404" } ] } diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json index f8f776973f4..0cde5604bc2 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4571.json @@ -2,13 +2,13 @@ "id": "CVE-2023-4571", "sourceIdentifier": "prodsec@splunk.com", "published": "2023-08-30T17:15:11.080", - "lastModified": "2024-04-10T01:15:17.183", + "lastModified": "2024-10-15T19:15:16.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In Splunk IT Service Intelligence (ITSI) versions below below 4.13.3, 4.15.3, or 4.17.1, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine." + "value": "In Splunk IT Service Intelligence (ITSI) versions below 4.13.3 or 4.15.3, a malicious actor can inject American National Standards Institute (ANSI) escape codes into Splunk ITSI log files that, when a vulnerable terminal application reads them, can run malicious code in the vulnerable application. This attack requires a user to use a terminal application that translates ANSI escape codes to read the malicious log file locally in the vulnerable terminal. The vulnerability also requires additional user interaction to succeed. \n\nThe vulnerability does not directly affect Splunk ITSI. The indirect impact on Splunk ITSI can vary significantly depending on the permissions in the vulnerable terminal application, as well as where and how the user reads the malicious log file. For example, users can copy the malicious file from Splunk ITSI and read it on their local machine." }, { "lang": "es", diff --git a/CVE-2023/CVE-2023-469xx/CVE-2023-46956.json b/CVE-2023/CVE-2023-469xx/CVE-2023-46956.json index f008de6a664..6265e51f238 100644 --- a/CVE-2023/CVE-2023-469xx/CVE-2023-46956.json +++ b/CVE-2023/CVE-2023-469xx/CVE-2023-46956.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46956", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-30T23:15:07.717", - "lastModified": "2023-12-06T18:39:39.687", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:09.673", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-486xx/CVE-2023-48655.json b/CVE-2023/CVE-2023-486xx/CVE-2023-48655.json index e3e90b4c217..ac27f98795b 100644 --- a/CVE-2023/CVE-2023-486xx/CVE-2023-48655.json +++ b/CVE-2023/CVE-2023-486xx/CVE-2023-48655.json @@ -2,7 +2,7 @@ "id": "CVE-2023-48655", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-17T05:15:12.640", - "lastModified": "2024-01-10T00:15:45.530", + "lastModified": "2024-10-15T18:35:10.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-488xx/CVE-2023-48848.json b/CVE-2023/CVE-2023-488xx/CVE-2023-48848.json index cbe03108bb1..ceaa1d414e4 100644 --- a/CVE-2023/CVE-2023-488xx/CVE-2023-48848.json +++ b/CVE-2023/CVE-2023-488xx/CVE-2023-48848.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48848", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-28T17:15:08.417", - "lastModified": "2023-12-04T19:05:42.390", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:11.340", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-489xx/CVE-2023-48910.json b/CVE-2023/CVE-2023-489xx/CVE-2023-48910.json index 826ad8b8c3b..8285374dc80 100644 --- a/CVE-2023/CVE-2023-489xx/CVE-2023-48910.json +++ b/CVE-2023/CVE-2023-489xx/CVE-2023-48910.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48910", "sourceIdentifier": "cve@mitre.org", "published": "2023-12-04T17:15:07.137", - "lastModified": "2023-12-07T21:02:12.637", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:12.120", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json index d9b7dec1ac4..719f9a08587 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1873", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:51.460", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:14:09.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +83,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0447480-50CE-4682-B3B1-B8F021C5C731" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/c1cfc0d9-517a-4d0e-bf1c-6444c1fd195d", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json index 37c36f55d77..e1130d19f31 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22326.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22326", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-06-06T19:15:52.137", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:51:10.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +81,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*", + "matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*", + "matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.40.83.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3ADADE10-E7D1-4FC6-B755-88CE28BFAADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.40.93.0:*:*:*:*:*:*:*", + "matchCriteriaId": "919EDF00-BF73-4EE1-8D7F-2365C872C8E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279518", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7156621", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json index 2ebf5627c83..4516fb49206 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24879", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-08T12:15:55.973", - "lastModified": "2024-02-08T13:44:11.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:39:30.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "7.5.13", + "matchCriteriaId": "8CC556B7-656B-48C5-BF04-F96422CAD4C8" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/link-library/wordpress-link-library-plugin-7-5-13-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json index 5acf171ba06..291e674a8c8 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24880", "sourceIdentifier": "audit@patchstack.com", "published": "2024-02-08T12:15:56.170", - "lastModified": "2024-02-08T13:44:11.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:41:39.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apollo13themes:apollo13_framework_extensions:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.9.2", + "matchCriteriaId": "8DE78A6F-B113-4964-A903-76C5649B0312" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/apollo13-framework-extensions/wordpress-apollo13-framework-extensions-plugin-1-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json index e31ff17fda2..218f3a4c28d 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2624.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2624", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:55.437", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:49:16.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.4", + "matchCriteriaId": "E8DA02EF-1A49-47C3-B2E4-5F70C25D8B34" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/parisneo/lollms-webui/commit/aeba79f3ea934331b8ecd625a58bae6e4f7e7d3f", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/39e17897-0e92-4473-91c7-f728322191aa", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29946.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29946.json index f053125af88..f12cc13f9c9 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29946.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29946.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29946", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-03-27T17:15:54.273", - "lastModified": "2024-08-12T20:35:03.383", + "lastModified": "2024-10-15T18:35:13.400", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -79,16 +79,6 @@ "value": "CWE-20" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-1287" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json index fb8dbb49c5c..d21e0f168e2 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2965.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2965", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:55.897", - "lastModified": "2024-06-25T11:15:49.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:55:04.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + }, { "source": "security@huntr.dev", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.2.5", + "matchCriteriaId": "9A6F06FB-8127-41C1-A077-6C0B9E45B58E" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/90b0776d-9fa6-4841-aac4-09fde5918cae", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json index bfeaff4de6f..2c18e423509 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30373", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-06-06T19:15:56.167", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:23:52.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -40,6 +62,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "zdi-disclosures@trendmicro.com", "type": "Secondary", @@ -51,10 +83,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.0.21", + "matchCriteriaId": "9A747AB2-C10E-48A0-AD8B-921061C1FEDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-557/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json b/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json index e36e879df51..d9ebce7b8a7 100644 --- a/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json +++ b/CVE-2024/CVE-2024-328xx/CVE-2024-32873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32873", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-06T19:15:56.390", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:22:33.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-682" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0.0", + "matchCriteriaId": "0A019FA6-35D5-44D6-B008-79D56A86C6B1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/evmos/evmos/commit/b2a09ca66613d8b04decd3f2dcba8e1e77709dcb", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-pxv8-qhrh-jc7v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-355xx/CVE-2024-35584.json b/CVE-2024/CVE-2024-355xx/CVE-2024-35584.json new file mode 100644 index 00000000000..1b1dae1cc4a --- /dev/null +++ b/CVE-2024/CVE-2024-355xx/CVE-2024-35584.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-35584", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T19:15:16.957", + "lastModified": "2024-10-15T19:15:16.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection vulnerability in Ajax.php, ForWindow.php, ForExport.php, Modules.php, functions/HackingLogFnc.php in OpenSis Community Edition 9.1, 8.0, and possibly earlier versions. It is possible for an authenticated user to perform SQL Injection due to the lack to sanitisation. The application takes arbitrary value from \"X-Forwarded-For\" header and appends it to a SQL INSERT statement directly, leading to SQL Injection." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://opensis.com", + "source": "cve@mitre.org" + }, + { + "url": "http://os4ed.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/whwhwh96/CVE-2024-35584", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json index 4e267a49a4f..118462335ca 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36264", "sourceIdentifier": "security@apache.org", "published": "2024-06-12T14:15:11.983", - "lastModified": "2024-10-14T09:15:04.000", - "vulnStatus": "Modified", + "lastModified": "2024-10-15T18:46:46.633", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "security@apache.org", @@ -53,7 +53,7 @@ "description": [ { "lang": "en", - "value": "CWE-798" + "value": "NVD-CWE-Other" } ] }, diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json index 8c29cba82fd..13742268618 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36730.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36730", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:57.840", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:25:24.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "Validaci\u00f3n de entrada incorrecta en OneFlow-Inc. Oneflow v0.9.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) ingresando valores negativos en el par\u00e1metro oneflow.zeros/ones. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oneflow:oneflow:0.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E8058A82-101A-4B97-9169-0EEFDB712EA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/1c530e191fb3c76f034c2ea1d11eb821", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json b/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json index b60debd6ae6..6bbf46caf9d 100644 --- a/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json +++ b/CVE-2024/CVE-2024-367xx/CVE-2024-36735.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36735", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T19:15:58.117", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:31:49.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "OneFlow-Inc. Oneflow v0.9.1 no muestra un error o advertencia cuando el par\u00e1metro oneflow.eye est\u00e1 flotante." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oneflow:oneflow:0.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "E8058A82-101A-4B97-9169-0EEFDB712EA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Redmept1on/4998e9b6435448cea07a8b2dbf96eedc", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json index a6a2fc55382..ab535c12e75 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36983.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36983", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.257", - "lastModified": "2024-07-08T14:18:39.520", + "lastModified": "2024-10-15T18:35:13.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-77" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-75" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json index ed3184276cf..a0361f420d9 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36984.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36984", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.480", - "lastModified": "2024-07-03T02:03:57.773", + "lastModified": "2024-10-15T18:35:13.683", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-502" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-502" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json index 1777bd7aea2..81d6b590915 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36985.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36985", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:06.703", - "lastModified": "2024-07-08T14:18:40.360", + "lastModified": "2024-10-15T18:35:13.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-687" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-253" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json index aed28e05a59..3c69d748fd6 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36991", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:07.860", - "lastModified": "2024-07-22T15:00:45.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-15T18:35:13.927", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,16 +79,6 @@ "value": "CWE-35" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-35" - } - ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json index 262fa45fad4..05393579a0b 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36997.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36997", "sourceIdentifier": "prodsec@splunk.com", "published": "2024-07-01T17:15:09.143", - "lastModified": "2024-07-08T14:18:42.053", + "lastModified": "2024-10-15T18:35:14.063", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -49,16 +49,6 @@ "value": "CWE-79" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-75" - } - ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json index 15eb24ee0b8..90972bc6e2f 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37153.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37153", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-06T19:15:58.403", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:40:12.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1.0", + "matchCriteriaId": "86A51586-C030-485C-BD16-98B0B6C30BC1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/evmos/evmos/commit/478b7a62e7af57a70cf3a01126c7f5a89bee69d7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-xgr7-jgq3-mhmc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json b/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json index c9e7af9a538..af9028ba6e5 100644 --- a/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json +++ b/CVE-2024/CVE-2024-371xx/CVE-2024-37154.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37154", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-06T19:15:58.683", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:43:51.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:evmos:evmos:*:*:*:*:*:*:*:*", + "matchCriteriaId": "1A616824-97B4-4783-9D1D-E06E56D62E6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/evmos/evmos/security/advisories/GHSA-7hrh-v6wp-53vw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-413xx/CVE-2024-41344.json b/CVE-2024/CVE-2024-413xx/CVE-2024-41344.json new file mode 100644 index 00000000000..93a8cd102ce --- /dev/null +++ b/CVE-2024/CVE-2024-413xx/CVE-2024-41344.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-41344", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-15T19:15:17.287", + "lastModified": "2024-10-15T19:15:17.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) in Codeigniter 3.1.13 allows attackers to arbitrarily change the Administrator password and escalate privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/kirilkirkov/Ecommerce-CodeIgniter-Bootstrap/issues/264", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46468.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46468.json index 43899076236..f1dcd7a7221 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46468.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46468.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46468", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T21:15:07.040", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T18:35:14.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe una vulnerabilidad de Server-Side Request Forgery (SSRF) en jpress <= v5.1.1, que puede ser explotada por un atacante para obtener informaci\u00f3n confidencial, lo que resulta en una divulgaci\u00f3n de informaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/ilikeoyt/b396bbb9ef858105c46e999630e7afbe", diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json index 0862b67f798..108a1ebdd6c 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47135.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47135", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-03T03:15:02.697", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:21:04.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "vultures@jpcert.or.jp", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "vultures@jpcert.or.jp", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jtekt:kostac_plc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.15.0", + "matchCriteriaId": "4D035F46-CBB8-40BD-B819-DB523E055234" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU92808077/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.electronics.jtekt.co.jp/en/topics/202410026928/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json index a1d6be13cda..b280c17ab4d 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47136.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47136", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-10-03T03:15:02.903", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:20:40.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "vultures@jpcert.or.jp", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "vultures@jpcert.or.jp", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jtekt:kostac_plc:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.6.15.0", + "matchCriteriaId": "4D035F46-CBB8-40BD-B819-DB523E055234" + } + ] + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/vu/JVNVU92808077/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.electronics.jtekt.co.jp/en/topics/202410026928/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48249.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48249.json index e55bb8775eb..011feead35d 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48249.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48249.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48249", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T15:15:13.760", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T18:35:15.607", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Wavelog 1.8.5 permite la inyecci\u00f3n SQL get_band_confirmed de Gridmap_model.php mediante banda, sat\u00e9lite, propagaci\u00f3n o modo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json index 5e94d7c2d4e..0ca017ce602 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48253", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T14:15:11.857", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:35:37.163", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Cloudlog 2.6.15 permite la inyecci\u00f3n SQL del identificador delete_oqrs_line de Oqrs.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json index 429b52e4399..f217e170c39 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48259", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T15:15:14.033", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:35:38.413", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Cloudlog 2.6.15 permite la inyecci\u00f3n SQL de request_form Oqrs.php a trav\u00e9s de station_id o callsign." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://chiggerlor.substack.com/p/unauthenticated-sql-injection-in-9a3", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48624.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48624.json index 497905a8cd3..e134d4ac4a7 100644 --- a/CVE-2024/CVE-2024-486xx/CVE-2024-48624.json +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48624.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48624", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T16:15:05.840", - "lastModified": "2024-10-15T16:15:05.840", + "lastModified": "2024-10-15T18:35:16.363", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In segments\\edit.php of DomainMOD below v4.12.0, the segid parameter in the GET request can be exploited to cause a reflected Cross Site Scripting (XSS) vulnerability." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/domainmod/domainmod/issues/175", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48769.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48769.json index da0b0fae5c4..c2a103cee0f 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48769.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48769.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48769", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:05.353", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:39.423", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en BURG-WCHTER KG de.burgwachter.keyapp.app 4.5.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "http://burg-wchter.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48772.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48772.json index 1656edebdbc..9d5f1eb7e63 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48772.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48772.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48772", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T21:15:07.127", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:40.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en C-CHIP (com.cchip.cchipamaota) v.1.2.8 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "http://comcchipcchipamaota.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48777.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48777.json index 6870b9b0e17..44c5adc23f0 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48777.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48777.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48777", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:05.997", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:41.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "LEDVANCE com.ledvance.smartplus.eu 2.1.10 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://comledvancesmartpluseu.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48778.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48778.json index 3de4432d6c3..69f14c7ad08 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48778.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48778.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48778", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:06.090", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:41.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en GIANT MANUFACTURING CO., LTD RideLink (tw.giant.ridelink) 2.0.7 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "http://giant.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48784.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48784.json index b5bce1cfad0..1e909509a68 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48784.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48784.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48784", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:06.180", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:42.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema de control de acceso incorrecto en SAMPMAX com.sampmax.homemax 2.1.2.7 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "http://comsampmaxhomemax.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48786.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48786.json index 92358651c2c..7bd28b43137 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48786.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48786.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48786", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:06.277", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:43.413", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en SWITCHBOT INC SwitchBot (com.theswitchbot.switchbot) 5.0.4 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "http://switchbot.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48787.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48787.json index c751135a57e..451aef4ed74 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48787.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48787.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48787", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T20:15:06.407", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:44.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Revic Optics Revic Ops (us.revic.revicops) 1.12.5 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "http://revic.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48788.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48788.json index f9132c961c0..8841f3517ab 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48788.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48788.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48788", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T21:15:07.220", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:44.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en YESCAM (com.yescom.YesCam.zwave) 1.0.2 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s del proceso de actualizaci\u00f3n del firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "http://yescam.com", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48915.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48915.json index 0c60f55a413..3597b28601e 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48915.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48915.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48915", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-15T17:15:11.943", - "lastModified": "2024-10-15T17:15:11.943", + "lastModified": "2024-10-15T19:35:45.867", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 0.0 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json index a0a9252b1d2..6c19c071190 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48933.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48933", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T23:15:11.017", - "lastModified": "2024-10-11T21:36:45.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:56:52.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,33 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lemonldap-ng:lemonldap\\:\\:ng:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.3", + "matchCriteriaId": "1BA4655A-220E-47D6-B393-8F158ADF411F" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitlab.ow2.org/lemonldap-ng/lemonldap-ng/-/issues/3232", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json index 5a9ed0daf87..884106553e7 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4889.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4889", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T18:15:18.577", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:00:09.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litellm:litellm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.44.16", + "matchCriteriaId": "C90542D4-7994-47FF-8394-D537FCF72331" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/be3fda72-a65b-4993-9a0e-7e0f05db51f8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5749.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5749.json new file mode 100644 index 00000000000..9d844fe8464 --- /dev/null +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5749.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5749", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-10-15T18:15:05.997", + "lastModified": "2024-10-15T18:15:05.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Certain HP DesignJet products may be vulnerable to credential reflection which allow viewing SMTP server credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11428772-11428805-16/hpsbpi03979", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json index 24461338e2a..b4d6a9d02f9 100644 --- a/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7038", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-09T19:15:14.930", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T19:04:48.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +83,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openwebui:open_webui:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1233F450-99C2-4F5A-A47E-5F341BEA0E1B" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/f42cf72a-8015-44a6-81a9-c6332ef05afc", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8690.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8690.json index e1318749f89..3e8ed4de40a 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8690.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8690.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8690", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-09-11T17:15:14.487", - "lastModified": "2024-10-03T01:29:08.547", + "lastModified": "2024-10-15T18:38:32.260", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -107,6 +107,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -114,8 +115,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9.102-ce:*:*:*:*:windows:*:*", - "matchCriteriaId": "F2C371CD-A60B-4DEE-8D83-F240ADA3BB7E" + "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9.102:*:*:*:critical_environment:*:*:*", + "matchCriteriaId": "DAD96F99-F6DD-4310-AC22-23354CB10FF8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json index 4cb99f8f124..011e0bf73c0 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9341", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-01T19:15:09.500", - "lastModified": "2024-10-14T15:15:14.373", + "lastModified": "2024-10-15T19:15:17.707", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:8039", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:8112", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9341", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json index c29fff6c8fa..f3aa2ab85c9 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9469.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9469", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.770", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:38:25.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + }, { "source": "psirt@paloaltonetworks.com", "type": "Secondary", @@ -73,10 +105,54 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:*:*:*", + "versionStartIncluding": "7.9", + "versionEndExcluding": "7.9.102", + "matchCriteriaId": "E7510DB5-E41B-484D-8BE8-12F7BECA18C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.3.0:*:*:*:-:*:*:*", + "matchCriteriaId": "8632049D-4794-46B0-88A8-D14261C40620" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.4.0:*:*:*:-:*:*:*", + "matchCriteriaId": "01CDA3EB-9E29-4A07-B9CF-219436C170D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-9469", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json index ae718404bff..9e6ad5864d3 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9473", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:21.230", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:54:54.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "psirt@paloaltonetworks.com", "type": "Secondary", @@ -73,10 +105,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "6.2.5", + "matchCriteriaId": "7E2CBAA4-7E71-4769-BBD6-6AF13714E565" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.0:*:*:*:*:windows:*:*", + "matchCriteriaId": "CF300947-06F7-4027-B57A-1F3388233670" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paloaltonetworks:globalprotect:6.3.1:*:*:*:*:windows:*:*", + "matchCriteriaId": "11061375-2C2C-47B4-A3ED-B1DA70F96642" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-9473", - "source": "psirt@paloaltonetworks.com" + "source": "psirt@paloaltonetworks.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json index 678d431ef87..0736e2633ee 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9794.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9794", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T16:15:09.350", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:12:36.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:online_shopping_portal:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "755F393E-3C39-4717-A053-6820CD4965B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/7", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279947", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279947", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.417583", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json index 833d1d3ad24..53b32566f10 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9796.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9796", "sourceIdentifier": "contact@wpscan.com", "published": "2024-10-10T08:15:04.140", - "lastModified": "2024-10-10T15:35:16.310", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-15T18:46:53.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.3.9.2", + "matchCriteriaId": "C3DB91B5-A9DD-4476-9012-0FF3AA9C7D8B" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/2ddd6839-6bcb-4bb8-97e0-1516b8c2b99b/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json index 00e04e3368f..b5f6c085e2b 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9797", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T17:15:16.063", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:14:42.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/siyuancn-hub/cve/blob/main/sql4-user.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279948", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279948", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.417586", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json index 133ffecebff..3235ac32c00 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9804.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9804", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T18:15:09.150", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:17:27.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/sternstundes/cve/blob/main/sql5-campdetails.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279952", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279952", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418618", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json index 8cdc49cd891..87daa2cb97a 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9805.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9805", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T18:15:09.440", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:18:27.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/sternstundes/cve/blob/main/xss5.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279953", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418619", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json index ed9b111efc9..7d0bb9ec6de 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9808", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T20:15:05.003", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:19:57.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/r1ckyL/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279960", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279960", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.420744", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json index 786cea6d618..083464add93 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9809", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T20:15:05.267", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:21:13.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wuyanzu-lab/cve/blob/main/sql.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279961", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279961", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.420745", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json index bec702e3b6c..36ff83a7e4e 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9810", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T20:15:05.517", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:22:00.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jkev:record_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "457BEE12-29ED-48B8-8C96-E181F0E80B56" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/GangZhou1/VUL/blob/main/Record-Management-System-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279962", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279962", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.420806", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json index 4f2b2ba46b7..f2bd836f8e1 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9811", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T21:15:05.383", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:22:35.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:restaurant_reservation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "EE12AD85-FC4C-4F66-82E3-7BDCB43D3903" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ppp-src/a/issues/24", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279963", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279963", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418728", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json index 31789a73eef..d6825cb4f27 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9812", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T21:15:05.677", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:22:51.340", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/ppp-src/a/issues/25", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279964", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279964", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418729", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json index a7f16b33497..21ef3d2e0c1 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9813", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-10T21:15:05.963", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:23:28.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:pharmacy_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F881269F-6B88-4C78-866B-B408AA5711F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/10", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.279965", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.279965", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.418904", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9859.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9859.json index 80b6e96e753..97ef8c8919e 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9859.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9859", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-10-11T17:15:04.677", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-15T19:35:46.273", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La confusi\u00f3n de tipos en WebAssembly en Google Chrome anterior a la versi\u00f3n 126.0.6478.126 permit\u00eda a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de una p\u00e1gina HTML manipulada a medida. (Gravedad de seguridad de Chromium: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -26,6 +49,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9973.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9973.json index b185293d3b7..5028aa8f9cc 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9973.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9973.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9973", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-15T10:15:04.297", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:27:44.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,58 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/higordiego/b9699573de61b26f2290e69f38d23fd0", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.280338", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280338", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.423167", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9974.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9974.json index d1a406e27b4..a6e7c696d22 100644 --- a/CVE-2024/CVE-2024-99xx/CVE-2024-9974.json +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9974.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9974", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-15T10:15:04.777", - "lastModified": "2024-10-15T12:57:46.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-15T19:28:37.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "464A3580-D632-43EB-93EF-E2A1A5736F14" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/higordiego/2373b9e3e89f03e5f8888efd38eb4b48", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.280339", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280339", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.423231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index a73f7791e8d..87a8a69bd30 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-15T18:00:20.241933+00:00 +2024-10-15T20:00:18.097712+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-15T17:35:51.263000+00:00 +2024-10-15T19:51:10.393000+00:00 ``` ### Last Data Feed Release @@ -33,56 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265604 +265607 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `3` -- [CVE-2024-47779](CVE-2024/CVE-2024-477xx/CVE-2024-47779.json) (`2024-10-15T16:15:04.963`) -- [CVE-2024-47824](CVE-2024/CVE-2024-478xx/CVE-2024-47824.json) (`2024-10-15T16:15:05.120`) -- [CVE-2024-47874](CVE-2024/CVE-2024-478xx/CVE-2024-47874.json) (`2024-10-15T16:15:05.260`) -- [CVE-2024-47876](CVE-2024/CVE-2024-478xx/CVE-2024-47876.json) (`2024-10-15T16:15:05.420`) -- [CVE-2024-48622](CVE-2024/CVE-2024-486xx/CVE-2024-48622.json) (`2024-10-15T16:15:05.680`) -- [CVE-2024-48623](CVE-2024/CVE-2024-486xx/CVE-2024-48623.json) (`2024-10-15T16:15:05.767`) -- [CVE-2024-48624](CVE-2024/CVE-2024-486xx/CVE-2024-48624.json) (`2024-10-15T16:15:05.840`) -- [CVE-2024-48913](CVE-2024/CVE-2024-489xx/CVE-2024-48913.json) (`2024-10-15T16:15:05.960`) -- [CVE-2024-48914](CVE-2024/CVE-2024-489xx/CVE-2024-48914.json) (`2024-10-15T16:15:06.270`) -- [CVE-2024-48915](CVE-2024/CVE-2024-489xx/CVE-2024-48915.json) (`2024-10-15T17:15:11.943`) -- [CVE-2024-9506](CVE-2024/CVE-2024-95xx/CVE-2024-9506.json) (`2024-10-15T16:15:06.650`) -- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-10-15T16:15:06.933`) +- [CVE-2024-35584](CVE-2024/CVE-2024-355xx/CVE-2024-35584.json) (`2024-10-15T19:15:16.957`) +- [CVE-2024-41344](CVE-2024/CVE-2024-413xx/CVE-2024-41344.json) (`2024-10-15T19:15:17.287`) +- [CVE-2024-5749](CVE-2024/CVE-2024-57xx/CVE-2024-5749.json) (`2024-10-15T18:15:05.997`) ### CVEs modified in the last Commit -Recently modified CVEs: `43` +Recently modified CVEs: `93` -- [CVE-2024-45470](CVE-2024/CVE-2024-454xx/CVE-2024-45470.json) (`2024-10-15T17:18:52.227`) -- [CVE-2024-45471](CVE-2024/CVE-2024-454xx/CVE-2024-45471.json) (`2024-10-15T17:18:37.377`) -- [CVE-2024-45472](CVE-2024/CVE-2024-454xx/CVE-2024-45472.json) (`2024-10-15T17:15:34.937`) -- [CVE-2024-45473](CVE-2024/CVE-2024-454xx/CVE-2024-45473.json) (`2024-10-15T17:31:56.830`) -- [CVE-2024-45474](CVE-2024/CVE-2024-454xx/CVE-2024-45474.json) (`2024-10-15T17:31:54.730`) -- [CVE-2024-45475](CVE-2024/CVE-2024-454xx/CVE-2024-45475.json) (`2024-10-15T17:31:52.313`) -- [CVE-2024-45476](CVE-2024/CVE-2024-454xx/CVE-2024-45476.json) (`2024-10-15T17:31:50.310`) -- [CVE-2024-45754](CVE-2024/CVE-2024-457xx/CVE-2024-45754.json) (`2024-10-15T16:35:07.827`) -- [CVE-2024-45806](CVE-2024/CVE-2024-458xx/CVE-2024-45806.json) (`2024-10-15T16:03:44.943`) -- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2024-10-15T16:35:08.740`) -- [CVE-2024-47661](CVE-2024/CVE-2024-476xx/CVE-2024-47661.json) (`2024-10-15T16:03:29.260`) -- [CVE-2024-47771](CVE-2024/CVE-2024-477xx/CVE-2024-47771.json) (`2024-10-15T16:15:04.860`) -- [CVE-2024-47944](CVE-2024/CVE-2024-479xx/CVE-2024-47944.json) (`2024-10-15T16:35:09.410`) -- [CVE-2024-47945](CVE-2024/CVE-2024-479xx/CVE-2024-47945.json) (`2024-10-15T17:35:06.870`) -- [CVE-2024-48120](CVE-2024/CVE-2024-481xx/CVE-2024-48120.json) (`2024-10-15T16:35:09.650`) -- [CVE-2024-48150](CVE-2024/CVE-2024-481xx/CVE-2024-48150.json) (`2024-10-15T16:35:10.450`) -- [CVE-2024-48168](CVE-2024/CVE-2024-481xx/CVE-2024-48168.json) (`2024-10-15T16:35:11.240`) -- [CVE-2024-48279](CVE-2024/CVE-2024-482xx/CVE-2024-48279.json) (`2024-10-15T16:35:11.997`) -- [CVE-2024-48280](CVE-2024/CVE-2024-482xx/CVE-2024-48280.json) (`2024-10-15T16:35:12.753`) -- [CVE-2024-48283](CVE-2024/CVE-2024-482xx/CVE-2024-48283.json) (`2024-10-15T16:35:13.517`) -- [CVE-2024-48770](CVE-2024/CVE-2024-487xx/CVE-2024-48770.json) (`2024-10-15T17:35:07.440`) -- [CVE-2024-48796](CVE-2024/CVE-2024-487xx/CVE-2024-48796.json) (`2024-10-15T16:35:14.433`) -- [CVE-2024-48798](CVE-2024/CVE-2024-487xx/CVE-2024-48798.json) (`2024-10-15T16:35:14.783`) -- [CVE-2024-9399](CVE-2024/CVE-2024-93xx/CVE-2024-9399.json) (`2024-10-15T16:04:59.350`) -- [CVE-2024-9471](CVE-2024/CVE-2024-94xx/CVE-2024-9471.json) (`2024-10-15T16:55:45.090`) +- [CVE-2024-48786](CVE-2024/CVE-2024-487xx/CVE-2024-48786.json) (`2024-10-15T19:35:43.413`) +- [CVE-2024-48787](CVE-2024/CVE-2024-487xx/CVE-2024-48787.json) (`2024-10-15T19:35:44.190`) +- [CVE-2024-48788](CVE-2024/CVE-2024-487xx/CVE-2024-48788.json) (`2024-10-15T19:35:44.980`) +- [CVE-2024-4889](CVE-2024/CVE-2024-48xx/CVE-2024-4889.json) (`2024-10-15T19:00:09.633`) +- [CVE-2024-48915](CVE-2024/CVE-2024-489xx/CVE-2024-48915.json) (`2024-10-15T19:35:45.867`) +- [CVE-2024-48933](CVE-2024/CVE-2024-489xx/CVE-2024-48933.json) (`2024-10-15T18:56:52.363`) +- [CVE-2024-7038](CVE-2024/CVE-2024-70xx/CVE-2024-7038.json) (`2024-10-15T19:04:48.627`) +- [CVE-2024-8690](CVE-2024/CVE-2024-86xx/CVE-2024-8690.json) (`2024-10-15T18:38:32.260`) +- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-10-15T19:15:17.707`) +- [CVE-2024-9469](CVE-2024/CVE-2024-94xx/CVE-2024-9469.json) (`2024-10-15T18:38:25.647`) +- [CVE-2024-9473](CVE-2024/CVE-2024-94xx/CVE-2024-9473.json) (`2024-10-15T18:54:54.560`) +- [CVE-2024-9794](CVE-2024/CVE-2024-97xx/CVE-2024-9794.json) (`2024-10-15T19:12:36.503`) +- [CVE-2024-9796](CVE-2024/CVE-2024-97xx/CVE-2024-9796.json) (`2024-10-15T18:46:53.397`) +- [CVE-2024-9797](CVE-2024/CVE-2024-97xx/CVE-2024-9797.json) (`2024-10-15T19:14:42.600`) +- [CVE-2024-9804](CVE-2024/CVE-2024-98xx/CVE-2024-9804.json) (`2024-10-15T19:17:27.083`) +- [CVE-2024-9805](CVE-2024/CVE-2024-98xx/CVE-2024-9805.json) (`2024-10-15T19:18:27.987`) +- [CVE-2024-9808](CVE-2024/CVE-2024-98xx/CVE-2024-9808.json) (`2024-10-15T19:19:57.720`) +- [CVE-2024-9809](CVE-2024/CVE-2024-98xx/CVE-2024-9809.json) (`2024-10-15T19:21:13.343`) +- [CVE-2024-9810](CVE-2024/CVE-2024-98xx/CVE-2024-9810.json) (`2024-10-15T19:22:00.260`) +- [CVE-2024-9811](CVE-2024/CVE-2024-98xx/CVE-2024-9811.json) (`2024-10-15T19:22:35.447`) +- [CVE-2024-9812](CVE-2024/CVE-2024-98xx/CVE-2024-9812.json) (`2024-10-15T19:22:51.340`) +- [CVE-2024-9813](CVE-2024/CVE-2024-98xx/CVE-2024-9813.json) (`2024-10-15T19:23:28.953`) +- [CVE-2024-9859](CVE-2024/CVE-2024-98xx/CVE-2024-9859.json) (`2024-10-15T19:35:46.273`) +- [CVE-2024-9973](CVE-2024/CVE-2024-99xx/CVE-2024-9973.json) (`2024-10-15T19:27:44.020`) +- [CVE-2024-9974](CVE-2024/CVE-2024-99xx/CVE-2024-9974.json) (`2024-10-15T19:28:37.377`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 68837a42636..c706279636e 100644 --- a/_state.csv +++ b/_state.csv @@ -81627,7 +81627,7 @@ CVE-2015-8959,0,0,e4feb9cdabdb3d786b1dfa0918fb34a014335ebaac4e12d762b5ac36d6b511 CVE-2015-8960,0,0,7c8328ad312b06f04169804d632e57e483a9322217f8a9f4911101790603c6d9,2023-01-30T17:33:01.257000 CVE-2015-8961,0,0,62da8e87a5071d2e0f607fdea4425d342cf4861fe470d62253a06a5919c78788,2023-01-19T16:05:41.817000 CVE-2015-8962,0,0,f36c71c2820159522e0abec4e6fdf1c39415560ab75e38790961bd83bbffc9a1,2023-01-19T16:07:59.687000 -CVE-2015-8963,0,0,b78230386fe6f82e274b0d58ccebfc58f33cd17686d94c2e2ca84efb9f2a7e82,2023-12-14T14:06:01.427000 +CVE-2015-8963,0,1,bf0436b5720895d64ce36ae64be1a69b016dfe1c2df3f7685d7f3d693926f78a,2024-10-15T19:35:01.347000 CVE-2015-8964,0,0,7cdc86627e7edebae884be5734bc12c0bcc6e8c2d02f379240a1b96595c761c4,2016-11-28T19:50:55.427000 CVE-2015-8965,0,0,ad4c6458189f0cbc5fac9dbe6483fc48d3286626361bf61457c9f0b1be368572,2022-07-23T10:33:29.740000 CVE-2015-8966,0,0,5d536de20357e58f3a895a5fdc510fced6513d899ad14b0dbe3983c44800b897,2016-12-10T02:59:01.727000 @@ -89794,7 +89794,7 @@ CVE-2016-6813,0,0,d71885dff5c934e9fbe2ce0b6cf645d1395581af32a5df8b30eb53cb2de53e CVE-2016-6814,0,0,78d3f1533629bf03d80706ee5a160955afae71b11190e65cc31f959c3af7fe56,2020-07-15T03:15:16.327000 CVE-2016-6815,0,0,05dae4dce194b7cf3c6884df749bb6be9157d82b2de4c5b4c1a003f3c2269549,2017-11-03T16:02:16.803000 CVE-2016-6816,0,0,fdf8c17a5e83d2a7b9ead95cbb8569e4f3ea8dfd3627fff48a8e0b2beaa11c9c,2023-12-08T16:41:18.860000 -CVE-2016-6817,0,0,163fd93dd71d6c8439d394f92b556b39c3a3266ade2b2ba6cab349b28874a3b8,2023-12-08T16:41:18.860000 +CVE-2016-6817,0,1,6383961d5d34661cbecfe77c3e7d44850098ca9acd0152fc0aa29fa181027f6e,2024-10-15T19:35:07.040000 CVE-2016-6818,0,0,19b81d454ed9c2f69424f0b7b67bb54c2f3a8ceea791ca333d5e075adafd3452,2018-12-10T19:29:18.343000 CVE-2016-6820,0,0,3f8c709c5d3168a806fa8d62e56db4812c1f7f337e47884702ba4bee5c134f3a,2017-11-16T02:29:02.160000 CVE-2016-6823,0,0,07dedf7f97839e34d5162811295dac0b5453bd99157789695e57347b86b73746,2021-04-28T16:32:48.120000 @@ -91632,7 +91632,7 @@ CVE-2016-8743,0,0,f0451111dce4bf6ecd69c3f737d2335d19cf4b10905c9e710f3d5b5d37e72a CVE-2016-8744,0,0,c6e5598d487c5114bd3cadfb7da34373326854657ae678e1ee186253346363e1,2023-11-07T02:36:29.397000 CVE-2016-8745,0,0,8ad2a0ef338b25421877c6b75cd276010266e3050fc96a80ecadc7ababa8815c,2023-12-08T16:41:18.860000 CVE-2016-8746,0,0,5889aac71000974612512cb0e6790af72bbb951d2106c5d46fe379aa79eb3b64,2017-06-19T17:46:50.020000 -CVE-2016-8747,0,0,a7e91f55c80802c7299e888ffd43c78bebc5bf57b524e177d848caa5da47e37a,2023-12-08T16:41:18.860000 +CVE-2016-8747,0,1,be8ffe4c1b226b8a463e11b921000732c98b8c7264c7188f6ae715d1632edd17,2024-10-15T19:35:07.950000 CVE-2016-8748,0,0,3e276dd3c6ef8a4d3797670441fb6ab06da8cb26204e2ef88c94024529e6f925,2019-05-01T20:20:17.510000 CVE-2016-8749,0,0,2d7fa202a1d154018945d0b067a6ee579cb8ac3812f0d9d03c9703e373477e0b,2023-11-07T02:36:29.720000 CVE-2016-8750,0,0,e6860de1e44e31a9f9b0d0d6a353c25e0db2660dee4f93c1a4df091975a410e5,2019-04-26T13:16:27.353000 @@ -92241,7 +92241,7 @@ CVE-2016-9424,0,0,c921bc0be77850a8673b84272f35fdb8c6408a687d5a0cbffb461b0f0c2119 CVE-2016-9425,0,0,21ac5ffb65fa37a4f19eaac2eb23ffe0d9ab387470b757bd0d450a7fed4ff11f,2023-12-29T18:38:04.570000 CVE-2016-9426,0,0,f90e06f00f1a284b5e29c6e47034aeb0af9e2c01e685adc120981e97d9654a0a,2023-12-29T18:38:04.570000 CVE-2016-9427,0,0,5f64bef16cd29b02a500713ca7667b8a7136594873543189f5b7225718ae73f9,2022-06-01T20:41:50.427000 -CVE-2016-9428,0,0,49f8c4e55ab7837f684a57b71aa880d4a1a95187e0f4ae04f9abbf590a505a5c,2023-12-29T18:38:04.570000 +CVE-2016-9428,0,1,d4187b3909f84d3995ce136011fd4bc4d1bbc35e89f7f2438de4721ab814ebb5,2024-10-15T19:35:08.300000 CVE-2016-9429,0,0,3c897b808e6093d20e69e112f4c8b3c064c4cf0a878f14ca166d2d8c782ef0ef,2023-12-29T18:38:04.570000 CVE-2016-9430,0,0,b6a7947bb3a4718d0d1535ed5682928d4f28b19cc1ebc3dcc896b02d35f05be8,2023-12-29T18:38:04.570000 CVE-2016-9431,0,0,548d5a77e5dc17c6f5dd662f1ca70dbc4be0bb86e93dd475064ab480bf7e98a7,2023-12-29T18:38:04.570000 @@ -131856,7 +131856,7 @@ CVE-2019-13984,0,0,7f98f3a0004da7ed72b7ebdac0bbe0ff7cff78d899d1fe51a85bb1a7b6978 CVE-2019-13988,0,0,165406adc18203e69dbe506dde2e2eb543be8409e7529f8d48eb53010107166c,2023-01-05T18:16:09.947000 CVE-2019-13989,0,0,3b846a7077f2b9ed939690fa0a341892efaf331e91ecfc09cd8f096d32bb4fd8,2020-09-14T14:25:15.073000 CVE-2019-1399,0,0,2b4fe3f4727fbe5b64e872792fdc588887f75207e699599add36de26b4f8c94b,2019-11-13T19:16:17.557000 -CVE-2019-13990,0,0,911b3e9aa71bd7797308e632b0a14335b255cc4d9a6a324b2081c49b76eb03df,2023-12-22T16:35:35.523000 +CVE-2019-13990,0,1,156692f7736737b9e4694b16d30771e6ad9ceec5419aeb6a9d199f9c188a5afe,2024-10-15T19:35:09.210000 CVE-2019-13991,0,0,54dab28f5304ff5e608009a070d2c7aff7076150a2eae51bf736a966afa3d0fa,2020-08-24T17:37:01.140000 CVE-2019-13992,0,0,f2d3a4eb5b1a3a0c4f10e9d46c96061dbe6cab7e14ca22a23740339355ffd137,2020-09-11T13:12:49.640000 CVE-2019-13993,0,0,5e800f88a111fb74d20aa5625718fdd67e2461cea937d6feea60af587776a517,2023-11-07T03:04:32.543000 @@ -135243,7 +135243,7 @@ CVE-2019-17657,0,0,3589f959f4c5758fb254c32363b9c26f0e3bce3eb41bdf218b016eb517e32 CVE-2019-17658,0,0,e8c785ff740b98e11ca35218a2fb0941207707343437b70f43c39412099d6630,2021-04-29T15:57:36.170000 CVE-2019-1766,0,0,dd14365f2fcfad0166daa287f5cc5f8a0c81cbedb69e60f51d08209249804f2a,2023-03-24T18:04:42.353000 CVE-2019-17660,0,0,afffbe2474e3465c14e74b0749bae31435ebb7173be1f80009c8f6996eb6d753,2019-10-17T19:53:51.527000 -CVE-2019-17661,0,0,40a43737276beb09a76ea03e4e6aef7a0e902051b49d708575fa27f9cab4b4a8,2024-02-14T17:00:29.027000 +CVE-2019-17661,0,1,776bb5d3187d2aac10cb1d211a1359aabc2b0c7f10c6879082385e6ea3eeaa3a,2024-10-15T19:35:12.793000 CVE-2019-17662,0,0,94cdcefaea724ba3175dcd7ba3377f2df922b90ae348ba8a3a8b938b5dd04bdb,2020-08-24T17:37:01.140000 CVE-2019-17663,0,0,fa58fd6e8bdbcab57c2dc88ca55a0bd3744375f941ea98ef4cf360e747c8216e,2023-04-26T18:55:30.893000 CVE-2019-17664,0,0,fe0d4ccd4e4a22211f4362b1de9476d3a3121a1f9309ac1e8020a0fa1b3aba9f,2019-10-21T18:21:57.090000 @@ -135405,7 +135405,7 @@ CVE-2019-18275,0,0,57b69d578dae91260262ca2cd2de0532d239a1ae9a52c70553642ff54c959 CVE-2019-18276,0,0,b1c2c54bf8417368d5d5cbac5e1f69a50dc0eacfec4c242b5d5cba08dda15cb2,2023-11-07T03:06:25.300000 CVE-2019-18277,0,0,39618ab26b366044aec57d0ac909f5619853b7a5227e0faf0b837e53ef5f2b9e,2023-11-07T03:06:25.370000 CVE-2019-18278,0,0,0fbcfbebd244efebed557714951ceb122b2847400805fc63c53ce8ebada811da,2020-08-24T17:37:01.140000 -CVE-2019-18279,0,0,f65aa7796cf606c012f8e02da723a5a12bf1067a77afde6191c4fe5526d2e859,2023-12-08T18:54:42.680000 +CVE-2019-18279,0,1,3af66cf0dc12aefd8f142e007bf0505d54b26886b291199538d45ec7714d1766,2024-10-15T19:35:14.120000 CVE-2019-1828,0,0,31629b87d1faf7a4636e0b51380d1ea58a117646471ad0a46eb16e577153dc12,2019-10-09T23:48:16.300000 CVE-2019-18280,0,0,baa6ab0d6e8245dd1ba9d7a5a128d52d2cbf7bcfd025dc7cd74462e89fd76c91,2020-09-03T12:12:33.933000 CVE-2019-18281,0,0,b30c829839b001df0743fea21d37266d59016cc21077299059e47bfee868e6d1,2020-02-18T20:15:13.527000 @@ -156603,7 +156603,7 @@ CVE-2020-28044,0,0,9dec248224c84fb3b6d590d43e11c0b90ba0b86f61868c11bc93daa0f6964 CVE-2020-28045,0,0,4d5bdfbad3bc00d40489bccbd6fe76b89401563ec9e734cffe1b02141841fc85,2020-11-19T15:57:34.527000 CVE-2020-28046,0,0,44d530bddcaff80e6ff5be5fb1f549c7a3ec6e359dd3a9eb3d4698f0f2f81f38,2020-11-17T16:44:06.563000 CVE-2020-28047,0,0,595c4a35287db4d8495bb3fc1397c03ef462b6f15a9018a2b47a7fd9589ce955,2020-11-10T18:33:17.353000 -CVE-2020-28049,0,0,1e4257c8d50c84a4dacbb3eb74262ee73971659a834d7ebbb768a6fbfdcbd61c,2024-02-03T07:15:14.473000 +CVE-2020-28049,0,1,5198edddb89ec5d57d56adfc7db4108a9a566163236647b3915972ed2f1beebb,2024-10-15T18:35:01.473000 CVE-2020-2805,0,0,56417af69fbdb9e62dc00ecf779e6ab849b2ad8db9062ed4b73b559e3c3874c8,2023-11-07T03:21:48.580000 CVE-2020-28050,0,0,98d0b33a06934e3e4b0d803cf9a2b485661d9ab4e64e6efc4c140b7a07fed853,2021-07-21T11:39:23.747000 CVE-2020-28052,0,0,7e307b15b15b3688430016c0e44640c2a415ca9ab47eae1c3388703b4ddeb8cb,2023-11-07T03:21:07.073000 @@ -158372,7 +158372,7 @@ CVE-2020-35658,0,0,bac6cf1c7aef565f1a1698a02251a8469c92fa52deab1b2d5ef8b5c883769 CVE-2020-35659,0,0,4441c1e1c8903144d64ad9be702d4ee0e77db6bbdf385bea53c34fd5963846e4,2020-12-28T17:40:47.570000 CVE-2020-3566,0,0,e1cfa7d5045a3d8ad006162cbffae3fab0acfa5538e71ade5e2b82f9f5feefb3,2024-07-26T19:55:20.327000 CVE-2020-35660,0,0,08a734959bf9e43b2dd6309403dbe1b952809996e47a441cf234ac58099c3bae,2021-04-19T19:19:32.800000 -CVE-2020-35662,0,0,b174392db159d2e0107d1f38fc1a270afb82029d30dd345f455b297c74d48097,2023-12-21T18:22:07.907000 +CVE-2020-35662,0,1,08e139e9ffe01f10074da1797b766de8003e29d4961f1b3589bd33b9dc383741,2024-10-15T19:35:21.893000 CVE-2020-35664,0,0,2cfbaaf1c74c1da117d4d6c1a5ecf1abc90b24b1bfdde941390c8b453f3729f8,2021-02-26T03:38:20.213000 CVE-2020-35665,0,0,b9efce5ee44d69e18b56c4b3437609d637cae01537a0e29baae259b6d4e59ef5,2023-06-12T07:15:15.967000 CVE-2020-35666,0,0,ba81c5a44fef70aa83376a2a240e5000e6c3bc1d26a02a5a987cff3f2ee8ba6f,2020-12-23T20:29:19.160000 @@ -160791,7 +160791,7 @@ CVE-2020-5525,0,0,64ea149f46db4ab00cbcbaf4a7491d0fb717f31ef584aba45673e2edd33e8d CVE-2020-5526,0,0,2391ec31a9c89f8c10917bf57865a3050800bba76fb45f94e58f50342e1c04dc,2020-02-10T17:18:20.030000 CVE-2020-5527,0,0,57deab79448e5d8a49b236a1811b92dfce87fc11de785b5c45af08454ff51018,2020-04-07T13:49:38.617000 CVE-2020-5528,0,0,09a1f1bcbb8bf8319db11603db57e44c757713209f0493810700709ca88c89a5,2020-02-07T19:41:25.013000 -CVE-2020-5529,0,0,7dad2ef441b0f9956acfb0d6f38cb2eead824c9bd9bfa556739fa80acae46d75,2023-12-07T17:56:27.147000 +CVE-2020-5529,0,1,010ee382d2cba73e8b4243c8f08192ed01682c1fbd6c1cdfd46e1de191b65925,2024-10-15T19:35:22.773000 CVE-2020-5530,0,0,9f3a3ca2c9c8ce7035785f04c73f09960043cdfeb3136eff0c4b88086c8b5a7e,2020-02-19T14:25:37.707000 CVE-2020-5531,0,0,606ced651e1449d7c60ba7a6ae044659643c3b15529d957c79a7d7d8ddce2e4f,2020-03-04T18:34:01.613000 CVE-2020-5532,0,0,c141ef0177edc1068cb275042d6ac5224a6c000ad19d032ab8c08853e473327a,2020-02-25T17:52:00.583000 @@ -172960,7 +172960,7 @@ CVE-2021-28113,0,0,574b44645a729a2cfc0695972b78ca1a5bac176730befd5969281862c691a CVE-2021-28114,0,0,05ef0ec0c99eedc9271a931700ea3746450475fa66235fda50736febfd0e8a49,2022-09-23T16:51:39.850000 CVE-2021-28115,0,0,91e82c36cae7d5f3d74d62d7d8f6ff66a2ea3752505f53f54a34fbd4c9a458a3,2021-03-13T00:17:55.233000 CVE-2021-28116,0,0,af548a84a2f1e0902b418257ac708f44fa2e61c11f413f2ac30024bf58348873,2023-11-07T03:32:03.943000 -CVE-2021-28117,0,0,877389657aaa05da4b7d900f7f50f42f26dcdc3e2d93942fe30cdffe84b2d2fc,2023-12-28T16:24:49.047000 +CVE-2021-28117,0,1,1053c6b1d303088252e7acc02380e7dd8095d5124cdfcd02be6fc0718e8146b5,2024-10-15T18:35:02.437000 CVE-2021-28119,0,0,b72f04a854999097edc8e43597b3e5bbc09d90dc38eea706ece37c3bbbef8a18,2021-03-18T15:23:23.303000 CVE-2021-28121,0,0,a7c57f54b35225b1286132ce4cb9b494f5fd721c4f4f715008a7b89e92edd473,2021-08-23T15:54:19.747000 CVE-2021-28122,0,0,ccc8c91f4ed32545ca3abef25c009df7f586fd35d6be52a88f14fb1f7de23a8a,2022-07-12T17:42:04.277000 @@ -177807,7 +177807,7 @@ CVE-2021-34617,0,0,edc1a64cfeb4c0e2df32b7f7119695d9ef5fa9de6543b6f19ee12d81d14ea CVE-2021-34618,0,0,02a15b639d55b088d597f70410e6357bdac143aa1da1b22c1756034272dfd074,2021-07-29T15:17:34.050000 CVE-2021-34619,0,0,18a08322927fecc8a0a27e7875dbb1d65b52a60672691b7e4ef0bf33acdae6b6,2023-07-18T12:34:01.287000 CVE-2021-3462,0,0,d40fce269a120c19f17c82297a497adc608152420fd69d261c6bf6924a55bbe9,2022-10-27T12:45:23.963000 -CVE-2021-34620,0,0,e795de79033c4ac3f1d4d4f80d34e60093db75f8ad51ae54f94acf0095137194,2022-11-07T16:37:09.160000 +CVE-2021-34620,0,1,ffaac1ce53a97c21b97c4f10941ff5ddfc251828ba52444f4474029615ab4dc0,2024-10-15T19:35:23.910000 CVE-2021-34621,0,0,2907591a5a42bf6a0ded9aa9129b81888fa65f401aed577b6a84dd43e4c38456,2023-05-26T19:38:26.543000 CVE-2021-34622,0,0,e59444b71cedfed16528b7ab7b6850e6295a4f91f3538a5872e6f49f05b59443,2023-05-26T19:38:26.543000 CVE-2021-34623,0,0,92eeb117870210c18f20a043d5700b9eb85cf6960958c6019ccad808a21fa6b5,2023-05-26T19:38:26.543000 @@ -181871,7 +181871,7 @@ CVE-2021-39945,0,0,d67483f8f0b55fa80688cddeb4b076685e53a47812e5694fddb9a64caee2d CVE-2021-39946,0,0,dafab3df7c87ba6c22f2cd9d671f6939605a9280879df58c9e6fe6d207e80822,2022-01-25T16:35:57.753000 CVE-2021-39947,0,0,078ead3be4f1198b7c789cde932f66c430b109f94d58fcac3a8853a0bbbbbda0,2023-08-08T14:22:24.967000 CVE-2021-3995,0,0,2ace30b0a6cdb6219249a68e7e36964d12d87e790f3eb5e5380a3bd6ac631e76,2024-01-07T09:15:08.413000 -CVE-2021-3996,0,1,086fcd4c494524df329d97ae9e6f851a84a2a6d226707e4372456e5f670bc8f4,2024-10-15T16:35:00.963000 +CVE-2021-3996,0,0,086fcd4c494524df329d97ae9e6f851a84a2a6d226707e4372456e5f670bc8f4,2024-10-15T16:35:00.963000 CVE-2021-39966,0,0,651155860e4d6d8fb6f37eb1650af5fb450da83d30e3e15a87554e286f71295c,2022-01-13T16:22:11.833000 CVE-2021-39967,0,0,0f58906621f83b67c28bfd477dc988ce5b77b2719cefe28be91c7d12d3a40439,2022-01-13T16:23:38.167000 CVE-2021-39968,0,0,2e5e1cb3e038cdcd67bae6f723481408cf6010f2d25f4662133be026ae205966,2022-01-13T16:28:17.993000 @@ -192327,7 +192327,7 @@ CVE-2022-23092,0,0,feefc35a77dda18a2f3e06f31c3166e7ad94e6732e53343f8ba132e825f2c CVE-2022-23093,0,0,e5e8d34f160f1c848e42f116f1b09f04694af73c06dcb59c1486806997905207,2024-02-15T06:23:39.303000 CVE-2022-23094,0,0,853abfd9e10f1c92cadf6f500a7ff4c8d565cd6f2ee990346fdb7cf1ef6d1ba7,2023-11-07T03:44:04.353000 CVE-2022-23095,0,0,56b2c39c187f31dbdf4d336d0209e5136c96a4985ccfae139c0ff11e41d1aca3,2023-08-08T14:21:49.707000 -CVE-2022-23096,0,1,8375f1330dc658c51cceb00c11b969fb503079555e42e0b96f1d5d1574d434be,2024-10-15T16:35:01.440000 +CVE-2022-23096,0,0,8375f1330dc658c51cceb00c11b969fb503079555e42e0b96f1d5d1574d434be,2024-10-15T16:35:01.440000 CVE-2022-23097,0,0,2e80a0f3145a3d4a023304b6af7db5bc77845aedab953e425cff21fd6a4a1953,2023-12-21T20:10:57.727000 CVE-2022-23098,0,0,b46eaa36653fb7b1c7ab6b58a1453e672907a363e7ed3890b17d99c7d3afbc56,2023-12-21T19:26:25.640000 CVE-2022-23099,0,0,2b56c5422bc8e6379f85d636a980307179a442d05607ad88ed7811eb51196b0b,2022-08-03T12:55:32.697000 @@ -196522,7 +196522,7 @@ CVE-2022-28132,0,0,514c27b4a8ea5c0424943b0cfe173c5331618c82893416f2cf213bbfb8fac CVE-2022-28133,0,0,c75bcbb4c849156d4d399c0ecd88c51eb6d4670588507cd92fbb96c79c61c69e,2024-01-09T03:20:00.110000 CVE-2022-28134,0,0,bc2ace0342df28965d969cd8f2769ae710b40345f2a4b4dd18730e059150d945,2023-12-22T16:23:56.647000 CVE-2022-28135,0,0,b4b8f6f12226f9bd9abe358a3d75438cd874c7be98b2d4e7c66102fc4382734d,2023-12-21T21:53:55.317000 -CVE-2022-28136,0,0,e024342590c921cc046b495ca294bc172a75b3e63ff6a5e1ad236aba683a3315,2023-12-21T01:42:53.653000 +CVE-2022-28136,0,1,1a0b4ad1d035316504d86e7a22fc1c81e85b0e0c0142d15cfee7ce0634b78ace,2024-10-15T19:35:24.497000 CVE-2022-28137,0,0,33a9664335a2d924ba0635bb5f72daca87f4c73942e79edf9e849e9bd56f675e,2023-12-22T16:23:08.167000 CVE-2022-28138,0,0,8cdd4c5723fac4c5f9bb47fc37ae9abbe7af931b3c675f2963405008d3549070,2023-11-17T17:23:52.757000 CVE-2022-28139,0,0,a042a4d027139319bb06a6a75fe1aa7c8c7543230ea7e0c449dfac57ac2ca2b1,2023-11-17T17:23:59.070000 @@ -198514,7 +198514,7 @@ CVE-2022-30547,0,0,e8e7999e7671db2ca6b11cbee96ecc0d751be3551ff3689647d6c2b4dc425 CVE-2022-30548,0,0,25c7729929701a7cea313660a9ebc63f574e751ed4ce69cffb4226d2a88a716d,2022-11-17T15:07:36.213000 CVE-2022-30549,0,0,d6f4715643e475f24cf06963d64cd280b9b9d15402b7e32afa657dc4b03e4654,2022-06-27T17:02:57.287000 CVE-2022-3055,0,0,edcbff647a85d58382d336223369defdde2ec6541033cbd064ab4ea17a088a2b,2023-11-07T03:50:44.703000 -CVE-2022-30550,0,0,0c44032a8c73d90e49b4d60f3a9ad11855aeb846637d3b558a1749392df6961a,2024-01-12T20:47:18.010000 +CVE-2022-30550,0,1,e8d9d63be4799d75f05930c1889713150096dfa8257d34f771c89927ca440240,2024-10-15T19:35:25.430000 CVE-2022-30551,0,0,de75ae1b3ee244c0a837d095169a91ff22d949fb6636f64e09ecf57e2c678180,2022-06-01T19:59:36.657000 CVE-2022-30552,0,0,57b63fede45ced57b99e81b338930b2e7dd5f31bcbef5ccae577c540682ae0fc,2022-06-16T13:12:33.857000 CVE-2022-30556,0,0,8be0e914ba71b624e4617ee79d0dcf86767caa4b15efac3d0094b316b1e795de,2023-11-07T03:47:15.293000 @@ -207744,7 +207744,7 @@ CVE-2022-42245,0,0,763d7567ddb2bf1e26ac8d998d442e4e9bdc90a939a9b7be870902e81347f CVE-2022-42246,0,0,0c3ccd2c34b78caedf393cbf8c98ccc53bc77fb78be42941a915d7f80221c5b5,2022-11-17T23:27:17.417000 CVE-2022-42247,0,0,cf702ee8aa9bf5f0d453ace1dac1e24f0663f25d899cf34aa27cb3c99953e760,2022-10-05T14:11:37.970000 CVE-2022-42248,0,0,a95c2adce99fe559ddd4eb8b9ed97ddf971aab766b82c5d961f797ecd48a2cea,2023-03-13T17:47:01.773000 -CVE-2022-42249,0,1,67664e2031a3fbd73e77d90c204a4bddd946c6a23d81a0226aebfb517802009b,2024-10-15T16:35:02.270000 +CVE-2022-42249,0,0,67664e2031a3fbd73e77d90c204a4bddd946c6a23d81a0226aebfb517802009b,2024-10-15T16:35:02.270000 CVE-2022-42250,0,0,13e5dfe33cbc6246914c752ec18aea676a3f6686b3b35e4b146adcd28ab8f152,2023-12-28T16:46:19.600000 CVE-2022-42252,0,0,56e5bd53a393eed0bd3a6a7148f0ecf3faab2064d317bb1daab6151636594ba0,2023-05-30T06:15:25.967000 CVE-2022-42254,0,0,a35c66c5e8ef6c29df181a0454ac11f8d6b731201db9b2da9a93912fe040e5af,2023-10-19T01:21:04.743000 @@ -208066,7 +208066,7 @@ CVE-2022-4271,0,0,a47ac03d1e87cb1cda38b7ea6127e82ceaa30264351edad1f0e8fca1e20900 CVE-2022-42710,0,0,2f897454383e292c38a2fea29c4b5822459c0c24a44f7454dc5f8ba6767830e7,2023-01-10T16:07:38.907000 CVE-2022-42711,0,0,5d6a8ca0f143e6cea55ae6ee10cd28d00a969dd3eac34fa6f3d8a6b06e9f46a1,2022-10-13T14:26:34.380000 CVE-2022-42715,0,0,ca40d0573c10bedd555693d4ffd55080465faa5da2e2b705115496faffca239f,2022-10-14T17:12:51.110000 -CVE-2022-42716,0,0,e997a107c61b633a53ecde69fc780f405a16d3870fa74fcc32f647a1268a1723,2023-12-14T20:02:26.400000 +CVE-2022-42716,0,1,4705fba1711101272961c92c31f81ae01031bbc82880a8e937a9207b6a01fd52,2024-10-15T19:35:25.727000 CVE-2022-42717,0,0,e3bcfb08a93365d31eac7cf05e0f3cac57af88081b3bb0ff3d6786373b54159c,2023-08-08T14:21:49.707000 CVE-2022-42718,0,0,e7ef3cbe28d70c3eedc059ef27463f0cf13fb05f51fcfbce1be1f4bbc54dec0a,2022-12-06T15:41:52.600000 CVE-2022-42719,0,0,de7281539fa9a0fe0876114ee4b4db714a6d64cc5df275662cc25d2bb16cebcc,2023-11-07T03:53:24.857000 @@ -209735,7 +209735,7 @@ CVE-2022-45044,0,0,803554cd6e7551ef9fe93be947430fa642bd29a9865744e6bbe76fad2a5a9 CVE-2022-45045,0,0,0988c9110c5c33a2c170db03acf4107d6887428ae9710864a80db248253cac15,2022-12-06T15:50:37.127000 CVE-2022-45046,0,0,1de35eb14a19f7f6f23d1643119c63f0a7099d4349f88737629fa34915974228,2023-11-07T03:54:29.393000 CVE-2022-45047,0,0,8d0b7ebca38f0f1369d9ffdda0020ccf5de3b9a7e4f290085fa7a3e0d274f6f3,2024-02-16T13:15:09.513000 -CVE-2022-45048,0,0,c09c714005001530ca7e61ad623d3e9338f47f23a2c18c87f1683b8b9ebda43b,2023-05-11T14:26:43.060000 +CVE-2022-45048,0,1,d6b5e4e689837d594642e79790738cd8e0855bf21d6a43431c1e903e9fa71480,2024-10-15T19:35:26.733000 CVE-2022-45049,0,0,d98b08f41c9f4c9b8c17761481eb8da8fc31beca12133aa5d1d9a4f2dd4ed2d3,2023-01-11T03:04:59.823000 CVE-2022-4505,0,0,80acf6850bff297cdcdcde9e235f2ea50363cd8a843569ae0e7b3ec505ac1090,2023-07-11T08:15:10.283000 CVE-2022-45050,0,0,6a37ecc7452e165ad3ae682d972aa78274210ba552c1115ed44bbaf958414280,2023-01-09T17:12:50.767000 @@ -209808,7 +209808,7 @@ CVE-2022-45129,0,0,e0ac11d7c2ca3a183286127657bef5780bebed5e7e26ad473712e63f12077 CVE-2022-4513,0,0,a623e2548c4d198cab3b5e24a7879401cd60e6db3e6750b2a35aac31b8b19e14,2023-11-07T03:58:02.317000 CVE-2022-45130,0,0,1be36ef4e68d679c4e5a26f49234d0e7be7af22ec7ccfe192333d6b33618ba9e,2022-11-15T18:18:08.173000 CVE-2022-45132,0,0,266cf6e7ca80af05fb82f59632edcd6ff3f2aaf2090d78f0714b9ce6c20da608,2023-11-07T03:54:36.650000 -CVE-2022-45135,0,0,ba17cc024027c3452790963589aad35f48eedcd67e70bfa2bd3fa557b8cf15c1,2023-12-05T18:14:31.810000 +CVE-2022-45135,0,1,cd1ebe0ecbe42047ad7d8664cb00d0b1d39df99583598f23d7f932ea73274403,2024-10-15T18:35:03.893000 CVE-2022-45136,0,0,dd772858dd7886d445c3529154e08b61532301c2980961e154788a2b9cbdd8ce,2024-08-03T14:15:44.217000 CVE-2022-45137,0,0,73f176b2e87fd65174896043f76ee01f9aa425160bf34c9a021bd94852172979,2023-03-08T15:20:05.963000 CVE-2022-45138,0,0,56cdcb695833ac94db92e73442425c0756d3b4cb60ec5b71a9bd98ed7d826f47,2023-03-07T22:54:12.070000 @@ -210682,7 +210682,7 @@ CVE-2022-46360,0,0,4602e6b518b0120944ceca23a9344c907013ecfc3ae840b5afda4360d6d79 CVE-2022-46361,0,0,49b554b3a37307342b5a02775f9ce4a190cab7b95b34c7a5a2ffedac72757f07,2023-06-06T14:22:24.033000 CVE-2022-46363,0,0,822e9b13de8b999c1faaf71fab1f9b4dc526ba1a6f6cfaa3463b4b83f97c06a7,2023-11-07T03:55:35.590000 CVE-2022-46364,0,0,2cbff159f963a77b69c9323f51c0bc7e15122d9c5359c8e1ab6c4ec8a77ad469,2023-11-07T03:55:35.660000 -CVE-2022-46365,0,1,c15d2b4a04a8a89a9f92c0338cb6b19975945ea38f14691eef23a470aa0c7a3e,2024-10-15T17:35:01.787000 +CVE-2022-46365,0,0,c15d2b4a04a8a89a9f92c0338cb6b19975945ea38f14691eef23a470aa0c7a3e,2024-10-15T17:35:01.787000 CVE-2022-46366,0,0,4390dfb2cb71036922f5d4d8d0094b83142f5d99a119496b7153612fb3e131bd,2024-08-03T15:15:36.180000 CVE-2022-46367,0,0,dd20fccca5328181d501e8c7bda047b5e3b1d9a1fa0cb6065ca307ff0839af67,2023-01-20T17:37:26.593000 CVE-2022-46368,0,0,ef996c0212d69f3b2b105e50abd25d2ac665fa3f7d85dde4969b8c3c0efc1e18,2023-01-20T17:37:14.357000 @@ -213758,9 +213758,9 @@ CVE-2023-1214,0,0,59179375a3b2279560ddaaf5b915a98935f23a78c079fa70ad3b0eec98ac9c CVE-2023-1215,0,0,ab14e12eb6b8ffa21e623a0f34cc25d4af2eb9a714f9b8afdee9d43b67dd1c47,2023-03-11T02:40:11.190000 CVE-2023-1216,0,0,e0e19bbeb5ea35db350d09457b008dcf8d83249cf843c97cb3620e04daa2ebbd,2024-10-15T15:35:12.380000 CVE-2023-1217,0,0,f50a682f8cc1dd1120c48e10fc44ea556304c04753999b045304eb31c2ddcfaa,2023-03-11T02:39:48.537000 -CVE-2023-1218,0,1,252b76d820dbb797f087fef0170591f698e579a5b5b835522775d369ef05e705,2024-10-15T16:35:03.250000 -CVE-2023-1219,0,1,37c837357e89ca8214f51e71c705df7226bca05db7e1b708159b67fda83e9751,2024-10-15T16:35:04.020000 -CVE-2023-1220,0,1,944ede9d55447f193575d8fcd12c1f74d810142cd970fa8f62b851ab890fb999,2024-10-15T16:35:04.880000 +CVE-2023-1218,0,0,252b76d820dbb797f087fef0170591f698e579a5b5b835522775d369ef05e705,2024-10-15T16:35:03.250000 +CVE-2023-1219,0,0,37c837357e89ca8214f51e71c705df7226bca05db7e1b708159b67fda83e9751,2024-10-15T16:35:04.020000 +CVE-2023-1220,0,0,944ede9d55447f193575d8fcd12c1f74d810142cd970fa8f62b851ab890fb999,2024-10-15T16:35:04.880000 CVE-2023-1221,0,0,f18e400dfc0680f68802e6939c519c06d9d3cf47fb6439707c672de2d8bf79b4,2023-03-11T02:39:03.177000 CVE-2023-1222,0,0,190d0da05e93e72aeeebe8898c45012067f66d519dabac52f25cd78ef25d0d0e,2024-10-11T21:35:37.550000 CVE-2023-1223,0,0,948ee91eada12d7d20e5b2b1fb298c9e614c851df4f101d24d278c07dc3fa4af,2023-03-11T02:38:37.183000 @@ -220656,7 +220656,7 @@ CVE-2023-27526,0,0,90bba01935d8c50e0c427bc10053b381693c1dc56dd7a4e5673aca7143a7e CVE-2023-27527,0,0,51570319ea28f5ce4a1bb5e4f6c5711cb6c95ef9d30e45378de89d53283db5ef,2023-05-16T20:33:27.193000 CVE-2023-27529,0,0,6f2ed4737d00f1a28c49b76e39a9e2b76c4e559f222f4b425d71cb3e16dc39ef,2023-06-01T12:59:00.870000 CVE-2023-2753,0,0,3ec66932a5bcd9eed3481c511af0697f0ae6e6f569c9b289c3f6bd7b56f89f29,2023-05-24T15:18:44.767000 -CVE-2023-27530,0,0,c38846978790388683b6ff5664dc0f6fd23da91f30e3112909a3b69ee9e836c1,2023-12-08T22:15:07.603000 +CVE-2023-27530,0,1,a6b8da34011966b2aae235c9a5d48513cdef95567c0552e96e3b1236493190c0,2024-10-15T19:35:28.200000 CVE-2023-27532,0,0,8fe400f7f37baab3522ba179b9f004b37bcc03ae2fe7be01437ae18da205a037,2024-05-09T18:37:54.573000 CVE-2023-27533,0,0,ddcf75098269ad247e88d3b9d3ae4eddf0ff197e2c39d7fccf88edcf619ac976,2024-03-27T14:54:51.937000 CVE-2023-27534,0,0,8799fd2c76e137ac497a9e25f1c9a67a6eeb13d9dac7a39ee061d3c5fdaf7a86,2024-03-27T14:54:34.810000 @@ -222048,7 +222048,7 @@ CVE-2023-29069,0,0,7da2f0cc934da7b46c3ba113612a21be795cffa5b852be9cd57cdb7ee23c9 CVE-2023-2907,0,0,7a8a7461df46bc3013396fb374fd593f3139f8b31f4f0f4d13e861e1c45881f5,2023-06-29T17:10:00.027000 CVE-2023-29073,0,0,09fa9364a43ad1600713f8328c4939940145a5a1646913c5041c0d723065d532,2023-11-30T02:20:48.793000 CVE-2023-29074,0,0,30e84416b576d09a4f949476dc99d16dc0944ed6f5c1e4eca872247afa8f398f,2023-11-30T02:20:40.343000 -CVE-2023-29075,0,0,ddbd0cee6717035488bf97f9008a5e5b7b29d2b13e63c6438865130d31efbeaa,2023-11-30T02:20:10.977000 +CVE-2023-29075,0,1,51c3e8f462e6ab129d12634335476e6ee026ad8960305699dbe3f16ae63666fd,2024-10-15T18:35:05.263000 CVE-2023-29076,0,0,738196ea7eb05a83ccbf166531915bf6e3ecd99a353d13f5c275038287c98598,2023-11-30T02:19:53.027000 CVE-2023-29078,0,0,98f0a1df2914b755410c43b843273f3f9d7a3cbd24ceae31c365338749a6c3fd,2023-11-07T04:11:04.110000 CVE-2023-29079,0,0,edcf382a38e58cd59b2be67ba719f86a3e8b655dc0fc8f10eed674f74af76c31,2023-11-07T04:11:04.143000 @@ -223043,7 +223043,7 @@ CVE-2023-30570,0,0,32ae4e1289238527bea45856a5956c2666d0298df11b9014353bed6d1101f CVE-2023-30571,0,0,37bdef63b6140792b75b13cda177804470d747dbf58d1a00e95696797c0e43b8,2023-06-05T16:40:57.930000 CVE-2023-30575,0,0,453e9f14721a62fdcce101be7638faa38eafedbce10643f585d34009782ad1ce,2023-06-15T08:15:09.223000 CVE-2023-30576,0,0,a7beef98c4aaaa905d0d5c6034ba03cdb4e7ff8c323a7c6da61dd78d972b118d,2023-06-14T14:33:16.713000 -CVE-2023-30577,0,0,545749b2d6af0de8487bf303128bd274f5cfec0c086fb3a542d149f7fd574f53,2023-12-03T11:15:09.093000 +CVE-2023-30577,0,1,ca42116783f8ee4be277ed74592a45e2d496562e9eda457efa01613289b2a310,2024-10-15T19:35:29.413000 CVE-2023-3058,0,0,9f7c305f8337fa20576361292d1d535cd2135f70c208fde6ed8bf974c1470dc5,2024-05-17T02:27:14.193000 CVE-2023-30581,0,0,b156a6b818374eedaecff7e6959cc25150181fbf1ed9a43d050cab8b1b8a4335,2023-12-11T20:49:02.543000 CVE-2023-30582,0,0,7764763ecd07c5fb15156b35aae4db9eecddd9d0dcb2778caae4e418824f86ee,2024-09-09T19:35:01.063000 @@ -223454,8 +223454,8 @@ CVE-2023-31034,0,0,5fa25a427ce0daa80d54b5d167ab61c466dff79ba4104f1a297cee7d9fb5a CVE-2023-31035,0,0,e432bc0ff52bd04f4a521ebde8a42030c8c5b1748e9d5899bfa694370648c5f6,2024-01-19T13:32:06.080000 CVE-2023-31036,0,0,dc0d629ead54f3cccdd9157c0a020d8f0e8e35cabf6fe29f2bbb8a2a304e0663,2024-01-18T20:45:53.087000 CVE-2023-31037,0,0,b95f45a927f3745dc380a7b2d93c3b4568522ef25775c003ae4515027e079ad5,2024-01-31T20:11:28.867000 -CVE-2023-31038,0,0,7e7853254f5562040d249c1efcfe96d7c1113fe1c763f02bfaccd2038e539349,2023-05-15T16:10:47.323000 -CVE-2023-31039,0,0,580351c9d327f03afbf6c1fe033d211ffa5ac33d8f7428255b06f48a7d976c60,2023-05-12T02:03:27.397000 +CVE-2023-31038,0,1,a278f0f2e81202889e90ede99a7d3e3084a9f40435a2a643087d642eb0cd9fdf,2024-10-15T19:35:30.310000 +CVE-2023-31039,0,1,b200f78e2a866a9e8f61c044755eeaa2e429914f488f494f2efaa15dd03a5b91,2024-10-15T19:35:30.543000 CVE-2023-3104,0,0,8b6f4c6f48b1b62bf61458ce539caf79c30a1810a33592d01a47a4eba574dee9,2024-08-02T07:15:47.150000 CVE-2023-31041,0,0,d3f74113b8e24fb7c0c0ea099f9f16d14e383fd28713189dea1c7477de7e468c,2023-08-24T21:26:16.843000 CVE-2023-31042,0,0,e9e4089fb29b1dd553ccbf7459726b99b949b96ffd3c665020bf1be4ec17b111,2023-10-05T15:46:26.893000 @@ -224058,7 +224058,7 @@ CVE-2023-32003,0,0,61aa2cf05fc68219dcd3a0f1788eeefc22cd565c423346515dd9cef18f810 CVE-2023-32004,0,0,2f65f459b49d361d9730cc89e29c811cca8e3b0fbe8de40726919f20873ab2fa,2023-09-15T14:15:10.010000 CVE-2023-32005,0,0,932d47577f634f904c83223001a6f212bbb60744045087ba240044f21a08c88b,2023-12-22T17:07:29.110000 CVE-2023-32006,0,0,c8a5cb8ae876b507e0415003b3ecc178591f6426233c650a4050dca8bc183a38,2023-09-15T14:15:10.087000 -CVE-2023-32007,0,0,7ed1eb16aa2b0bb30b2a043d48d71f814263ef896be4239fdc02a03ac1af34b4,2023-05-10T20:16:41.367000 +CVE-2023-32007,0,1,5c35865adee1fe07d55a3b831ef8dd5e1dbf9074f9e57414263b25f2b45df0a7,2024-10-15T18:35:05.553000 CVE-2023-32008,0,0,1a7f71b8a1ea61d01db3f32a6c59f55cafb04a1e9f83c9cd16eb172ebe789ba6,2024-05-29T02:15:44.807000 CVE-2023-32009,0,0,473230b495c85d07b7366a260b477b20bb42c0c381cff45d66a58d8ba5bd2e80,2024-05-29T02:15:44.973000 CVE-2023-3201,0,0,05e9a1198820b29c4fcf047e63c08f3747e0e0f79b2b500047a90f12bcc8d461,2023-11-07T04:18:12.573000 @@ -227214,7 +227214,7 @@ CVE-2023-36183,0,0,54562b882596582c43463f5c4105d7c02e40d30428cf14d6280e6bdce32ba CVE-2023-36184,0,0,498fe11ffca9cf3bb428a3670da2c8bc5899a2de7f5c6c1fd2b917b8dac3d1b6,2023-11-07T04:16:24.190000 CVE-2023-36187,0,0,130002987340aaae852e57d0c6d11a41ac1a90b3fde98b515cdc68bc7a38df5a,2023-09-07T17:05:35.237000 CVE-2023-36188,0,0,54930d0be408cfd69be0eac3183f0b9049941734a2d1cb35388d8bd3b36faa63,2023-07-12T18:34:19.300000 -CVE-2023-36189,0,0,97ad4df4dc014aac9b3d3d86906d9a9a7834b360112eb04a4cc8eaf3a6d34c4c,2023-12-26T18:15:07.903000 +CVE-2023-36189,0,1,73a815f70f51c8046220523bcb04e8411ffedb80385a832e8de6f8d5211911a9,2024-10-15T19:35:31.520000 CVE-2023-3619,0,0,9e5a6671ba246b70b4db8758cf5038a1eb286a0744b4ce51180ad578d887b078,2024-05-17T02:27:38.937000 CVE-2023-36191,0,0,00823ae71a62d0bb6e7f2fb1d27dd3732d8062dc7b6b9a8e738d16fe53c35c5c,2023-11-07T04:16:25.153000 CVE-2023-36192,0,0,1d8a5dccf4cade4ac929d84234ad33b0556786568b0a7035dab8871dacf1df3f,2023-06-30T16:41:14.160000 @@ -227261,7 +227261,7 @@ CVE-2023-36272,0,0,b40f5b0a455b9096df3ff383271d067f7a04c5792cad2e87f448c1960a80d CVE-2023-36273,0,0,862b00fa51e6f8f234d86825426ea6dc4831ed884e5f0942c6527d81dbd77a8a,2023-06-27T12:42:21.960000 CVE-2023-36274,0,0,0f2d05843a8f7063cc1bdd13b623a0e15f80cafab11dd19ff804b8beaacaa01d,2023-06-27T12:41:05.803000 CVE-2023-3628,0,0,92b3fb7cbec239c0b5b2cddfe0679b5d5a416e4b1488bcc89010bb714faecb81,2024-09-16T14:15:11.667000 -CVE-2023-36281,0,1,2249deb993bac3fb52df9eeea8be068838b049e0df384e0f6ca9856ee84ec4d1,2024-10-15T17:35:03.180000 +CVE-2023-36281,0,0,2249deb993bac3fb52df9eeea8be068838b049e0df384e0f6ca9856ee84ec4d1,2024-10-15T17:35:03.180000 CVE-2023-36284,0,0,c75831a07c181634ec17ed63af6f8bff4c2e6d5d361f74cb14494efba21ab22e,2023-06-30T07:58:35.530000 CVE-2023-36287,0,0,f49b835bac714b26ae9739952b8e59ac5c026e80ab82e3ceb7e4b67b223474b5,2023-06-29T20:41:22.900000 CVE-2023-36288,0,0,f4afcb6dbfa0585fbaee1ec4fbf9659d3e3df42df99d9bfd68c8b5a595635978,2023-06-29T20:40:42.003000 @@ -227948,7 +227948,7 @@ CVE-2023-3720,0,0,1ca03330ff4ebdad4c7a09ab89eb29f9b34da48545a17a2785bbb54a336312 CVE-2023-37200,0,0,3aad1ead99a8e32d973a13a68cd7a04a88370e22fdf2d9f697aaad7be108a68d,2023-07-20T00:35:09.917000 CVE-2023-37201,0,0,6b83bb2cc1f577d3379f8eb875e5ccd49e1a9788df963832fbf7a183ff01a483,2023-07-12T10:15:10.230000 CVE-2023-37202,0,0,2aa7aa02c0ba91581e181648a7bcc0c653a449039bd38fc23bedb8890c7ff74d,2023-07-12T10:15:10.350000 -CVE-2023-37203,0,0,e7ce3ad52c4959a7758db939379675c0107841cdd39c5277394618cefc63b3b6,2024-01-07T11:15:12.023000 +CVE-2023-37203,0,1,fef459d54677bb7db18ed02ec063c82b5e687c75a9778c5b2bd9b24228fe38fc,2024-10-15T19:35:32.430000 CVE-2023-37204,0,0,dd23e9c17c8f6babe82a859b37ccffe74e3eefe9ee11ef10d845e3965beda6cb,2024-01-07T11:15:12.120000 CVE-2023-37205,0,0,5d90666504e1d182da1091446956ac113a76c2b14b005aed016a92ea06683737,2024-01-07T11:15:12.190000 CVE-2023-37206,0,0,46342560d6b14d815fec53553b775166405fb0a3d0afbfdf0d75cb161aba0357,2024-01-07T11:15:12.283000 @@ -228991,7 +228991,7 @@ CVE-2023-38404,0,0,902ddf5ac3ca2946c3aa751a963d2fe56e9b643da3d7f28aa15700e00eda6 CVE-2023-38405,0,0,eb678e1398b0cc7afc6cadec898dca16e86921fb7075e187826e227511830ad9,2023-07-27T03:46:14.810000 CVE-2023-38406,0,0,b4e9fee11e6ca1b95b528449b15c85e7b4af1b868f84535cfe760130604cc642,2024-04-28T07:15:08.367000 CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 -CVE-2023-38408,0,0,aa067bcc02ee91438beef6886c441906ea0c381190b234c5874efece893144eb,2024-04-04T06:15:08.430000 +CVE-2023-38408,0,1,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000 CVE-2023-38409,0,0,838e08b6ac7468e45b0e0743452ec8eac55d08ae6cebd5146f7b96ce40e80d8e,2023-07-27T03:49:09.943000 CVE-2023-3841,0,0,d2f5ee23f09965afeb5d36623db7f402f898f5d6074e3d1a8c3e15639396c726,2024-05-17T02:27:52.550000 CVE-2023-38410,0,0,e9274a8c2977bf03cf0d0c7f2c3582424b089bd5b319bd6a98b407cf6ad77a9e,2023-08-01T19:54:15.847000 @@ -229009,7 +229009,7 @@ CVE-2023-38424,0,0,99fd4ff2cd45804a279009f8e79f45c2460852535d8a9d8c3b2de5ec9e04f CVE-2023-38425,0,0,be85cd1ba5ce4b3dab7a781196e893038fb93c2e7aabf5cf3e9b4428db2d2348,2023-08-03T13:52:43.773000 CVE-2023-38426,0,0,8be487c14d40f4026f898666c19e3292110c6d2186b99164ce31fa560af60242,2023-12-22T17:04:16.507000 CVE-2023-38427,0,0,f05b1b68284c205ab455c4a149a75bc8fc293184ccf2be2285c37de8eae7eb94,2024-08-27T18:54:08.123000 -CVE-2023-38428,0,0,f4a809af0e056508b7dfda0d80316548cac1608ce4a052dac3c5396d76d366ce,2023-12-15T15:47:05.687000 +CVE-2023-38428,0,1,375e75c46a43c6a3875664c4403ac19dd3e6d226b31ffaf168efc17a264f8616,2024-10-15T19:35:33.587000 CVE-2023-38429,0,0,806bfaee2c26630261e30d4b617ecf5e71aca09cbfffc25cc02a6c4e45bafa10,2023-12-22T21:34:39.870000 CVE-2023-3843,0,0,f3768772f60b965aa9498137bd66ecdccef50ca14144b9e479bd7aa1ea659164,2024-05-17T02:27:52.767000 CVE-2023-38430,0,0,f3010dea503abff1cfd675939731309587295c43eef70a09f838c33e10b5b5d8,2024-06-18T15:10:09.290000 @@ -230179,7 +230179,7 @@ CVE-2023-39966,0,0,c5dd0a6aec9d4aa1d397a8d8e714a2e1c27d86c17c97f295844f17f70a93c CVE-2023-39967,0,0,ae0d31e50c7c32eb189851841b9266bdf847b57a25fec0aa33492f6d0fc62223,2023-09-13T12:42:37.057000 CVE-2023-39968,0,0,ba5ffd3a755e803553f689e664ca470d470bf2a69e684828049a9f7ea7ac01b6,2023-09-15T22:15:14.217000 CVE-2023-39969,0,0,3a6b8f892432a96e36442551910e26c57b3b61e40eccd9ab8dee84cd4502cc89,2023-08-16T17:12:53.300000 -CVE-2023-3997,0,0,2e0c03c14e67fb178412e691a72daf3bf289255a682cdc5cd1e7bb51c3591278,2024-04-10T01:15:15.117000 +CVE-2023-3997,0,1,91ca3eb1595160e2a5d694f6360ea70cb38146af23de50645318c5c37bddcf2d,2024-10-15T19:15:16.200000 CVE-2023-39970,0,0,bb21001446f839220f5969dcda80be1e71b8e426712b7408673a0298889a4538,2023-08-23T17:39:56.180000 CVE-2023-39971,0,0,a947e48522049e989dfd2207442866b8db610de410f20becba059163cc4c0fb8,2023-12-02T01:15:08.287000 CVE-2023-39972,0,0,3be1a709c12904acde874dbe1827101e29037ae95c88070074639e37de5f5cce,2023-08-24T18:05:21.913000 @@ -233654,7 +233654,7 @@ CVE-2023-4480,0,0,8f720a32700f0dcf88298f81723ae2c513370bf9c361e1a327c21e8404982f CVE-2023-44807,0,0,cc9fa087fd498d5c0142310406c2f8e5ac715823650cae019eedc78dd30884f7,2023-10-10T20:16:41.627000 CVE-2023-44808,0,0,c21fe1fd44aeea6fd1f5d97f8e40c85ef4c9aad99cada000af1d2e25b8ea1a26,2023-10-19T11:11:35.753000 CVE-2023-44809,0,0,106ef081b5af79dc53d4bc479d0aa2e275e4760b3cc08b2cab3264d7a797d158,2024-09-17T02:35:28.503000 -CVE-2023-4481,0,1,e5c1dbac6485fdc3f8433d7bacdb081c57e29eadaf2f516d5e233feb4d53a038,2024-10-15T17:33:02 +CVE-2023-4481,0,0,e5c1dbac6485fdc3f8433d7bacdb081c57e29eadaf2f516d5e233feb4d53a038,2024-10-15T17:33:02 CVE-2023-44811,0,0,0fdedc6bc111ea9a02c62f8daaeff83c589b5ca14424d7f2de79dccf9ac38af2,2023-10-11T20:06:27.410000 CVE-2023-44812,0,0,54d24d8a8649398546bc69de6f53c9b08c93a76ddc19c43fa225b2d394f3bb24,2023-10-11T20:00:04.033000 CVE-2023-44813,0,0,e4aa38d88de0406751f5d82932d7709b2c42f855dfd3b491016e37100dc99415,2023-10-11T19:58:17.857000 @@ -234030,7 +234030,7 @@ CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5 CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 CVE-2023-45361,0,0,cbe1837117bae77cfa7c8113ef4bff14da0fe193bd049419020e7f971bbde8da,2024-10-10T12:51:56.987000 CVE-2023-45362,0,0,6a324f41b6301bc393e4e53b7fe2d3c213070e5c36f11f2203dcccfc20038a9d,2024-06-10T17:16:14.220000 -CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694240,2023-11-28T13:15:07.313000 +CVE-2023-45363,0,1,355fc5f232bf1e41d622931e8e0fa5fff2ffd211e1fe3e75c8946b919ef7f3a9,2024-10-15T18:35:06.707000 CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000 CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000 CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000 @@ -234066,7 +234066,7 @@ CVE-2023-4543,0,0,dc1ba3a33cff31b8fca78e8cb21ccb021964ab63d67083a56dc6088e7b3319 CVE-2023-4544,0,0,66678644f5a46dafda162d852e01208919798bc2eea8520b8083f0782a62c9e6,2024-05-17T02:31:38.500000 CVE-2023-4545,0,0,5094a10071b5d5056e6f60e262b3febe432e4176bd6515e9eb7db9cc518aaf27,2024-05-17T02:31:38.600000 CVE-2023-4546,0,0,fb1125db61b39cbad44dc327e25d0286799298f14003739d8954476eaa2b4478,2024-05-17T02:31:38.700000 -CVE-2023-45463,0,0,3510bfcdc87a2c6260344eb43bed2dd8b69f04115444704654eb7d4ae4288d45,2023-12-08T21:01:43.550000 +CVE-2023-45463,0,1,9a78f4d0c8b60857252fea436d15ef84513884af739bee3fed98f637e0f511b0,2024-10-15T18:35:08.103000 CVE-2023-45464,0,0,9884346d6a54efd33ad0403f2fae16c7bcf0ac34b9ae12386f58aef94fecf27d,2023-10-19T13:27:25.730000 CVE-2023-45465,0,0,11939030ce4eb60d36017d66f280d06015e01b5a936b89674c2cd009eaa75136,2023-10-19T13:18:38.903000 CVE-2023-45466,0,0,e19a332c24420755e29bdc00eb4f026cc2eead002eeae82e40fa92694ac9d222,2023-10-16T18:41:36.367000 @@ -234092,7 +234092,7 @@ CVE-2023-45510,0,0,95ec13089e5a8f1f6f38bec4a800643c30de82e9ef02421078bf52c52538a CVE-2023-45511,0,0,6a83b3b6e8ef3421fb625ab6b3efe4a060ef6fdb1aa115c72fc3336b2273558b,2024-09-19T02:35:26.067000 CVE-2023-4552,0,0,f0537603c3e5921898d4c4486b214591cfc8340feaf410d7a71774714a6fb778,2024-02-05T21:59:35.087000 CVE-2023-4553,0,0,7f7b3a1004c52632b83f35e4ed5b600ac3f6bf55e8037452043bd49f8b38d638,2024-02-05T21:56:14.073000 -CVE-2023-45539,0,0,14e5807e2e545a12b44e0f4dc1ccdba533d2f724acf1b5d66372955165f5d45d,2023-12-14T17:15:07.860000 +CVE-2023-45539,0,1,b9b4ee3af81befee503a260383b848c3b499e8e8720b40b3848220ebe0551075,2024-10-15T18:35:08.890000 CVE-2023-4554,0,0,cf6e0493fabcb0eae28fa5204b10744a5f3d57423632a868834aac6bfc68065b,2024-02-05T21:24:36.410000 CVE-2023-45540,0,0,f9fa54d48e396850cd644dcfc14b11c3a5b9baa24fe488931741460c67fc5d90,2023-10-20T16:39:15.033000 CVE-2023-45542,0,0,b9354eb52840255b735a9b8f8af4d37bbb9c5799afb10666e715844b295ab72c,2023-10-19T17:56:38.130000 @@ -234238,7 +234238,7 @@ CVE-2023-45703,0,0,070556f7cdea4e2addb11676672b324dd42d5030b84172af518bfffd1b6c3 CVE-2023-45705,0,0,d1579cdf15cf92ecd2427576da99f9ba06dccb4858fdaa9197aca556facb2f0b,2024-03-28T16:07:30.893000 CVE-2023-45706,0,0,d5dc82953bacdf7e8692c6cee3f5b9e98683974171515533c84fee346772acc6,2024-03-28T16:07:30.893000 CVE-2023-45707,0,0,c9b6196c79b5d00c9329a89273abfc5e4f68dd2d284703e16af7a7bd88eb0240,2024-07-03T01:41:54.823000 -CVE-2023-4571,0,0,92ce5017693d8f76d50711a158af46c583ba7c6561a65e75de43de382d903662,2024-04-10T01:15:17.183000 +CVE-2023-4571,0,1,8443fc50273dfda29496cebed5d56f9ac194ad2e3c5671055eb503b739aefb15,2024-10-15T19:15:16.617000 CVE-2023-45715,0,0,3278c072bd924465dfd9116ec5360f462dea3279fa22b565085ccb5501f7df77,2024-03-28T16:07:30.893000 CVE-2023-45716,0,0,db0d44612bd142c520992fd82eb862661776e524392c1075202fb819e27d77c1,2024-02-26T21:22:54.537000 CVE-2023-45718,0,0,503b94f26ece1372afe2befc1749228de6ec2a3a2f622ed4183f733f3d6e1b85,2024-09-05T13:14:01.253000 @@ -234307,7 +234307,7 @@ CVE-2023-45799,0,0,188b0f83d7878ae47b8098f969f768cf869e50e3dea08b261f247126db8b5 CVE-2023-4580,0,0,a57c3e7664e688b156820bd4b918e3f8486072b2b6add09845f38021feffdaf5,2023-09-14T03:53:15.150000 CVE-2023-45800,0,0,f496ca2530efaf7c1db1169c548eb0572c2c7fa0dc16de92c9d8b65231aa37ad,2023-12-15T18:50:06.017000 CVE-2023-45801,0,0,cf65d978a57bbdd5cf197844da19475d7658c7088a3bc16263e469fcf01449d6,2023-12-15T17:12:58.397000 -CVE-2023-45802,0,0,8b3cdecaad63513060b2cc217b8caa27800f29debb41e85c772f92c84e24b817,2024-10-14T09:15:02.967000 +CVE-2023-45802,0,1,09b74e4a217ba14073d80c83bfe062d5ee5b7e02e2c72c2e4450da1fa0048906,2024-10-15T18:42:31.357000 CVE-2023-45803,0,0,23b8cbd7f626523fc6c08c975e564a6e86c86fc0e31e897720bf93e28c1eefe1,2023-11-03T22:15:11.693000 CVE-2023-45804,0,0,dc3dcadd1fa31289495558cbc9b18ddf506c53bed3ec877dd82065d35e3d6f57,2023-11-07T04:21:48.277000 CVE-2023-45805,0,0,513f366112bde8fc8e42fbdfa66a39be7b5c9845822dfc13910fb1d740f25275,2023-10-28T03:24:28.190000 @@ -235186,7 +235186,7 @@ CVE-2023-46951,0,0,a2a1149009673701bfe93ebcee7c48a3a58110ed1168d2bfdf50f80a7f0c0 CVE-2023-46952,0,0,4bcf3948e8ecb1744ce911545c8fe6c861e6c40af1d5cc477719602d32e4f796,2024-01-23T21:44:21.433000 CVE-2023-46953,0,0,a872c64c0c4c630030a60d7892d6bcb58eb0d3a3b33b50c7787cc33ab267e7ac,2024-01-11T17:06:37.437000 CVE-2023-46954,0,0,027d3e8eb2a616e66ceedcb4a181a859da01b616cab639574d99af94762dbf8e,2024-09-06T17:35:01.953000 -CVE-2023-46956,0,0,31cbd0a04e29ac22bd9f823d3179040618ffc4e9e1a4e90764004517af632bb2,2023-12-06T18:39:39.687000 +CVE-2023-46956,0,1,2526c98583f5cb1d344e6399b829c1d7032935dea1897c631f9e7d92b2a01108,2024-10-15T18:35:09.673000 CVE-2023-46958,0,0,598349dfda94719665577de5fe0aa92d56da1b66528cb3b507f9540b0549c2e6,2024-09-06T14:35:08.110000 CVE-2023-4696,0,0,c17d353a65b5fe55231e71fd5dd8d9e90c20a1609f561de61d8d7b05e4fee642,2023-09-01T13:06:59.890000 CVE-2023-46960,0,0,60db2322c4a9b765f494d0ebafcd8efdc2e2d2d8adcbfbca9f64c33ec63e600d,2024-08-01T13:45:04.950000 @@ -236429,7 +236429,7 @@ CVE-2023-48651,0,0,3f057a7afdd285e7554b0b6c284d29d42d3ba941fa604744fc1323c88db54 CVE-2023-48652,0,0,30b28f5f6b93a46b2c1ce1f52cf168a633e5c34fa669bcb9ecb58b95d6522d89,2023-12-29T05:55:24.390000 CVE-2023-48653,0,0,4fb6e7a0b008e20f51ef4f63111fbf9fd0f0079e0ab2a1dc1103c7b617dc71ee,2024-02-29T13:49:47.277000 CVE-2023-48654,0,0,0b3b3102ce95f91c22905aa8f0c132cc56aba7398dff3c49066ba8dfc7f41451,2024-01-03T20:54:40.840000 -CVE-2023-48655,0,0,32d07d4d98f6f91cf7110695bc0f0d5560deaae915ec1bc7979ae136176088ee,2024-01-10T00:15:45.530000 +CVE-2023-48655,0,1,3aabd822ee44ed91334c6908392362a5f10f9c820ec96a8071366621f0e3c6b8,2024-10-15T18:35:10.453000 CVE-2023-48656,0,0,4491ef8244b3a516fc90d018e6fde5397fdcf13d8bed3ec3a4791b68d1f4b1f8,2024-01-10T00:15:45.627000 CVE-2023-48657,0,0,4d5ad332b04fdd82aa860b75ce703a807f1db2387fc2d1d764cadab3e7a52a5c,2024-01-10T00:15:45.697000 CVE-2023-48658,0,0,e82fed3d9ed202c99ba234764f4a940d593822fcfe2e74b2ca4a927a3db4f761,2024-01-10T00:15:45.780000 @@ -236601,7 +236601,7 @@ CVE-2023-4884,0,0,cfbecc9b7cb6cbd0b4b1362ef48e959396e0c75ee9945389f4dfeb8d9f826a CVE-2023-48840,0,0,66507f89762cce8058d30fe903be3d25aa0326032ad749eddab90f58dfe5e1f6,2023-12-09T04:46:03.793000 CVE-2023-48841,0,0,a98679f76431dcf6326a4f8961979545584bd793a405fa03c3999d29af747aba,2024-10-09T15:35:09.740000 CVE-2023-48842,0,0,99ae820b733e6276d6aa35a1a60ab7d466debfd9a079b7690c967b25c7e87d0d,2023-12-06T18:54:07.467000 -CVE-2023-48848,0,0,6104d81c07dc162ba8030e44033fb5f9f2b6b25c8fdd6ce70f4501237665e04f,2023-12-04T19:05:42.390000 +CVE-2023-48848,0,1,e9dca9c0d63c1eb039bf47ed52632a0af1e0c2a089d537841789922521ea6ad0,2024-10-15T18:35:11.340000 CVE-2023-48849,0,0,2253543c611d2e3acc680e128d1321413ba686970c36c4ae9ebbfec5b2a9273d,2023-12-11T16:18:06.687000 CVE-2023-4885,0,0,b2886bf75dd8aeea5a7e4b1b6590ad94e6642e0e312579090bc490039b601938,2023-10-05T00:57:17.943000 CVE-2023-48858,0,0,f7bef58909aa98ac653b8350d9c446ced9ed809586d0f82043ffb04744211c78,2024-01-24T20:16:53.197000 @@ -236630,7 +236630,7 @@ CVE-2023-48903,0,0,c36eea55d7ebb58b6550658aa069864d729af997931b2f0f1cd8f0bd7c2c2 CVE-2023-48906,0,0,dcf61e4baeea39a70a46cf16ef25f7d94c12ff2d2949997b5a61f61056a26263,2024-04-02T12:50:42.233000 CVE-2023-48909,0,0,6e26fded8220754411f0b0c0969e60ad89d13528c1e447cb4c30f373b2f2fd1f,2024-01-22T16:33:28.663000 CVE-2023-4891,0,0,518501d9fad12c9ba0655a11e9a287ce14b36fbcb904c6e98df8ddbd16b3fc84,2023-11-16T18:01:59.767000 -CVE-2023-48910,0,0,e96f6ed6022459c2cdcf45f692175ebeba1cadf0d1ce60155df5c2f8b76a1591,2023-12-07T21:02:12.637000 +CVE-2023-48910,0,1,059e3303b5f5870784eaca4274404a7f4379993c2d106b460273a0c44ee1022e,2024-10-15T18:35:12.120000 CVE-2023-48912,0,0,3e44b44d8c36623152dbf778c1bd6b4d6975114ac15e1ef6e92dfb4947cc5a99,2023-12-05T20:07:27.620000 CVE-2023-48913,0,0,3113a871c852c204f0705f6536a463b4b18ffc49c61dd56d51083e9768834811,2023-12-05T20:10:04.053000 CVE-2023-48914,0,0,f62ce7097dc2f1dc959323c678c29edb1633195083f560ff982632d82d4b0610,2023-12-05T20:08:48.207000 @@ -242965,7 +242965,7 @@ CVE-2024-1869,0,0,3998fca9aba65da3032051bba49c4c7fbbed3ad27cf86d29260ce751b65a61 CVE-2024-1870,0,0,9043a976525f352aaa6c3d9729ba890eb6378250a18455d48857378e562c62f9,2024-03-11T01:32:29.610000 CVE-2024-1871,0,0,3febb3fff07b16e51c21f3b87748727e6cb83597ff7d412acb640471d56a308d,2024-05-17T02:35:39.620000 CVE-2024-1872,0,0,aa7a68ee0f5f23cfde15f81a4ee68e0aba9fc68928dc131f7d1904269d9689ce,2024-03-29T12:45:02.937000 -CVE-2024-1873,0,0,f263a4f5306a6c00e4089baff2ff7c677aae5fedd4deda225a2c446b8d585908,2024-06-07T14:56:05.647000 +CVE-2024-1873,0,1,48ba33ce47bb197174bf426612a0767c59b5459a927dfd6b91332949526c3c92,2024-10-15T19:14:09.547000 CVE-2024-1874,0,0,b3d82a78aae87d3aff2d8730cda3de5c4eb1ff6a7a168fbf4393adaad2eb2b3f,2024-06-13T04:15:16.157000 CVE-2024-1875,0,0,a69a70937681edd3d5184a4fd13b8b71713c44ac42ff9a8634ede759dab371d6,2024-05-17T02:35:39.780000 CVE-2024-1876,0,0,e8e0571c659b0fa787427894c4b874422cd76362527c553c866da3c23dcf7847,2024-05-17T02:35:39.867000 @@ -244860,7 +244860,7 @@ CVE-2024-22318,0,0,23961be1d55db1add7e5c07e52a10b572ea2445d12113c47c48e0f1ac8215 CVE-2024-22319,0,0,ea19cdf9e4072a8b9cfc9502b925f062e7b8a96ab088ba79c4019077bc3c20e6,2024-03-21T02:52:02.483000 CVE-2024-2232,0,0,eb55e6d1211c43c7498854b3b8820fe2f01b88d448661718d29c577fdabad9d6,2024-08-07T14:35:01.727000 CVE-2024-22320,0,0,ec85534fc104e628cf2f58dee5a98a0a436bfe75ddbc94f8841f4752e5e01ce2,2024-03-21T02:52:02.607000 -CVE-2024-22326,0,0,b3eaceedec16b8a3de1cf940d604f1e18610d5b396997267a191f16e42ff711e,2024-06-07T14:56:05.647000 +CVE-2024-22326,0,1,0b9083c74a3b6261928ae256538efe0ffc9696087bfcb2cd57b40a111b96cf5d,2024-10-15T19:51:10.393000 CVE-2024-22328,0,0,a39f02e34baf95d793f8f0fc19cf685bee17730011f4e69feb7fe01d897a8992,2024-04-08T18:48:40.217000 CVE-2024-22329,0,0,aa0a912726f87ac0fc2f03e4f48cf9b56180a47c1f55734bdb4c9a367e28989d,2024-04-17T12:48:07.510000 CVE-2024-2233,0,0,64d5f0d00597a950fc292ee037f4f02af319aec097e9756db9a22b729db28750,2024-07-08T14:18:11.917000 @@ -246479,9 +246479,9 @@ CVE-2024-24875,0,0,d4175d9d145d2e6aa042e46e11e97f48819e638c38138d0ec209148e9f744 CVE-2024-24876,0,0,fd2b02565d60f44ad7f12138fcc8688af9116be3df3cfc2409498788186c00a9,2024-02-22T19:07:27.197000 CVE-2024-24877,0,0,9d2f0e7fc46543edf49748fb4f8f8be67b4fb86dc6a0325358bf368765aade7c,2024-02-15T02:53:41.823000 CVE-2024-24878,0,0,298a08ab82a5bf3a5e1905d2bd2b0b3a16b15c92c4d573ce5c55312b22ff7afa,2024-02-15T03:01:50.883000 -CVE-2024-24879,0,0,bf6b13e3233057aaea0d59bba3f9d4b670c9c80198928f79e24fcebaa00a210e,2024-02-08T13:44:11.750000 +CVE-2024-24879,0,1,1422cad3ad9accd9aa029eb9d1c62dbe9e3a36357966aceb9c265cb2245cb4ff,2024-10-15T19:39:30.157000 CVE-2024-2488,0,0,9f9545c282e96006573210a989f186c5df3154a3513e0af714a0d9e2892e8aac,2024-05-17T02:38:15.413000 -CVE-2024-24880,0,0,70ad5aab83df57ce9217f3bc641d9386a6067eebf334b2d7ba7e24c2c6f354fb,2024-02-08T13:44:11.750000 +CVE-2024-24880,0,1,417f1620a783691d55294b271631d28b4b974c4f2048f45d9f97fd0cbadb67a0,2024-10-15T19:41:39.670000 CVE-2024-24881,0,0,83232d9aad9f81c612eac50a505c74c916726b151a429d494f39905108d0a162,2024-10-09T16:28:32.153000 CVE-2024-24882,0,0,381ab78a9a0af97941fd74c6df8e310e9ebd0e71a36f326d7eada32431ec60f2,2024-05-17T18:36:05.263000 CVE-2024-24883,0,0,da5a0962c7cfdbb418c545bab7733305dd100d1fcb6e77a25a1017edf709a327,2024-04-11T12:47:44.137000 @@ -247493,7 +247493,7 @@ CVE-2024-26236,0,0,19d5aae98ae95db4c4d70f418437d84d96fc7ffa6eb3fc6e960d1fb32f039 CVE-2024-26237,0,0,4a5a46dfbaa9ee757c266cb06f5bdd3b7c9c9212350e3b3f940b0f5aa28b1fa2,2024-04-10T13:24:00.070000 CVE-2024-26238,0,0,f51ff6c77a18790c6e3fbd5916b9e4339c1fbba58d3f9a7dc1403152bf549147,2024-05-14T19:17:55.627000 CVE-2024-26239,0,0,b6bef41140cc2fe190d67ae538417b420d577a7d3675c65900e55846e1dc5504,2024-04-10T13:24:00.070000 -CVE-2024-2624,0,0,9d29efc17e6364740a6798ed3ebc8be6debf3940cacd2e3ec7a7a0de154ad1a1,2024-06-07T14:56:05.647000 +CVE-2024-2624,0,1,f8883c0ffc3c07e08d49666aeea251af0b4d5d0067045e6b3090117c94be39af,2024-10-15T18:49:16.667000 CVE-2024-26240,0,0,469d109d7f6dbe34081d9860472aff3b4e252c2c74e78521b270d4e97c1e526f,2024-04-10T13:24:00.070000 CVE-2024-26241,0,0,ad49425919c070a9631331db70a22ebb9d6d5ba3446192474b9ed36e91182f09,2024-04-10T13:24:00.070000 CVE-2024-26242,0,0,87be43bdf41cad376dd7ec9618b8c7069b8c8b4a0eda2f8823d78d95a17b33c7,2024-04-10T13:24:00.070000 @@ -249917,7 +249917,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7 CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000 CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 -CVE-2024-2965,0,0,e178a5677ff509b758e925bb6981e960414ae7e25d8c6ced56d5c9529602efc8,2024-06-25T11:15:49.873000 +CVE-2024-2965,0,1,33064d8404a1f414503cee7ae4d0f3de7144ff0f58588fb6c3798d949ec71919,2024-10-15T18:55:04.863000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000 CVE-2024-2966,0,0,400ebec10c52dfe133448a888edcb5c95faf833eae277c5e987b3dc9ba62c6f2,2024-04-11T12:47:44.137000 @@ -250164,7 +250164,7 @@ CVE-2024-29941,0,0,5268fd2170dfcdffdb652336d23b2a74b8e628a596ea4475ef9d929015e3f CVE-2024-29943,0,0,77fce75b3b79190c7987459c64d58a0451f9c8cb7178727b76412299d4b63e02,2024-08-12T17:35:03.860000 CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139be6,2024-08-27T18:35:09.073000 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 -CVE-2024-29946,0,0,140bcfc073bda94d7ef4639048c1485e5634c470063153e21df7be99b584ee7c,2024-08-12T20:35:03.383000 +CVE-2024-29946,0,1,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000 CVE-2024-29947,0,0,5ce72939d2768b5ffd8ef75fa59eeac4277e1fd0f98f69cde2fd39c4873b7e51,2024-04-02T12:50:42.233000 CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000 CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000 @@ -250573,7 +250573,7 @@ CVE-2024-30369,0,0,084ebabb6bba6f65e3a665faf08cf2442ac42f59e1585ca47c68653967d4e CVE-2024-3037,0,0,5192283ef3f0b9026a4bd8ad8d1a7b79d0e8030dc3224136afdfcbc8af6dad6b,2024-09-26T02:15:02.277000 CVE-2024-30370,0,0,6207ecfb3ab83effd5b69f8ad0454d61dd1c4b620444f7bf5bed75b59a7e9bf2,2024-04-03T12:38:04.840000 CVE-2024-30371,0,0,5cb1f88df7d7d6dd29afc1f981808ff71d5fa01260db76282c78c8209c6570fc,2024-04-03T12:38:04.840000 -CVE-2024-30373,0,0,d55376e4b21a73ffd899f3f3f278ea14c11108d98d740fdf1d6c4014999d9779,2024-06-07T14:56:05.647000 +CVE-2024-30373,0,1,fd6dad9f528d4b818b9cd3b70c19f394231e81452601d5b071c636fca6b844b9,2024-10-15T18:23:52.207000 CVE-2024-30374,0,0,4a829013b3c1a4609a76f5790d534eb221b5942a8caf978bc6991bfee50c426e,2024-09-26T14:22:20.047000 CVE-2024-30375,0,0,e38288bbc33b00a1927d2243b199eacbf12e85c7f7703d097b6b791a059430e2,2024-09-26T14:24:26.730000 CVE-2024-30378,0,0,b80140413aed971e52d27ba98a46e8aa758cf76f2f094e7fb695d089c0e62074,2024-05-16T18:15:09.407000 @@ -252398,7 +252398,7 @@ CVE-2024-32869,0,0,69becb8131b51a67986aa1e24b4ccea1d69cd7e659280280f6d26b43d75df CVE-2024-3287,0,0,81c3e92cb525adf74a229ae8f4dc096d97ad8021a63134e1a741f1327c99a33a,2024-05-02T18:00:37.360000 CVE-2024-32871,0,0,c0389a284947a3f025a08761a37fdb67fc665da6d219972d0c888cc5d32f0801,2024-06-10T21:07:12.030000 CVE-2024-32872,0,0,dd2fffea9672a216dbcdde4c4a274554beaeb36e5143b921e2a822ba0dc44c31,2024-04-24T17:16:50.397000 -CVE-2024-32873,0,0,f3739c2039d9173c83006ce7450adea489a507dec59c17c0ec72c42eefc719dc,2024-06-07T14:56:05.647000 +CVE-2024-32873,0,1,0ff9ac0dc6e337547d76cd6798c23a9cd2a1d3d981e083768193a558e753694d,2024-10-15T19:22:33.647000 CVE-2024-32874,0,0,addb84ea881ea0feaefba19978b4f9ede845534ba6243cf8c5e6018bc364eb26,2024-05-14T16:12:23.490000 CVE-2024-32875,0,0,40aaa75f1201e42c5f0849be8614c0a4d622893733a69b13d08c130e0c9a1074,2024-04-24T13:39:42.883000 CVE-2024-32876,0,0,8a2a937b5bb789a06f1b910a6e7251f42791b60b4d46c3846bf785e13f1c5823,2024-04-24T19:58:40.710000 @@ -254203,6 +254203,7 @@ CVE-2024-35580,0,0,a43fd10e129fd9e146689cfa2d63929069dd287ced1e3cf39c84ed52a8ef4 CVE-2024-35581,0,0,f44263214f42e721dd7c3dc00efbb15dd18e867b1fcd80955bdfd7a6cc44bd29,2024-07-03T02:01:55.113000 CVE-2024-35582,0,0,2219b5579a19c25f0f78733ea0e4d22e0bdafa0a58bb93c103fdebb267edde75,2024-08-20T15:35:17.183000 CVE-2024-35583,0,0,b5c80f126e7aedb5091bd213ec23d58eb7894ac75a15e7c2f39695f5e3fa2ab6,2024-08-01T13:52:43.587000 +CVE-2024-35584,1,1,c61e0d501e1d989580b5328f300efd5dcd9735c0a7006cd352a8a1802d08769f,2024-10-15T19:15:16.957000 CVE-2024-3559,0,0,6795a97a10669b581ec15fc558119e6f23b6f2221caf66e80800086dfa7b2bd5,2024-06-13T18:36:09.013000 CVE-2024-35591,0,0,27faac454b8155f287bc6ac35261d2d1913acb4129e9514b657e844f649215b5,2024-08-29T20:36:47.170000 CVE-2024-35592,0,0,c1fef65873ac1061d41e08db42afc69241a1ccc24e746aa460028428ca90ae7f,2024-08-20T15:35:17.980000 @@ -254849,7 +254850,7 @@ CVE-2024-3626,0,0,ecad313ba7341fd9bbe18ef0c6d316a3039cc88d660f7ee647b2392d610dec CVE-2024-36260,0,0,eb0574ced86ce4421ec32797bfb96748b51a8c31102b417db4374d946aa9d144,2024-09-09T12:21:53.383000 CVE-2024-36261,0,0,c5e25a6ffc1d9b2b1a542491c796ec9c713e3656e35c75393a1c0c59fce58861,2024-09-23T14:16:44.273000 CVE-2024-36263,0,0,b19ce9bdaf5871a0e8a25ce5c3dd3fadaa21375012330812df4d2d32a979172d,2024-08-21T15:35:09.140000 -CVE-2024-36264,0,0,902f0e415355048d98f149346eaafb6e286e187db1d5026fa72650af847ceca3,2024-10-14T09:15:04 +CVE-2024-36264,0,1,0a62131b07156b0179f3441bfe77f5b1ed091699b66e5976a0a8c084173d9a24,2024-10-15T18:46:46.633000 CVE-2024-36265,0,0,12d738a1b4f63f0028c8f62cfbcac12211bd41f794fc3fcd67344ea579538e2e,2024-09-26T14:35:23.360000 CVE-2024-36266,0,0,9d2961d489b0fce568e04e4c1c269f16c8c57dd6d267e14663bd78f27bc7e154,2024-06-11T13:54:12.057000 CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e0935f8,2024-07-03T02:03:00.383000 @@ -255102,10 +255103,10 @@ CVE-2024-3672,0,0,3f4375d3f925965eedd3021149cf89991af4643d3a1e99168ddd0533ac28ff CVE-2024-36728,0,0,685c6307c04e58fb91aa1cd3d8196094b317c76e0e4421d5d65d9f3c42021678,2024-07-03T02:03:33.547000 CVE-2024-36729,0,0,d45877829f45f72a36efe808f4ab30639504f5ee409a1f4bbca4482bbbc7cd52,2024-07-03T02:03:34.353000 CVE-2024-3673,0,0,793bfe64393173ca9d6fad84c98d57e0015832a693f798ed6c4f8a051964a6cc,2024-08-30T19:35:06.567000 -CVE-2024-36730,0,0,bde34fb358bb97f482c42e2ac502de0d6a71608d72eee227c2d882aedb55a476,2024-06-07T14:56:05.647000 +CVE-2024-36730,0,1,47a1048d0cce3bd24213ea634eb12d347f4b856c9821af240d374fe9caf8bcaa,2024-10-15T19:25:24.773000 CVE-2024-36732,0,0,89ef79acf914e7fa79f0997bbb77dd27a533cae855c7319e0da9cc89d060d11c,2024-08-01T13:53:14.287000 CVE-2024-36734,0,0,37607296c2114d18eb9371884ac39d9c7abe072eefba87ba6dd89607d9b61cc6,2024-08-20T14:35:24.830000 -CVE-2024-36735,0,0,7e77c1c2f42a7160fedd9f29c2dec0ba326afbd11e438159f9b83ba055e05300,2024-06-07T14:56:05.647000 +CVE-2024-36735,0,1,616a14bca9c8563a817269ef367a8fc2b8ae8bda780dc4acd9d5028036ab3e05,2024-10-15T19:31:49.630000 CVE-2024-36736,0,0,c50cb1cf13d661e9b33a59110518d0f4be71f27e3bfa5afa7ea981ac29d9a915,2024-09-18T15:06:23.837000 CVE-2024-36737,0,0,057f118c82edd0aa1d4131fe214e85ce5f2a6c68abed48ab267123bdfcc3df73,2024-08-20T16:35:19.277000 CVE-2024-3674,0,0,03b7d2663970c659e666aededf211d9dc4cf0601da686d1d01e4f2350a35269d,2024-05-02T18:00:37.360000 @@ -255271,21 +255272,21 @@ CVE-2024-3698,0,0,1636f30943e700f62090e4fa161d7d9dd9aa51f3d552ed312bd5146a81f86c CVE-2024-36980,0,0,e49231cf188398c0359917434170af1132681e7b8b4d7cdf62fdadcaa3a55c33,2024-09-26T20:53:57.597000 CVE-2024-36981,0,0,692e3253e54d255e568ff73285bb6cacdec70eb91eb30bd794acc0fdb33ebac4,2024-09-26T20:55:39.783000 CVE-2024-36982,0,0,aa7c6f6fb5fb0c2be2ff96348e0ea696169b845aaba61abec5ab8d5dad3d35cc,2024-08-02T15:27:14.607000 -CVE-2024-36983,0,0,e2f2eb32ae3cfffdff5d7dfbfdef5f12a2b42788ca5c6f7f7a02f6e1986f58cd,2024-07-08T14:18:39.520000 -CVE-2024-36984,0,0,e0e9241900a224e3ad6fe1ba063f84bef1aef3bc909574846a1878b8e10e5d08,2024-07-03T02:03:57.773000 -CVE-2024-36985,0,0,79ad0407ff845adba2267085ae08be5487982d62becef69388cf8c25525fe83e,2024-07-08T14:18:40.360000 +CVE-2024-36983,0,1,3d2671e3b6faad6837d39321277c4a087da43bfc9e171858dbd03f44fb9a4b06,2024-10-15T18:35:13.550000 +CVE-2024-36984,0,1,5ab2ac22a4ff5dc4e74e9156d2e3d10e3aab10ff6f84623eec6fcd6d6201a02d,2024-10-15T18:35:13.683000 +CVE-2024-36985,0,1,b797a67fe55aeafc6435df22b9723883504e6bd69623593e54049520578cd9da,2024-10-15T18:35:13.810000 CVE-2024-36986,0,0,19150827ddb5a5edfc4814b01ab21fdc0631b6b8b842914dd22329d1e779f69a,2024-08-02T15:24:42.677000 CVE-2024-36987,0,0,1d55b78de0429e0f9217425a916f7a81cae7e1ecd4aabcd3cf4385f4839c5aca,2024-08-02T15:21:54.573000 CVE-2024-36989,0,0,e29df74fff69a124cbba202c433c463e6aee8ba4fb035b75e2a80ecf4b180960,2024-10-10T11:58:28.630000 CVE-2024-3699,0,0,30b1531f872c88b7cbea0828fb395914bc791e58c332296f8abe3de89de3423a,2024-06-12T17:53:09.130000 CVE-2024-36990,0,0,c6ebb7eedce1b1630f254f51b2ec2bdff0ad362c70cf722357a5198ef0b015f1,2024-08-21T14:29:07.173000 -CVE-2024-36991,0,0,170802115c918c2bd8567732564fe4924a4eadc0df36a7df6beeafa80b77c812,2024-07-22T15:00:45.110000 +CVE-2024-36991,0,1,c7d9550d82ccdf9d656e7761cf6e8ead1b939e36f63a32cf976b15c461af5891,2024-10-15T18:35:13.927000 CVE-2024-36992,0,0,abecdc4ff7a886a1f65deead5ea9a8254937cde8f8bba6a6817f94c9cd8353cb,2024-08-21T14:30:51.263000 CVE-2024-36993,0,0,7f59a560bfa90071fc78d38c16f79210d5ba47a0e83d9bb9c035ff8837c28bcc,2024-08-21T14:31:35.970000 CVE-2024-36994,0,0,5bcf467196c1b84a362932fda69af7a594fd1733711aa93db9e3192dd09151ba,2024-08-02T15:07:01.577000 CVE-2024-36995,0,0,001f01624b8476726d4d815467edb381482f5d309cf989b89173ce343b404752,2024-08-02T14:55:40.310000 CVE-2024-36996,0,0,5b2b9df71831d71bb4824acd46b570122cc17e69d17ce334c08a5d79406aaa97,2024-10-10T12:30:29.247000 -CVE-2024-36997,0,0,63b805e1c52b85e32c39913d47be0e81c2a81088ce95f6ee3da9b8a1cc881d60,2024-07-08T14:18:42.053000 +CVE-2024-36997,0,1,d26537886e67e2636705f692175341d9610e08b0875574e3e76efe2c198bbb04,2024-10-15T18:35:14.063000 CVE-2024-36999,0,0,734e0568d2623f6b7394de1b2c703cca096721b07c4ba47885bcabdc0e4abb78,2024-07-03T02:03:59.553000 CVE-2024-3700,0,0,1f63c1e7ae5862d8303d1df0f80fb7224c65b53b248ffd3fb3ee320fd320cf52,2024-06-12T17:51:52.710000 CVE-2024-37000,0,0,eb7342d14f34edf9127b95014f2d19d18d4dda29c980fd9452975dec05564bca,2024-07-03T02:03:59.763000 @@ -255405,8 +255406,8 @@ CVE-2024-3715,0,0,a3f6e7a82320a6d7e6e6c69e7827898cea9e6e8692b09fe17381d67f1803ba CVE-2024-37150,0,0,ebe86994cf382db2f42db3a67da442aa16fa332cd6f1072a3ddf757a2ef9a966,2024-09-26T14:04:54.867000 CVE-2024-37151,0,0,8369ee3c4d467fa86763a95ad47c05c55ab1bf8ab2582315661b340a8d9a5c13,2024-07-12T18:46:55.207000 CVE-2024-37152,0,0,ac6f3acf11b3a1f516e05266cf8046e8001605f3fd121de5700d8dfd6dcff917,2024-09-18T12:51:04.430000 -CVE-2024-37153,0,0,85228309a9dbd3d5cc7023ad5c180dc01a5cb4c16fb418b8df38af81e23fe21d,2024-06-07T14:56:05.647000 -CVE-2024-37154,0,0,bde5aa6907ca2cb4c0ee9877af8bda5e0bca1361f6566d9f784624692130fad9,2024-06-07T14:56:05.647000 +CVE-2024-37153,0,1,9f4424de0035ce52fbc12758883da96bd3d6274fe3ec25134b2ea0b426063640,2024-10-15T19:40:12.917000 +CVE-2024-37154,0,1,dd0ccf9a2b9c80e8d5e5d3b5ee95b70b33aa0e3330c8531821fb592ab05146b2,2024-10-15T19:43:51.117000 CVE-2024-37156,0,0,a4629359601329a252e33b03a4ccc833dd9e2ce7a4a6bb980b335d8342668158,2024-10-09T15:08:29.647000 CVE-2024-37157,0,0,a07622f963d285fd9e3dcfe8c8c66929285017ffcec83ca71975fa9dd7c880ca,2024-09-18T13:50:23.367000 CVE-2024-37158,0,0,d89015f3d5c7061659d9d0607cd8f932d19692ba0c53081aaf8195c4a3e4e008,2024-06-20T12:44:22.977000 @@ -255991,7 +255992,7 @@ CVE-2024-38037,0,0,6ee6641359a9997141535dc4bf184fc6adae3314eb2141cf63c27cb33bd18 CVE-2024-38038,0,0,4aa049265d32d6590c37031d06b9ca2e8eb5e0e6a4aadbb4eb6ba3d0d1ecc8b1,2024-10-15T14:33:46.730000 CVE-2024-38039,0,0,e15a0723c4839431a45e7e12b3249cdf72b61c98dd323f1ba61d1cba1e519674,2024-10-15T14:34:00.893000 CVE-2024-3804,0,0,670259bb9deba1dd09e2fd5f21b522d9251378214c2f8d4e9a81f125a92ebbc4,2024-06-04T19:20:24.583000 -CVE-2024-38040,0,1,66148b0a6485bdfd9ee337fe5cd490f45dd2483daedb656eb852e3aa4eb61925,2024-10-15T16:01:44.010000 +CVE-2024-38040,0,0,66148b0a6485bdfd9ee337fe5cd490f45dd2483daedb656eb852e3aa4eb61925,2024-10-15T16:01:44.010000 CVE-2024-38041,0,0,f4a3a12f8b0083cabe34ce18f7650953aa9c869c7e1908b1e136d7159a58fbbc,2024-07-11T16:25:14.153000 CVE-2024-38043,0,0,678d7239712daaa20be0694f0d9a87623bf13f4e650f026e0e7dc828486931e4,2024-07-11T16:25:00.517000 CVE-2024-38044,0,0,c3503c93ef40bb7d47f5a9bf23be6e47e665166216973f3f0d25fcf29360c08f,2024-07-11T18:11:30.147000 @@ -258119,6 +258120,7 @@ CVE-2024-41320,0,0,6629b2c1bbc9cd1b160b7b0f9c935334633b6b47708e3a65ad0ff69abde9e CVE-2024-4133,0,0,809a3aebbf4e63405fb2f0740c9908f3dfcf1d711b93379e5d465ea9e56d3cba,2024-05-02T18:00:37.360000 CVE-2024-41332,0,0,0c297902d1fd2e33f0ac4f9fcf27ea849083281238ee0df040d97531f7646dbb,2024-08-21T18:53:15.927000 CVE-2024-41333,0,0,cddcfe88014fc883d7c26828c1a1c1f213d8d1e951fc2a526ac4569575e77f96,2024-08-07T20:54:44.060000 +CVE-2024-41344,1,1,ff7648e8ae989269db49eecd8eade2bf67c01c04709c899061f7f40e7351972c,2024-10-15T19:15:17.287000 CVE-2024-41345,0,0,ad86d7e7395244aeefb4513ee22ed35e62fdc5af64583f081b4b5d8d7fb51f54,2024-09-04T14:17:57.747000 CVE-2024-41346,0,0,1adac0ec66721c6669287245d0fb70166e2ec17c4be292036b9085702109e039,2024-09-04T16:05:09.933000 CVE-2024-41347,0,0,89b16501f9998c45192ab464895dbba53a76bd7b2944c225500c1ee4223ff754,2024-09-04T16:05:47.790000 @@ -259018,7 +259020,7 @@ CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65 CVE-2024-42638,0,0,f05422802d125b3ce266da31a9abfdc3602d6bb3aba7eee20387c1a0cbe79fd0,2024-09-11T12:53:03.987000 CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 -CVE-2024-42640,0,1,aa9fdc0f8db2e7e48ae8090075d403a2f9c88e4c7abd16509bc27a944cdc3dcd,2024-10-15T17:35:04.623000 +CVE-2024-42640,0,0,aa9fdc0f8db2e7e48ae8090075d403a2f9c88e4c7abd16509bc27a944cdc3dcd,2024-10-15T17:35:04.623000 CVE-2024-42642,0,0,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000 @@ -260615,21 +260617,21 @@ CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55 CVE-2024-45459,0,0,9b179c3f3fb0a5657b063c5e1d95801691f8f9a5515abf4db8b2da6f6597452a,2024-09-27T14:46:32.483000 CVE-2024-4546,0,0,b54fd960b0f682682e91f5a439869fe44d7d9c83b2d79e063c1697b7441a9761,2024-05-16T13:03:05.353000 CVE-2024-45460,0,0,b05278f65cfdb1f7853ef120543347199a3969bb30d487211ecff7d9eae8c937,2024-09-27T14:51:08.120000 -CVE-2024-45463,0,1,a9a5f56b759215b2281ec627fe0c607aa07ab62cdff5847ecbdaa1e6768d0035,2024-10-15T17:35:51.263000 -CVE-2024-45464,0,1,8b929b4e136ea61613724435daa38f3adbab6eb0ab0969f0cee83dc792efc84a,2024-10-15T17:35:33.887000 -CVE-2024-45465,0,1,810f47d979302bb0c310fa31cc05b9821ef43ec873eb81fa46fb54894361c8d3,2024-10-15T17:35:22.230000 -CVE-2024-45466,0,1,95f5ac029a8b218e2f70f2e90df726fc14b401f47783cb5bd7054969b8bc85be,2024-10-15T17:35:06.890000 -CVE-2024-45467,0,1,5fd65ef5c4419b3719d423c16cf15c7939d251f4960abcbd21314c864a1c6ec1,2024-10-15T17:34:51.353000 -CVE-2024-45468,0,1,03be94a96ff394925e1a30865b1dc768668eb0d484dc2d528f698c2015f801e9,2024-10-15T17:34:32.503000 -CVE-2024-45469,0,1,c6746822b015becdd0c455845b5943365489ab16cf5f9f46a370137632c48863,2024-10-15T17:34:18.037000 +CVE-2024-45463,0,0,a9a5f56b759215b2281ec627fe0c607aa07ab62cdff5847ecbdaa1e6768d0035,2024-10-15T17:35:51.263000 +CVE-2024-45464,0,0,8b929b4e136ea61613724435daa38f3adbab6eb0ab0969f0cee83dc792efc84a,2024-10-15T17:35:33.887000 +CVE-2024-45465,0,0,810f47d979302bb0c310fa31cc05b9821ef43ec873eb81fa46fb54894361c8d3,2024-10-15T17:35:22.230000 +CVE-2024-45466,0,0,95f5ac029a8b218e2f70f2e90df726fc14b401f47783cb5bd7054969b8bc85be,2024-10-15T17:35:06.890000 +CVE-2024-45467,0,0,5fd65ef5c4419b3719d423c16cf15c7939d251f4960abcbd21314c864a1c6ec1,2024-10-15T17:34:51.353000 +CVE-2024-45468,0,0,03be94a96ff394925e1a30865b1dc768668eb0d484dc2d528f698c2015f801e9,2024-10-15T17:34:32.503000 +CVE-2024-45469,0,0,c6746822b015becdd0c455845b5943365489ab16cf5f9f46a370137632c48863,2024-10-15T17:34:18.037000 CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000 -CVE-2024-45470,0,1,05ae393936dae2464e7b0417bca670f575905839e441c81b7b53f4226f4b2732,2024-10-15T17:18:52.227000 -CVE-2024-45471,0,1,08ee5f448c6bdf4af33214fb2172bc9c784a32c01855723bc7198e3f1b97a812,2024-10-15T17:18:37.377000 -CVE-2024-45472,0,1,99ba6a0dd1a694cc772944067840407aebb63cc1b8de9603bcf4ba7d890c5926,2024-10-15T17:15:34.937000 -CVE-2024-45473,0,1,865aa159e69490a974a9134607670a0c10ee3f357ea596017add2302228a8767,2024-10-15T17:31:56.830000 -CVE-2024-45474,0,1,0077a4784ce6e6c47b98449e48d902bd7a576357740b2f012aa0621077fe9ec1,2024-10-15T17:31:54.730000 -CVE-2024-45475,0,1,ceca83f140e5142ec9e788bac45b6a2b3e6a9f421935b40e9d1d34e5a20ee9c9,2024-10-15T17:31:52.313000 -CVE-2024-45476,0,1,caca7fe790f916474a7ca41537f465a0ddfe22def297e5b30824f70c2c729b14,2024-10-15T17:31:50.310000 +CVE-2024-45470,0,0,05ae393936dae2464e7b0417bca670f575905839e441c81b7b53f4226f4b2732,2024-10-15T17:18:52.227000 +CVE-2024-45471,0,0,08ee5f448c6bdf4af33214fb2172bc9c784a32c01855723bc7198e3f1b97a812,2024-10-15T17:18:37.377000 +CVE-2024-45472,0,0,99ba6a0dd1a694cc772944067840407aebb63cc1b8de9603bcf4ba7d890c5926,2024-10-15T17:15:34.937000 +CVE-2024-45473,0,0,865aa159e69490a974a9134607670a0c10ee3f357ea596017add2302228a8767,2024-10-15T17:31:56.830000 +CVE-2024-45474,0,0,0077a4784ce6e6c47b98449e48d902bd7a576357740b2f012aa0621077fe9ec1,2024-10-15T17:31:54.730000 +CVE-2024-45475,0,0,ceca83f140e5142ec9e788bac45b6a2b3e6a9f421935b40e9d1d34e5a20ee9c9,2024-10-15T17:31:52.313000 +CVE-2024-45476,0,0,caca7fe790f916474a7ca41537f465a0ddfe22def297e5b30824f70c2c729b14,2024-10-15T17:31:50.310000 CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000 CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 CVE-2024-45489,0,0,6ea1c310f6732949eac7ded3c08e0687f1be76a01c2bdfe6c41533999acd86e8,2024-09-26T13:32:55.343000 @@ -260734,7 +260736,7 @@ CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48 CVE-2024-45750,0,0,f86fce6cd4045728a00882dd42402a213a9d23f5fcb44064e442c5967c556b92,2024-09-26T19:35:17.850000 CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4a91,2024-09-25T16:54:27.520000 -CVE-2024-45754,0,1,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000 +CVE-2024-45754,0,0,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000 CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b36f,2024-09-20T12:30:17.483000 @@ -260759,7 +260761,7 @@ CVE-2024-45800,0,0,e84cff012b7d4b74db66a83e7b935dc1edfec9ef774b30490760e7407aa53 CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd025,2024-09-20T12:31:20.110000 CVE-2024-45803,0,0,a103e4b6ec153497af7929b1abcca6c81c3d6f7a709474f445551e656cc860a0,2024-10-07T17:05:16.440000 CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000 -CVE-2024-45806,0,1,1ea4fb4c712bb48146dcc90039539097532217007de9e1bf4affe475258a028d,2024-10-15T16:03:44.943000 +CVE-2024-45806,0,0,1ea4fb4c712bb48146dcc90039539097532217007de9e1bf4affe475258a028d,2024-10-15T16:03:44.943000 CVE-2024-45807,0,0,109f977914214954b1d4c58b77a41ab231481644c3f0d5e0c1a61fe3a8137355,2024-09-25T17:12:38.380000 CVE-2024-45808,0,0,e0b8548e8c97a2dbe35aa53aed4f22546b5e8aaa33f6c0d1789ad77d012310d8,2024-09-25T17:18:38.823000 CVE-2024-45809,0,0,61a35443140d3227d7a81e1d73cdcea190bec5c7e8b6089514de0625aa5d92ef,2024-09-24T20:12:24.597000 @@ -260958,7 +260960,7 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188 CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000 CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000 CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000 -CVE-2024-46468,0,0,590f99179c67e59eb42f50e717dee3e2d00e317ae2f74cf7e2e6cc04e0418e38,2024-10-15T12:57:46.880000 +CVE-2024-46468,0,1,d1dabc49a2c8f6666100b3e113a0965ffec605533a3aa178ac1056f150b98c3d,2024-10-15T18:35:14.680000 CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000 CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000 CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000 @@ -260979,7 +260981,7 @@ CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a5 CVE-2024-46528,0,0,229b9bb15493caebdf3e208d9a8202b04a5b638f9227848df207ebaa53b79ee7,2024-10-15T15:35:16.373000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 CVE-2024-46532,0,0,c6e0d455d21a04879d4eb03cbf11fc55f7b3d1c74ff8ace5dcd3df8ff8b6f824,2024-10-15T12:57:46.880000 -CVE-2024-46535,0,1,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000 +CVE-2024-46535,0,0,303f432dafe76053288b97daeba04961b685b8c5980dad6e5d762d1f5502c318,2024-10-15T16:35:08.740000 CVE-2024-46539,0,0,2d2c57643421ecf3202df41ca86f61b87e91435ec045a273724c1fd7bed0cf14,2024-10-10T12:56:30.817000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 CVE-2024-46540,0,0,82bd73e280c5a23d3b35406dd5a042ddc542cc53d99831f15d05d7d862ed5067,2024-10-04T13:51:25.567000 @@ -261385,8 +261387,8 @@ CVE-2024-47129,0,0,b38b36d9af9ba9097d5f30d3ac794a3599474bb5946ca986d25e9630ca9b2 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-47130,0,0,e7f6fb202a607836b8263c1620a1a5e98a9ca050003113851c771acca23538dd,2024-10-07T17:57:43.347000 CVE-2024-47134,0,0,2dc8636e0ee5fd2f97b814bd39f5b4217906ea0a61e539db830c2896b6e052cf,2024-10-04T13:50:43.727000 -CVE-2024-47135,0,0,447f1b653dd0637b0975f8b2a0589bbfb6986fc90885b0d8c45ddd003e931ff4,2024-10-04T13:50:43.727000 -CVE-2024-47136,0,0,1a39bed452003009147d69bd8fa96ae4884f50ab47a258dae1ff6b5248f61085,2024-10-04T13:50:43.727000 +CVE-2024-47135,0,1,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000 +CVE-2024-47136,0,1,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-47145,0,0,1a35765c26b04b61b861cee47b184170021783241b94fd51efafd1127befdb57,2024-09-26T18:42:33.550000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 @@ -261670,7 +261672,7 @@ CVE-2024-47658,0,0,7d83d41550ee4896fe2089957fc970e4ffb8e6c30451f535c67b0cffeb69f CVE-2024-47659,0,0,b7c74157edbbfcf6cc191fb9eb6c2e328a941e3c74433eed8f44bf21a8a12312,2024-10-10T12:51:56.987000 CVE-2024-4766,0,0,2055f7e2ec48f00fc79991c0efa64507537f075393b9abe23a04ed1e0c30396e,2024-05-14T19:17:55.627000 CVE-2024-47660,0,0,accf7b6bc163d236ec224793cf44bab1e91316de88fa320bb4708923ce43fb79,2024-10-10T12:51:56.987000 -CVE-2024-47661,0,1,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000 +CVE-2024-47661,0,0,0c740796dab368d37558db934f0b4e8bdfdcea457a0f8107f53cd199a836ef43,2024-10-15T16:03:29.260000 CVE-2024-47662,0,0,9592ff301142fec228feda5f28aa5220c1e0fdd0719eedaab776fcd353ec2534,2024-10-10T12:51:56.987000 CVE-2024-47663,0,0,38c847c85cb58f1bdc14b2643d340f12f21f2abeb9d0471d3efb10c92740f7a5,2024-10-10T12:51:56.987000 CVE-2024-47664,0,0,1c2309f9d69bf8bb4cc3d6eb245972d5a50bf2b31179b3921c4437d37dadd6e5,2024-10-10T12:51:56.987000 @@ -261703,10 +261705,10 @@ CVE-2024-47767,0,0,9af27c7c3746a91762dbd43bd1bdd93db1f293ef5650b0e96c4aac72ab44c CVE-2024-47768,0,0,f403a0de6ad99844ca2cbb93a58b82a840eb5e868f9e8f1d631547e4814a24ea,2024-10-07T17:48:28.117000 CVE-2024-47769,0,0,89e2e7df1b1b68f8d9732f48769437016eda3284d5a81e91e9482d5022e6eda8,2024-10-07T17:48:28.117000 CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737be4,2024-06-10T17:16:34.070000 -CVE-2024-47771,0,1,307639daadadbf3202f674c43a3fb0644dc668cf5b5d367eaa82f2bdc0b500d7,2024-10-15T16:15:04.860000 +CVE-2024-47771,0,0,307639daadadbf3202f674c43a3fb0644dc668cf5b5d367eaa82f2bdc0b500d7,2024-10-15T16:15:04.860000 CVE-2024-47772,0,0,cc6b812a8af17a97a7a1e7281e186f43a2e5e0166a885f7d8c94f126c3b51715,2024-10-10T12:57:21.987000 CVE-2024-47773,0,0,9ec3c242835bf576bc0968a82a3b46699041f8e41d118ea66f5704cf28b5d58f,2024-10-10T12:56:30.817000 -CVE-2024-47779,1,1,3a163337dfc03590a25dadcf99329dac626e059e04e1d823549ab286b0d21437,2024-10-15T16:15:04.963000 +CVE-2024-47779,0,0,3a163337dfc03590a25dadcf99329dac626e059e04e1d823549ab286b0d21437,2024-10-15T16:15:04.963000 CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000 CVE-2024-47781,0,0,942905ddf0e252a3fb77e10ba3da26f7a3985ae743d3e1737c070a7332d5f79d,2024-10-10T12:57:21.987000 @@ -261731,7 +261733,7 @@ CVE-2024-47818,0,0,4d7e5ae8d80cd68e1a4826a976dd1a317a0485050783b2b6d50912171135a CVE-2024-4782,0,0,37dcdb14f7d23ae467b62646ac8eb504448e2a7781e3c175892c72dc54d3aebf,2024-08-19T13:00:23.117000 CVE-2024-47822,0,0,659225121d6760adf8eca1f83c834e75b86ebec31d9e1e0ebc639ac3cc87e33f,2024-10-10T12:56:30.817000 CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298a07,2024-10-10T12:56:30.817000 -CVE-2024-47824,1,1,2be970dcd77fedf37b12cf1771315ac50be5119386c01748fc934145cb380c25,2024-10-15T17:35:05.960000 +CVE-2024-47824,0,0,2be970dcd77fedf37b12cf1771315ac50be5119386c01748fc934145cb380c25,2024-10-15T17:35:05.960000 CVE-2024-47826,0,0,e0e92319bd7ff9f0b6142ef26fd12487604c5bd0a7b38d2c0ea52634274a8fe7,2024-10-15T12:57:46.880000 CVE-2024-47828,0,0,20037a2831594572185910fec3fa22739c3e04d0ddf5a1652087e64bcac4c0e3,2024-10-10T12:51:56.987000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 @@ -261759,9 +261761,9 @@ CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f CVE-2024-47870,0,0,1cd8b567f779c035bc02695f74b97afb3b466e52ad5fdfb83f9ad4c9d6c2565f,2024-10-15T12:58:51.050000 CVE-2024-47871,0,0,c330cbf3bccdc411e72d0c9fdb93f2acf8aa015186f3acc4a33480b7d49f7295,2024-10-15T12:58:51.050000 CVE-2024-47872,0,0,fab9cb24e0cb00ac19ee7c8a7191edcbcecc81dc5861aabc369822430797585f,2024-10-15T12:58:51.050000 -CVE-2024-47874,1,1,b2e984fb0184ca3bd0cbcb3dcc4440ecf205b77628994db1548a308aa19adde1,2024-10-15T17:35:06.347000 +CVE-2024-47874,0,0,b2e984fb0184ca3bd0cbcb3dcc4440ecf205b77628994db1548a308aa19adde1,2024-10-15T17:35:06.347000 CVE-2024-47875,0,0,7d3f699a2dfd28fae24f11f0ffebcb02477b8963ab93d8f474f9ee88d14cf58e,2024-10-15T12:58:51.050000 -CVE-2024-47876,1,1,0097c0b96f8151854a1f0202f1d9af72dc4b0fea44c712acf5036d788e5de33f,2024-10-15T17:35:06.610000 +CVE-2024-47876,0,0,0097c0b96f8151854a1f0202f1d9af72dc4b0fea44c712acf5036d788e5de33f,2024-10-15T17:35:06.610000 CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92bc00,2024-10-15T12:57:46.880000 CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000 @@ -261776,8 +261778,8 @@ CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000 -CVE-2024-47944,0,1,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000 -CVE-2024-47945,0,1,0900df5cee0123a45d84da30514678340ec3b514351287898be6de2614710736,2024-10-15T17:35:06.870000 +CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000 +CVE-2024-47945,0,0,0900df5cee0123a45d84da30514678340ec3b514351287898be6de2614710736,2024-10-15T17:35:06.870000 CVE-2024-47948,0,0,aafd0e8fc979ea94b2b8df4bf3f1f60d1fa5454036169ceb387558bd65bac363,2024-10-11T19:56:44.863000 CVE-2024-47949,0,0,8ba4c45c98cb1da5a81b6d150df81b78f598bd9353dce1414e0f42eb2bdd7632,2024-10-11T19:57:06.207000 CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e298,2024-06-04T19:20:49.590000 @@ -261819,14 +261821,14 @@ CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e900 CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000 CVE-2024-48119,0,0,91983fb09dc3775c9139671c3c1253717b336036174f5a3aef288d9728dadb3b,2024-10-15T12:57:46.880000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 -CVE-2024-48120,0,1,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000 +CVE-2024-48120,0,0,9504bbf5097a8042aa622e4bcffcd74f79e5a7cbeebb7a1d1951fd43248d522c,2024-10-15T16:35:09.650000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 CVE-2024-4815,0,0,a12a3714528f7b768c4c9101b510e3e25b21fa14abf883b4fca5d245888d3088,2024-06-04T19:20:51.183000 -CVE-2024-48150,0,1,3a74ef17dd937b2ce7ec4baf65ca0a0269cc457ed04e16b8c883126dbac56b6f,2024-10-15T16:35:10.450000 +CVE-2024-48150,0,0,3a74ef17dd937b2ce7ec4baf65ca0a0269cc457ed04e16b8c883126dbac56b6f,2024-10-15T16:35:10.450000 CVE-2024-48153,0,0,0115bd5a7f787b918c5b80970e16ea447bfa931e6c66b1d9675f3a387f3eea27,2024-10-15T12:57:46.880000 CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000 -CVE-2024-48168,0,1,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000 +CVE-2024-48168,0,0,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000 CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 @@ -261835,20 +261837,20 @@ CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 CVE-2024-4823,0,0,0c5de98ac761e11f69c407a8dbff0028d3fe4b31e8abb3e2bfd72a91e6adb2ed,2024-05-14T16:11:39.510000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 -CVE-2024-48249,0,0,4f26a9d3cbe208cbdd9ea727b661bdba3e562618b583ee76b0512b4afadfe7dc,2024-10-15T12:57:46.880000 +CVE-2024-48249,0,1,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 CVE-2024-48251,0,0,4d098db24396007455b29406aa1659eb8d5f46a48fef3576943743462426dc0d,2024-10-15T12:57:46.880000 -CVE-2024-48253,0,0,608bd21fa837eef2492e5d98929070282bc787c93de4ba72bd7c51001703024e,2024-10-15T12:57:46.880000 +CVE-2024-48253,0,1,3bf19f22b051acf529017405a1e456dc3273dcf3e1fd7bc187ab36f4f4639f3f,2024-10-15T19:35:37.163000 CVE-2024-48255,0,0,313b410d31dd8621f0d7faab3c11bc5341a96c35dca7329f3a83e566161ad534,2024-10-15T12:57:46.880000 CVE-2024-48257,0,0,aaadd224a47f274d472be6ce08b5d69075572392f21cee0f372452df54632bb8,2024-10-15T12:57:46.880000 -CVE-2024-48259,0,0,2a0e952e0f673f38e8090e544a78e235a41eeb6627f4c6a5736da1f86a9b4045,2024-10-15T12:57:46.880000 +CVE-2024-48259,0,1,510d99d2a12621cee76f94930e2255d64498e13bd360e8917cdd6a12710d1c8e,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 CVE-2024-48278,0,0,1989401114df78ae2b738db10dc761dd7c87f5042e958dd73b1ad8ae21b3fdde,2024-10-15T15:35:17.077000 -CVE-2024-48279,0,1,1a7b526d9068600675847ed04f9097557e4f8603cd174863881b3866309b7c1d,2024-10-15T16:35:11.997000 -CVE-2024-48280,0,1,30bb52dd15fcd1691d30aef0fd2f9da37796443505a0387f8cf8d09c83ed623c,2024-10-15T16:35:12.753000 +CVE-2024-48279,0,0,1a7b526d9068600675847ed04f9097557e4f8603cd174863881b3866309b7c1d,2024-10-15T16:35:11.997000 +CVE-2024-48280,0,0,30bb52dd15fcd1691d30aef0fd2f9da37796443505a0387f8cf8d09c83ed623c,2024-10-15T16:35:12.753000 CVE-2024-48282,0,0,f31d72254316b2d688a7e6f828feda19722b4bc66e309fa59b8b0531deb88d13,2024-10-15T15:35:18.263000 -CVE-2024-48283,0,1,5ad0da5ee0e3f610c2e0b4a44dada3daebe4e9c6ee3b0fdabbf955afa11385c7,2024-10-15T16:35:13.517000 +CVE-2024-48283,0,0,5ad0da5ee0e3f610c2e0b4a44dada3daebe4e9c6ee3b0fdabbf955afa11385c7,2024-10-15T16:35:13.517000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 @@ -261874,9 +261876,9 @@ CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b94 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 CVE-2024-4862,0,0,1615bd8ef961831b9e24202d7c6665df3c0d355a3a7edbddf82c728a6e33bae9,2024-07-09T18:19:14.047000 -CVE-2024-48622,1,1,980c56ef0d1700c69a05a060c6a491b5f8e60fe341396b57dff705be81d09548,2024-10-15T16:15:05.680000 -CVE-2024-48623,1,1,e8e3c9332b5c8204410a6fbbe6d65618def700fdad0cf7393579a2c6b88740f9,2024-10-15T16:15:05.767000 -CVE-2024-48624,1,1,4f54bb230b281f4e5a4f74591a10d3264508152e955f3ed013c29db2bd52623e,2024-10-15T16:15:05.840000 +CVE-2024-48622,0,0,980c56ef0d1700c69a05a060c6a491b5f8e60fe341396b57dff705be81d09548,2024-10-15T16:15:05.680000 +CVE-2024-48623,0,0,e8e3c9332b5c8204410a6fbbe6d65618def700fdad0cf7393579a2c6b88740f9,2024-10-15T16:15:05.767000 +CVE-2024-48624,0,1,f2be1358a87a4e8adff25895a95d7dab79bd042822ea0feed2b936938384ac0d,2024-10-15T18:35:16.363000 CVE-2024-4863,0,0,a7452bc03047df9dfe2f17de61b10d1bcd60cf90a2b2dad4486f933b8b326310,2024-06-17T12:42:04.623000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-4866,0,0,1fd2c3b939730f1522c70c99454a98badb9f05648f1c0fa9438c4abc3e506e92,2024-07-11T13:05:54.930000 @@ -261890,20 +261892,20 @@ CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f CVE-2024-4875,0,0,5a9bf10de46e2f944321ed00fa6d17c799716a219001f5797c9cce4abb6a2b7b,2024-05-21T12:37:59.687000 CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d2c,2024-05-21T12:37:59.687000 CVE-2024-48768,0,0,ca8de8e07b0f4e68695a45f656c413c10b94b260fe52ed672054ce66c06a9fb6,2024-10-15T12:57:46.880000 -CVE-2024-48769,0,0,987a65bc7023bf5f10fdfa37f57f702552f2716842ca04ff68a0022a049e643d,2024-10-15T12:57:46.880000 -CVE-2024-48770,0,1,a5f9413e80eaeb5bd8cc7305118d9d871b4a6f4a982e875ef049dbc556cc75cb,2024-10-15T17:35:07.440000 +CVE-2024-48769,0,1,111cb6e3b59af6f41642c6c2c5b8c53bc420797d62f026a9cd65018ae24e939c,2024-10-15T19:35:39.423000 +CVE-2024-48770,0,0,a5f9413e80eaeb5bd8cc7305118d9d871b4a6f4a982e875ef049dbc556cc75cb,2024-10-15T17:35:07.440000 CVE-2024-48771,0,0,7cc16fb1e7b182ba1707e039c92b376a12b4f5c194ecd59d33b42309a06ec623,2024-10-15T12:57:46.880000 -CVE-2024-48772,0,0,0bfd137924b2aa589f0b388aa2a4bb6e650e0bed2b66f58add5dd08c77edb7d0,2024-10-15T12:57:46.880000 +CVE-2024-48772,0,1,976a3e2889a545044e2211b5dd62f039b94e0c74df9ae926e2ac2fb4a96d0f16,2024-10-15T19:35:40.267000 CVE-2024-48773,0,0,fb43d7aa77de082965363f581f54c3d061652fad69676731f89ae7cab058f131,2024-10-15T12:57:46.880000 CVE-2024-48774,0,0,d20edaaf1d024afe7f584acc048e0777c96bfc6984585e77dc1e01adfd6f8e5c,2024-10-15T12:57:46.880000 CVE-2024-48775,0,0,f5669ae425289b72e71d7a60ceabc6022280b7646d6dac15ce5178659cbc0334,2024-10-15T12:57:46.880000 CVE-2024-48776,0,0,b89d40e78c84d47e76ba1de04c88609484eadc9d4130b8e88457197ed2b471ee,2024-10-15T12:57:46.880000 -CVE-2024-48777,0,0,c4fd7419a3ee8a4dc369b6738eac4d7c9ae9e2f6d34315b5881974062a04c73f,2024-10-15T12:57:46.880000 -CVE-2024-48778,0,0,3adfe5983eab4dfdbe6a86e78e52319129a13c83d51e2776521d179f4e595d91,2024-10-15T12:57:46.880000 -CVE-2024-48784,0,0,fa927cf3db9565e61ab3bb2bed2d088f6b1d62d2eee7fc3578b18973620e71aa,2024-10-15T12:57:46.880000 -CVE-2024-48786,0,0,be06c2f94ca958b0210a50f1a2dbe5d1b27730c8a2625e641cf00ec903aaad96,2024-10-15T12:57:46.880000 -CVE-2024-48787,0,0,b8fcef644dedfdb63d84c8688c4e6efacc4f55e42f9d5bb1eea0f9ffeb39921f,2024-10-15T12:57:46.880000 -CVE-2024-48788,0,0,7ec1f33a068dd41f1e24941aa0c74f54e34cb2634cb32491fce6c1ee79242159,2024-10-15T12:57:46.880000 +CVE-2024-48777,0,1,54c3f1ea2e45e8317008bb4fa68d7dedc38bc1a3751236b3d316d88496c43ce3,2024-10-15T19:35:41.067000 +CVE-2024-48778,0,1,84465a6cd0aeb1f5e7a79a50b406c02904acdaa29d8045952a59d45351acb806,2024-10-15T19:35:41.840000 +CVE-2024-48784,0,1,b17d7d33d987ccc732abbbed7a19a2cd24322765e46d4a5e12c5048ecd3b3022,2024-10-15T19:35:42.627000 +CVE-2024-48786,0,1,356725ffde0ce97cc052a45790af4a3778948dfbfe170e13c7ea8d62a13a4603,2024-10-15T19:35:43.413000 +CVE-2024-48787,0,1,6d2ea7e3a85defa8b6f92bcb4641f0fb3472eedc1d016221be7f4707cb95d1ae,2024-10-15T19:35:44.190000 +CVE-2024-48788,0,1,d49daeb800740f0e90355e5fab9ca765541a870f5f806cc24938c90cbcb96ed5,2024-10-15T19:35:44.980000 CVE-2024-48789,0,0,5f592c36436047d58bf382ebdc10d7cfe3a178af546d803f30cd03c06e0e8ad4,2024-10-15T15:35:19.560000 CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000 CVE-2024-48790,0,0,ceda703837f83637982efb81eeabebf961c0a8457d3c931aa6c365425a142c37,2024-10-15T12:57:46.880000 @@ -261911,9 +261913,9 @@ CVE-2024-48791,0,0,cee0a23c7df15be93fddb008f000fe0bf9be40f59d5c9806b782ce26b20a6 CVE-2024-48792,0,0,f0468a8723df3ecc044b28f7bf95d6c4f917c9f33598ee95b354cbcc674cafbd,2024-10-15T15:35:20.183000 CVE-2024-48793,0,0,dae7e208b54b46b9b3b2ea5a99cfd6703dd4b418e372d8815ac028cc55c60587,2024-10-15T12:57:46.880000 CVE-2024-48795,0,0,3ba44c809bccc74424c36040f3837b0bb086ec1f910a55507b2cf216568d50ad,2024-10-15T12:57:46.880000 -CVE-2024-48796,0,1,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed9ca,2024-10-15T16:35:14.433000 +CVE-2024-48796,0,0,1e14f7498f727da73668bbab5fa9c3e26a7526443607be49f5cc1b64f9aed9ca,2024-10-15T16:35:14.433000 CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda79b,2024-10-15T15:35:21.060000 -CVE-2024-48798,0,1,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 +CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000 CVE-2024-4881,0,0,70a5432f5c5a777364201296899d588f04c479b317d8edcefa9e35906d6586a3,2024-06-07T14:56:05.647000 CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000 @@ -261929,18 +261931,18 @@ CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b2 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000 CVE-2024-4888,0,0,52d3f21edee01fa1b7d50228c23ad770da0e07dcc70157700a078948f8463c9b,2024-06-07T14:56:05.647000 -CVE-2024-4889,0,0,dc396989938962dc001a5281d191cbfae52fbf722fa7438f9288c8cc16167175,2024-06-07T14:56:05.647000 +CVE-2024-4889,0,1,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000 CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000 CVE-2024-48902,0,0,4705ef2c55813b3d84116179c2f627380e6bdeb3958de084a14cde58a5b57f28,2024-10-10T12:51:56.987000 CVE-2024-48909,0,0,9f043bbad446a771de31685005b4aaec51407994137d3dc87a7597202df7de61,2024-10-15T12:57:46.880000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 CVE-2024-48911,0,0,e0b0f376339137788c8f5f310259d6e022437aed42d17513390da35e83b91690,2024-10-15T12:57:46.880000 -CVE-2024-48913,1,1,37dd6c652ace131411a1e5015973d721dfff292a443bb2cd2e9a123fa40fa498,2024-10-15T16:15:05.960000 -CVE-2024-48914,1,1,475d5c9171a024fc7321a4edcc7825561f09062c68d4829f0d88af27fe9ab80e,2024-10-15T16:15:06.270000 -CVE-2024-48915,1,1,a41a27228e8c7be04fdb162c020629f72a9c841436d4d75d0e35bdfe0688a24c,2024-10-15T17:15:11.943000 +CVE-2024-48913,0,0,37dd6c652ace131411a1e5015973d721dfff292a443bb2cd2e9a123fa40fa498,2024-10-15T16:15:05.960000 +CVE-2024-48914,0,0,475d5c9171a024fc7321a4edcc7825561f09062c68d4829f0d88af27fe9ab80e,2024-10-15T16:15:06.270000 +CVE-2024-48915,0,1,436abbcaa0bec3654a766e3739fdf6000c3bf80c7e442d11f7ecd8d059ad5b32,2024-10-15T19:35:45.867000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-4893,0,0,c4900f559bdc4a1c952ec15ffc0a407a7d0fc758594c29af597940962bf437f6,2024-05-15T16:40:19.330000 -CVE-2024-48933,0,0,26e7fffc7245fc28a7fbe658a2efc943aeace159e18ee8e57ad42a85fc085d33,2024-10-11T21:36:45.080000 +CVE-2024-48933,0,1,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf897,2024-10-15T18:56:52.363000 CVE-2024-48937,0,0,fb3aa1360cb042294647ae67e18ab591b2f48004999a7cd6a26f133ca6565fb4,2024-10-15T12:57:46.880000 CVE-2024-48938,0,0,3d30d33d5321768a3f65e3940b0730e05bbd4ff5e3d997465431f4cb5c46177b,2024-10-15T12:57:46.880000 CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000 @@ -262709,6 +262711,7 @@ CVE-2024-5742,0,0,c310dd28e6218f94af8f7597fa59ff6226be5f6bc18ba1f4cf6bdcb5be3777 CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000 CVE-2024-5745,0,0,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000 CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000 +CVE-2024-5749,1,1,3106234ad189b55b90e3d5371ca0e65ff3bc48acf1c8a0659ef6ef2ef2bf0543,2024-10-15T18:15:05.997000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,665d058ed530ae61eb83388b4a703659e3453f6012f62fa19adedb27d3fa9b05,2024-09-20T18:01:44.533000 CVE-2024-5753,0,0,43c94f3dac782081ffe06f7a7f44ffc012545fd59744b1529ccc7aa1117863e3,2024-07-08T15:49:22.437000 @@ -263795,7 +263798,7 @@ CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f8946 CVE-2024-7031,0,0,4808703a4cd0b97f67a773c5f222b01d69a2fff387801423358b3ea99670c83a,2024-08-05T12:41:45.957000 CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca45054,2024-08-31T03:02:41.763000 CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000 -CVE-2024-7038,0,0,50e1a958338e09dd5d29ac761cd7257587d7fbf8d06206d63e71117bb6ca44d7,2024-10-10T12:51:56.987000 +CVE-2024-7038,0,1,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000 CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000 CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000 CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000 @@ -265019,7 +265022,7 @@ CVE-2024-8686,0,0,022931d7d759e19b0434bc52cbdd6347bb39936f99eb55db4994112c6b1c44 CVE-2024-8687,0,0,acaaec34cb53b28ae166b73ca3b7beb76d1056832fd2f401fa104cfe417cf027,2024-10-03T00:26:56.110000 CVE-2024-8688,0,0,029257a651f738e9f27877382144b226fa4512857c7fc61efd2c2ae6b87c68fd,2024-10-03T00:19:32.047000 CVE-2024-8689,0,0,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000 -CVE-2024-8690,0,0,67e41d4fc2072d70d0779ce07b487cc96378ea1bcbe929aa92f47f625147a8df,2024-10-03T01:29:08.547000 +CVE-2024-8690,0,1,eb968451e4e62166b7c59305af1ec818435c2d81bb22259d4694cffd92b8d03d,2024-10-15T18:38:32.260000 CVE-2024-8691,0,0,86e4139a64d9b51ddc9d346ef3726cdbb0eca03f25fc24c1e79857eafd0831a5,2024-09-12T12:35:54.013000 CVE-2024-8692,0,0,62cd5a24f2f195f456dad2a14bc82086c94059c24620db27bc989fe057273892,2024-10-03T13:17:07.547000 CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000 @@ -265368,7 +265371,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 -CVE-2024-9341,0,0,d189ad1f5a137e8ae5c8357f3191cc9111f21b931f4eff48979046ce5164f4a3,2024-10-14T15:15:14.373000 +CVE-2024-9341,0,1,dd0e44bc8e2097c098fb36058bfb22e7ad9d27e180476832b369b29945d74b86,2024-10-15T19:15:17.707000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 @@ -265396,7 +265399,7 @@ CVE-2024-9395,0,0,5635514233d9ffee7876b8b2143dfc7636f2a12f95a3e319a76e442d8673b9 CVE-2024-9396,0,0,530fd74976554bcd60385c13cda51e8c090f8d2168af9c130173451c01d15309,2024-10-04T13:51:25.567000 CVE-2024-9397,0,0,eedca49f89627e559465b4c1980d39b3c979416597a1ac9dbc74efac9146189f,2024-10-11T16:07:56.577000 CVE-2024-9398,0,0,bdddf943c112a95674b6a5445a1c9aea85241f45d8a7242f5a5f280afd3f7bd6,2024-10-11T16:08:14.577000 -CVE-2024-9399,0,1,71d350d28d9602a123d1293eb86793568be4f2238424536b634c21711ccc3392,2024-10-15T16:04:59.350000 +CVE-2024-9399,0,0,71d350d28d9602a123d1293eb86793568be4f2238424536b634c21711ccc3392,2024-10-15T16:04:59.350000 CVE-2024-9400,0,0,a07b092a7377838a4bb1e87b4e3b2f09cba515c42895dfa1fbf9dfd7eae19700,2024-10-04T13:51:25.567000 CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f468c,2024-10-04T13:51:25.567000 CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b23,2024-10-04T13:51:25.567000 @@ -265426,16 +265429,16 @@ CVE-2024-9465,0,0,add9f556a2a76282938e69631466c01e7fcb9a0d783603fabcb3a9a8f6f9d5 CVE-2024-9466,0,0,4056ea73cc1df707db4f05bb2a6ab96565812ace99f5afd63580b9c827e5636d,2024-10-15T15:08:55.420000 CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000 CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000 -CVE-2024-9469,0,0,8bb9a78228eb26b44d146abb8c36e4dccf96e88c6afa5a6a89dd30c8de19d781,2024-10-10T12:51:56.987000 +CVE-2024-9469,0,1,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000 CVE-2024-9470,0,0,6d7d145d5ed6ae4ef4f33928573352f54839c5b9641b899af46f8b3aa4ed69d1,2024-10-10T12:51:56.987000 -CVE-2024-9471,0,1,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000 -CVE-2024-9473,0,0,b488f190917a741efff9ce774060e2242f39c1fd009aabbb1ce12625032617b4,2024-10-10T12:51:56.987000 +CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000 +CVE-2024-9473,0,1,825f3e5d710ec92d62a1f5ebd2a2dd44d1120fd5e69e5435fa3d2066e6d99e08,2024-10-15T18:54:54.560000 CVE-2024-9481,0,0,dce581617d5cf6edbc62a2fe02f71507870c412f67698e0495feb9e6b8ee0972,2024-10-04T13:50:43.727000 CVE-2024-9482,0,0,10c3c4a119489ce5d129acd1f72184e55e1f72d2675c976690dcbbc5d407b533,2024-10-04T13:50:43.727000 CVE-2024-9483,0,0,6a9a1cfe421d679c621a2969a64278be9b39bdca7774e9b4a3235c5640b6357b,2024-10-04T13:50:43.727000 CVE-2024-9484,0,0,3f1e4bdc376cc95b97b5c0150a8d7b1a17051d92adc32b058eb06edb62f443eb,2024-10-04T13:50:43.727000 CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9a7,2024-10-15T12:58:51.050000 -CVE-2024-9506,1,1,1b9faa7ea92c6eb294076b1b1dafc59deb1bacd745dcd940153d30384a0a3ce0,2024-10-15T16:15:06.650000 +CVE-2024-9506,0,0,1b9faa7ea92c6eb294076b1b1dafc59deb1bacd745dcd940153d30384a0a3ce0,2024-10-15T16:15:06.650000 CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000 CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 CVE-2024-9514,0,0,a0c385c9cad31170054b57880ea14385102aa94e9ee1a9b5619f4982b4ac92e4,2024-10-09T11:19:25.577000 @@ -265502,7 +265505,7 @@ CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb776103 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9675,0,0,cd830de46e01fce71654106f4dc61863debb474230c2cb4969fc123764df58c7,2024-10-10T12:51:56.987000 -CVE-2024-9676,1,1,adf46a01644c0b5011ec1c0db0d0631e1b3a4d9e1974ae046ccbb83f76e08c4a,2024-10-15T16:15:06.933000 +CVE-2024-9676,0,0,adf46a01644c0b5011ec1c0db0d0631e1b3a4d9e1974ae046ccbb83f76e08c4a,2024-10-15T16:15:06.933000 CVE-2024-9680,0,0,a011127e762167171e169cf1c5c34d37941413b66fef20ba90b60170aec9759f,2024-10-11T13:15:21.013000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9687,0,0,892b3ec492b9f76dc48c1c64fed3d122004a3f16f1ff48bd4dbf12570db9abe9,2024-10-15T12:57:46.880000 @@ -265525,23 +265528,23 @@ CVE-2024-9789,0,0,0b7e270cf4baeae63b135180c0b00e3345c02df6dc92f399d94198cc5dcc2f CVE-2024-9790,0,0,14c4372898279ac90fde78cce4001f6f1e8b4b9eda1cf1e99e5ebf775cc5b4c6,2024-10-15T12:58:51.050000 CVE-2024-9792,0,0,d68aca032770f3ab555b174d9c980d2b9c8b7e1f4d87418bf0969c937a5a85c0,2024-10-15T12:58:51.050000 CVE-2024-9793,0,0,0f71c88bb614b0080f91ce00289e6f60c39b1d1486897ebc6c960c3d831b128b,2024-10-15T12:58:51.050000 -CVE-2024-9794,0,0,3f24c240ccf8d574723ec3c16ceea804867b41065e67eb7dc8dc6908830adede,2024-10-15T12:58:51.050000 -CVE-2024-9796,0,0,899ce363196ddc68e5b47cda88813fdcdfeceffcc5f5079fa63ff41ce27f0d98,2024-10-10T15:35:16.310000 -CVE-2024-9797,0,0,3b99b39be435a5eb019ee3dccac3de76ed79cc37733e7af970c6749ada946336,2024-10-15T12:58:51.050000 +CVE-2024-9794,0,1,2109299c412606589d2d15c7a99f00ade0d69b6b01c343ac91afffa4dccb49fe,2024-10-15T19:12:36.503000 +CVE-2024-9796,0,1,e9e2b215bb5f3ccc6d7244ebabf60d89574166678e83498211f5060a11c7c349,2024-10-15T18:46:53.397000 +CVE-2024-9797,0,1,76d0d64f17ede2284b5f27cd006706a5a6cf138e624975afba6fbae8df1636b1,2024-10-15T19:14:42.600000 CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f5a,2024-10-10T15:35:16.493000 CVE-2024-9799,0,0,7cb01e604d6eac6e5a3859204aba429f0c165ddde47994b62794b11c93d01e84,2024-10-15T12:58:51.050000 CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000 CVE-2024-9803,0,0,c198e0f40a9e86d3c4f20656e7a7e2143c76b9f81b8509b1d0c40b2503cd6b64,2024-10-15T12:58:51.050000 -CVE-2024-9804,0,0,6e0b935f7d4d0bd3e6a861a26d364dc1d0bbd2a1f958a831798b240f7388a4c5,2024-10-15T12:58:51.050000 -CVE-2024-9805,0,0,728f8ef41df59eb6c440577d1152338661bdb36bd0caa1806c03d834f72ea70e,2024-10-15T12:58:51.050000 +CVE-2024-9804,0,1,68f5c7e14739a6361e19dd7d813977d666aa17ad23eace3ce2a17d5ea8fdec35,2024-10-15T19:17:27.083000 +CVE-2024-9805,0,1,ee00c11b4d31e847e0ebd53a130c82f569b78de6fc7dd36fd6219e14679cf80b,2024-10-15T19:18:27.987000 CVE-2024-9806,0,0,2a19b98163bbc19db8559bafff0a76ba4932387d3b8511ad3780630baad612c8,2024-10-15T12:58:51.050000 CVE-2024-9807,0,0,78a38d043b1962fb3571036d21641177bef4e7c8d56e6b70ccb1a7373eaaec64,2024-10-15T12:58:51.050000 -CVE-2024-9808,0,0,311d5115d832756e9b44bf5fe7ba9a357d1137429465846f82fc9b575361de88,2024-10-15T12:58:51.050000 -CVE-2024-9809,0,0,85839514d9e2e34531395152e5827a30d9a81a82feda2b6bf75dd600826a8637,2024-10-15T12:58:51.050000 -CVE-2024-9810,0,0,dd3b09561c8ce39b0b50eac1926d846f85a1af249d5af07bb373f1e84f72204c,2024-10-15T12:58:51.050000 -CVE-2024-9811,0,0,43216b70b942216744f7e944e2535e1f9673f3f0f5fcdfbb23c789be8d44cea5,2024-10-15T12:58:51.050000 -CVE-2024-9812,0,0,32a7aede18aabe98855d3e6f664137855d2bd57fcaaf0e07bab05866e8e1c2e0,2024-10-15T12:58:51.050000 -CVE-2024-9813,0,0,c30d72a6a117fc5a327572b4f7f1abf516303c5f833d23ab47c0fa5dd3840a48,2024-10-15T12:58:51.050000 +CVE-2024-9808,0,1,8cb37bc0987e5d1a9cd6e2e2fdc996dda3265bb7143c31d3e644a0c1f12bc2e9,2024-10-15T19:19:57.720000 +CVE-2024-9809,0,1,6a6378bfa76c432c34db3affd586d6db82005db89ffbb959913ee66d0494ec0e,2024-10-15T19:21:13.343000 +CVE-2024-9810,0,1,c1986a5d4762fc2b8cf5273afd6cc2193d22cf0f70a679146d48fbe94e3902f2,2024-10-15T19:22:00.260000 +CVE-2024-9811,0,1,1da541f99caffc6ef33768ad0c7e75efe4945fef39464cf1fdbfee5cf8c9e1bb,2024-10-15T19:22:35.447000 +CVE-2024-9812,0,1,f7c2d67f254da57e92f97292917f047072a690b4b64d871b69e515fdcb45b363,2024-10-15T19:22:51.340000 +CVE-2024-9813,0,1,ebf8d991a9c56aa1f46b8a521fcad95d28b775470618a7a18b02317ab25ddfe0,2024-10-15T19:23:28.953000 CVE-2024-9814,0,0,909acc5669e0933797959b0f41ad905b48ee6338c8fb12bc92a4d2dcabca5f68,2024-10-15T12:58:51.050000 CVE-2024-9815,0,0,3efadeccbd9056fc1482d694efde2ac99851dc1cec21b9808ae962cd6dc508bc,2024-10-15T12:58:51.050000 CVE-2024-9816,0,0,cb20564cea99b9db0854ced1c2220742827ad9a1167949cee8f49b0272321d69,2024-10-15T12:58:51.050000 @@ -265555,7 +265558,7 @@ CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca42489 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 CVE-2024-9855,0,0,f4067d5f9739a4a46f27ed071acd023bca1d9a27db9968d98f329af2e8d70e8b,2024-10-15T12:58:51.050000 CVE-2024-9856,0,0,531963d8959dcaa0b68edaa5a63ce972541a941d9ad2303b1c288946d989ee89,2024-10-15T12:58:51.050000 -CVE-2024-9859,0,0,5e0dfd360014bd094ecef0a7ea3370cee2da248303a5356ea1a2ff0850990355,2024-10-15T12:57:46.880000 +CVE-2024-9859,0,1,144046db89cc7a1614c278bf90f5b4cc56b3ffdbde195acab46c61c2bc1b4092,2024-10-15T19:35:46.273000 CVE-2024-9860,0,0,5146b7a0224d680f933516d3f319e5a1a7abd782ae32358fb855e1c62c4df555,2024-10-15T12:57:46.880000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9894,0,0,14c1a187244ef98f70dad85c66b4e9e50b1523e45b13c684f05d8920a1d43b87,2024-10-15T12:57:46.880000 @@ -265590,8 +265593,8 @@ CVE-2024-9969,0,0,b88b6c4d3144ed615cd4311477b588678016590767983c0a36b38fc380f998 CVE-2024-9970,0,0,f001ac5abb7acc6ee06697c87a0cadac78ed1edd27d729d7f3d33875ec6b0a19,2024-10-15T12:57:46.880000 CVE-2024-9971,0,0,0594322115675ee753da27d556fc98ba9a723e7e04d41180f103320a4dd3f2c8,2024-10-15T12:57:46.880000 CVE-2024-9972,0,0,5672d796a3c0672617371b1fdfcdf3d8d1d30983cb269f7a20c96a13095710bc,2024-10-15T12:57:46.880000 -CVE-2024-9973,0,0,90a4187e6222035204a8094c1c908de4880d8343ba51bb13b56d0fd8dbd825af,2024-10-15T12:57:46.880000 -CVE-2024-9974,0,0,5c2b24e6ab8d26657f725ff3097d3b75619f11c33939e49479ca469fe5e9a9f8,2024-10-15T12:57:46.880000 +CVE-2024-9973,0,1,2267d71a3858182cc86abb02ea7f42a8954ae87627f44eaf0eee78687227d7e4,2024-10-15T19:27:44.020000 +CVE-2024-9974,0,1,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee70b,2024-10-15T19:28:37.377000 CVE-2024-9975,0,0,19a95b0d8594378de1a658f6110dd6917411d1ac6b44da217f59a38aaf420a6d,2024-10-15T12:57:46.880000 CVE-2024-9976,0,0,a0343d2773336f2452d12e06f8ed1c829d33d78887485939f459af0a85f318bf,2024-10-15T12:57:46.880000 CVE-2024-9977,0,0,2ff728332776d36f7a0b4f17f71817f48b8215cf8e3f608a790b17fa094fa3ba,2024-10-15T13:15:11.457000