From dcc1b3f26dcb4ada79729dbbc259148d026e2b6a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 29 Oct 2024 17:03:29 +0000 Subject: [PATCH] Auto-Update: 2024-10-29T17:00:30.149051+00:00 --- CVE-1999/CVE-1999-00xx/CVE-1999-0029.json | 4 +- CVE-2013/CVE-2013-70xx/CVE-2013-7030.json | 24 +- CVE-2014/CVE-2014-94xx/CVE-2014-9426.json | 24 +- CVE-2022/CVE-2022-243xx/CVE-2022-24329.json | 4 +- CVE-2022/CVE-2022-254xx/CVE-2022-25477.json | 32 +- CVE-2022/CVE-2022-261xx/CVE-2022-26135.json | 34 +- CVE-2022/CVE-2022-266xx/CVE-2022-26699.json | 24 +- CVE-2022/CVE-2022-316xx/CVE-2022-31629.json | 32 +- CVE-2022/CVE-2022-325xx/CVE-2022-32503.json | 4 +- CVE-2022/CVE-2022-34xx/CVE-2022-3447.json | 32 +- CVE-2022/CVE-2022-352xx/CVE-2022-35205.json | 32 +- CVE-2022/CVE-2022-368xx/CVE-2022-36800.json | 34 +- CVE-2022/CVE-2022-368xx/CVE-2022-36801.json | 34 +- CVE-2022/CVE-2022-368xx/CVE-2022-36802.json | 34 +- CVE-2022/CVE-2022-38xx/CVE-2022-3863.json | 34 +- CVE-2022/CVE-2022-408xx/CVE-2022-40897.json | 32 +- CVE-2022/CVE-2022-40xx/CVE-2022-4025.json | 34 +- CVE-2022/CVE-2022-460xx/CVE-2022-46088.json | 39 +- CVE-2022/CVE-2022-486xx/CVE-2022-48627.json | 27 +- CVE-2022/CVE-2022-486xx/CVE-2022-48636.json | 39 +- CVE-2022/CVE-2022-486xx/CVE-2022-48650.json | 27 +- CVE-2022/CVE-2022-489xx/CVE-2022-48948.json | 152 +++- CVE-2022/CVE-2022-489xx/CVE-2022-48949.json | 185 ++++- CVE-2022/CVE-2022-49xx/CVE-2022-4917.json | 32 +- CVE-2022/CVE-2022-49xx/CVE-2022-4926.json | 34 +- CVE-2023/CVE-2023-245xx/CVE-2023-24591.json | 57 +- CVE-2023/CVE-2023-250xx/CVE-2023-25073.json | 57 +- CVE-2023/CVE-2023-259xx/CVE-2023-25945.json | 57 +- CVE-2023/CVE-2023-259xx/CVE-2023-25951.json | 95 ++- CVE-2023/CVE-2023-265xx/CVE-2023-26586.json | 95 ++- CVE-2023/CVE-2023-283xx/CVE-2023-28374.json | 95 ++- CVE-2023/CVE-2023-284xx/CVE-2023-28407.json | 57 +- CVE-2023/CVE-2023-287xx/CVE-2023-28715.json | 57 +- CVE-2023/CVE-2023-287xx/CVE-2023-28720.json | 110 ++- CVE-2023/CVE-2023-319xx/CVE-2023-31998.json | 14 +- CVE-2023/CVE-2023-326xx/CVE-2023-32618.json | 57 +- CVE-2023/CVE-2023-326xx/CVE-2023-32642.json | 110 ++- CVE-2023/CVE-2023-326xx/CVE-2023-32644.json | 110 ++- CVE-2023/CVE-2023-326xx/CVE-2023-32651.json | 95 ++- CVE-2023/CVE-2023-338xx/CVE-2023-33875.json | 110 ++- CVE-2023/CVE-2023-343xx/CVE-2023-34351.json | 57 +- CVE-2023/CVE-2023-349xx/CVE-2023-34983.json | 110 ++- CVE-2023/CVE-2023-350xx/CVE-2023-35060.json | 57 +- CVE-2023/CVE-2023-350xx/CVE-2023-35062.json | 57 +- CVE-2023/CVE-2023-357xx/CVE-2023-35769.json | 57 +- CVE-2023/CVE-2023-364xx/CVE-2023-36493.json | 56 +- CVE-2024/CVE-2024-100xx/CVE-2024-10014.json | 55 +- CVE-2024/CVE-2024-101xx/CVE-2024-10189.json | 60 +- CVE-2024/CVE-2024-104xx/CVE-2024-10452.json | 56 ++ CVE-2024/CVE-2024-104xx/CVE-2024-10462.json | 39 +- CVE-2024/CVE-2024-104xx/CVE-2024-10463.json | 39 +- CVE-2024/CVE-2024-104xx/CVE-2024-10464.json | 39 +- CVE-2024/CVE-2024-104xx/CVE-2024-10465.json | 39 +- CVE-2024/CVE-2024-104xx/CVE-2024-10466.json | 39 +- CVE-2024/CVE-2024-104xx/CVE-2024-10467.json | 43 +- CVE-2024/CVE-2024-104xx/CVE-2024-10468.json | 39 +- CVE-2024/CVE-2024-20xx/CVE-2024-2004.json | 14 +- CVE-2024/CVE-2024-21xx/CVE-2024-2193.json | 39 +- CVE-2024/CVE-2024-225xx/CVE-2024-22526.json | 39 +- CVE-2024/CVE-2024-250xx/CVE-2024-25079.json | 4 +- CVE-2024/CVE-2024-255xx/CVE-2024-25566.json | 82 ++ CVE-2024/CVE-2024-278xx/CVE-2024-27839.json | 14 +- CVE-2024/CVE-2024-280xx/CVE-2024-28020.json | 6 +- CVE-2024/CVE-2024-280xx/CVE-2024-28021.json | 16 +- CVE-2024/CVE-2024-280xx/CVE-2024-28022.json | 6 +- CVE-2024/CVE-2024-280xx/CVE-2024-28024.json | 14 +- CVE-2024/CVE-2024-301xx/CVE-2024-30124.json | 14 +- CVE-2024/CVE-2024-317xx/CVE-2024-31714.json | 4 +- CVE-2024/CVE-2024-326xx/CVE-2024-32615.json | 4 +- CVE-2024/CVE-2024-329xx/CVE-2024-32944.json | 39 +- CVE-2024/CVE-2024-332xx/CVE-2024-33220.json | 14 +- CVE-2024/CVE-2024-332xx/CVE-2024-33222.json | 14 +- CVE-2024/CVE-2024-341xx/CVE-2024-34199.json | 4 +- CVE-2024/CVE-2024-342xx/CVE-2024-34200.json | 4 +- CVE-2024/CVE-2024-342xx/CVE-2024-34221.json | 4 +- CVE-2024/CVE-2024-349xx/CVE-2024-34950.json | 4 +- CVE-2024/CVE-2024-349xx/CVE-2024-34974.json | 4 +- CVE-2024/CVE-2024-407xx/CVE-2024-40746.json | 62 +- CVE-2024/CVE-2024-408xx/CVE-2024-40810.json | 65 +- CVE-2024/CVE-2024-420xx/CVE-2024-42017.json | 14 +- CVE-2024/CVE-2024-438xx/CVE-2024-43838.json | 77 +- CVE-2024/CVE-2024-438xx/CVE-2024-43840.json | 70 +- CVE-2024/CVE-2024-438xx/CVE-2024-43841.json | 109 ++- CVE-2024/CVE-2024-438xx/CVE-2024-43843.json | 70 +- CVE-2024/CVE-2024-441xx/CVE-2024-44185.json | 131 ++- CVE-2024/CVE-2024-442xx/CVE-2024-44205.json | 129 ++- CVE-2024/CVE-2024-442xx/CVE-2024-44206.json | 125 ++- CVE-2024/CVE-2024-446xx/CVE-2024-44667.json | 4 +- CVE-2024/CVE-2024-470xx/CVE-2024-47068.json | 6 +- CVE-2024/CVE-2024-474xx/CVE-2024-47486.json | 34 +- CVE-2024/CVE-2024-478xx/CVE-2024-47883.json | 65 +- CVE-2024/CVE-2024-489xx/CVE-2024-48921.json | 78 ++ CVE-2024/CVE-2024-492xx/CVE-2024-49214.json | 14 +- CVE-2024/CVE-2024-492xx/CVE-2024-49273.json | 61 +- CVE-2024/CVE-2024-492xx/CVE-2024-49288.json | 47 +- CVE-2024/CVE-2024-492xx/CVE-2024-49293.json | 51 +- CVE-2024/CVE-2024-493xx/CVE-2024-49321.json | 51 +- CVE-2024/CVE-2024-497xx/CVE-2024-49768.json | 64 ++ CVE-2024/CVE-2024-497xx/CVE-2024-49769.json | 68 ++ CVE-2024/CVE-2024-499xx/CVE-2024-49970.json | 69 +- CVE-2024/CVE-2024-499xx/CVE-2024-49983.json | 130 ++- CVE-2024/CVE-2024-499xx/CVE-2024-49984.json | 94 ++- CVE-2024/CVE-2024-499xx/CVE-2024-49997.json | 135 ++- CVE-2024/CVE-2024-500xx/CVE-2024-50067.json | 85 +- CVE-2024/CVE-2024-503xx/CVE-2024-50334.json | 78 ++ CVE-2024/CVE-2024-504xx/CVE-2024-50408.json | 51 +- CVE-2024/CVE-2024-504xx/CVE-2024-50416.json | 61 +- CVE-2024/CVE-2024-504xx/CVE-2024-50442.json | 51 +- CVE-2024/CVE-2024-504xx/CVE-2024-50450.json | 51 +- CVE-2024/CVE-2024-504xx/CVE-2024-50463.json | 51 +- CVE-2024/CVE-2024-504xx/CVE-2024-50486.json | 63 +- CVE-2024/CVE-2024-79xx/CVE-2024-7985.json | 64 ++ CVE-2024/CVE-2024-89xx/CVE-2024-8923.json | 88 ++ CVE-2024/CVE-2024-95xx/CVE-2024-9589.json | 54 +- CVE-2024/CVE-2024-95xx/CVE-2024-9590.json | 54 +- CVE-2024/CVE-2024-95xx/CVE-2024-9591.json | 64 +- README.md | 93 +-- _state.csv | 858 ++++++++++---------- 118 files changed, 6079 insertions(+), 854 deletions(-) create mode 100644 CVE-2024/CVE-2024-104xx/CVE-2024-10452.json create mode 100644 CVE-2024/CVE-2024-255xx/CVE-2024-25566.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48921.json create mode 100644 CVE-2024/CVE-2024-497xx/CVE-2024-49768.json create mode 100644 CVE-2024/CVE-2024-497xx/CVE-2024-49769.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50334.json create mode 100644 CVE-2024/CVE-2024-79xx/CVE-2024-7985.json create mode 100644 CVE-2024/CVE-2024-89xx/CVE-2024-8923.json diff --git a/CVE-1999/CVE-1999-00xx/CVE-1999-0029.json b/CVE-1999/CVE-1999-00xx/CVE-1999-0029.json index 95f63a522e0..9ffb0853240 100644 --- a/CVE-1999/CVE-1999-00xx/CVE-1999-0029.json +++ b/CVE-1999/CVE-1999-00xx/CVE-1999-0029.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0029", "sourceIdentifier": "cve@mitre.org", "published": "1997-07-16T04:00:00.000", - "lastModified": "2024-08-01T20:35:04.517", + "lastModified": "2024-10-29T15:35:01.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -77,7 +77,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2013/CVE-2013-70xx/CVE-2013-7030.json b/CVE-2013/CVE-2013-70xx/CVE-2013-7030.json index f315002793e..f1094cf0a3e 100644 --- a/CVE-2013/CVE-2013-70xx/CVE-2013-7030.json +++ b/CVE-2013/CVE-2013-70xx/CVE-2013-7030.json @@ -2,7 +2,7 @@ "id": "CVE-2013-7030", "sourceIdentifier": "cve@mitre.org", "published": "2013-12-12T17:55:03.783", - "lastModified": "2024-08-06T18:15:44.737", + "lastModified": "2024-10-29T15:35:02.647", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.7 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json b/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json index 9128b46f7aa..04e6270eee9 100644 --- a/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json +++ b/CVE-2014/CVE-2014-94xx/CVE-2014-9426.json @@ -2,7 +2,7 @@ "id": "CVE-2014-9426", "sourceIdentifier": "cve@mitre.org", "published": "2014-12-31T02:59:01.217", - "lastModified": "2024-08-06T14:15:49.283", + "lastModified": "2024-10-29T15:35:02.883", "vulnStatus": "Modified", "cveTags": [ { @@ -23,6 +23,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", diff --git a/CVE-2022/CVE-2022-243xx/CVE-2022-24329.json b/CVE-2022/CVE-2022-243xx/CVE-2022-24329.json index 0ead3c0f38c..dc047a01300 100644 --- a/CVE-2022/CVE-2022-243xx/CVE-2022-24329.json +++ b/CVE-2022/CVE-2022-243xx/CVE-2022-24329.json @@ -2,7 +2,7 @@ "id": "CVE-2022-24329", "sourceIdentifier": "cve@mitre.org", "published": "2022-02-25T15:15:09.897", - "lastModified": "2023-02-22T17:50:02.030", + "lastModified": "2024-10-29T15:36:31.610", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -71,7 +71,7 @@ "description": [ { "lang": "en", - "value": "CWE-667" + "value": "CWE-829" } ] } diff --git a/CVE-2022/CVE-2022-254xx/CVE-2022-25477.json b/CVE-2022/CVE-2022-254xx/CVE-2022-25477.json index 3360b6650b3..9f9a0995241 100644 --- a/CVE-2022/CVE-2022-254xx/CVE-2022-25477.json +++ b/CVE-2022/CVE-2022-254xx/CVE-2022-25477.json @@ -2,7 +2,7 @@ "id": "CVE-2022-25477", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T19:15:11.757", - "lastModified": "2024-10-24T17:15:13.463", + "lastModified": "2024-10-29T15:35:03.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-261xx/CVE-2022-26135.json b/CVE-2022/CVE-2022-261xx/CVE-2022-26135.json index 781515bbe66..83f0d163a42 100644 --- a/CVE-2022/CVE-2022-261xx/CVE-2022-26135.json +++ b/CVE-2022/CVE-2022-261xx/CVE-2022-26135.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26135", "sourceIdentifier": "security@atlassian.com", "published": "2022-06-30T06:15:07.693", - "lastModified": "2022-08-04T15:31:35.393", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:35:01.013", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -74,6 +94,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-266xx/CVE-2022-26699.json b/CVE-2022/CVE-2022-266xx/CVE-2022-26699.json index 9d0fc6b2f8f..808bc4e5075 100644 --- a/CVE-2022/CVE-2022-266xx/CVE-2022-26699.json +++ b/CVE-2022/CVE-2022-266xx/CVE-2022-26699.json @@ -2,8 +2,8 @@ "id": "CVE-2022-26699", "sourceIdentifier": "product-security@apple.com", "published": "2023-08-14T23:15:10.020", - "lastModified": "2023-08-18T20:12:40.500", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T15:35:04.353", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31629.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31629.json index e1a7c09741e..ec5a9edd204 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31629.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31629.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31629", "sourceIdentifier": "security@php.net", "published": "2022-09-28T23:15:10.540", - "lastModified": "2024-05-01T17:15:24.897", + "lastModified": "2024-10-29T15:35:04.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -59,6 +79,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json b/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json index 82c3b664b95..8e0ddaf32bc 100644 --- a/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json +++ b/CVE-2022/CVE-2022-325xx/CVE-2022-32503.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32503", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T10:43:41.040", - "lastModified": "2024-07-03T01:38:31.060", + "lastModified": "2024-10-29T15:35:05.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-288" + "value": "CWE-306" } ] } diff --git a/CVE-2022/CVE-2022-34xx/CVE-2022-3447.json b/CVE-2022/CVE-2022-34xx/CVE-2022-3447.json index d7568f398ef..62051cc61d4 100644 --- a/CVE-2022/CVE-2022-34xx/CVE-2022-3447.json +++ b/CVE-2022/CVE-2022-34xx/CVE-2022-3447.json @@ -2,7 +2,7 @@ "id": "CVE-2022-3447", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2022-11-09T19:15:10.673", - "lastModified": "2023-05-03T12:16:24.360", + "lastModified": "2024-10-29T15:35:07.713", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-352xx/CVE-2022-35205.json b/CVE-2022/CVE-2022-352xx/CVE-2022-35205.json index fbbed0bed85..166089b47b8 100644 --- a/CVE-2022/CVE-2022-352xx/CVE-2022-35205.json +++ b/CVE-2022/CVE-2022-352xx/CVE-2022-35205.json @@ -2,7 +2,7 @@ "id": "CVE-2022-35205", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:23.060", - "lastModified": "2023-10-06T15:15:13.000", + "lastModified": "2024-10-29T15:35:06.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36800.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36800.json index caa37dce1b4..9b8731eb864 100644 --- a/CVE-2022/CVE-2022-368xx/CVE-2022-36800.json +++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36800.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36800", "sourceIdentifier": "security@atlassian.com", "published": "2022-08-03T03:15:08.460", - "lastModified": "2023-08-08T14:22:24.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:35:02.460", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36801.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36801.json index b087086aa1c..06399d94fd7 100644 --- a/CVE-2022/CVE-2022-368xx/CVE-2022-36801.json +++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36801.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36801", "sourceIdentifier": "security@atlassian.com", "published": "2022-08-10T03:15:08.187", - "lastModified": "2022-08-12T17:38:37.907", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:35:03.280", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-368xx/CVE-2022-36802.json b/CVE-2022/CVE-2022-368xx/CVE-2022-36802.json index 2947f0b0b63..506f1f0c646 100644 --- a/CVE-2022/CVE-2022-368xx/CVE-2022-36802.json +++ b/CVE-2022/CVE-2022-368xx/CVE-2022-36802.json @@ -2,8 +2,8 @@ "id": "CVE-2022-36802", "sourceIdentifier": "security@atlassian.com", "published": "2022-10-14T04:15:13.703", - "lastModified": "2022-10-17T15:08:01.323", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:35:04.083", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-38xx/CVE-2022-3863.json b/CVE-2022/CVE-2022-38xx/CVE-2022-3863.json index 4e562f2f8f8..338cd3be38d 100644 --- a/CVE-2022/CVE-2022-38xx/CVE-2022-3863.json +++ b/CVE-2022/CVE-2022-38xx/CVE-2022-3863.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3863", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-01-02T23:15:10.730", - "lastModified": "2023-01-09T19:14:44.877", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T15:35:08.557", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-408xx/CVE-2022-40897.json b/CVE-2022/CVE-2022-408xx/CVE-2022-40897.json index 71df70ff534..83880488a4c 100644 --- a/CVE-2022/CVE-2022-408xx/CVE-2022-40897.json +++ b/CVE-2022/CVE-2022-408xx/CVE-2022-40897.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40897", "sourceIdentifier": "cve@mitre.org", "published": "2022-12-23T00:15:13.987", - "lastModified": "2024-06-21T19:15:23.877", + "lastModified": "2024-10-29T15:35:09.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-1333" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1333" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-40xx/CVE-2022-4025.json b/CVE-2022/CVE-2022-40xx/CVE-2022-4025.json index 131eeb79e58..440b0268dd0 100644 --- a/CVE-2022/CVE-2022-40xx/CVE-2022-4025.json +++ b/CVE-2022/CVE-2022-40xx/CVE-2022-4025.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4025", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-01-02T23:15:10.783", - "lastModified": "2023-08-08T14:22:24.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:35:06.953", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json b/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json index f0ae343e6f8..4c70e8a14e4 100644 --- a/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json +++ b/CVE-2022/CVE-2022-460xx/CVE-2022-46088.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46088", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T16:15:49.190", - "lastModified": "2024-03-05T18:50:18.333", + "lastModified": "2024-10-29T16:35:04.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Online Flight Booking Management System v1.0 contiene una vulnerabilidad de cross-site scripting (XSS) a trav\u00e9s del formulario de comentarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ASR511-OO7/CVE-2022-46088/blob/main/CVE-36", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json index 7f89da87dfb..6b1b36d054f 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48627.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48627", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-02T22:15:46.930", - "lastModified": "2024-06-27T12:15:13.380", + "lastModified": "2024-10-29T16:35:05.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vt: corrige la superposici\u00f3n de memoria al eliminar caracteres en el b\u00fafer. Se produce una copia de memoria superpuesta al eliminar una l\u00ednea larga. Esta copia superpuesta de memoria puede causar corrupci\u00f3n de datos cuando scr_memcpyw est\u00e1 optimizado para memcpy porque memcpy no garantiza su comportamiento si el b\u00fafer de destino se superpone con el b\u00fafer de origen. El b\u00fafer de l\u00ednea no siempre est\u00e1 roto, porque memcpy utiliza la aceleraci\u00f3n de hardware, cuyo resultado no es determinista. Solucione este problema reemplazando scr_memcpyw con scr_memmoew." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/14d2cc21ca622310babf373e3a8f0b40acfe8265", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48636.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48636.json index 6523e8104b1..301759dbf9d 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48636.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48636.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48636", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:06.710", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-10-29T16:35:05.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: s390/dasd: corrige Ups en dasd_alias_get_start_dev debido a la falta de pavgroup. Corrige Ups en la funci\u00f3n dasd_alias_get_start_dev() causada porque el puntero pavgroup es NULL. El puntero pavgroup se verifica en la entrada de la funci\u00f3n pero sin que se mantenga presionado el bloqueo lcu->. Por lo tanto, existe una ventana de ejecuci\u00f3n entre dasd_alias_get_start_dev() y _lcu_update() que establece pavgroup en NULL con el bloqueo lcu->retenido. Para solucionarlo, compruebe el puntero de pavgroup con lcu->lock retenido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2e473351400e3dd66f0b71eddcef82ee45a584c1", diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48650.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48650.json index bd4fe47d3bd..f6c80d6c288 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48650.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48650.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48650", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-28T13:15:07.380", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-10-29T16:35:06.770", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: scsi: qla2xxx: Reparar p\u00e9rdida de memoria en __qlt_24xx_handle_abts() el commit 8f394da36a36 (\"scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG\") hizo que la funci\u00f3n __qlt_24xx_handle_abts() regresara antes si tcm_qla2xxx_find_cmd_by_tag() no lo hizo encontr\u00f3 un comando, pero no pudo limpiar la memoria asignada para el comando de administraci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/601be20fc6a1b762044d2398befffd6bf236cebf", diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48948.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48948.json index fa8184cf8db..ef536cdb0e6 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48948.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48948.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48948", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.230", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:34:03.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,43 +15,171 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: uvc: Evitar desbordamiento de b\u00fafer en el controlador de configuraci\u00f3n La funci\u00f3n de configuraci\u00f3n uvc_function_setup permite solicitudes de transferencia de control con hasta 64 bytes de payload (UVC_MAX_REQUEST_SIZE), el controlador de etapa de datos para transferencia OUT usa memcpy para copiar req->actual bytes a la matriz uvc_event->data.data de tama\u00f1o 60. Esto puede resultar en un desbordamiento de 4 bytes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.35", + "versionEndExcluding": "4.9.337", + "matchCriteriaId": "8118BB3A-5FED-4BA6-8788-DE9274F8319B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.14.303", + "matchCriteriaId": "1E7450AD-4739-46F0-B81B-C02E7B35A97B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.270", + "matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.229", + "matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.161", + "matchCriteriaId": "6CD83369-DB79-46EF-B731-E327A63A4E1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.85", + "matchCriteriaId": "E0D49B1E-E996-4A13-9C5C-23C64BBD0E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.15", + "matchCriteriaId": "3E66ABBB-C60E-481F-88C6-ED81661DFC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB047947-8B25-46FD-8AEA-A916F4A3DC71" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/06fd17ee92c8f1704c7e54ec0fd50ae0542a49a5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4972e3528b968665b596b5434764ff8fd9446d35", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c92670b16727365699fe4b19ed32013bab2c107", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6b41a35b41f77821db24f2d8f66794b390a585c5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7b1f773277a72f9756d47a41b94e43506cce1954", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b8fb1cba934ea122b50f13a4f9d6fc4fdc43d2be", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bc8380fe5768c564f921f7b4eaba932e330b9e4b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c79538f32df12887f110dcd6b9c825b482905f24", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d1a92bb8d697f170d93fe922da763d7d156b8841", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48949.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48949.json index 8df787ed6b0..ad36753ed5b 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48949.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48949.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48949", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:06.337", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:32:41.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,202 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: igb: inicializar mensaje de buz\u00f3n para restablecer VF Cuando no se asigna una direcci\u00f3n MAC a la VF, esa parte del mensaje enviado a la VF no se configura. Sin embargo, la memoria se asigna desde la pila, lo que significa que la informaci\u00f3n puede filtrarse a la VM. Inicialice el b\u00fafer de mensajes a 0 para que no se pase informaci\u00f3n a la VM en este caso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0", + "versionEndExcluding": "4.14.303", + "matchCriteriaId": "F1238C2D-F818-46F1-9B91-5BC55D9D2FEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.15", + "versionEndExcluding": "4.19.270", + "matchCriteriaId": "AE8904A3-99BE-4E49-9682-1F90A6373F4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.229", + "matchCriteriaId": "A0C0D95E-414A-445E-941B-3EF6A4D3A093" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.161", + "matchCriteriaId": "6CD83369-DB79-46EF-B731-E327A63A4E1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.85", + "matchCriteriaId": "E0D49B1E-E996-4A13-9C5C-23C64BBD0E0F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.15", + "matchCriteriaId": "3E66ABBB-C60E-481F-88C6-ED81661DFC31" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "EB047947-8B25-46FD-8AEA-A916F4A3DC71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc8:*:*:*:*:*:*", + "matchCriteriaId": "21718AA4-4056-40F2-968E-BDAA465A7872" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "6DFB454D-4F85-4BE2-8CC9-70245EAE4D31" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/367e1e3399dbc56fc669740c4ab60e35da632b0e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/51fd5ede7ed42f272682a0c33d6f0767b3484a3d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a6629659af3f5c6a91e3914ea62554c975ab77f4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c383c7c35c7bc15e07a04eefa060a8a80cbeae29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c581439a977545d61849a72e8ed631cfc8a2a3c1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/de5dc44370fbd6b46bd7f1a1e00369be54a041c8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef1d739dd1f362aec081278ff92f943c31eb177a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f2479c3daaabccbac6c343a737615d0c595c6dc4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4917.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4917.json index e9a88acbf9e..4d259de9365 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4917.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4917.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4917", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:11.410", - "lastModified": "2023-08-19T03:15:19.503", + "lastModified": "2024-10-29T16:35:07.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-49xx/CVE-2022-4926.json b/CVE-2022/CVE-2022-49xx/CVE-2022-4926.json index 363a1291c72..19c077f5fde 100644 --- a/CVE-2022/CVE-2022-49xx/CVE-2022-4926.json +++ b/CVE-2022/CVE-2022-49xx/CVE-2022-4926.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4926", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2023-07-29T00:15:11.893", - "lastModified": "2023-08-15T16:05:07.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:35:09.090", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24591.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24591.json index a6b700841f3..2bec4788e8c 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24591.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24591.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24591", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:40.920", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:15:54.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:binary_configuration_tool:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.4.4", + "matchCriteriaId": "12449AF8-2836-4B59-912F-1C260F5DAE87" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00973.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25073.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25073.json index f151a9b7ba0..e4831d5d6db 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25073.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25073.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25073", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:41.693", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:15:44.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.4.33", + "matchCriteriaId": "A293EC22-0192-4D4A-BF13-BCFDA04A3D04" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25945.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25945.json index c0bdc67c72a..f4b49fc640e 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25945.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25945.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25945", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:43.823", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:15:35.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:one_boot_flash_update:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.31", + "matchCriteriaId": "55797FBC-C56B-4CBD-BA31-E2157C30E82A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00927.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25951.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25951.json index 1c4ad069da9..a220d6c8cbd 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25951.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25951.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25951", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:44.040", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:52:44.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,69 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26586.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26586.json index 6ba658d1614..893794b4245 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26586.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26586.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26586", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:44.547", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:58:04.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,69 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28374.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28374.json index 5d687dbe822..cf53dde082c 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28374.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28374.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28374", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:47.507", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:39:02.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,69 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28407.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28407.json index 5468a56d34b..36e9ecf2072 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28407.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28407.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28407", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:47.893", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:27:09.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:extreme_tuning_utility:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.12.0.29", + "matchCriteriaId": "F68E64E6-DBCF-431D-B5D8-8A4AFF38143E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00955.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28715.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28715.json index f490e92b26c..33538e1e456 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28715.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28715.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28715", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:48.080", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:16:01.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:oneapi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.2", + "matchCriteriaId": "9F911E33-C893-409E-923C-0B1FB4DF8823" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28720.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28720.json index 522b0bf51b7..e2ab31e47da 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28720.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28720.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28720", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:48.273", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:06:24.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json index a2389f70fac..814dc1f5249 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31998.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31998", "sourceIdentifier": "support@hackerone.com", "published": "2023-07-18T03:15:55.163", - "lastModified": "2023-07-27T17:09:55.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:35:10.213", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -67,6 +67,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32618.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32618.json index fd315083855..fdd450aba7f 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32618.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32618.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32618", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:51.317", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:15:14.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:oneapi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.3.2", + "matchCriteriaId": "9F911E33-C893-409E-923C-0B1FB4DF8823" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00956.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32642.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32642.json index 19bd3a63c1c..22e9db1e917 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32642.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32642.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32642", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:52.350", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:06:08.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32644.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32644.json index adc6627f8bc..c3edb8f68e1 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32644.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32644.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32644", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:53.043", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:07:20.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32651.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32651.json index e1a64775632..aef240effcc 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32651.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32651.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32651", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:54.883", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:58:52.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,69 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:proset_wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77EADB2D-F10B-40A9-A938-A89EE0FEFF60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-338xx/CVE-2023-33875.json b/CVE-2023/CVE-2023-338xx/CVE-2023-33875.json index fde535c92de..344159da712 100644 --- a/CVE-2023/CVE-2023-338xx/CVE-2023-33875.json +++ b/CVE-2023/CVE-2023-338xx/CVE-2023-33875.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33875", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:56.020", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:07:31.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34351.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34351.json index 218779cbff0..9ca3302e030 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34351.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34351.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34351", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:57.070", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:14:22.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:performance_counter_monitor:*:*:*:*:*:*:*:*", + "versionEndExcluding": "202307", + "matchCriteriaId": "8C0EC3DA-1CB6-4BD7-9238-9577DCF901C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00954.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34983.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34983.json index f93a6b58dbd..cd946f2f378 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34983.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34983.json @@ -2,8 +2,8 @@ "id": "CVE-2023-34983", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:57.663", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:02:23.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,84 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:killer:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1423.712", + "matchCriteriaId": "9627ABBA-1C01-4319-8EC9-E2C7D9A1A378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:proset\\/wireless:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.240", + "matchCriteriaId": "E61C3056-FB8D-422F-8FCE-94607192C18D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6_ax1650:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E239C04-1D6B-4305-9340-BFEC3E54E19A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1675:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35F09C95-25BD-440A-AD79-8510E54F8DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:killer_wi-fi_6e_ax1690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95537444-5F18-49E1-91D4-AB24B29DF4FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D653F9C-5B2E-400F-8F50-BFE466F08F0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6_ax201:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0433774-9479-4A01-B697-1379AEA223C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "54323008-43E6-4A85-BB92-F2EF6ED8E57C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax211:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C90E6127-7D01-49CE-96EF-9F4CB5891373" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:wi-fi_6e_ax411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE89FD4-8B08-430E-976A-068DBF47F5F7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00947.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35060.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35060.json index 42018b3bac6..6928e82cd67 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35060.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35060.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35060", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:58.773", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:14:35.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:battery_life_diagnostic_tool:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3.1", + "matchCriteriaId": "27E04494-CD21-4A70-BDBC-24EE2FA59D8A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00987.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-350xx/CVE-2023-35062.json b/CVE-2023/CVE-2023-350xx/CVE-2023-35062.json index d79e3dcd759..fbee8468eba 100644 --- a/CVE-2023/CVE-2023-350xx/CVE-2023-35062.json +++ b/CVE-2023/CVE-2023-350xx/CVE-2023-35062.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35062", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:59.780", - "lastModified": "2024-02-14T15:01:51.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:14:45.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:driver_\\&_support_assistant:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.4.33", + "matchCriteriaId": "A293EC22-0192-4D4A-BF13-BCFDA04A3D04" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00969.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35769.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35769.json index 3f64ca3345d..e1228f3df4d 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35769.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35769.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35769", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:00.460", - "lastModified": "2024-02-14T15:01:46.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:14:53.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.4.10577", + "matchCriteriaId": "C1E4DC53-B27B-4E77-8EEF-E3A02B767618" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00959.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-364xx/CVE-2023-36493.json b/CVE-2023/CVE-2023-364xx/CVE-2023-36493.json index 12517cbc945..37f5dcd0843 100644 --- a/CVE-2023/CVE-2023-364xx/CVE-2023-36493.json +++ b/CVE-2023/CVE-2023-364xx/CVE-2023-36493.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36493", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:16:00.873", - "lastModified": "2024-02-14T15:01:46.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:15:03.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:software_development_kit_for_opencl:*:*:*:*:*:*:*:*", + "matchCriteriaId": "2E30C361-9C2F-40F9-A650-BFF1217C02A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00992.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json index 5599b21ad81..904e8be9c52 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10014.json @@ -2,17 +2,41 @@ "id": "CVE-2024-10014", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-18T05:15:03.713", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:58:48.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Flat UI Button plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's flatbtn shortcode in version 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Flat UI Button para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del c\u00f3digo corto flatbtn del complemento en la versi\u00f3n 1.0 debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten secuencias de comandos web arbitrarias en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -47,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tiandiyoyo:flat_ui_button:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A95CF1DB-0CDE-43BD-AE7E-EC77B1D9F3E6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/flat-ui-button/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec5474ac-62d7-4431-b789-51c831dd1c20?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10189.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10189.json index 807fe6c2ed6..628bd43ecee 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10189.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10189.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10189", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T10:15:03.610", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:27:55.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,18 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jesweb:anchor_episodes_index:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.11", + "matchCriteriaId": "F3EE4466-6B8C-4D64-91BC-AE305887C4F4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3171752/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/anchor-episodes-index/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8c8e37f8-708e-41d5-a6b8-3ba587437532?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10452.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10452.json new file mode 100644 index 00000000000..0ab494b6efb --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-10452", + "sourceIdentifier": "security@grafana.com", + "published": "2024-10-29T16:15:04.593", + "lastModified": "2024-10-29T16:15:04.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Organization admins can delete pending invites created in an organization they are not part of." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.2, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.7, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@grafana.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://grafana.com/security/security-advisories/cve-2024-10452", + "source": "security@grafana.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10462.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10462.json index 6e7fab169be..82c79172427 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10462.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10462.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10462", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:03.963", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T15:35:12.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Truncation of a long URL could have allowed origin spoofing in a permission prompt. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920423", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10463.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10463.json index fabb9d080df..23e5640f536 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10463.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10463.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10463", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.040", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T15:35:13.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Video frames could have been leaked between origins in some situations. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Firefox ESR < 115.17, Thunderbird < 128.4, and Thunderbird < 132." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1920800", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10464.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10464.json index c97ed8c1ca6..7dfcfd2319e 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10464.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10464.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10464", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.120", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T15:35:14.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Repeated writes to history interface attributes could have been used to cause a Denial of Service condition in the browser. This was addressed by introducing rate-limiting to this API. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1913000", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10465.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10465.json index 946c4f7849d..67d2fa94c97 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10465.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10465.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10465", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.197", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T15:35:15.247", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A clipboard \"paste\" button could persist across tabs which allowed a spoofing attack. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1918853", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json index 5f6b792b456..fc550ff99ef 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10466.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10466", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.273", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T15:35:16.103", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "By sending a specially crafted push message, a remote server could have hung the parent process, causing the browser to become unresponsive. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924154", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10467.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10467.json index ca75384fd84..df90d3dfe61 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10467.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10467.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10467", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.350", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T15:35:17.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,46 @@ "value": "Memory safety bugs present in Firefox 131, Firefox ESR 128.3, and Thunderbird 128.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 132, Firefox ESR < 128.4, Thunderbird < 128.4, and Thunderbird < 132." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + }, + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1829029%2C1888538%2C1900394%2C1904059%2C1917742%2C1919809%2C1923706", diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10468.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10468.json index 576a84da2c7..f22698b4f93 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10468.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10468.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10468", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-29T13:15:04.447", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-29T15:35:17.917", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Potential race conditions in IndexedDB could have caused memory corruption, leading to a potentially exploitable crash. This vulnerability affects Firefox < 132 and Thunderbird < 132." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1914982", diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json index 890e5550b93..e1eb32fd9d6 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2004", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-03-27T08:15:41.173", - "lastModified": "2024-07-30T02:15:05.320", + "lastModified": "2024-10-29T16:35:12.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jul/18", diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2193.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2193.json index 20ade4220c6..3d203afe2e4 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2193.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2193.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2193", "sourceIdentifier": "cret@cert.org", "published": "2024-03-15T18:15:08.530", - "lastModified": "2024-05-01T17:15:32.313", + "lastModified": "2024-10-29T16:35:13.023", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se ha revelado una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n especulativa (SRC) que afecta a las arquitecturas de CPU modernas que admiten la ejecuci\u00f3n especulativa (relacionada con Spectre V1). Un atacante no autenticado puede aprovechar esta vulnerabilidad para revelar datos arbitrarios de la CPU utilizando condiciones de ejecuci\u00f3n para acceder a las rutas de c\u00f3digo ejecutable especulativas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/12/14", diff --git a/CVE-2024/CVE-2024-225xx/CVE-2024-22526.json b/CVE-2024/CVE-2024-225xx/CVE-2024-22526.json index 891796a1b9b..253a47c76bf 100644 --- a/CVE-2024/CVE-2024-225xx/CVE-2024-22526.json +++ b/CVE-2024/CVE-2024-225xx/CVE-2024-22526.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22526", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-12T07:15:08.480", - "lastModified": "2024-04-12T12:43:46.210", + "lastModified": "2024-10-29T15:35:19.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en bandisoft bandiview v7.0, permite a atacantes locales provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de imagen exr." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/GAP-dev/c33276a151c824300d68aecc317082a3", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json index 054ac2f15e1..9ef15f4ebc5 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25079.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25079", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-15T15:15:07.930", - "lastModified": "2024-07-03T01:48:40.830", + "lastModified": "2024-10-29T15:35:19.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-822" + "value": "CWE-763" } ] } diff --git a/CVE-2024/CVE-2024-255xx/CVE-2024-25566.json b/CVE-2024/CVE-2024-255xx/CVE-2024-25566.json new file mode 100644 index 00000000000..58aa3715ff7 --- /dev/null +++ b/CVE-2024/CVE-2024-255xx/CVE-2024-25566.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-25566", + "sourceIdentifier": "responsible-disclosure@pingidentity.com", + "published": "2024-10-29T16:15:04.947", + "lastModified": "2024-10-29T16:15:04.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Open-Redirect vulnerability exists in PingAM where well-crafted requests may cause improper validation of redirect URLs. This could allow an attacker to redirect end-users to malicious sites under their control, simplifying phishing attacks" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "responsible-disclosure@pingidentity.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "responsible-disclosure@pingidentity.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://backstage.forgerock.com/downloads/browse/am/featured", + "source": "responsible-disclosure@pingidentity.com" + }, + { + "url": "https://backstage.forgerock.com/knowledge/advisories/article/a63463303", + "source": "responsible-disclosure@pingidentity.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27839.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27839.json index 996d6fc4d44..109a66626e7 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27839.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27839.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27839", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:07.730", - "lastModified": "2024-09-06T18:35:11.870", + "lastModified": "2024-10-29T15:35:20.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/10", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json index fa202f98126..a2bd71e2e6b 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28020.json @@ -2,13 +2,13 @@ "id": "CVE-2024-28020", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T19:16:05.787", - "lastModified": "2024-10-09T17:08:57.697", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T15:15:09.207", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A user/password reuse vulnerability exists in the FOXMAN-UN/UNEM\u00a0 application and server management. If exploited a malicious user \ncould use the passwords and login information to extend access on \nthe server and other services." + "value": "A user/password reuse vulnerability exists in the FOXMAN-UN/UNEM application\nand server management. If exploited a malicious high-privileged\nuser could use the passwords and login information through complex routines to extend access on the server and other services." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json index 533331aa58b..4b11f828684 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28021", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T14:15:10.587", - "lastModified": "2024-08-15T21:29:46.697", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T15:15:09.347", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,20 +42,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N", - "attackVector": "ADJACENT_NETWORK", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "CHANGED", + "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "NONE", - "baseScore": 8.0, + "baseScore": 7.4, "baseSeverity": "HIGH" }, - "exploitabilityScore": 1.6, - "impactScore": 5.8 + "exploitabilityScore": 2.2, + "impactScore": 5.2 } ] }, diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json index 7b0d1532cff..a7e86775759 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28022.json @@ -2,13 +2,13 @@ "id": "CVE-2024-28022", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T19:16:06.017", - "lastModified": "2024-08-15T21:44:20.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T15:15:09.573", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability exists in the FOXMAN-UN/UNEM server / APIGateway that \nif exploited allows a malicious user to perform an arbitrary number \nof authentication attempts using different passwords, and \neventually gain access to the targeted account." + "value": "A vulnerability exists in the UNEM server / APIGateway that if exploited allows a malicious user to perform an arbitrary number of\nauthentication attempts using different passwords, and eventually\ngain access to other components in the same security realm using\nthe targeted account." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28024.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28024.json index 9fbdfb468a3..15553e55598 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28024.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28024.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28024", "sourceIdentifier": "cybersecurity@hitachienergy.com", "published": "2024-06-11T19:16:06.243", - "lastModified": "2024-08-15T21:46:11.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T15:15:09.697", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -42,20 +42,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 1.9, - "baseSeverity": "LOW" + "baseScore": 4.1, + "baseSeverity": "MEDIUM" }, "exploitabilityScore": 0.5, - "impactScore": 1.4 + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30124.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30124.json index 707bcd72a9c..b458cec317e 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30124.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30124.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30124", "sourceIdentifier": "psirt@hcl.com", "published": "2024-10-23T16:15:05.667", - "lastModified": "2024-10-25T12:56:36.827", + "lastModified": "2024-10-29T15:35:22.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], "references": [ { "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627", diff --git a/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json b/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json index 12a4e18c039..6e168fc0326 100644 --- a/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json +++ b/CVE-2024/CVE-2024-317xx/CVE-2024-31714.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31714", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-20T18:15:10.330", - "lastModified": "2024-07-03T01:55:18.240", + "lastModified": "2024-10-29T15:35:23.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json b/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json index de0e90f4e39..99d613412ef 100644 --- a/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json +++ b/CVE-2024/CVE-2024-326xx/CVE-2024-32615.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32615", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:36:46.620", - "lastModified": "2024-07-03T01:56:48.017", + "lastModified": "2024-10-29T15:35:24.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-122" + "value": "CWE-787" } ] } diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32944.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32944.json index e72517f9afe..a63761f4f48 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32944.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32944.json @@ -2,7 +2,7 @@ "id": "CVE-2024-32944", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-05-28T03:15:08.563", - "lastModified": "2024-05-28T12:39:28.377", + "lastModified": "2024-10-29T15:35:25.073", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Path traversal existe en versiones de UTAU anteriores a la v0.4.19. Si un usuario del producto instala un instalador de banco de voz UTAU manipulado (archivo .uar, archivo .zip) en UTAU, se puede colocar un archivo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN71404925/", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json index 9c0e4e51791..68d7b1632c7 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33220.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33220", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T15:15:28.780", - "lastModified": "2024-08-15T17:35:06.067", + "lastModified": "2024-10-29T15:35:25.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-782" - } - ] - } - ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33220", diff --git a/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json b/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json index fd477d30c7a..031227aed3b 100644 --- a/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json +++ b/CVE-2024/CVE-2024-332xx/CVE-2024-33222.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33222", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T16:15:09.960", - "lastModified": "2024-08-01T13:51:48.023", + "lastModified": "2024-10-29T15:35:26.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,18 +39,6 @@ } ] }, - "weaknesses": [ - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-782" - } - ] - } - ], "references": [ { "url": "https://github.com/DriverHunter/Win-Driver-EXP/tree/main/CVE-2024-33222", diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json index 14aecc4d3ee..9facac30213 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34199.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34199", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:32.970", - "lastModified": "2024-07-03T01:59:29.647", + "lastModified": "2024-10-29T15:35:26.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-122" + "value": "CWE-787" } ] } diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json index cd43abf683b..1892634b669 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34200.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34200", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:33.103", - "lastModified": "2024-07-03T01:59:30.427", + "lastModified": "2024-10-29T15:35:27.197", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json index 74bf5106432..9a385195975 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34221.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34221", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.090", - "lastModified": "2024-07-03T01:59:41.290", + "lastModified": "2024-10-29T15:35:28.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-276" } ] } diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json index f1a80709b50..de9df0ecbe1 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34950.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34950", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:17:30.633", - "lastModified": "2024-07-03T02:01:01.753", + "lastModified": "2024-10-29T15:35:28.890", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json b/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json index 4b14c66aa40..3abcf3b0857 100644 --- a/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json +++ b/CVE-2024/CVE-2024-349xx/CVE-2024-34974.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34974", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:39:38.873", - "lastModified": "2024-07-03T02:01:06.613", + "lastModified": "2024-10-29T15:35:29.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-121" + "value": "CWE-125" } ] } diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40746.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40746.json index 34d06a2f314..f895abdae16 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40746.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40746.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40746", "sourceIdentifier": "security@joomla.org", "published": "2024-10-21T17:15:03.330", - "lastModified": "2024-10-23T15:13:58.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:34:22.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,8 +15,41 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) almacenado en el componente HikaShop Joomla anterior a la versi\u00f3n 5.1.1 permite a atacantes remotos ejecutar c\u00f3digo JavaScript arbitrario en el navegador web de un usuario, mediante la inclusi\u00f3n de una carga maliciosa en el par\u00e1metro `description` de cualquier producto. El par\u00e1metro `description` no se desinfecta en el backend." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@joomla.org", "type": "Secondary", @@ -28,10 +61,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hikashop:hikashop:*:*:*:*:*:joomla\\!:*:*", + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "749123A7-480B-4982-89D0-B8E5D49AE5B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.hikashop.com/", - "source": "security@joomla.org" + "source": "security@joomla.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40810.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40810.json index 394f2e08a22..e22a07c34fb 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40810.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40810.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40810", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-24T17:15:16.263", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:21:56.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se solucion\u00f3 un problema de escritura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sonoma 14.6. Una aplicaci\u00f3n puede provocar un bloqueo del coprocesador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120911", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42017.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42017.json index 4d2f3b1b709..26e790723ab 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42017.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42017.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42017", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T18:15:05.827", - "lastModified": "2024-10-04T13:51:25.567", + "lastModified": "2024-10-29T15:35:30.713", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://eviden.com", diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43838.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43838.json index be1f854a309..02039e66873 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43838.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43838.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43838", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.390", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:24:43.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,82 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf: corrigi\u00f3 la verificaci\u00f3n de desbordamiento en ajustar_jmp_off() ajuste_jmp_off() us\u00f3 incorrectamente el campo insn->imm para toda la verificaci\u00f3n de desbordamiento, lo cual es incorrecto ya que eso solo debe hacerse o el BPF_JMP32 | Caso BPF_JA, no el caso de instrucci\u00f3n de salto general. Solucionelo usando insn->off para verificar el desbordamiento en el caso general." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9.8", + "versionEndExcluding": "6.10", + "matchCriteriaId": "7CD11465-AFC4-428F-A933-C8F6486DDC2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "21DC7A88-E88C-4C44-9AFB-CBB30134097C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/345652866a8869825a2a582ee5a28d75141f184a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4a04b4f0de59dd5c621e78f15803ee0b0544eeb8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43840.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43840.json index b1e887fcc8e..a4eb388f0c8 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43840.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43840.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43840", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.517", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:25:29.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf, arm64: Reparar trampol\u00edn para BPF_TRAMP_F_CALL_ORIG Cuando BPF_TRAMP_F_CALL_ORIG est\u00e1 configurado, el trampol\u00edn llama a las funciones __bpf_tramp_enter() y __bpf_tramp_exit(), pas\u00e1ndoles el puntero struct bpf_tramp_image *im como argumento en R0 . El c\u00f3digo de generaci\u00f3n de trampol\u00edn usa emit_addr_mov_i64() para emitir instrucciones para mover la direcci\u00f3n bpf_tramp_image a R0, pero emit_addr_mov_i64() asume que la direcci\u00f3n est\u00e1 en el espacio vmalloc() y usa solo 48 bits. Debido a que bpf_tramp_image se asigna usando kzalloc(), su direcci\u00f3n puede usar m\u00e1s de 48 bits, en este caso el trampol\u00edn pasar\u00e1 una direcci\u00f3n no v\u00e1lida a __bpf_tramp_enter/exit() provocando un bloqueo del kernel. Solucione este problema utilizando emit_a64_mov_i64() en lugar de emit_addr_mov_i64(), ya que puede funcionar con direcciones superiores a 48 bits." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "10A3C375-FFAF-4092-9FFF-0DE81E7DCE63" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19d3c179a37730caf600a97fed3794feac2b197b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6d218fcc707d6b2c3616b6cd24b948fd4825cfec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43841.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43841.json index 203698656ac..86f13ccf4ad 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43841.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43841.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43841", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.580", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:27:14.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: virt_wifi: evita informar el \u00e9xito de la conexi\u00f3n con un SSID incorrecto Cuando el usuario emite una conexi\u00f3n con un SSID diferente al que virt_wifi ha anunciado, __cfg80211_connect_result() activar\u00e1 la advertencia: WARN_ON( bss_not_found). El problema se debe a que el c\u00f3digo de conexi\u00f3n en virt_wifi no verifica el SSID desde el espacio del usuario (solo verifica el BSSID), y virt_wifi llamar\u00e1 a cfg80211_connect_result() con WLAN_STATUS_SUCCESS incluso si el SSID es diferente del que virt_wifi ha anunciado. Eventualmente, cfg80211 no podr\u00e1 encontrar cfg80211_bss y generar la advertencia. Se solucion\u00f3 verificando el SSID (del espacio de usuario) en el c\u00f3digo de conexi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0", + "versionEndExcluding": "6.1.103", + "matchCriteriaId": "46AEA0CE-4C1D-4091-BB9A-5C62C862EF39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.44", + "matchCriteriaId": "CC912330-6B41-4C6B-99AF-F3857FBACB6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "92D388F2-1EAF-4CFA-AC06-5B26D762EA7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/05c4488a0e446c6ccde9f22b573950665e1cd414", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/36e92b5edc8e0daa18e9325674313802ce3fbc29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/416d3c1538df005195721a200b0371d39636e05d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/93e898a264b4e0a475552ba9f99a016eb43ef942", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/994fc2164a03200c3bf42fb45b3d49d9d6d33a4d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b5d14b0c6716fad7f0c94ac6e1d6f60a49f985c7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d3cc85a10abc8eae48988336cdd3689ab92581b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43843.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43843.json index e6b6c9da064..a75ab268339 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43843.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43843", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-17T10:15:09.707", - "lastModified": "2024-08-19T12:59:59.177", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:29:16.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,75 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: riscv, bpf: soluciona el problema de fuera de los l\u00edmites al preparar la imagen del trampol\u00edn. Obtenemos el tama\u00f1o de la imagen del trampol\u00edn durante la fase de ejecuci\u00f3n en seco y asignamos memoria en funci\u00f3n de ese tama\u00f1o. La imagen asignada se completar\u00e1 con instrucciones durante la fase de parche real. Pero despu\u00e9s del commit 26ef208c209a (\"bpf: Use arch_bpf_trampoline_size\"), el argumento `im` es inconsistente en la fase de prueba y de parche real. Esto puede hacer que emit_imm en RV64 genere una cantidad diferente de instrucciones al generar la direcci\u00f3n 'im', lo que podr\u00eda causar problemas fuera de los l\u00edmites. Emitamos la cantidad m\u00e1xima de instrucciones para la direcci\u00f3n \"im\" durante el ensayo para solucionar este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-131" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.3", + "matchCriteriaId": "38E515B9-DAD5-4A5A-9C4C-1B6873D3185A" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e6a1b1b179abb643ec3560c02bc3082bc92285f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f1e16fb1fc9826001c69e0551d51fbbcd2d74e9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json index 14edc86fcf4..bdaef577db4 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44185", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-24T17:15:16.470", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:22:45.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,144 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 17.6, visionOS 1.3, Safari 17.6, watchOS 10.6, iOS 17.6 y iPadOS 17.6, macOS Sonoma 14.6. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un bloqueo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.6", + "matchCriteriaId": "035D8460-BD6F-4696-9D7B-BA571A994FD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120909", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120911", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120913", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120914", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120915", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120916", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44205.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44205.json index 3d9902d7ac0..3e65880ef23 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44205.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44205.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44205", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-24T17:15:16.543", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:27:08.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,140 @@ "value": "Se solucion\u00f3 un problema de privacidad con una mejor redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Ventura 13.6.8, macOS Monterey 12.7.6, iOS 16.7.9 y iPadOS 16.7.9, iOS 17.6 y iPadOS 17.6, macOS Sonoma 14.6. Una aplicaci\u00f3n aislada puede tener acceso a datos confidenciales del usuario en los registros del sistema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "29A9994D-AE71-45E0-8CC5-E6219420F7E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "B191C80F-3801-4AD0-9A63-EB294A029D7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.9", + "matchCriteriaId": "1ACEA981-1D96-49F1-8048-74D21D71FD39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.6", + "matchCriteriaId": "34E8C966-19C7-4376-A0C3-A242720F62DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.7.6", + "matchCriteriaId": "3556C7C3-14B6-4846-B3E8-FE07A503155F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.8", + "matchCriteriaId": "7008225C-B5B9-4F87-9392-DD2080717E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.6", + "matchCriteriaId": "51E2E93B-C5A3-4C83-B806-2EC555AD45FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120908", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120909", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120910", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120911", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120912", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json index 13067d78e99..a309ae01524 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44206", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-24T17:15:16.620", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:31:02.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,138 @@ "value": "Se solucion\u00f3 un problema en el manejo de protocolos URL con una l\u00f3gica mejorada. Este problema se solucion\u00f3 en tvOS 17.6, visionOS 1.3, Safari 17.6, watchOS 10.6, iOS 17.6 y iPadOS 17.6, macOS Sonoma 14.6. Es posible que los usuarios puedan eludir algunas restricciones de contenido web." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A7AF9041-5C4F-42CB-99E5-5276DB6AC07C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "A8A1B228-89B1-470E-9B6E-8553E561E062" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "1E393815-B3B5-4FF9-9D1D-AA3EA9C5D352" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.6", + "matchCriteriaId": "687902EF-637F-4537-B419-15A1695370B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.6", + "matchCriteriaId": "9FB1D28B-EF0E-4CA0-90F7-073A85D001E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.3", + "matchCriteriaId": "CDBCE187-329C-4B1C-89B7-7D45A7946AF4" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/120909", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120911", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120913", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120914", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120915", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/120916", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-446xx/CVE-2024-44667.json b/CVE-2024/CVE-2024-446xx/CVE-2024-44667.json index a41feb29896..26d55001d03 100644 --- a/CVE-2024/CVE-2024-446xx/CVE-2024-44667.json +++ b/CVE-2024/CVE-2024-446xx/CVE-2024-44667.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44667", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-10T17:15:37.030", - "lastModified": "2024-09-10T20:35:11.007", + "lastModified": "2024-10-29T16:35:13.953", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-863" } ] } diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json index bd3c9aa5528..eb04345e412 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47068.json @@ -2,13 +2,13 @@ "id": "CVE-2024-47068", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-23T16:15:06.947", - "lastModified": "2024-09-30T17:39:45.350", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T16:15:05.583", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Rollup is a module bundler for JavaScript. Versions prior to 3.29.5 and 4.22.4 are susceptible to a DOM Clobbering vulnerability when bundling scripts with properties from `import.meta` (e.g., `import.meta.url`) in `cjs`/`umd`/`iife` format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Versions 3.29.5 and 4.22.4 contain a patch for the vulnerability." + "value": "Rollup is a module bundler for JavaScript. Versions prior to 2.79.2, 3.29.5, and 4.22.4 are susceptible to a DOM Clobbering vulnerability when bundling scripts with properties from `import.meta` (e.g., `import.meta.url`) in `cjs`/`umd`/`iife` format. The DOM Clobbering gadget can lead to cross-site scripting (XSS) in web pages where scriptless attacker-controlled HTML elements (e.g., an `img` tag with an unsanitized `name` attribute) are present. Versions 2.79.2, 3.29.5, and 4.22.4 contain a patch for the vulnerability." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json index 77646c09b7e..0e5944d040e 100644 --- a/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47486.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47486", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-10-18T09:15:03.217", - "lastModified": "2024-10-22T16:11:07.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-29T15:35:31.557", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 } ] }, @@ -93,6 +113,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47883.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47883.json index 13ed5cf3734..e447a0d1c50 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47883.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47883", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-24T21:15:13.430", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:38:11.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,14 +85,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openrefine:butterfly:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.2.6", + "matchCriteriaId": "11B5F36B-35D1-4FAA-AA42-E0E498458672" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenRefine/simile-butterfly/commit/537f64bfa72746f8b21d4bda461fad843435319c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OpenRefine/simile-butterfly/security/advisories/GHSA-3p8v-w8mr-m3x8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48921.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48921.json new file mode 100644 index 00000000000..2d380c162cb --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48921.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-48921", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-29T15:15:10.593", + "lastModified": "2024-10-29T15:15:10.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Kyverno is a policy engine designed for Kubernetes. A kyverno ClusterPolicy, ie. \"disallow-privileged-containers,\" can be overridden by the creation of a PolicyException in a random namespace. By design, PolicyExceptions are consumed from any namespace. Administrators may not recognize that this allows users with privileges to non-kyverno namespaces to create exceptions. This vulnerability is fixed in 1.13.0." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kyverno/kyverno/security/advisories/GHSA-qjvc-p88j-j9rm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49214.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49214.json index 96325d72220..a0009a2f9c3 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49214.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49214.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49214", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-14T04:15:05.853", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-10-29T16:35:14.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://github.com/haproxy/haproxy/commit/f627b9272bd8ffca6f2f898bfafc6bf0b84b7d46", diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json index 4b6d254dbf0..1a2265979cd 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49273.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49273", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T12:15:08.450", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:48:10.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in ProfileGrid User Profiles ProfileGrid.This issue affects ProfileGrid: from n/a through 5.9.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n faltante en los perfiles de usuario de ProfileGrid ProfileGrid. Este problema afecta a ProfileGrid: desde n/a hasta 5.9.3." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.9.3", + "matchCriteriaId": "E4BBAE72-33CD-4ECA-AD92-7417B8B8B0D3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/profilegrid-user-profiles-groups-and-communities/wordpress-profilegrid-plugin-5-9-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json index d9ca8bd4e28..60c58a6de33 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49288.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49288", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-17T20:15:12.343", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:59:05.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:villatheme:woocommerce_email_template_customizer:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.5", + "matchCriteriaId": "8D5AEE50-A466-4CF2-A609-85A0F1885E4D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/email-template-customizer-for-woo/wordpress-email-template-customizer-for-woocommerce-plugin-1-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json b/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json index 1b34d253a2f..ca9ff33910e 100644 --- a/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json +++ b/CVE-2024/CVE-2024-492xx/CVE-2024-49293.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49293", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T12:15:08.683", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:07:39.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Rextheme WP VR allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WP VR: from n/a through 8.5.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Rextheme WP VR permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a WP VR: desde n/a hasta 8.5.4." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rextheme:wp_vr:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "8.5.4", + "matchCriteriaId": "0313CA61-EBD8-43DA-BE57-006A0967451B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpvr/wordpress-wp-vr-plugin-8-5-4-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json index 0ceb6c35ef5..911134f9d66 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49321.json @@ -2,17 +2,41 @@ "id": "CVE-2024-49321", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-21T12:15:08.893", - "lastModified": "2024-10-21T17:09:45.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:20:12.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Missing Authorization vulnerability in Colorlib Simple Custom Post Order allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple Custom Post Order: from n/a through 2.5.7." + }, + { + "lang": "es", + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Simple Custom Post Order de Colorlib permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Simple Custom Post Order: desde n/a hasta 2.5.7." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:colorlib:simple_custom_post_order:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.5.7", + "matchCriteriaId": "698E7E0E-9A6B-4026-A0CE-E43084AC4EEA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/simple-custom-post-order/wordpress-simple-custom-post-order-plugin-2-5-7-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49768.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49768.json new file mode 100644 index 00000000000..1ebf64ff95a --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49768.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-49768", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-29T15:15:11.440", + "lastModified": "2024-10-29T15:15:11.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Waitress is a Web Server Gateway Interface server for Python 2 and 3. A remote client may send a request that is exactly recv_bytes (defaults to 8192) long, followed by a secondary request using HTTP pipelining. When request lookahead is disabled (default) we won't read any more requests, and when the first request fails due to a parsing error, we simply close the connection. However when request lookahead is enabled, it is possible to process and receive the first request, start sending the error message back to the client while we read the next request and queue it. This will allow the secondary request to be serviced by the worker thread while the connection should be closed. Waitress 3.0.1 fixes the race condition. As a workaround, disable channel_request_lookahead, this is set to 0 by default disabling this feature." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + }, + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Pylons/waitress/commit/e4359018537af376cf24bd13616d861e2fb76f65", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Pylons/waitress/security/advisories/GHSA-9298-4cf8-g4wj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49769.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49769.json new file mode 100644 index 00000000000..309e07d6d6c --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49769.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-49769", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-29T15:15:12.030", + "lastModified": "2024-10-29T15:15:12.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Waitress is a Web Server Gateway Interface server for Python 2 and 3. When a remote client closes the connection before waitress has had the opportunity to call getpeername() waitress won't correctly clean up the connection leading to the main thread attempting to write to a socket that no longer exists, but not removing it from the list of sockets to attempt to process. This leads to a busy-loop calling the write function. A remote attacker could run waitress out of available sockets with very little resources required. Waitress 3.0.1 contains fixes that remove the race condition." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Pylons/waitress/commit/1ae4e894c9f76543bee06584001583fc6fa8c95c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Pylons/waitress/issues/418", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Pylons/waitress/pull/435", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Pylons/waitress/security/advisories/GHSA-3f84-rpwh-47g6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49970.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49970.json index 64b4467b618..194fe544d40 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49970.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49970.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49970", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:17.973", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T15:57:41.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Implementar comprobaci\u00f3n de los l\u00edmites para la creaci\u00f3n de codificadores de flujo en DCN401 La matriz 'stream_enc_regs' es una matriz de estructuras dcn10_stream_enc_registers. La matriz se inicializa con cuatro elementos, que corresponden a las cuatro llamadas a stream_enc_regs() en el inicializador de la matriz. Esto significa que los \u00edndices v\u00e1lidos para esta matriz son 0, 1, 2 y 3. El mensaje de error 'stream_enc_regs' 4 <= 5 a continuaci\u00f3n indica que hay un intento de acceder a esta matriz con un \u00edndice de 5, que est\u00e1 fuera de los l\u00edmites. Esto podr\u00eda provocar un comportamiento indefinido Aqu\u00ed, eng_id se utiliza como \u00edndice para acceder a la matriz stream_enc_regs. Si eng_id es 5, esto dar\u00eda como resultado un acceso fuera de los l\u00edmites en la matriz stream_enc_regs. De esta forma se soluciona el error de desbordamiento de b\u00fafer en dcn401_stream_encoder_create. Encontrado por smatch: drivers/gpu/drm/amd/amdgpu/../display/dc/resource/dcn401/dcn401_resource.c:1209 Error en dcn401_stream_encoder_create(): desbordamiento de b\u00fafer 'stream_enc_regs' 4 <= 5" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "6D5FF9C2-A011-4A64-B614-F9244ED2EA0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/b219b46ad42df1dea9258788bcfea37181f3ccb2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bdf606810210e8e07a0cdf1af3c467291363b295", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49983.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49983.json index 248f12c96ad..62a4b0781f0 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49983.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49983.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49983", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:18.797", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:23:31.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,145 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ext4: eliminar ppath de ext4_ext_replay_update_ex() para evitar una doble liberaci\u00f3n Al llamar a ext4_force_split_extent_at() en ext4_ext_replay_update_ex(), se actualiza 'ppath' pero es 'path' el que se libera, lo que potencialmente desencadena una doble liberaci\u00f3n en el siguiente proceso: ext4_ext_replay_update_ex ppath = path ext4_force_split_extent_at(&ppath) ext4_split_extent_at ext4_ext_insert_extent ext4_ext_create_new_leaf ext4_ext_grow_indepth ext4_find_extent if (depth > path[0].p_maxdepth) kfree(path) ---> path Primero liberado *orig_path = path = NULL ---> null ppath kfree(path) ---> path double-free !!! Por lo tanto, elimine el ppath innecesario y use path directamente para evitar este problema. Y use ext4_find_extent() directamente para actualizar path, evitando la asignaci\u00f3n y liberaci\u00f3n de memoria innecesaria. Adem\u00e1s, propague el error devuelto por ext4_find_extent() en lugar de usar c\u00f3digos de error extra\u00f1os." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "658E9248-9CAC-4A1E-A483-039DF6CCAF8C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1b558006d98b7b0b730027be0ee98973dd10ee0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3ff710662e8d86a63a39b334e9ca0cb10e5c14b0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5c0f4cc84d3a601c99bc5e6e6eb1cbda542cce95", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6367d3f04c69e2b8770b8137bd800e0784b0abbc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/63adc9016917e6970fb0104ee5fd6770f02b2d80", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c26d9e53e5fbacda0732a577e97c5a5b7882aaf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a34bed978364114390162c27e50fca50791c568d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49984.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49984.json index 42ac437e471..dd01bb17029 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49984.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49984.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49984", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:18.873", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:22:25.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,103 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/v3d: Evitar el acceso fuera de los l\u00edmites en las extensiones de consulta de rendimiento. Compruebe que la cantidad de espacio de usuario de perfmons que pasa en las extensiones de copia y restablecimiento no sea mayor que el almacenamiento interno del kernel donde se copiar\u00e1n los identificadores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.10.4", + "matchCriteriaId": "F8B935B3-1FAC-4502-A5BA-A3C286A20469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10.5", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "7434BF03-F3C3-4CD7-AF0B-397AF34727DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3e50d72abe50204c7b19784a66e86da29dde32c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73ad583bd4938bf37d2709fc36901eb6f22f2722", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d9536f16be3970c170571efa707c13cd089c774e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f32b5128d2c440368b5bf3a7a356823e235caabb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-499xx/CVE-2024-49997.json b/CVE-2024/CVE-2024-499xx/CVE-2024-49997.json index 158364713e1..dba1954b82d 100644 --- a/CVE-2024/CVE-2024-499xx/CVE-2024-49997.json +++ b/CVE-2024/CVE-2024-499xx/CVE-2024-49997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49997", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T18:15:19.837", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:20:49.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,150 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ethernet: lantiq_etop: fix memory breach Al aplicar relleno, el b\u00fafer no se pone a cero, lo que da como resultado la divulgaci\u00f3n de memoria. Los datos mencionados se observan en el cable. Este parche usa skb_put_padto() para rellenar los marcos Ethernet correctamente. La funci\u00f3n mencionada pone a cero el b\u00fafer expandido. En caso de que el paquete no se pueda rellenar, se descarta silenciosamente. Las estad\u00edsticas tampoco se incrementan. Este controlador no admite estad\u00edsticas en el antiguo formato de 32 bits ni en el nuevo formato de 64 bits. Estos se agregar\u00e1n en el futuro. En su forma actual, el parche deber\u00eda poder retroportarse f\u00e1cilmente a versiones estables. Las MAC de Ethernet en Amazon-SE y Danube no pueden realizar relleno de los paquetes en hardware, por lo que se debe aplicar relleno de software." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-212" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "2DA9563A-F5E7-48BB-AE3C-4A591C574A45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.55", + "matchCriteriaId": "E90B9576-56C4-47BC-AAB0-C5B2D438F5D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.14", + "matchCriteriaId": "4C16BCE0-FFA0-4599-BE0A-1FD65101C021" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.3", + "matchCriteriaId": "54D9C704-D679-41A7-9C40-10A6B1E7FFE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1097bf16501ed5e35358d848b0a94ad2830b0f65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/185df159843d30fb71f821e7ea4368c2a3bfcd36", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2bf4c101d7c99483b8b15a0c8f881e3f399f7e18", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/431b122933b197820d319eb3987a67d04346ce9e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45c0de18ff2dc9af01236380404bbd6a46502c69", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/469856f76f4802c5d7e3d20e343185188de1e2db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e66e38d07b31e177ca430758ed97fbc79f27d966", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json index d9ce869228d..a2ae63963bf 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50067", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-28T01:15:02.930", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:30:44.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,88 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: uprobe: evitar el acceso a memoria fuera de los l\u00edmites para obtener argumentos. Uprobe necesita obtener argumentos en un b\u00fafer por CPU y luego copiarlos en el b\u00fafer de anillo para evitar problemas de contexto no at\u00f3mico. A veces, las cadenas y matrices del espacio de usuario pueden ser muy grandes, pero el tama\u00f1o del b\u00fafer por CPU es solo el tama\u00f1o de la p\u00e1gina. Y store_trace_args() no verificar\u00e1 si estos datos exceden una sola p\u00e1gina o no, lo que provoc\u00f3 un acceso a memoria fuera de los l\u00edmites. Se puede reproducir siguiendo los pasos: 1. compilar el kernel con CONFIG_KASAN habilitado 2. guardar el siguiente programa como test.c ``` \\#include \\#include \\#include // Si la longitud de la cadena es mayor que MAX_STRING_SIZE, fetch_store_strlen() // devolver\u00e1 0, lo que har\u00e1 que __get_data_size() devuelva un tama\u00f1o menor y // store_trace_args() no active el acceso fuera de los l\u00edmites. // Entonces haga que la longitud de la cadena sea menor que 4096. \\#define STRLEN 4093 void generate_string(char *str, int n) { int i; for (i = 0; i < n; ++i) { char c = i % 26 + 'a'; str[i] = c; } str[n-1] = '\\0'; } void print_string(char *str) { printf(\"%s\\n\", str); } int main() { char tmp[STRLEN]; generate_string(tmp, STRLEN); print_string(tmp); return 0; } ``` 3. compilar el programa `gcc -o test test.c` 4. obtener el desplazamiento de `print_string()` ``` objdump -t test | grep -w print_string 0000000000401199 g F .text 000000000000001b print_string ``` 5. configure uprobe con desplazamiento 0x1199 ``` off=0x1199 cd /sys/kernel/debug/tracing/ echo \"p /root/test:${off} arg1=+0(%di):ustring arg2=\\$comm arg3=+0(%di):ustring\" > uprobe_events echo 1 > events/uprobes/enable echo 1 > tracing_on ``` 6. ejecute `test` y kasan informar\u00e1 el error. ===================================================================== ERROR: KASAN: use-after-free en strncpy_from_user+0x1d6/0x1f0 Escritura de tama\u00f1o 8 en la direcci\u00f3n ffff88812311c004 por la tarea test/499CPU: 0 UID: 0 PID: 499 Comm: test No contaminado 6.12.0-rc3+ #18 Nombre del hardware: Red Hat KVM, BIOS 1.16.0-4.al8 01/04/2014 Rastreo de llamadas: dump_stack_lvl+0x55/0x70 descripci\u00f3n_direcci\u00f3n_impresi\u00f3n.constprop.0+0x27/0x310 informe_kasan+0x10f/0x120 ? strncpy_desde_usuario+0x1d6/0x1f0 strncpy_desde_usuario+0x1d6/0x1f0 ? rmqueue.constprop.0+0x70d/0x2ad0 inserci\u00f3n_obtenci\u00f3n_proceso+0xb26/0x1470 ? __pfx_instrucci\u00f3n_obtenci\u00f3n_proceso+0x10/0x10 ? _bloqueo_giro_sin_procesamiento+0x85/0xe0 ? __pfx__bloqueo_giro_sin_procesamiento+0x10/0x10 ? __pte_offset_map+0x1f/0x2d0 ? desenrollar_siguiente_fotograma+0xc5f/0x1f80 ? arch_stack_walk+0x68/0xf0 ? is_bpf_text_address+0x23/0x30 ? kernel_text_address.part.0+0xbb/0xd0 ? __kernel_text_address+0x66/0xb0 ? unwind_get_return_address+0x5e/0xa0 ? __pfx_stack_trace_consume_entry+0x10/0x10 ? arch_stack_walk+0xa2/0xf0 ? _raw_spin_lock_irqsave+0x8b/0xf0 ? __pfx__raw_spin_lock_irqsave+0x10/0x10 ? depot_alloc_stack+0x4c/0x1f0 ? __pfx_uprobe_dispatcher+0x10/0x10 ? __kasan_slab_alloc+0x4d/0x90 handler_chain+0xdd/0x3e0 handle_swbp+0x26e/0x3d0 ? __pfx_handle_swbp+0x10/0x10 ? uprobe_pre_sstep_notifier+0x151/0x1b0 irqentry_exit_to_user_mode+0xe2/0x1b0 asm_exc_int3+0x39/0x40 RIP: 0033:0x401199 C\u00f3digo: 01 c2 0f b6 45 fb 88 02 83 45 fc 01 8b 45 fc 3b 45 e4 7c b7 8b 45 e4 48 98 48 8d 50 ff 48 8b 45 e8 48 01 d0 ce RSP: 002b:00007ffdf00576a8 EFLAGS: 00000206 RAX: 00007ffdf00576b0 RBX: 0000000000000000 RCX: 0000000000000ff2 RDX: 0000000000000ffc RSI: 0000000000000ffd RDI: 00007ffdf00576b0 RBP: 00007ffdf00586b0 R08: 00007feb2f9c0d20 R09: 00007feb2f9c0d20 R10: 000000000000001 R11: 0000000000000202 R12: 0000000000401040 R13: 00007ffdf0058780 R14: 00000000000000000 R15: 0000000000000000 Esta confirmaci\u00f3n hace que la longitud m\u00e1xima del b\u00fafer sea menor que el tama\u00f1o de una p\u00e1gina para evitar el acceso fuera de memoria a store_trace_args()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.14", + "versionEndExcluding": "6.12", + "matchCriteriaId": "E1469267-C646-45B9-8184-EDA367A2CF53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/373b9338c9722a368925d83bc622c596896b328e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50334.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50334.json new file mode 100644 index 00000000000..633566b101f --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50334.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-50334", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-10-29T15:15:12.560", + "lastModified": "2024-10-29T15:15:12.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type: application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Erudika/scoold/security/advisories/GHSA-fhwp-f6g7-rr3p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50408.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50408.json index e0135d0c8d1..813e6fb2292 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50408.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50408.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50408", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T12:15:15.257", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:01:08.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in Kiboko Labs Namaste! LMS allows Object Injection.This issue affects Namaste! LMS: from n/a through 2.6.3." + }, + { + "lang": "es", + "value": "Vulnerabilidad de deserializaci\u00f3n de datos no confiables en Kiboko Labs Namaste! LMS permite la inyecci\u00f3n de objetos. Este problema afecta a Namaste! LMS: desde n/a hasta 2.6.3." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -77,10 +101,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kibokolabs:namaste\\!_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.4", + "matchCriteriaId": "B6754CEA-177A-4C55-955D-88F152B521AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/namaste-lms/wordpress-namaste-lms-plugin-2-6-3-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50416.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50416.json index 1b88b0df0a4..0280224c772 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50416.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50416.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50416", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T12:15:15.490", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:02:10.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Deserialization of Untrusted Data vulnerability in WPClever WPC Shop as a Customer for WooCommerce allows Object Injection.This issue affects WPC Shop as a Customer for WooCommerce: from n/a through 1.2.6." + }, + { + "lang": "es", + "value": "La vulnerabilidad de deserializaci\u00f3n de datos no confiables en WPClever WPC Shop as a Customer for WooCommerce permite la inyecci\u00f3n de objetos. Este problema afecta a WPC Shop como cliente de WooCommerce: desde n/a hasta 1.2.6." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpclever:wpc_shop_as_a_customer_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.7", + "matchCriteriaId": "70C6952C-3789-4F31-B6DC-F87B2203C2CD" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wpc-shop-as-customer/wordpress-wpc-shop-as-a-customer-for-woocommerce-plugin-1-2-6-php-object-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50442.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50442.json index 93a4b7649c5..d278e08f42e 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50442.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50442.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50442", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T12:15:15.710", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:04:29.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Restriction of XML External Entity Reference vulnerability in WP Royal Royal Elementor Addons allows XML Injection.This issue affects Royal Elementor Addons: from n/a through 1.3.980." + }, + { + "lang": "es", + "value": "La vulnerabilidad de restricci\u00f3n incorrecta de referencia de entidad externa XML en WP Royal Royal Elementor Addons permite la inyecci\u00f3n XML. Este problema afecta a Royal Elementor Addons: desde n/a hasta 1.3.980." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.981", + "matchCriteriaId": "B298BEB5-C5DE-4658-AE9D-3904958BC853" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/royal-elementor-addons/wordpress-royal-elementor-addons-and-templates-plugin-1-3-980-xml-external-entity-xxe-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50450.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50450.json index 14f6a21f652..bfc013e9f3d 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50450.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50450.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50450", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T12:15:15.923", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:05:40.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Control of Generation of Code ('Code Injection') vulnerability in realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) allows Code Injection.This issue affects WordPress Meta Data and Taxonomies Filter (MDTF): from n/a through 1.3.3.4." + }, + { + "lang": "es", + "value": "La vulnerabilidad de control inadecuado de generaci\u00f3n de c\u00f3digo ('inyecci\u00f3n de c\u00f3digo') en realmag777 WordPress Meta Data and Taxonomies Filter (MDTF) permite la inyecci\u00f3n de c\u00f3digo. Este problema afecta a WordPress Meta Data and Taxonomies Filter (MDTF): desde n/a hasta 1.3.3.4." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluginus:wordpress_meta_data_and_taxonomies_filter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.3.5", + "matchCriteriaId": "7525A8C0-D8BC-4E22-8645-5D74C2D261F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-meta-data-filter-and-taxonomy-filter/wordpress-mdtf-meta-data-and-taxonomies-filter-plugin-1-3-3-4-bypass-vulnerability-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50463.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50463.json index 0c191c43fe5..6ead56b144f 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50463.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50463.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50463", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T13:15:04.693", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:25:01.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in WP Sunshine Sunshine Photo Cart.This issue affects Sunshine Photo Cart: from n/a through 3.2.9." + }, + { + "lang": "es", + "value": "Vulnerabilidad de redirecci\u00f3n de URL a un sitio no confiable ('Redirecci\u00f3n abierta') en WP Sunshine Sunshine Photo Cart. Este problema afecta a Sunshine Photo Cart: desde n/a hasta 3.2.9." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.11", + "matchCriteriaId": "3E631EB0-209B-47AE-A653-46A2E726DEC3" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-plugin-3-2-9-open-redirection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-504xx/CVE-2024-50486.json b/CVE-2024/CVE-2024-504xx/CVE-2024-50486.json index e4183fd14e8..60f0fe87bbf 100644 --- a/CVE-2024/CVE-2024-504xx/CVE-2024-50486.json +++ b/CVE-2024/CVE-2024-504xx/CVE-2024-50486.json @@ -2,17 +2,41 @@ "id": "CVE-2024-50486", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-28T12:15:16.353", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:07:03.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Acnoo Acnoo Flutter API allows Authentication Bypass.This issue affects Acnoo Flutter API: from n/a through 1.0.5." + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de autenticaci\u00f3n mediante una ruta o canal alternativo en Acnoo Acnoo Flutter API permite la omisi\u00f3n de autenticaci\u00f3n. Este problema afecta a la API de Flutter de Acnoo: desde n/a hasta 1.0.5." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -37,8 +61,18 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acnoo:flutter_api:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.5", + "matchCriteriaId": "1BF01D2E-4E76-433B-9BA3-81A9BB3C606B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/acnoo-flutter-api/wordpress-acnoo-flutter-api-plugin-1-0-5-account-takeover-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7985.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7985.json new file mode 100644 index 00000000000..ebc90169596 --- /dev/null +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7985.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-7985", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-29T16:15:06.180", + "lastModified": "2024-10-29T16:15:06.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The FileOrganizer \u2013 Manage WordPress and Website Files plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the \"fileorganizer_ajax_handler\" function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. NOTE: The FileOrganizer Pro plugin must be installed and active to allow Subscriber+ users to upload files." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/fileorganizer/trunk/main/ajax.php#L13", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3149878/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f79164c2-be3b-496d-b747-3e4b60b7fc2b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json new file mode 100644 index 00000000000..0eafc665f69 --- /dev/null +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8923.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-8923", + "sourceIdentifier": "psirt@servicenow.com", + "published": "2024-10-29T16:15:06.417", + "lastModified": "2024-10-29T16:15:06.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an unauthenticated user to remotely execute code within the context of the Now Platform.\u00a0ServiceNow deployed an update to hosted instances and ServiceNow provided the update to our partners and self-hosted customers.\u00a0Further, the vulnerability is addressed in the listed patches and hot fixes." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "psirt@servicenow.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1706070", + "source": "psirt@servicenow.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9589.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9589.json index c8e8e076bdf..6cb6f23f065 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9589.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9589.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9589", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T08:15:04.227", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:07:54.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aftabhusain:category_and_taxonomy_meta_fields:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "A6683605-6A12-4A0C-AAE1-8ACDCE8E3B3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-custom-taxonomy-meta/trunk/includes/options.php?rev=1196908#L232", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d879fc6-97ec-4ecb-99c8-7fc0b91692ef?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9590.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9590.json index 173d2102c4f..03acfa63865 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9590.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9590.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9590", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T08:15:04.807", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:07:43.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aftabhusain:category_and_taxonomy_meta_fields:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "A6683605-6A12-4A0C-AAE1-8ACDCE8E3B3A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-custom-taxonomy-meta/trunk/wp-texonomy-meta.php?rev=1454207#L631", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f6d9c23-53e9-4393-beff-2f996c279ad8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9591.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9591.json index eb376f93dd2..5c89c477072 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9591.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9591.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9591", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T08:15:05.273", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-29T16:04:23.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aftabhusain:category_and_taxonomy_image:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.0", + "matchCriteriaId": "A423A639-8C40-48FA-9A6F-1191006922CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-custom-taxonomy-image/trunk/wp-custom-taxonomy-image.php?rev=1454210#L47", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5760933b-30e6-465b-9b94-c913b21f07fd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index f2ee51e4c3e..bd0c057df89 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-29T15:00:51.520398+00:00 +2024-10-29T17:00:30.149051+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-29T14:49:04.463000+00:00 +2024-10-29T16:59:05.867000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267543 +267551 ``` ### CVEs added in the last Commit -Recently added CVEs: `50` +Recently added CVEs: `8` -- [CVE-2024-49643](CVE-2024/CVE-2024-496xx/CVE-2024-49643.json) (`2024-10-29T13:15:06.743`) -- [CVE-2024-49645](CVE-2024/CVE-2024-496xx/CVE-2024-49645.json) (`2024-10-29T13:15:06.960`) -- [CVE-2024-51075](CVE-2024/CVE-2024-510xx/CVE-2024-51075.json) (`2024-10-29T14:15:08.080`) -- [CVE-2024-51076](CVE-2024/CVE-2024-510xx/CVE-2024-51076.json) (`2024-10-29T14:15:08.183`) -- [CVE-2024-51180](CVE-2024/CVE-2024-511xx/CVE-2024-51180.json) (`2024-10-29T13:15:07.190`) -- [CVE-2024-51181](CVE-2024/CVE-2024-511xx/CVE-2024-51181.json) (`2024-10-29T13:15:07.297`) -- [CVE-2024-5823](CVE-2024/CVE-2024-58xx/CVE-2024-5823.json) (`2024-10-29T13:15:07.380`) -- [CVE-2024-5982](CVE-2024/CVE-2024-59xx/CVE-2024-5982.json) (`2024-10-29T13:15:07.637`) -- [CVE-2024-6581](CVE-2024/CVE-2024-65xx/CVE-2024-6581.json) (`2024-10-29T13:15:07.840`) -- [CVE-2024-6673](CVE-2024/CVE-2024-66xx/CVE-2024-6673.json) (`2024-10-29T13:15:08.040`) -- [CVE-2024-6674](CVE-2024/CVE-2024-66xx/CVE-2024-6674.json) (`2024-10-29T13:15:08.263`) -- [CVE-2024-6868](CVE-2024/CVE-2024-68xx/CVE-2024-6868.json) (`2024-10-29T13:15:08.473`) -- [CVE-2024-7010](CVE-2024/CVE-2024-70xx/CVE-2024-7010.json) (`2024-10-29T13:15:08.683`) -- [CVE-2024-7042](CVE-2024/CVE-2024-70xx/CVE-2024-7042.json) (`2024-10-29T13:15:08.883`) -- [CVE-2024-7472](CVE-2024/CVE-2024-74xx/CVE-2024-7472.json) (`2024-10-29T13:15:09.093`) -- [CVE-2024-7473](CVE-2024/CVE-2024-74xx/CVE-2024-7473.json) (`2024-10-29T13:15:09.320`) -- [CVE-2024-7474](CVE-2024/CVE-2024-74xx/CVE-2024-7474.json) (`2024-10-29T13:15:09.530`) -- [CVE-2024-7475](CVE-2024/CVE-2024-74xx/CVE-2024-7475.json) (`2024-10-29T13:15:09.737`) -- [CVE-2024-7774](CVE-2024/CVE-2024-77xx/CVE-2024-7774.json) (`2024-10-29T13:15:09.930`) -- [CVE-2024-7783](CVE-2024/CVE-2024-77xx/CVE-2024-7783.json) (`2024-10-29T13:15:10.137`) -- [CVE-2024-7807](CVE-2024/CVE-2024-78xx/CVE-2024-7807.json) (`2024-10-29T13:15:10.360`) -- [CVE-2024-7962](CVE-2024/CVE-2024-79xx/CVE-2024-7962.json) (`2024-10-29T13:15:10.557`) -- [CVE-2024-8143](CVE-2024/CVE-2024-81xx/CVE-2024-8143.json) (`2024-10-29T13:15:10.750`) -- [CVE-2024-8309](CVE-2024/CVE-2024-83xx/CVE-2024-8309.json) (`2024-10-29T13:15:10.950`) -- [CVE-2024-9505](CVE-2024/CVE-2024-95xx/CVE-2024-9505.json) (`2024-10-29T14:15:08.500`) +- [CVE-2024-10452](CVE-2024/CVE-2024-104xx/CVE-2024-10452.json) (`2024-10-29T16:15:04.593`) +- [CVE-2024-25566](CVE-2024/CVE-2024-255xx/CVE-2024-25566.json) (`2024-10-29T16:15:04.947`) +- [CVE-2024-48921](CVE-2024/CVE-2024-489xx/CVE-2024-48921.json) (`2024-10-29T15:15:10.593`) +- [CVE-2024-49768](CVE-2024/CVE-2024-497xx/CVE-2024-49768.json) (`2024-10-29T15:15:11.440`) +- [CVE-2024-49769](CVE-2024/CVE-2024-497xx/CVE-2024-49769.json) (`2024-10-29T15:15:12.030`) +- [CVE-2024-50334](CVE-2024/CVE-2024-503xx/CVE-2024-50334.json) (`2024-10-29T15:15:12.560`) +- [CVE-2024-7985](CVE-2024/CVE-2024-79xx/CVE-2024-7985.json) (`2024-10-29T16:15:06.180`) +- [CVE-2024-8923](CVE-2024/CVE-2024-89xx/CVE-2024-8923.json) (`2024-10-29T16:15:06.417`) ### CVEs modified in the last Commit -Recently modified CVEs: `274` +Recently modified CVEs: `108` -- [CVE-2024-50481](CVE-2024/CVE-2024-504xx/CVE-2024-50481.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50482](CVE-2024/CVE-2024-504xx/CVE-2024-50482.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50484](CVE-2024/CVE-2024-504xx/CVE-2024-50484.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50485](CVE-2024/CVE-2024-504xx/CVE-2024-50485.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50490](CVE-2024/CVE-2024-504xx/CVE-2024-50490.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50493](CVE-2024/CVE-2024-504xx/CVE-2024-50493.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50494](CVE-2024/CVE-2024-504xx/CVE-2024-50494.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50495](CVE-2024/CVE-2024-504xx/CVE-2024-50495.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50496](CVE-2024/CVE-2024-504xx/CVE-2024-50496.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-50550](CVE-2024/CVE-2024-505xx/CVE-2024-50550.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-51506](CVE-2024/CVE-2024-515xx/CVE-2024-51506.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-51507](CVE-2024/CVE-2024-515xx/CVE-2024-51507.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-51508](CVE-2024/CVE-2024-515xx/CVE-2024-51508.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-51509](CVE-2024/CVE-2024-515xx/CVE-2024-51509.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-5532](CVE-2024/CVE-2024-55xx/CVE-2024-5532.json) (`2024-10-29T14:34:50.257`) -- [CVE-2024-6245](CVE-2024/CVE-2024-62xx/CVE-2024-6245.json) (`2024-10-29T14:34:50.257`) -- [CVE-2024-8740](CVE-2024/CVE-2024-87xx/CVE-2024-8740.json) (`2024-10-29T14:46:02.103`) -- [CVE-2024-8790](CVE-2024/CVE-2024-87xx/CVE-2024-8790.json) (`2024-10-29T14:44:59.497`) -- [CVE-2024-8916](CVE-2024/CVE-2024-89xx/CVE-2024-8916.json) (`2024-10-29T14:37:42.877`) -- [CVE-2024-9350](CVE-2024/CVE-2024-93xx/CVE-2024-9350.json) (`2024-10-29T13:44:03.897`) -- [CVE-2024-9376](CVE-2024/CVE-2024-93xx/CVE-2024-9376.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-9438](CVE-2024/CVE-2024-94xx/CVE-2024-9438.json) (`2024-10-29T14:34:04.427`) -- [CVE-2024-9593](CVE-2024/CVE-2024-95xx/CVE-2024-9593.json) (`2024-10-29T13:40:23.983`) -- [CVE-2024-9629](CVE-2024/CVE-2024-96xx/CVE-2024-9629.json) (`2024-10-29T14:34:50.257`) -- [CVE-2024-9825](CVE-2024/CVE-2024-98xx/CVE-2024-9825.json) (`2024-10-29T14:34:50.257`) +- [CVE-2024-44205](CVE-2024/CVE-2024-442xx/CVE-2024-44205.json) (`2024-10-29T15:27:08.630`) +- [CVE-2024-44206](CVE-2024/CVE-2024-442xx/CVE-2024-44206.json) (`2024-10-29T15:31:02.493`) +- [CVE-2024-44667](CVE-2024/CVE-2024-446xx/CVE-2024-44667.json) (`2024-10-29T16:35:13.953`) +- [CVE-2024-47068](CVE-2024/CVE-2024-470xx/CVE-2024-47068.json) (`2024-10-29T16:15:05.583`) +- [CVE-2024-47486](CVE-2024/CVE-2024-474xx/CVE-2024-47486.json) (`2024-10-29T15:35:31.557`) +- [CVE-2024-47883](CVE-2024/CVE-2024-478xx/CVE-2024-47883.json) (`2024-10-29T15:38:11.573`) +- [CVE-2024-49214](CVE-2024/CVE-2024-492xx/CVE-2024-49214.json) (`2024-10-29T16:35:14.877`) +- [CVE-2024-49273](CVE-2024/CVE-2024-492xx/CVE-2024-49273.json) (`2024-10-29T15:48:10.617`) +- [CVE-2024-49288](CVE-2024/CVE-2024-492xx/CVE-2024-49288.json) (`2024-10-29T16:59:05.867`) +- [CVE-2024-49293](CVE-2024/CVE-2024-492xx/CVE-2024-49293.json) (`2024-10-29T15:07:39.407`) +- [CVE-2024-49321](CVE-2024/CVE-2024-493xx/CVE-2024-49321.json) (`2024-10-29T15:20:12.503`) +- [CVE-2024-49970](CVE-2024/CVE-2024-499xx/CVE-2024-49970.json) (`2024-10-29T15:57:41.000`) +- [CVE-2024-49983](CVE-2024/CVE-2024-499xx/CVE-2024-49983.json) (`2024-10-29T16:23:31.943`) +- [CVE-2024-49984](CVE-2024/CVE-2024-499xx/CVE-2024-49984.json) (`2024-10-29T16:22:25.833`) +- [CVE-2024-49997](CVE-2024/CVE-2024-499xx/CVE-2024-49997.json) (`2024-10-29T16:20:49.107`) +- [CVE-2024-50067](CVE-2024/CVE-2024-500xx/CVE-2024-50067.json) (`2024-10-29T16:30:44.217`) +- [CVE-2024-50408](CVE-2024/CVE-2024-504xx/CVE-2024-50408.json) (`2024-10-29T16:01:08.447`) +- [CVE-2024-50416](CVE-2024/CVE-2024-504xx/CVE-2024-50416.json) (`2024-10-29T16:02:10.660`) +- [CVE-2024-50442](CVE-2024/CVE-2024-504xx/CVE-2024-50442.json) (`2024-10-29T16:04:29.950`) +- [CVE-2024-50450](CVE-2024/CVE-2024-504xx/CVE-2024-50450.json) (`2024-10-29T16:05:40.250`) +- [CVE-2024-50463](CVE-2024/CVE-2024-504xx/CVE-2024-50463.json) (`2024-10-29T16:25:01.827`) +- [CVE-2024-50486](CVE-2024/CVE-2024-504xx/CVE-2024-50486.json) (`2024-10-29T16:07:03.833`) +- [CVE-2024-9589](CVE-2024/CVE-2024-95xx/CVE-2024-9589.json) (`2024-10-29T16:07:54.387`) +- [CVE-2024-9590](CVE-2024/CVE-2024-95xx/CVE-2024-9590.json) (`2024-10-29T16:07:43.737`) +- [CVE-2024-9591](CVE-2024/CVE-2024-95xx/CVE-2024-9591.json) (`2024-10-29T16:04:23.463`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 859fe572b85..1d80168b357 100644 --- a/_state.csv +++ b/_state.csv @@ -4,7 +4,7 @@ CVE-1999-0002,0,0,52ad26bc78bc155140feacd4d850b7ed9051fb5126f4883feb1552eb8bfb60 CVE-1999-0003,0,0,3a125ee5553459e11723b19dc50c18dfd3195cf8dd418ba15cf0249d29090526,2018-10-30T16:26:22.357000 CVE-1999-0004,0,0,f08da57ccc696d31a7cb70b7295a6515680992e2031c9aa9fe117bcc9a4cd3fe,2018-10-12T21:29:02.120000 CVE-1999-0005,0,0,8b017dd50eb7824c23a2900de39cb981ff0974e42c3499b8b54bdd369b7b5e20,2008-09-09T12:33:31.117000 -CVE-1999-0006,0,1,48f21e030b02e3518c9b1f40c086ca15a7e4bff1297da6d8fe275b422fd5f503,2024-10-29T14:35:00.930000 +CVE-1999-0006,0,0,48f21e030b02e3518c9b1f40c086ca15a7e4bff1297da6d8fe275b422fd5f503,2024-10-29T14:35:00.930000 CVE-1999-0007,0,0,5667e64786a829159abdd94021a3fe54fd18268a2befb79ceda4747e6e2e83a6,2020-04-02T13:31:03.237000 CVE-1999-0008,0,0,f126f01ab79dda86a2d2b539ee9d9e2b20cb5fea1756509c890b57d81d941634,2018-10-30T16:26:22.357000 CVE-1999-0009,0,0,2ad374e3241b0e0481e637ce2ac40875a9368043e4fbd5a2e3c7019c6ef02a59,2018-10-30T16:26:22.357000 @@ -20,21 +20,21 @@ CVE-1999-0018,0,0,9f125eee321be1905535dae949eaa3bdc345a55047d20826c9103319587eac CVE-1999-0019,0,0,acdcaacf15c2e70b19d8b852d642c54c72eb5a0ab4c515191f9c36763168ce6b,2008-09-09T12:33:32.460000 CVE-1999-0020,0,0,e25596084efd5d8daec7e761cdec745254d557e48519c1e7dad0c6b1abbd0d7e,2023-11-07T01:54:53.530000 CVE-1999-0021,0,0,653c238e42c5cdb47c5c89d523a8a527e70fab9bfb953e6c17d27bf1bc18ac56,2008-09-09T12:33:34.930000 -CVE-1999-0022,0,1,acba7dbc4ca77e5064998e165b44b59e05f7acac18fb4f78ab1f31e39e84f453,2024-10-29T14:35:02.103000 +CVE-1999-0022,0,0,acba7dbc4ca77e5064998e165b44b59e05f7acac18fb4f78ab1f31e39e84f453,2024-10-29T14:35:02.103000 CVE-1999-0023,0,0,771dbbfe88e214bbf5d2fd04114226719669a7e791cd919f78536f582e8fe6c5,2022-08-17T07:15:08.357000 CVE-1999-0024,0,0,a53bc7b34627be8f46db79df7c0696c41786542e03f20c10b1eb23b1a427183b,2022-08-17T07:15:08.443000 CVE-1999-0025,0,0,6c6407f328012c5416b209d35e346a687d97406b934eb8c868f128082df5341c,2018-05-03T01:29:00.957000 CVE-1999-0026,0,0,f9caf922c508972730247bfc7e867c55914ff079be00e0eef5f0c214abea25ea,2022-08-17T07:15:08.527000 CVE-1999-0027,0,0,f7e33215150f66046a5642a64a14620c3ac916e797bbad850bedc353a4daa610,2022-08-17T07:15:08.580000 CVE-1999-0028,0,0,45a87a430985a1eac9173b76b0a64f87e3ac56a2775c2f5011c966800857b980,2022-08-17T07:15:08.637000 -CVE-1999-0029,0,0,c9bd215deb674e1f90b593a4383227d15a5c910543c28a1b7defe245c74b2f8c,2024-08-01T20:35:04.517000 +CVE-1999-0029,0,1,353ea6e62ec1cf420835a811e5850b31a9702d069699bc7b862aff407aced817,2024-10-29T15:35:01.487000 CVE-1999-0030,0,0,9d18e6d9dbc7f2571f4d8b358d8015df71fa19ccf517329c01942d3017115903,2022-08-17T07:15:08.743000 CVE-1999-0031,0,0,d3e9363bb7c96b3d84066b2e3da2defae4e6116d4eb96c7b418773e581f85675,2024-02-14T01:17:43.863000 CVE-1999-0032,0,0,57dd00fc1961e4d4c387499ac05792a9fe192ac191f5589da8f7faf9c7ccac9b,2008-09-09T12:33:35.867000 CVE-1999-0033,0,0,4ddb04e149c4d937e15944351127ab035e870177ccb3ef8aec59d00db8cc3ba5,2022-08-17T07:15:08.797000 CVE-1999-0034,0,0,43bb5bdf16feb1716fd4c515e99849db419fb22188c6e9f91b6c40a76e52d2fa,2022-08-17T07:15:08.867000 CVE-1999-0035,0,0,2b77a0699cc5e5ebdeb4870fddbdffd7df51c593a91f98e3b0f2c9ae32fb185f,2022-08-17T07:15:08.930000 -CVE-1999-0036,0,1,190bf2cf7f9595165e59cf4049b53593f6003ff2c2fe321938028cb0e40973a9,2024-10-29T14:35:02.970000 +CVE-1999-0036,0,0,190bf2cf7f9595165e59cf4049b53593f6003ff2c2fe321938028cb0e40973a9,2024-10-29T14:35:02.970000 CVE-1999-0037,0,0,d38bd6b9e0375b7fa44485e0d1d6c73541ae8bce5f8d9e8d5d51c4af1812b56d,2022-08-17T07:15:08.993000 CVE-1999-0038,0,0,0e695c6ea4468dc7260d5239b78b551040c17942d36f3c7876221e3099aafb7e,2024-09-12T15:35:31.693000 CVE-1999-0039,0,0,663ca0cbe1947ed25ded76a3fcb97f2a9ac70d43241bfe92c0b4661e5f666022,2018-05-03T01:29:01.223000 @@ -6826,7 +6826,7 @@ CVE-2003-0059,0,0,9b467128aa7d52b1c0228e54a512232ea06b5094b0ca4328a1b19c18c086bb CVE-2003-0060,0,0,2b161e5e23ecaff15a71eedebc54308999fda54f3b03eb3f15e239e527ef079a,2020-01-21T15:44:53.820000 CVE-2003-0061,0,0,fb48c810402a59f1e816cce84765259427dd905ebafca590217d2c1d1a0a8ba6,2008-09-05T20:33:21.787000 CVE-2003-0062,0,0,220e4ca7fe7a82c24abb8933393b0872bef9fb76c3a861b86d6b6b6d3b45fd2c,2016-10-18T02:28:57.360000 -CVE-2003-0063,0,1,6155149aa0600b9aa13db3a3278e2a0325fb90b89e90b81784a9f348419dde2f,2024-10-29T14:35:03.790000 +CVE-2003-0063,0,0,6155149aa0600b9aa13db3a3278e2a0325fb90b89e90b81784a9f348419dde2f,2024-10-29T14:35:03.790000 CVE-2003-0064,0,0,0f3d2197cadb1ae2a90294bd1e0ce23bd609779c42335a9bf1f6318b5e844d84,2018-10-30T16:26:22.763000 CVE-2003-0065,0,0,32c52cb2ff50eee0bd89462e579d28cc1a8537aa17f9ad12358b4b4edb43ab1e,2016-10-18T02:29:01.440000 CVE-2003-0066,0,0,77fac5544f85a414f7d717e1977ab442b656c9b7041d46aa7231df36ff38a87e,2016-10-18T02:29:02.690000 @@ -64094,7 +64094,7 @@ CVE-2013-7024,0,0,f69dfb33b726c99c09e7ec1cfc4b23e5b2357257e4c01221ad12f94b9687a2 CVE-2013-7025,0,0,0c06b92c09cd5e5b8b25b690ab99e51861bf2c68a061e20ac48b62d2fe6b1dcb,2018-03-12T17:22:58.757000 CVE-2013-7026,0,0,064ad508609ac0f6241a57de11029bdc80cbccbd4d3c53e3191d8a4022c749be,2023-11-07T02:17:51.830000 CVE-2013-7027,0,0,617716f913701f6d9015662788a250b9ca079a3d4ce663c2b49d9ab220513b37,2023-11-07T02:17:51.913000 -CVE-2013-7030,0,0,8de2ebcd29ca951ff1ad8b5eaed86584c18f12ba4c1dcd128bc102cfa4abae0a,2024-08-06T18:15:44.737000 +CVE-2013-7030,0,1,f48993dec3c119255ff7808d9efb4faf723b3ccf6bf8101903ded7380155bb09,2024-10-29T15:35:02.647000 CVE-2013-7032,0,0,755f9dcaf16880822e3b18c4d66ef94055901553dea5aee900fe9bbcf7632afb,2017-08-29T01:34:02.747000 CVE-2013-7033,0,0,9120c005361703e7139b903a7fdd8ac4dfe946033f094d7e06ef92744889cd2c,2014-05-20T12:03:46.753000 CVE-2013-7034,0,0,e6403cc91dd05f33ed640ffa3cb80f9bedfb07166ab07fd217b01483a0d42683,2017-08-29T01:34:02.810000 @@ -72940,7 +72940,7 @@ CVE-2014-9422,0,0,27c8e7a0cf99a84ef981b8b2b672e59145d9cb55a8a19433f70fca6bfaa621 CVE-2014-9423,0,0,dbadccf52a483c15e53cbfc8cff4f8c35dff181abefb76aad09cc936bb620341,2020-01-21T15:46:57.183000 CVE-2014-9424,0,0,55bdda0c39ccc1cb32dee00597a52f0dc9d40ef04ef47b61da3a378a5e610d68,2014-12-30T15:35:22.727000 CVE-2014-9425,0,0,dccca6d22e6a40ca8c10cd53a77b3ca62bb27fbd6d878e5c45a7840efff9cab2,2023-11-07T02:23:05.040000 -CVE-2014-9426,0,0,a5eaef3f086db66e1ab8ff75649475d0278e443df35e2d68d2b965ffc409b8a9,2024-08-06T14:15:49.283000 +CVE-2014-9426,0,1,9fbd66fb1971644fa8a55b6898eec7531f8e5c661bb3c377fa47ee5179065b3d,2024-10-29T15:35:02.883000 CVE-2014-9427,0,0,cdf611994b2bbdb6383e0c3ae8d5b7d74beb486f34c9d704c2cf8812d341710e,2023-11-07T02:23:05.237000 CVE-2014-9428,0,0,dab4fb56a8e7f25bde74bf56cfa79dff31b355fde3d82e45f5476f14c98784f0,2023-11-07T02:23:05.363000 CVE-2014-9429,0,0,545088f5923f35de470761ad7721527bc41230312934d94b14622336a9798a18,2017-09-08T01:29:34.293000 @@ -102532,7 +102532,7 @@ CVE-2017-20191,0,0,c82081004c307230c99856cdb3a9bea1dbe477fc9056adce103f7b0450353 CVE-2017-20192,0,0,191924c7b50d8cb8c53e91be3aa258ea86148b635680fd267b3908bb01e9fafd,2024-10-16T16:38:14.557000 CVE-2017-20193,0,0,1fbd71996d7e51a684a159c06d87592d1f1888a5e02c08198ec6c5ae8d4a948d,2024-10-16T16:38:14.557000 CVE-2017-20194,0,0,af65a809463bbe940000342907722ea6f70775d21158d089d1d123168ec6f423,2024-10-16T16:38:14.557000 -CVE-2017-20195,0,1,0347c3e96eed90daff75208ff8f9b7246859178d6ced2549c1b28fadca74e6e3,2024-10-29T14:34:04.427000 +CVE-2017-20195,0,0,0347c3e96eed90daff75208ff8f9b7246859178d6ced2549c1b28fadca74e6e3,2024-10-29T14:34:04.427000 CVE-2017-2020,0,0,0176f89e76e77d17aff44beb265bbd6290607491912cdad54f562216e17fef40,2023-11-07T02:43:30.943000 CVE-2017-2021,0,0,76f10f5cd36e75a57c68367deb797f3f6432a879d0c98ef2f911f8615c163241,2023-11-07T02:43:31.170000 CVE-2017-2022,0,0,9f249157715bb01a33c6885e22f286efa78b6a3306959a78f30cb9dd84a9f46c,2023-11-07T02:43:31.413000 @@ -109619,7 +109619,7 @@ CVE-2017-9851,0,0,e02e8c801409ba6765d56373051e9f9a3b894e2ccbf4aa7e193c6818378807 CVE-2017-9852,0,0,80fa02f5017c6bf3edb4c7d8c1f3e74166fa89bb54f0a4a0dcbb291120b47d85,2024-08-05T18:15:29.483000 CVE-2017-9853,0,0,e79eada926aeaa228599bb64aeeb862527abc0b12604128035bee283b299bd33,2024-08-05T18:15:29.643000 CVE-2017-9854,0,0,b84d5c95f554fb901239ca2972f0543d1a8ae0b16c7a70fdcb3e6515c0e82431,2024-08-05T18:15:29.747000 -CVE-2017-9855,0,1,e2f6b5707fb7cc998fd006ebc1ff64913937502c3e6e1f5c03ea611150901ba1,2024-10-29T14:35:04.070000 +CVE-2017-9855,0,0,e2f6b5707fb7cc998fd006ebc1ff64913937502c3e6e1f5c03ea611150901ba1,2024-10-29T14:35:04.070000 CVE-2017-9856,0,0,37014e02420a56be70d03d31ab7cf32c594982d8a8c30df560e5066fd7a17fcd,2024-08-05T18:15:29.980000 CVE-2017-9857,0,0,8149c484fd1a817ae45baf46c3c2e18a6f601384c85797ac2059ab776092572b,2024-08-05T18:15:30.107000 CVE-2017-9858,0,0,2d5f7890f0bf73e6ed55acf462cc2a41b33d6b9f4eeba4d941a5667a401b7dcd,2024-08-05T18:15:30.227000 @@ -115036,7 +115036,7 @@ CVE-2018-14331,0,0,1733e7b3c78eb173f6e76f921a4b1f5947023f3b6403afccde2b928f50210 CVE-2018-14332,0,0,bb15d876c7c697bea436f2865b795a9464bdc96c3e27a980a0cfbfc5eaefa1ff,2019-07-21T12:15:13.647000 CVE-2018-14333,0,0,fca5b144141c8927646c58c7bf28b597b8cc11ea66f929f8037c82fecde2aef0,2018-09-17T19:51:15.093000 CVE-2018-14334,0,0,2ed445cefbd8dc02dae3c6c9bb32557a08ace5b6278ac6d3207390bbfcf2221e,2018-09-17T17:02:03.977000 -CVE-2018-14335,0,1,de44289e2d3528f0390ab00cf9249f523b04454cd0e47033c30f3454fef35b9d,2024-10-29T14:35:05.543000 +CVE-2018-14335,0,0,de44289e2d3528f0390ab00cf9249f523b04454cd0e47033c30f3454fef35b9d,2024-10-29T14:35:05.543000 CVE-2018-14336,0,0,537b076def27ceed63df540357c12c791443f0b9f11d7b54320de106daf70d90,2018-09-18T12:14:00.220000 CVE-2018-14337,0,0,275d721464bb61f28b281bbc31f5f1039135b556716ccbc6030085efcabb1a71,2022-05-12T20:12:40.610000 CVE-2018-14338,0,0,094ebee330e8d8e57b8626935c8559ca2b75ef5f03880febde375b1a53fb3eae,2018-09-17T14:25:43.537000 @@ -149071,7 +149071,7 @@ CVE-2020-14314,0,0,c9d55ee466e5fdf8ca58d9c7ea273e92cd3f1efbd22109f970a409b1d9da2 CVE-2020-14315,0,0,f3d65e0a1ded81a63ac1f1cbd72dfdbbad05024ab0cff25ce7c4bda3a5dede02,2022-01-01T18:38:25.567000 CVE-2020-14316,0,0,529c9c13c0397adb748959e6f5ec8b56fe1783bbd192fe1e9f2c93e2250262fb,2021-07-21T11:39:23.747000 CVE-2020-14317,0,0,6d8541761ed97455bbb23f0b205debc440371c13284b5200d5b1c6b4d02b33a8,2021-06-10T19:34:49.500000 -CVE-2020-14318,0,1,bb52ee730ffc1231f5594a76a672c8e541e9155f369fc8d31a4b58df1ddec1df,2024-10-29T14:35:06.523000 +CVE-2020-14318,0,0,bb52ee730ffc1231f5594a76a672c8e541e9155f369fc8d31a4b58df1ddec1df,2024-10-29T14:35:06.523000 CVE-2020-14319,0,0,d3c49ba93b3db74d67caa58f6588b0a2c37a3f0a1a0d5004ffe5353ca53f87fc,2020-08-12T14:16:48.007000 CVE-2020-1432,0,0,f7c208e3178a12ccca64865be98ff1737c62a1788239359f1a1afbb2317b1fa4,2021-07-21T11:39:23.747000 CVE-2020-14320,0,0,c47f2259a2f1d5558b07b9b2dc326d2a8cd583de7fc3e895baba68cbd74583b5,2022-08-17T15:17:47.090000 @@ -153434,7 +153434,7 @@ CVE-2020-2289,0,0,237e78a6af3d7036130767680f57c0a3a020db1aac49245aeee56fa84f1760 CVE-2020-2290,0,0,76a22d2b9301b18a97edcdcf9ae08f28c0d2e63d9cf064f038f3bf935b951564,2023-11-02T21:48:06.380000 CVE-2020-22907,0,0,14182f172528e66c19ff3e146c03cd1dcc6aba53a36508ba701493addbbc4ca9,2021-07-15T19:35:40.677000 CVE-2020-2291,0,0,831f057ba1b974d72da3756b366963589d96107752aa176ea582cb1e649bcaf9,2023-10-25T18:16:41.680000 -CVE-2020-22916,0,1,01b2214767052416eb90155f3bc47f5dafa8310d0707d4ce46106bc189040f39,2024-10-29T14:35:06.790000 +CVE-2020-22916,0,0,01b2214767052416eb90155f3bc47f5dafa8310d0707d4ce46106bc189040f39,2024-10-29T14:35:06.790000 CVE-2020-2292,0,0,820a1e836e8b2a00fa64cad273c996c9369fc62f43e740918d1d311a42b24e26,2023-11-02T21:48:09.623000 CVE-2020-2293,0,0,b807566236b4117c5b2834ebaaf01007b6526caee28548561327fb17e0e0b05c,2023-10-25T18:16:41.803000 CVE-2020-22937,0,0,09d1bc2d2eb8fe3be5eec72f950895d5eb910c1f01d2bf0a3e12d4ca21ef65a5,2022-10-26T19:04:32.750000 @@ -163403,7 +163403,7 @@ CVE-2020-8544,0,0,3a888ba051453fbac405eb0f09a5bf042104a1e1e50ba8dab847dbc7c3e3f5 CVE-2020-8545,0,0,609c5da111e2fc56181689c848cb7edb7ee1d1399459623f134a6346ad47eaa4,2020-02-06T17:31:09.207000 CVE-2020-8547,0,0,89c8e44a1b538656d52e171c8f31755da98710fb1407d2ceae7cca78896a7866,2021-07-21T11:39:23.747000 CVE-2020-8548,0,0,dd4f220188dad09b7393e47669a721a5f4180f3ed71deea10ef8fbe1d386c87c,2020-02-06T15:48:56.747000 -CVE-2020-8549,0,1,d2a3ee625dce8cdd095896233486477c7bc4a0d84e55a398fbbbd001ac2218b2,2024-10-29T14:02:29.840000 +CVE-2020-8549,0,0,d2a3ee625dce8cdd095896233486477c7bc4a0d84e55a398fbbbd001ac2218b2,2024-10-29T14:02:29.840000 CVE-2020-8551,0,0,4d3eba4ea6483cdfcc54964882463ca07bac4e41ebd81e8f513a3484bcdcfece,2023-11-07T03:26:37.053000 CVE-2020-8552,0,0,c5cc4507a0344c19d76d89e91081b61d6ad713ed607e954d77572e90ab21532e,2023-11-07T03:26:37.147000 CVE-2020-8553,0,0,431014ec274230fabc63983eacf74f4d7bba2e727f06ebaccfd12693a918dbcd,2020-08-04T19:58:43.923000 @@ -179830,7 +179830,7 @@ CVE-2021-37379,0,0,660b760096832af33961911d2e731d0b3261b18bf8a347316566574899f78 CVE-2021-3738,0,0,3229d21a2eb86b533022aa4f9c03af5757d6539e525c3f9e249d641572b52ec7,2023-09-17T09:15:09.923000 CVE-2021-37381,0,0,36e2309ba57bcf2bcc20e949d5a071968af133f14de6abf89cbee645b90a97c7,2021-08-13T18:42:59.763000 CVE-2021-37384,0,0,f2844aafad4d02136d8e2525e7ff6772cff4e1f2006c1b87ee431deb96d5aa0d,2024-08-01T13:42:16.360000 -CVE-2021-37386,0,1,9b54581cd28afa2d00010b79f87ec816957edb13d013d1f7fb5733c3a3c49a39,2024-10-29T14:35:07.070000 +CVE-2021-37386,0,0,9b54581cd28afa2d00010b79f87ec816957edb13d013d1f7fb5733c3a3c49a39,2024-10-29T14:35:07.070000 CVE-2021-37388,0,0,25d4d35859a9e89f020cbd148383f838a4632bb2dc268d112a6b3789166e4144,2021-08-13T18:00:58.260000 CVE-2021-37389,0,0,b931c76f236e74f85f1bc82b87aea3e5d7a9564f5b8d1de5964d41447d325847,2021-08-17T15:34:02.817000 CVE-2021-3739,0,0,1a29798c067e67ae19aa21358a195e1184b2adaf9d99c9a8d92ef90fa92dd822,2023-11-09T14:44:33.733000 @@ -182550,7 +182550,7 @@ CVE-2021-40797,0,0,83ecf144755a078fb0137640e23751e8fdeb611b3d941f8f1cfd6d9bd9d7a CVE-2021-4080,0,0,d4d1ec072b93ca5483690d4a56f768d54774e114ec073ae9346077dd1bfd3c1b,2022-01-18T19:57:58.883000 CVE-2021-40809,0,0,f94e284cff36abdbc2c67c180c3c67c73bbdac5fa4593983c6a0e49d59c4a92a,2021-12-02T02:15:07.473000 CVE-2021-4081,0,0,90824a26fe3f02407f226276e613d6dd19d3f88f47724d1f4fdf53f2c4b9edb8,2021-12-10T23:06:50.363000 -CVE-2021-40812,0,1,3ddecafe06043d0105cf53348b1d7a2dbad342724d6baec15648b5cb1ef88f1a,2024-10-29T14:35:07.913000 +CVE-2021-40812,0,0,3ddecafe06043d0105cf53348b1d7a2dbad342724d6baec15648b5cb1ef88f1a,2024-10-29T14:35:07.913000 CVE-2021-40813,0,0,8197c29251f18732892acf1be66140720a7ec379bc6dbd6bbb36684689527962,2022-01-22T02:46:23.477000 CVE-2021-40814,0,0,612a646cf942a49855b53b29f0459f7f8f03abb06ff7859a858a3d092b4397a2,2021-09-15T14:39:40.313000 CVE-2021-40818,0,0,6a72137ffdf80c9c6842993df83558d006db1efc99b56b58f1cbd20fcd5a6c4d,2021-09-15T14:59:36.733000 @@ -183929,7 +183929,7 @@ CVE-2021-42687,0,0,51aff8bb8be2dfed23e5e2283ce8a960a865bbf78379ca2f376af01110d43 CVE-2021-42688,0,0,646457e21c7114292df4109589a24f0f288dd18fb24ec94d267d31ede6bdd204,2021-12-09T14:05:17.687000 CVE-2021-4269,0,0,08b719a96cba7dec3a11b26321c09d6eb626c38187e3cc307ce1a1023588c7b5,2023-11-07T03:40:29.450000 CVE-2021-42692,0,0,83b2956d3775f5dec583c92f53fdd8bc4c1fa855e8b7ccb98fca5842039fedea,2022-06-03T02:56:05.980000 -CVE-2021-42694,0,1,adf4b334d1de2270325b32329a21782f24cc834ca2a0c2991fc9fd443fd0e806,2024-10-29T14:35:08.773000 +CVE-2021-42694,0,0,adf4b334d1de2270325b32329a21782f24cc834ca2a0c2991fc9fd443fd0e806,2024-10-29T14:35:08.773000 CVE-2021-42697,0,0,05f0c4f5dd4d421cf8e92c234de33ee1f0c98041acd57668964d6a55f79c825a,2022-06-13T15:41:16.767000 CVE-2021-42698,0,0,6e5c540194b901c9f12a1bd85f98d4b2a1097d11a022c232bbc9598df8a0e75d,2021-11-09T13:56:23.843000 CVE-2021-42699,0,0,f7c15d007953981fdcfe0e5042345932e64c3a607431e6511ffbeadf41010118,2021-11-09T14:35:52.460000 @@ -186841,12 +186841,12 @@ CVE-2021-46916,0,0,fdb459c12fd239c2e83f9c4d4aefabbcf808ed1a5f88bfee6b46458f77ef6 CVE-2021-46917,0,0,aff6030a1bff1cbcdfce5542931948e59338e91df96ed70e576a89da079c3c58,2024-04-10T14:43:21.067000 CVE-2021-46918,0,0,b804a6899d07a427e771a5f08ec631466d6d2dee399776fd2a12082a5e90e7f0,2024-04-10T14:47:16.307000 CVE-2021-46919,0,0,0cde8c43296fcd13ad033026b1ddbd4df8832a139f34b8e1b28c2677c09a2bce,2024-04-10T14:46:43.057000 -CVE-2021-46920,0,1,6b2c741068e1cb2da8db8e261467184d030fdcb4fe67eb82cc23fbb349d0f728,2024-10-29T14:35:10.437000 +CVE-2021-46920,0,0,6b2c741068e1cb2da8db8e261467184d030fdcb4fe67eb82cc23fbb349d0f728,2024-10-29T14:35:10.437000 CVE-2021-46921,0,0,f76eb13759623cb0c69517bc9ca9be27b62de7989b6e7890df13dd34a12cb58f,2024-04-10T13:39:36.027000 CVE-2021-46922,0,0,0ef9dc08de3c017c31bcbe65eb1d6f2a13f3cef07b1101305f6a81f63fc70c44,2024-04-10T15:31:51.440000 CVE-2021-46923,0,0,7441fcb2b7b199ba732b4449dcb26eebf9f117ba4edafd02335ac76d5d494de1,2024-04-10T15:25:34.540000 CVE-2021-46924,0,0,7809d1e21be7ef51181cbcf8ca7773288d7c4758e65da465f7f4db286193c767,2024-04-10T15:23:33.673000 -CVE-2021-46925,0,1,311fd749d4b0db8495763b88e3fb10e4f65f9c97e567a8f000490d1786586e91,2024-10-29T14:35:10.930000 +CVE-2021-46925,0,0,311fd749d4b0db8495763b88e3fb10e4f65f9c97e567a8f000490d1786586e91,2024-10-29T14:35:10.930000 CVE-2021-46926,0,0,01644ae7acf4d3f47959a5f052fd0c86681dd26bf119b2b3a88f04e6fded8274,2024-04-10T16:26:55.390000 CVE-2021-46927,0,0,f1ab7fe02832c444785b0186ed8b045f076e799b4c625ec0ee1a40e80b0b557f,2024-04-10T16:25:32.067000 CVE-2021-46928,0,0,2e946335924400d0c882fa7cfc859b689dc887e45829f01c93967ea4b3bc8631,2024-04-10T16:29:19.867000 @@ -193438,7 +193438,7 @@ CVE-2022-24323,0,0,60933f9defeff6ffaca1206f125a529ca2fd450897a5ecdd4a1dc57f02a29 CVE-2022-24324,0,0,40ff4a81d9205c96789d84e2cb0a474b7cd8f2362ad8a5836c903abe7f719eb8,2023-02-08T15:58:21.810000 CVE-2022-24327,0,0,a13ed7bbc787a46e63c14b6c4fc06e6001037675034c33c85b9627e17c84f296,2022-03-04T02:01:35.887000 CVE-2022-24328,0,0,816798155f43a17a8e125d70fe1d9198f2c5fdb4c060ff8f14f71a6a07458a66,2022-03-04T02:05:33.877000 -CVE-2022-24329,0,0,f15ded741831dd5304e06534798e4dda629697aed8e1e4b6efafeb6d06ff353b,2023-02-22T17:50:02.030000 +CVE-2022-24329,0,1,af5d3fc0ad398e3456f084890afa77e3ccd837d448d3209b160510d7dff4f42f,2024-10-29T15:36:31.610000 CVE-2022-2433,0,0,f15487e277bdcefbb231f399ec09c6aba0c3c1218877701f420b8cdc9e979e18,2023-11-07T03:46:34.623000 CVE-2022-24330,0,0,a2999038b1d765eecddd8185bf0a19fe846f15e55e5f2474cefa5c8a88aeb1b9,2022-03-04T02:10:23.783000 CVE-2022-24331,0,0,4b2584daa512df956c9784798625d17ecc848560039c2b3695c72172e14ed7df,2023-08-08T14:21:49.707000 @@ -194472,7 +194472,7 @@ CVE-2022-25464,0,0,fa4446c0b87ccc8489496fa2f9dcccfb6f1f7e87309e1719761a02c32bdef CVE-2022-25465,0,0,7cbe3853c67634a1c63754575fe4ed932bd1f0187da78b5a63369dcaa7c4cae1,2022-03-11T15:55:36.710000 CVE-2022-2547,0,0,dbeba4a8b3d68d6d3de10cc461419e2c751bf3e1f6f2ec4f183c6a17312177c5,2022-08-19T01:43:28.157000 CVE-2022-25471,0,0,d59a2094cef30b0a74747ab7cc9d6328094a89833946591fcbe214da809a6cc7,2022-03-09T19:47:15.070000 -CVE-2022-25477,0,0,d86bf46fd43c2390bd2006b2734d584360ad90ef71c9dacdc8f62e8d103e231c,2024-10-24T17:15:13.463000 +CVE-2022-25477,0,1,3a41e0696d9b7093c271393e844e39591137c452b650a874800dac195bfa4e88,2024-10-29T15:35:03.380000 CVE-2022-25478,0,0,ed982e56e9c14c65c29ba579ed08350359448be86acb78a40fa8eafcbcfa73f6,2024-10-27T15:35:00.560000 CVE-2022-25479,0,0,f692c3efe0d91ffaa495484faf07e81ae6f282eb960806bd2c9e1b2594541e23,2024-10-28T19:35:02.130000 CVE-2022-25480,0,0,c5c263da9f1df4b92b5b97a94c271252be09f3b4a9bab47b12b6b752f161829f,2024-10-24T17:15:13.817000 @@ -195023,7 +195023,7 @@ CVE-2022-26130,0,0,f5d00a8d594c3c9a5a76c59a5eae2a9b0265e622b079a3869dfb48c26aa3c CVE-2022-26131,0,0,ae0b4fb43b33e1484c241aac17637114600c06f8bca32f6fe29efec493803887,2022-03-23T18:37:02.983000 CVE-2022-26133,0,0,ffa6882abf1006ca33138be1d3118308796159752fdef8b4640dacb3c5e895ed,2024-10-03T15:35:00.870000 CVE-2022-26134,0,0,d3c92ffe05d5b347d66ad1f6e09fe61e264909d50ad2ff29e6820d2348a3d6ff,2024-06-28T14:22:46.883000 -CVE-2022-26135,0,0,5feabacd409141da2b175a7ed015fa6e909537b4a385f3739c4898dc95a861a2,2022-08-04T15:31:35.393000 +CVE-2022-26135,0,1,6362a7161b68e45e099fd9ef982d945176c5c06d9e0772531efe48ad79179457,2024-10-29T16:35:01.013000 CVE-2022-26136,0,0,d3c4eb85ac63626dba3e8c570510b596fede05247aec3106659fc0077d1cecaa,2024-10-03T17:35:00.530000 CVE-2022-26137,0,0,4d61537846b2a0cec058cac99e9cac03c99d1687b308900e0eb773cecfff291b,2024-10-03T17:35:01.143000 CVE-2022-26138,0,0,7590806ebfbbe178e5eacbe72eea932c8666bfae87cee4c9d2637bc12d14b0b4,2022-08-04T14:13:04.353000 @@ -195441,7 +195441,7 @@ CVE-2022-26694,0,0,169c107dc25cd8fe2031df5efd9423cace17eb0870c85c9758cc8168e70aa CVE-2022-26696,0,0,bca2bf4ee2335bd72ee817b2bbd1edc26686976fcbc5d1d24edc6a7c7cbf3e76,2022-09-22T20:25:34.193000 CVE-2022-26697,0,0,31624809f9cdc65d0276755db20b983160e808ce83061faa07fddc3f26adb8c8,2022-06-08T18:21:35.653000 CVE-2022-26698,0,0,3a52443786f0bd357f8e04dc6524a78fbc15640b76331152a666dd6b3c6883e4,2022-06-08T18:50:01.627000 -CVE-2022-26699,0,0,708faaa0cfeb7e9e3f8adbeb74cac1bd2fc993c500f89f84647be37e219bc0e5,2023-08-18T20:12:40.500000 +CVE-2022-26699,0,1,9bdbb984d5f5097ea1323ff4942eed4be55928b5d83277230733daa1b675ab10,2024-10-29T15:35:04.353000 CVE-2022-26700,0,0,a66b72d1fb946ca44c0170eb3f2f4482773ae37880fd98ab53c322ca21300dfa,2023-08-08T14:21:49.707000 CVE-2022-26701,0,0,256df3327cb732c3329184704791a0a8969cc817ecead12b37cede5d2c5fd1f7,2022-06-08T19:00:39.003000 CVE-2022-26702,0,0,5be1e7ecf83886193681ffa88c713840633ebecb2922e143d35505104879d011,2023-03-28T05:15:07.577000 @@ -199342,7 +199342,7 @@ CVE-2022-31447,0,0,0e5ab019dd73f8dcdaae08c8255dba869dabe446e1481b353116985983b62 CVE-2022-3145,0,0,d21cbde81bf5231b6fc94cab977bc88d6bdce7bbbee0913fa47d0f07ea1cb7be,2023-01-30T16:30:45.250000 CVE-2022-31454,0,0,7b3bd591a8827aeff64f69219e825cc31ddba92a0152f6341ff16a366f7dd8ae,2024-08-03T08:15:17.517000 CVE-2022-31455,0,0,3cce69cbfeb6b887dab0c4c485c901171ee6a35dd013d430d1262dce568ac8aa,2023-11-07T03:47:37.770000 -CVE-2022-31456,0,1,165af628194d0d12e625cc1bfcd87aab46eaeacefcf1d6de170ce36d9a171435,2024-10-29T14:35:12.093000 +CVE-2022-31456,0,0,165af628194d0d12e625cc1bfcd87aab46eaeacefcf1d6de170ce36d9a171435,2024-10-29T14:35:12.093000 CVE-2022-31457,0,0,23731effc053c3caac791445d3c6d2f512fedf81864f9e6109fe79e03829f998,2023-11-07T03:47:37.910000 CVE-2022-31458,0,0,6309737435a4e437f77d27a264d59769b805bd0380f3c95e48ca3963d7ffdb38,2023-11-07T03:47:37.973000 CVE-2022-31459,0,0,5403dd4049a94c0b3f2af5b604ed0efd236682d733de44cf28bb0728e25e543d,2023-08-08T14:22:24.967000 @@ -199530,7 +199530,7 @@ CVE-2022-31625,0,0,b2f4cc813c1ca180b90a012dcd95ca87f4fbfbb9e9eaac7bf904c97b8f8b2 CVE-2022-31626,0,0,8d94e8e2103c7862bc20f22cd91ae7a0fc49a69374596f2d1963324fae2d8e4d,2023-11-07T03:47:39.910000 CVE-2022-31627,0,0,71717207ad4e5fdd41ef51ce9ec9df450045b8dbf5e32c118f066a3578f11cad,2022-10-25T19:45:51.713000 CVE-2022-31628,0,0,318257423888c15846b494c47e87840cd1108d4bd4ce2079f0ead2aa19679a05,2023-11-07T03:47:40.020000 -CVE-2022-31629,0,0,6bf1ab24df2c9d2708d68c6685b83104230ca1a0f2c3c3ba3b00e64e8192efbd,2024-05-01T17:15:24.897000 +CVE-2022-31629,0,1,40e49bcadc3d2c9e6ba8aef844fadf44ccb48c31ac09ac6fb7ee3b18a76a42f8,2024-10-29T15:35:04.630000 CVE-2022-31630,0,0,8d3e760820fd817b7c9c3295a2647273326d355de0036c89b782973772926d83,2024-04-02T03:15:07.973000 CVE-2022-31635,0,0,5e1cf10a427e50450538e356254bf291a5830b0c0ade6c88ffadb7c2692ba11d,2023-06-29T20:00:00.027000 CVE-2022-31636,0,0,e3d132a1af04b3d9083c5ed58892a13d87dfeea9ffdce8bde41483a9ad35cc23,2023-06-29T19:59:04.183000 @@ -200191,7 +200191,7 @@ CVE-2022-32497,0,0,409cd89fd07f73753644dd274b182d97057b0345e3dbc349e8160d0e576e9 CVE-2022-32498,0,0,7e077c92647ed8c3a2a9b16e6c5edcba97f696da7c1d8c831a2eceabd97716f1,2022-07-30T01:24:17.157000 CVE-2022-3250,0,0,f5bd8db8cab9b54b1b72289fb537f8db5593484a25773a6d077ab99d66a1b38a,2022-09-23T17:00:34.603000 CVE-2022-32502,0,0,8043bd7b67ea0539b415e98c4f691c3c17aca58cf56f8cb93f7ff0987225b88f,2024-07-03T01:38:30.257000 -CVE-2022-32503,0,0,f57183dbef2543b9f63dcf473a4267a67a4ba901286e8bc05468ac8a81f43f5a,2024-07-03T01:38:31.060000 +CVE-2022-32503,0,1,0502e59f680c5964f98e4b05a8da6f97bc98f48102aedf6f29e3815dad5453f2,2024-10-29T15:35:05.717000 CVE-2022-32504,0,0,f985a28466775169224400eb27b21a7a82a049f055b74ee3fe4261e86e2a23c4,2024-07-03T01:38:31.860000 CVE-2022-32505,0,0,d68338a48cb6379b7959ddbe908e7d1fc8f4608362b59573f8ed193723734aef,2024-08-19T17:35:04.330000 CVE-2022-32506,0,0,7c3872e68b41f5c55b555638bfe7bcc9ff215c45bf9f77b0ea11d0b9c47308db,2024-08-20T14:35:01.103000 @@ -201691,7 +201691,7 @@ CVE-2022-34466,0,0,85a76098c827f44807472c9050aa9c34b6861f3a702b89bd6b78f3d8f9608 CVE-2022-34467,0,0,cd47bfa6f5e49ff9016c15d080ba88e1e79bd8dc045dc6db1482988187a0fb18,2022-07-20T15:33:35.377000 CVE-2022-34468,0,0,77ad896586149e39a2afb98344879f153efb79a8d0eee250b247497339ea05f2,2022-12-30T18:01:31.813000 CVE-2022-34469,0,0,d3be71ac915c4f5965f10a11beeb43100d2dfbe56e8f9ee217c4853a21b1c08e,2023-01-04T16:41:47.043000 -CVE-2022-3447,0,0,d12634c5117eab78610255c2676d85da975219136b8ed10cf01b47c1894c49f8,2023-05-03T12:16:24.360000 +CVE-2022-3447,0,1,777271e968bba913bbc5521ada37920ac214c21e6feb7ff7fce5a7c71c1f34eb,2024-10-29T15:35:07.713000 CVE-2022-34470,0,0,0852e1a30c78ada9d20cab322f1e310f5c2467db5d31cbb964f1a5259162c3f3,2023-01-04T15:52:28.317000 CVE-2022-34471,0,0,a4f20ea698aee3a8aa9c0862fb6f5336283760bb0428ef938a0593a4c0879108,2023-01-04T16:04:16.437000 CVE-2022-34472,0,0,a04a00dc06c1e3a467671361ffa7534fe535a3d7ea6f755da1fde59cfc4c74f1,2023-01-04T15:28:06.480000 @@ -202291,7 +202291,7 @@ CVE-2022-3520,0,0,5c0db1922eb6a1749e4cf82c6edecf7114b50102dd4661fd8b4c295f0f81ef CVE-2022-35201,0,0,a45a663fecb3c00e814bc7b384217d3bbad522459479d4afd6dc563b9b88de8f,2024-02-14T01:17:43.863000 CVE-2022-35203,0,0,aebf17ad08ed8ea5229716240c5e778922d765217451ed0e0919b873b84c0fe2,2024-02-14T01:17:43.863000 CVE-2022-35204,0,0,8a403804d5cfd3b40458a0ffcd362acee182087639c04a063ffcbc494a094d97,2022-08-19T14:47:22.827000 -CVE-2022-35205,0,0,94fa969e3c91200dbe4af9e0d5417d2e96af8aae240dc9cf6331d991feca84fa,2023-10-06T15:15:13 +CVE-2022-35205,0,1,1d034141049f378649b5b29752acfe9c39d416889b33ef5f45cd08d0b4a66965,2024-10-29T15:35:06.720000 CVE-2022-35206,0,0,49720cc7c709b5ad216548b5c0b3309be1c5a446165acb7aa71812c30493001e,2023-08-31T00:36:57.233000 CVE-2022-3521,0,0,5d4087931682630895a0dc749c2a320ddfa4eb621e3a6ac3eab58359d6de9b3b,2023-02-23T15:29:14.540000 CVE-2022-35212,0,0,41b6a11502e4e8a67b10a67a2d24fc87779f325adf83ae6031d288aa7a6f6487,2022-08-19T15:01:06.300000 @@ -203689,9 +203689,9 @@ CVE-2022-36797,0,0,90016e57563b430c7b525e8fd47fabd28019c16b067a6bdd01b412d6cadca CVE-2022-36798,0,0,309d7800cb4e1ffad279b761a51715ee05ee0bc213bbfd237d79d5f0595db935,2022-09-23T19:33:35.513000 CVE-2022-36799,0,0,6f5f644d8a556e2f37e914de2c73c0d1c7617369d1ed795238fddfc6c3d69967,2024-10-03T19:35:06.767000 CVE-2022-3680,0,0,4045a251fd074dc1e78a757b3250a9f45dbb1c048a72547f43ae93ad5dd948f3,2023-11-07T03:51:38.153000 -CVE-2022-36800,0,0,dd1af9dfe900eb3e2d7479d8dda8d0887ce7def8c5fc17c6c520bcbd1cb0496b,2023-08-08T14:22:24.967000 -CVE-2022-36801,0,0,6ee5b9b9e2a587ee6808d637ba4173972a9016f471a78c39081d815f64f7b29a,2022-08-12T17:38:37.907000 -CVE-2022-36802,0,0,3502c01758a1fbb120eb1199a3a435b4eaa88bb4300cfcf4c2a8cb28d6077b9d,2022-10-17T15:08:01.323000 +CVE-2022-36800,0,1,486fd5839322b0d5f2337462309abac337ea54afcbff10e8f6f3fe581f46a815,2024-10-29T16:35:02.460000 +CVE-2022-36801,0,1,793b2b4d725f74df2984c70c9c322ee8a0639dc5968470400b2f00be81641f9e,2024-10-29T16:35:03.280000 +CVE-2022-36802,0,1,636712aa86112217531be40a8cad4279d1fcb5d184b683cc081fb1eb29ca1c10,2024-10-29T16:35:04.083000 CVE-2022-36803,0,0,8bf391ac2eb3e6ee9d8828e1361ac87e802988d8d37cb0a535af2291dbd1c770,2024-10-02T15:35:01.363000 CVE-2022-36804,0,0,0ca1f04aaa3e26878886d510c1f32bf471ffd055bf07c2485f77648a7440ec06,2024-06-28T13:57:13.930000 CVE-2022-3681,0,0,1233abe7c4aafe7eacd841955e89714c7f64b04fb29227eb9e9865f916fa993c,2023-11-07T19:41:49.927000 @@ -205033,7 +205033,7 @@ CVE-2022-38621,0,0,7e5376116068e534bd5b739452fca37c46477488cabf404b4eb4e4408cb5e CVE-2022-38625,0,0,3c6831c34940089d40acc7513e688c1e4dbb406e6dac4487987a18136063a078,2024-08-03T11:15:55.197000 CVE-2022-38627,0,0,6fa70cf692b77ea18329aa80fa68e4e056fe59b1cc16b0f473d59f8d38738a58,2023-01-10T16:56:35.530000 CVE-2022-38628,0,0,16a1c93b1056c2faca040f777f3d22fff4a353ca0b25d5e20933b4cf855e4fb2,2023-08-08T14:21:49.707000 -CVE-2022-3863,0,0,59401a4df0d8998d1a5b64e07ae249db7faf0fe0c691a52485c082a147b13ad8,2023-01-09T19:14:44.877000 +CVE-2022-3863,0,1,1c686b884f20606006c3acc13b931d044f0b9859352e2b546ada84ec6f22e430,2024-10-29T15:35:08.557000 CVE-2022-38633,0,0,fde3605b886bf4f76fb872f28dc2fd5deda34dffe8ab326928c5ebc91e5a9520,2022-09-17T01:50:57.147000 CVE-2022-38636,0,0,8dd2b0164d7a9a956898352540efe936ab700244a63a88781aea9cf76433ae63,2023-11-07T03:50:10.187000 CVE-2022-38637,0,0,35b82a8fef7196b376ae5b13155913192cc93d0f70d18b6c8b2447ab5f447f22,2022-09-16T02:58:05.803000 @@ -206168,7 +206168,7 @@ CVE-2022-4024,0,0,ff3a57f0d476d9607fe3e9a83b97e3aa80fc59409fe1af1adacaa8bcfaccf1 CVE-2022-40242,0,0,db466be0a84044f237f29ef72a5ac9db4cc43fd07a94f370c78169a0a3d16988,2023-07-10T18:44:41.837000 CVE-2022-40246,0,0,bec7539d28c316859712c5d3cab41b522ac82417d048441c9ed698abc3bbecb4,2022-09-26T14:22:04.787000 CVE-2022-40248,0,0,89ce04ffd5b2eaf79a3d163c1817644fa1f4b102448c531310b7cd55ea9bb545,2023-07-10T18:44:33.213000 -CVE-2022-4025,0,0,4e0345b5547dcb53f9462cddaa91e74f9f7ef4262615d7f5744114a622be593e,2023-08-08T14:22:24.967000 +CVE-2022-4025,0,1,ea98ad2ec0f6f830d5aa22496db19d531bc303d44cd85bf0778f030b675a4a5e,2024-10-29T16:35:06.953000 CVE-2022-40250,0,0,4f6facb418ccb991971beb09c80e6ada4e135a191a9044a7470cbe57898a8445,2022-09-24T02:38:05.873000 CVE-2022-40257,0,0,218e8282c39aa935058e5cd97a11f1786a3c98f77c3885bf162b9b84e838293f,2023-07-10T17:43:25.830000 CVE-2022-40258,0,0,1edeac27c60456fafc480760d4cd1def9e0052c64f42508af3ab5acf70d02d70,2023-07-31T19:15:15.630000 @@ -206664,7 +206664,7 @@ CVE-2022-4089,0,0,2975b3ace17a664f1cfbc2ebcd08bbfc2d93d94b89d1430a0935693386730c CVE-2022-40890,0,0,826f5fcb580923e669b2d463900c2768f1dbd884b8a4bd5e44cf32a1b976eebf,2022-10-03T17:53:03.830000 CVE-2022-40895,0,0,8ad58fce9f15e2b2abd3a74a0e6c7fda70fba6094332aef58466c0c415fce5a8,2022-10-07T20:11:10.490000 CVE-2022-40896,0,0,b185f387fea519f76da4721fc650440017d0fd023852bd19afc59f2c5b0631a1,2024-03-28T03:15:07.647000 -CVE-2022-40897,0,0,2de443948742cd284faa2df5c991e10b8c263db85d649110c47eada3bf23d920,2024-06-21T19:15:23.877000 +CVE-2022-40897,0,1,55636c58cbd144f55a5eb0e8e5c132b0fcb2701eff6e07fadb0bff81750831eb,2024-10-29T15:35:09.530000 CVE-2022-40898,0,0,5c6bc68bd00225bc811f4eeb16a5a24f9a866920a18f338bafc99f787abe0ba7,2022-12-30T22:15:22.800000 CVE-2022-40899,0,0,b276e4508a71aa68d54ee2387b6b638a3a7bbc43d1ca8fad43c482586bd92329,2023-01-23T18:57:18.740000 CVE-2022-4090,0,0,801c7e0f8782d92bf4038a1ac050b391b16cea80fa38442bf2fd8f751a230f4a,2023-11-07T03:56:54.410000 @@ -208004,7 +208004,7 @@ CVE-2022-42445,0,0,e295339bba1f3487f2025ef56dc96f11beb0a1486e3cdf407bd3b450306dd CVE-2022-42446,0,0,c60a97003a7f84c5f64fd596f87eab38f4c8f947f640f4977d97bb6854cb1f7d,2023-11-07T03:53:19.593000 CVE-2022-42447,0,0,0c5fa8c1d300f2b622eb4e0bf02de8273e45049e45b90fdf1b77dffdbc17b887,2023-11-07T03:53:19.810000 CVE-2022-4245,0,0,2f8a836729a2b28af01fd381acbb262fa1c36c272f02aeece53c3f8b33d50d4d,2024-10-10T20:02:34.187000 -CVE-2022-42451,0,1,23d16c813d9a957dd3752fc62ae51f051d73137ab1963af2b48468b5a11b22a8,2024-10-29T14:35:12.397000 +CVE-2022-42451,0,0,23d16c813d9a957dd3752fc62ae51f051d73137ab1963af2b48468b5a11b22a8,2024-10-29T14:35:12.397000 CVE-2022-42452,0,0,b66ad06c8e49a9d8c43cd7b8918f7497d8729a8e0f307d4a7cab0bda4a8dc2bc,2023-11-07T03:53:20.100000 CVE-2022-42453,0,0,8eb505e13c81a58ec1537abc098389b013e90e9754080b524d417f996725afb1,2023-11-07T03:53:20.307000 CVE-2022-42454,0,0,0ba3607d2c3832ffb5be71397ed848ba69a013507b70cb879c273e5e1e07e274,2023-11-07T03:53:20.500000 @@ -209370,7 +209370,7 @@ CVE-2022-44343,0,0,6d05f423371083efa9401ae4c199c365b6edc02598e6045acabd60888bd3f CVE-2022-44345,0,0,eb153b34db34fb58b5e04627ec85ce9c1752a7f2e5b2b48f824a72fc54da2c2e,2022-12-03T14:27:12.420000 CVE-2022-44347,0,0,cb96dc5cda79d88b6b1dd9bd3ef3fb3c7e521e86c0d9b3793f79a3e9b36804ab,2022-12-03T14:27:01.077000 CVE-2022-44348,0,0,b3edb8f526e4510ca80333cefdde5f0fe598497e53fdac05b7fc4e9d58a9120b,2022-12-03T14:26:33.983000 -CVE-2022-44349,0,1,42da5a73bb0eb32326d589a91057ad58cbb17d0f7af89fd452e039b22b8d1904,2024-10-29T14:35:12.720000 +CVE-2022-44349,0,0,42da5a73bb0eb32326d589a91057ad58cbb17d0f7af89fd452e039b22b8d1904,2024-10-29T14:35:12.720000 CVE-2022-4435,0,0,7dfde5d833f2ef69acae39af25992d4d30ce7c6fbf5011e5b52990a483591e41,2023-05-15T15:02:39.973000 CVE-2022-44351,0,0,47136da05a3c6e2cc2c40e27c43031f776cbfd38f1571ef559095bf55a48f871,2022-12-10T03:06:14.997000 CVE-2022-44354,0,0,53f5714991bc9662aa84127de793c763ba9f0ae3db371a8f7c6ad1f2d38306f9,2022-12-01T20:01:46.563000 @@ -210501,7 +210501,7 @@ CVE-2022-4608,0,0,f69509f880e35e178a11911413477eaef967c720f30eb08adc66f5acc28821 CVE-2022-46080,0,0,fe9b2f2a23de7c5102d29ab9bc9b6a0f2eb379ce1e2d5a8ce8acadcffbe0e14b,2023-07-12T14:53:35.557000 CVE-2022-46081,0,0,10dd263b055bb8688d827cd365513fa6234714848594880daa28df023fae41a3,2024-08-03T15:15:33.853000 CVE-2022-46087,0,0,a07060581efe9298121db2233c5c38501954d5c2160fa5042db2ba805035666f,2023-02-06T21:54:50.580000 -CVE-2022-46088,0,0,4ed06a94c0bc5acd5a9950d39108669b474d03ba4d63c42e5b0a87c8dd938716,2024-03-05T18:50:18.333000 +CVE-2022-46088,0,1,1a5b0fccd49e1ae8ab5ab9dcdad7a1bef698f8342a3af670bbe8034da0ecde11,2024-10-29T16:35:04.890000 CVE-2022-46089,0,0,a389db1543f1a2ff5fae3a5ebf216c4a40482acbc273e2405c2ae12b84cb1029,2024-08-16T17:35:01.040000 CVE-2022-4609,0,0,e70428330dd60a5e25b1dc4109e568b1aced34149fef1cd3984474ebc7588254,2022-12-23T18:44:47.767000 CVE-2022-46091,0,0,6ff24a58a333a49492281b25c366e610950da50d2b34311dcc22df1e4f6200df,2024-08-05T16:35:01.230000 @@ -210989,9 +210989,9 @@ CVE-2022-46719,0,0,c556d1c8e4cec6f1708a76e4f56e1770d03a9008f0fd1910f774141108142 CVE-2022-4672,0,0,9c2e59790280420d462ec305448b87221671610a4df920be27309373361e4116,2023-11-07T03:58:33.343000 CVE-2022-46720,0,0,a4866f6c76c74ef985b56ff02afeafaffb2d3f6684cd4df17a3bd7d8b53f6392,2023-11-07T03:55:51.277000 CVE-2022-46721,0,0,6fb30f1b6aaf820d1fbe3446f21ed89a2a3705b52c844ead8b8f365a222ec152,2024-01-17T17:40:40.553000 -CVE-2022-46722,0,1,78a633e86d2602f43acb274357af30e6c746eb5bbb1604ea6a427ce909daf4b9,2024-10-29T14:35:12.967000 +CVE-2022-46722,0,0,78a633e86d2602f43acb274357af30e6c746eb5bbb1604ea6a427ce909daf4b9,2024-10-29T14:35:12.967000 CVE-2022-46723,0,0,38844899b509786377c261723a475f9aafc391778c130669ceb1b0ebedb2e89d,2023-03-08T19:05:39.457000 -CVE-2022-46724,0,1,fdf855f78b259101b387943b6c29bdc9300cbe737b2b321411fdbd59b6e5188e,2024-10-29T14:35:13.290000 +CVE-2022-46724,0,0,fdf855f78b259101b387943b6c29bdc9300cbe737b2b321411fdbd59b6e5188e,2024-10-29T14:35:13.290000 CVE-2022-46725,0,0,b4d7d537ba6e53186436d1efdbfe91863964382d98743ade38d8fe7414496a57,2023-12-27T22:04:02.383000 CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000 CVE-2022-46728,0,0,3a822acf6167275765f764ac260bc9302405662dfcb2879d04efd07d46f8ff04,2023-11-07T03:55:51.883000 @@ -211147,7 +211147,7 @@ CVE-2022-46897,0,0,fe57547f97f17bf88594b7dfabf1162a67ec8bfa3eab2856b5d894212f819 CVE-2022-46898,0,0,e07d70879aece1d8caec802b6c251399a533127727413ffd55878678f32b005c,2023-08-01T01:21:54.823000 CVE-2022-46899,0,0,47cf48c2a9fa34274d86379a7c591cdc4ec1c2991370cbbb10d8f9edd90ebab4,2023-08-01T01:28:42.690000 CVE-2022-4690,0,0,09b82453a76ab8f1047bf7981c70909e40ea72752c4f747c5c0a5b8ae673a1dc,2022-12-30T16:25:52.877000 -CVE-2022-46900,0,1,1ada8cb944acaa94afe201553723c2ea4dd7e6ff1d8d7c1b032917ea8df1332b,2024-10-29T14:35:14.353000 +CVE-2022-46900,0,0,1ada8cb944acaa94afe201553723c2ea4dd7e6ff1d8d7c1b032917ea8df1332b,2024-10-29T14:35:14.353000 CVE-2022-46901,0,0,0a812e631ccd4c832094fff6bd6ba8e21eb75afdbec4ee4392ca48e1e4a21b09,2023-08-01T01:32:04.767000 CVE-2022-46902,0,0,2fc6b9468dc70dd641b245b6de684673cb74b49c5125529aed1ac6adb5bc7614,2023-08-04T18:19:48.140000 CVE-2022-46903,0,0,cc109058a85ca135a9ea89d0065559940fa523aae863c9fdc92ebaab79710fc8,2022-12-15T13:50:12.330000 @@ -212229,7 +212229,7 @@ CVE-2022-48623,0,0,903da016b4a21385c85cb533e0b0fbe60d9e83c91876ab8bbe25078b9f102 CVE-2022-48624,0,0,ea5513f2cbde0a9cdff3d197db7e4adb0a5ac7da8f42a8c9f8ae3134bd040db0,2024-06-10T18:15:19.857000 CVE-2022-48625,0,0,f6663c1686b1284fd5202202aca248b725343b1c940d427bdd48722330db6bff,2024-08-29T20:35:08.187000 CVE-2022-48626,0,0,fc58451bcf554cb6d7596ed91f1d4bac3d14dee8e91d35aa41459c2e76fb613b,2024-08-27T18:54:45.263000 -CVE-2022-48627,0,0,1c5ba43c57e15c20868a7719b8b597bd7966d9eb144dc2e8795a79d72f631cf4,2024-06-27T12:15:13.380000 +CVE-2022-48627,0,1,af11a2eb196858a96609719823f98be7d4508ce9acf219c4ba77f5dbd4bee989,2024-10-29T16:35:05.710000 CVE-2022-48628,0,0,ceea607df19dd86785346a0794b198b9994cba32c0926340c10f946e11d1e532,2024-03-04T13:58:23.447000 CVE-2022-48629,0,0,e891c69ca957bbf297b8083e0219ef44c2d49f5751aae1302d2d546d861aa415,2024-03-21T02:44:43.813000 CVE-2022-4863,0,0,2a3c4b04ec99e4b52a59a1d4f5052958af6425fb87bdb405a14104dd3900f281,2023-01-10T15:19:48.147000 @@ -212239,7 +212239,7 @@ CVE-2022-48632,0,0,604f20ec0eaf6c13c4b3b66792ca33665e6d1e06fdaa3f2397f35f9bec38e CVE-2022-48633,0,0,d1b02d8abcad4acece798c33d4e1bda012ee764a6eb89a127c625e4eb186648a,2024-04-29T12:42:03.667000 CVE-2022-48634,0,0,8b3f149d7efcde225ca801ea6e9ac42f0b447147b0126ce4de49bf2c5e4b3310,2024-04-29T12:42:03.667000 CVE-2022-48635,0,0,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000 -CVE-2022-48636,0,0,7e659e6f34080bf75c9db28ed1be7f7aacf7d91702f5f099876346aaa3b6e913,2024-04-29T12:42:03.667000 +CVE-2022-48636,0,1,bd119ee3a500e8de66c4e55ffa746e94e5dcf276788f5780f1a4b33a00caa150,2024-10-29T16:35:05.977000 CVE-2022-48637,0,0,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000 CVE-2022-48638,0,0,f1f3c62f32abd9dfa0b7d8788d87905580bbfec25eb951765d8861d82d3e8214,2024-04-29T12:42:03.667000 CVE-2022-48639,0,0,4a5ae1aed25211cad58cf1392921491fc3122875f222672a6b19cfd32acf6264,2024-04-29T12:42:03.667000 @@ -212255,7 +212255,7 @@ CVE-2022-48647,0,0,63a2d6011a27e3884bbf52c53c04a6667615b24da49dc1b7925f7441f3b1d CVE-2022-48648,0,0,dfadd22a87307801d0d16b9b01438d2bba84ad33295315fbb2e82d8be6718c71,2024-04-29T12:42:03.667000 CVE-2022-48649,0,0,0a15744c4cfd26154a17feb04c983f0ec779f45173af81b2d41d9c016bdb8dd6,2024-04-29T12:42:03.667000 CVE-2022-4865,0,0,8689164e9cb9dce17b47fc7ba6361df1270fcc55f0fc8450addce9277bb6a8a5,2023-01-06T21:22:00.620000 -CVE-2022-48650,0,0,36dc57e66247e19c5b02e1f88092c1215b71e38a10bd8141fab8b75a0b26a2d9,2024-04-29T12:42:03.667000 +CVE-2022-48650,0,1,766619acc76f809ac3f89b4b9fbe9aa75ea430cb3be2d98085e4eead243c1f7c,2024-10-29T16:35:06.770000 CVE-2022-48651,0,0,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000 CVE-2022-48652,0,0,05a5a1c50a1d4992042ef5994a0d5c1c6f5485af066180e574dbce1a367a6ecb,2024-04-29T12:42:03.667000 CVE-2022-48653,0,0,8f84c0201a079d8a50061e5f0d56ccc48847df28331e9cee5b020fada4dfd712,2024-04-29T12:42:03.667000 @@ -212576,8 +212576,8 @@ CVE-2022-48944,0,0,78b35f4e96175b0acbd7eb76c8fc345abc146c0623b459d55b4bfe903afbd CVE-2022-48945,0,0,04e7494c867d2745065a695f3c050464fcd7db6e245bb13442273deff488e24a,2024-09-26T13:32:55.343000 CVE-2022-48946,0,0,cfefbc7d174c777888e72ac65260eb61ba1bda7b72b2bde12ab6cdecb8dd5105,2024-10-25T20:13:39.847000 CVE-2022-48947,0,0,6aa8ae8b892b41abda0533803253735a337d5901b14281670a2ddf65e9421084,2024-10-25T20:11:45.473000 -CVE-2022-48948,0,0,0df7ff89bc20e6d14a730310fe00121f0b4c3b94433557dadb35b55179bf0d80,2024-10-23T15:13:25.583000 -CVE-2022-48949,0,0,2d06b0ddc43a1d6ceef8a0ad6d5012e53b15c9ea3ed8f9cf12049c67291c9b36,2024-10-23T15:13:25.583000 +CVE-2022-48948,0,1,15f3501e5ed2e803ee66410086c09d17587cbbbd63f39ff8b472204407dbb8f7,2024-10-29T16:34:03.013000 +CVE-2022-48949,0,1,c5c4280ee91be689a3aa5a6ae86f3e60c23ca211ed0c3133d63b6afe6463dada,2024-10-29T16:32:41.797000 CVE-2022-4895,0,0,0efd54174b680d04b5646c623fd6b294801b419a72088921312b45e7bb6c068f,2023-11-07T03:59:15.667000 CVE-2022-48950,0,0,1b3d55ca4ab6e70eb975939cd1542c8de3ef56155c29da3ff8cb8057a4e2b24e,2024-10-25T20:02:03.240000 CVE-2022-48951,0,0,8553eeb6fe1b212af16ae6d4d7032df2e5b6cc4fac9ad15dcd53ba648d3e070f,2024-10-25T20:01:24.943000 @@ -212689,7 +212689,7 @@ CVE-2022-4913,0,0,12d1631776d7003d6257770a5dffa113086b943ece5101cbbea839babde69e CVE-2022-4914,0,0,4227dde8e4f6e7f7a7a97029324234b6aebafec4f5a051fde4ce1bb058df57dc,2023-08-19T03:15:17.990000 CVE-2022-4915,0,0,7dce1966502761df69c2dafe86f736ea78df21a82c78242f2c6e6554747bb525,2023-08-19T03:15:18.290000 CVE-2022-4916,0,0,11156a0320210ecb533d09665dc4e516646ac7c485716843642ff2a3c6876232,2024-10-02T21:35:09.133000 -CVE-2022-4917,0,0,ffd6d161731b5943a4a2cecc0118210e94d8d50890cee00b3e5b54ec63650038,2023-08-19T03:15:19.503000 +CVE-2022-4917,0,1,a3db6b01f014972a342876daa312c0a13383f70ba58f9ba67a003b0b2014ed8b,2024-10-29T16:35:07.910000 CVE-2022-4918,0,0,be511b580f573f30861de1822e03bbf3b4f7c7355836b2656f724c73cdba85dc,2024-10-02T21:35:10.087000 CVE-2022-4919,0,0,0783d84e35c78a79cc39217e58f1f715e26f0dfc0e3c767292c16cfa09c212ab,2024-10-03T14:35:02.513000 CVE-2022-4920,0,0,4c86d941b74daf1d9a5f5f1b3cdb0d1cb7670a00976fd7f8ad822c91655a5153,2024-10-28T20:35:03.313000 @@ -212698,7 +212698,7 @@ CVE-2022-4922,0,0,7a2b4634322e96d3c241ed34ac0e68d8e19629d7fd1671456894ec86856684 CVE-2022-4923,0,0,761793b67ab54f7909a05bde1bca07eba07ede3d9cf67f8e3148ffe9b421bec4,2023-08-12T06:16:07.170000 CVE-2022-4924,0,0,cdce64e4b7502dd49525556dca8b809e232a384142d6d02d56c2287cddab7d9b,2023-08-12T06:16:27.147000 CVE-2022-4925,0,0,b565aa21efd571a523bfc66e4d7206d9d9762faa86d0f6d4e154592154c7c66b,2023-08-12T06:16:27.777000 -CVE-2022-4926,0,0,dbae64bbe5456b4343d241825ba05e0a1bad7604a4576361deb7c839f6cb7290,2023-08-15T16:05:07.137000 +CVE-2022-4926,0,1,8a875b168d2aef44e69b33e49fa6c452030a4e8dddbd5fe21dee135489c5830e,2024-10-29T16:35:09.090000 CVE-2022-4927,0,0,cd90fbf6e3ad147b99868787040eab6df93bfa4a7bf5960277ebc0a95a039676,2024-05-17T02:17:03.200000 CVE-2022-4928,0,0,04de84c66b0fbe937e91e213637e43124fa2ec16c4435422751c4379f7343aef,2024-05-17T02:17:03.317000 CVE-2022-4929,0,0,b54b3c33b5580708692b3cff4bd317d8ef46ee0e4d41d31c4ec085b344c44cb9,2024-05-17T02:17:03.423000 @@ -218507,7 +218507,7 @@ CVE-2023-24588,0,0,2ef36532565eb3be85b9be1d03ea17dba2ff521388a0b1d5e9f24cd0fb5ff CVE-2023-24589,0,0,a8570d1496a12370184415bfaaf30a6185d91001fda6cb8951fe6ab851e6a5df,2024-10-10T21:27:18.237000 CVE-2023-2459,0,0,87d0f3af5d9f2f16840cc7c27d343b6c8aa37b4163a5005ca8c8359b9978213f,2023-10-20T20:54:50.567000 CVE-2023-24590,0,0,7d131b3c6d25d723156ac81026080a6db7e78a83c9e0f7a66c7fac1f0c270f4a,2024-01-05T18:33:26.597000 -CVE-2023-24591,0,0,79dd70555de28073a9e21ecb9f6a1d70538293fc45723b3df3ea9015ecfcfb09,2024-02-14T15:02:01.453000 +CVE-2023-24591,0,1,aae36e1b3459141bb0ba0ea798b9a2da88b6c8422d8b36395f2e7c285dabe5c8,2024-10-29T16:15:54.250000 CVE-2023-24592,0,0,4dd8e587d22d415fe23662a0e7b9b2280ec1ea8bece15daca3c1cb5f43b1a9d0,2023-11-28T16:58:37.430000 CVE-2023-24593,0,0,efb8a1c5f27e887a35e026c30a04bbc582bf9fea074d7fd8663e8d531da2813e,2023-11-07T04:08:34.613000 CVE-2023-24594,0,0,390aa57eecd9ddc9a7de9633926b9a4ed86c340b1e61102c75638b7987b8b9e1,2023-10-05T14:59:56.710000 @@ -218884,7 +218884,7 @@ CVE-2023-2507,0,0,fcd576f0c20c0a52967ea862e5b8796a1b771a893544017d1f5d5168de06a5 CVE-2023-25070,0,0,cd49dfc9a1db5c084791fbe7e2bb5085fed018ee725b12b3ed79bd4084e814bd,2023-05-17T16:29:30.600000 CVE-2023-25071,0,0,7f8a43464289f161510c4edc3fcf3ef126d6d9dd8659d9c7d3601f700eb8db4a,2023-11-22T19:23:56.267000 CVE-2023-25072,0,0,5345d8cc0ac6455cb6ea835e2c53c67662b851ae1f85092f9027af2326a5ce31,2023-05-17T16:34:14.120000 -CVE-2023-25073,0,0,50fe4c5b26c5f132c9ce90eb2d55df22a38c9da959dc8cb7f91095909a5fba3e,2024-02-14T15:02:01.453000 +CVE-2023-25073,0,1,d3a8eefe082d084f783df84b78a88c94b3207f5bce59c0744f6450decca0a45c,2024-10-29T16:15:44.283000 CVE-2023-25074,0,0,7407210143704410593b93c59bb0e3f24b08a71d5e85ca45dc846d516af6cdaa,2023-08-01T19:47:47.580000 CVE-2023-25075,0,0,351344e1ff6898608e06ea081f11bc9d64380fb69b2bb87d9f4cff7897dc698d,2023-11-28T16:56:44.577000 CVE-2023-25076,0,0,73c3337b5a2a860ef073dc6503fc5331dd87f825ec47f89159ae4ff7cb742914,2023-05-27T04:15:24.837000 @@ -219608,14 +219608,14 @@ CVE-2023-25940,0,0,287a15e336abf02128dd858aae53f9d56a519ad6a45b3ecc081f83b7d434c CVE-2023-25941,0,0,57993d6e5c051bf730eec40037f77ce1e6290468793e6d031d99e4f3ced0ede0,2023-11-07T04:09:15.427000 CVE-2023-25942,0,0,96956d2db4db0fa83094177c856b64142c1187eccbbab3a5a53997293f9c2d60,2023-11-07T04:09:15.507000 CVE-2023-25944,0,0,5c6e1e2be975a23d9872db5000e04a147aa03d281d3149fea3af9930d3dbec2b,2023-11-07T04:09:15.630000 -CVE-2023-25945,0,0,bf3f9b77432e9dbbb1b584a0b18fdd0cdc0265ac50471d6abaf37453491e8b20,2024-02-14T15:02:01.453000 +CVE-2023-25945,0,1,cfe17a6972cbd1e3cc52da62168ddce58627abf3ef50a3da0efdba68bce9c071,2024-10-29T16:15:35.037000 CVE-2023-25946,0,0,36351b51211f6086546d685331bc1089c9e7b61831c3fbc32b9ecdd8f95782b1,2023-05-30T22:20:58.580000 CVE-2023-25947,0,0,61b472408da0c885e86ff715da8b1879120a825ba50c5f9f000516eaa2a0e7d9,2024-09-09T12:21:53.383000 CVE-2023-25948,0,0,3064d6395082ca991ce30a323e344736e0487c1680a52291f9184bc6dc1b4813,2024-04-22T16:15:12.950000 CVE-2023-25949,0,0,3b707dbe932e491340fc8b681d93c41ddbd815440e7fd02affd04e7d3e2ba6c9,2023-11-20T20:51:01.480000 CVE-2023-2595,0,0,ddd0efce01dda5a53a25edbe25022a938e123a7a3c2516163437a45a411fe558,2024-09-07T12:56:42.300000 CVE-2023-25950,0,0,e76c4a5df57a66294f8bc39e7524fb052892299d01ec7806259de034dbab901f,2023-11-07T04:09:15.983000 -CVE-2023-25951,0,0,bf63ce60545fd591f43291aa87018bc2c7284b53d8caf014a6aad7eea82409bf,2024-02-14T15:01:55.963000 +CVE-2023-25951,0,1,cc7d32db0cde343f2dbb64ab3dc3d2cc48eacadef2682aff29af3514ae3b0746,2024-10-29T15:52:44.830000 CVE-2023-25952,0,0,463ec8e960958d9e12aae14faa2213415ac314b7ce1af5d976a9825591309d77,2024-05-16T21:15:51.037000 CVE-2023-25953,0,0,5abb1a478f3e66cc9afa5420123d11a3200a4e70c29330cde9432b4b3f700576,2023-05-30T22:18:54.947000 CVE-2023-25954,0,0,a22ef5203d50fc0480af4dc4db46497b5ccc4201f195b9b49e98a817b6f6f318,2023-04-21T17:54:46.243000 @@ -220182,7 +220182,7 @@ CVE-2023-26582,0,0,12c32dcd82d637dcdedca56ca84b2864fc50eca2ce0d9d634578eaab32f20 CVE-2023-26583,0,0,c619025a8a287d6b9878acaa1d9ce72e24537dc38a39411e99d1856c96ad1c52,2023-10-28T03:20:44.597000 CVE-2023-26584,0,0,ebecbb1954e68aaca87b211a6a732faed82b38f5d9d39a0a0adb0aa435f6f45c,2023-10-28T03:20:48.837000 CVE-2023-26585,0,0,6a169d64030402114baa96977dc7f44050b20734c207e4738fbb9a1f046a7b26,2024-10-10T21:26:36.277000 -CVE-2023-26586,0,0,5975e2524d7ffa4f54f064e0e975bd8974bd474947eba7cbdf2beeae8120f0a2,2024-02-14T15:01:55.963000 +CVE-2023-26586,0,1,1587480d5153d2111512d0c6ac8d8ba3bcaed5605b8c8351ff3520a565add747,2024-10-29T15:58:04.433000 CVE-2023-26587,0,0,68f5d814568994653ae044c5e6f08404578310edae7342625238728fb686b87f,2023-11-07T04:09:40.973000 CVE-2023-26588,0,0,8d09e7de4a8174ad99c8db79151914941653e52f8e566e080f9908dd283d2aa8,2023-04-18T19:37:21.610000 CVE-2023-26589,0,0,4644ea6b391eb80feae3f8ad1321a56d547bc438f6de7ff9a9ab5f2c9ac10df8,2023-11-20T20:50:48.007000 @@ -221545,7 +221545,7 @@ CVE-2023-28370,0,0,de3582dd1096d81790e47f86e8d01523a06fbefe12ffcc4c13f69b64aa034 CVE-2023-28371,0,0,ce0db46339d119df5b173e4dd51d0445d33818b0b4f15f49c2da5f8c8034e485,2023-11-07T04:10:31.193000 CVE-2023-28372,0,0,5e32016ac1ab162878bbdfc06fd753c455aa8ed452229c8bacc32254e390279a,2024-09-20T15:35:06.010000 CVE-2023-28373,0,0,47ca9e35fd3782216fc051f00f61f9fa0b7104797240daf3baaadefda49c4509,2023-10-05T15:39:04.883000 -CVE-2023-28374,0,0,ba1f8ec5454f9cf98b4774fdb5f7678bb946c3e70464cf46816a01b7ba9efa6a,2024-02-14T15:01:55.963000 +CVE-2023-28374,0,1,93cd045f58f8292dac4292b3a64d953136db578e2b56b64dcbe2d0f720fd91f5,2024-10-29T15:39:02.053000 CVE-2023-28375,0,0,afa039314dadbdd9e9ba9f14ca38e1f298f32bca46adcfd0a2da113404317d23,2023-11-07T04:10:32.550000 CVE-2023-28376,0,0,aebeaeb3f0bed5466239494670d221bf2d002a6c164e9ace4ed7729ffc2f8792,2023-12-21T22:15:13.493000 CVE-2023-28377,0,0,bf392347f00e402c406ccbce20e5620a8c6121065b8f961cdb4151ed7212730c,2023-11-20T20:49:59.327000 @@ -221580,7 +221580,7 @@ CVE-2023-28402,0,0,69fdfbbddfac680137ae686304ed53949adbd271f7d5098f3a71c655e412c CVE-2023-28404,0,0,a6379d060fcb4fe65d0af0b2a2bce81b3e22cfedbed595c0a27f252c044e1405,2023-11-30T15:12:16.473000 CVE-2023-28405,0,0,7b8aa1d5c1b93aa240bb48f7abe5975e8794c64aff1950e2e537205cadc99443,2023-11-07T04:10:34.020000 CVE-2023-28406,0,0,f67b5150e530698712d739fea800c70b8018451a1cafab19e4ef7cf9114abed8,2023-10-05T15:52:29.633000 -CVE-2023-28407,0,0,a6897625c8075dca97dfedbec61dcf7589bf79157f271b6c7964cd1ecbd098f3,2024-02-14T15:01:55.963000 +CVE-2023-28407,0,1,8287d29206ea11d8f6b81f22f9c07fb17c0c17a52711bfa2d25fe7c7e3dcc767,2024-10-29T15:27:09.650000 CVE-2023-28408,0,0,ccbc75609a6937eef1c531b29dff1a73be110f4a78793ea3ca32985fbe2c2194,2023-05-30T16:36:15.673000 CVE-2023-28409,0,0,3632c4e5cd2c9eed37a9af7182abe6c0cccf5f5954bb34ef52e10e80ebadcd03,2023-05-30T16:36:27.643000 CVE-2023-2841,0,0,98ae6501a65ac08d4a0c246ac6c6fea551b70d7ab39b6993168d0dd2e95a4170,2023-11-30T04:58:34.337000 @@ -221883,11 +221883,11 @@ CVE-2023-28711,0,0,9a7e4692df4128407920abfd535c6e1e6ea2e2404eb6b544486446f8035d5 CVE-2023-28712,0,0,48cede95267e940bcf25c0c4d4718d225f1a658760a29a9cf30284758c8924a6,2023-11-07T04:10:49.617000 CVE-2023-28713,0,0,2fb09d63fae7527d1926c34ea4251376e037b7841aef4deb35a0f81acbe0ed9f,2023-06-08T13:48:05.117000 CVE-2023-28714,0,0,88063d4bdd18fdf40526b91d8cece6c00c174929be7d549860254d72024001f1,2024-10-17T14:35:12.920000 -CVE-2023-28715,0,0,7bab4fc5e402a7cd1c442b2fe291920a4c79fd165c63667328f372a760e48901,2024-02-14T15:01:55.963000 +CVE-2023-28715,0,1,3ea4cb23c984e1dc7e21ba30efabd581923443dd7272627ccdfacaa6d8fb32bf,2024-10-29T16:16:01.973000 CVE-2023-28716,0,0,e4045a53e3ed408d3cf4428ed05d8bc5361e8856e88f1fb66271a1cd958e92a2,2023-11-07T04:10:49.930000 CVE-2023-28718,0,0,e4b9a472339a4b19aed6c313163ced2de35df6cac5febd4f5946426a1ac5017a,2023-11-07T04:10:50.030000 CVE-2023-2872,0,0,09c0e7309a2b4d2af8176a5355a5ab1104607ddafe1d323feddfb7fed68a2e86,2024-05-17T02:23:19.867000 -CVE-2023-28720,0,0,75468773c6346a3b78a11d3485656254e97ef5065c2a3c714055de3759b91fea,2024-02-14T15:01:55.963000 +CVE-2023-28720,0,1,4ecff409d4fd7cf0ea131f7d92ef8c9a093746a7880694e15ec10d13e3f7bcf2,2024-10-29T16:06:24.940000 CVE-2023-28722,0,0,cb25a71dbb20945e84dce5a2ec951c7fe1080311ea7386f1af7e04d95f27987b,2024-01-30T14:47:58.587000 CVE-2023-28723,0,0,a8a40e8e5a6b2a8bcfede9efb54f5439d03b0015e1bcdbfa70cf3ac7f510d3b9,2023-11-20T20:59:22.650000 CVE-2023-28724,0,0,e3d8326e0af144f282612b2956f6d207661d6a8c15fd1ea13901eac5194150e6,2023-06-09T08:15:10.027000 @@ -224202,7 +224202,7 @@ CVE-2023-31994,0,0,55b495c701a3afcb9a0613c5692bde0c35418af8cc27d0a48037c62c14add CVE-2023-31995,0,0,ccde77b0a8aedc74cf8f2e7a2e5bf0d30fbc042d38f31a7d36b28b5a25b17a2a,2023-05-30T18:45:24.693000 CVE-2023-31996,0,0,ee8783260109f42b80f3819341b3e52a17c76066d374cbf1298bbb942d1a3738,2023-05-31T00:29:23.163000 CVE-2023-31997,0,0,d8cd637d415097d91fa487a3c2d4dd91d84ac1e995cbe2afb36874500d610fa3,2023-07-11T16:19:54.627000 -CVE-2023-31998,0,0,197957eda112be0392b410b0cfcf107ab9dd78e0a607efd8cbd5181883092173,2023-07-27T17:09:55.033000 +CVE-2023-31998,0,1,0cb7a2f5ff71486384a9d0f64eaa121057876713e622d0a1405873cb11a83cd3,2024-10-29T16:35:10.213000 CVE-2023-31999,0,0,fffa3ed6fbd25c3d86ee6b68528fce8a50751b49e144aa6b4f785f85126f6b98,2023-07-17T18:49:36.997000 CVE-2023-3200,0,0,973499c3ddf1024c520b61f7f3b565541ca97ac2ac3665738bbce9dd15b42507,2023-11-07T04:18:12.337000 CVE-2023-32000,0,0,441e6a2e0cc9dc5b1396d6f7e1bac793503283d1f850c76ce8a3c0ae89468dcc,2023-07-13T19:14:34.663000 @@ -224828,7 +224828,7 @@ CVE-2023-32614,0,0,a784f55ff10684ff0982e590005de61c2c9f48fb842d9b782491c6446577d CVE-2023-32615,0,0,091c09c0f2f1329fa59c5332eabb3854daaef309b38ebf1cc8ec5795c893e63f,2023-09-08T17:23:31.060000 CVE-2023-32616,0,0,d3aebc90f3ffc63473146e75b263a0746735e522cae3aae445f73fd478ee1866,2023-12-01T20:55:14.250000 CVE-2023-32617,0,0,55304cf8798a4bf1924f390b38e9f9f7d42946f5d339841e013e0604cc90b4d6,2023-11-07T04:14:37.857000 -CVE-2023-32618,0,0,59c541f72cd2b48f212083f422f40fa8c6981497230e6c8159d58cbca7cc6126,2024-02-14T15:01:51.137000 +CVE-2023-32618,0,1,9452291064e5b607b4e57110fdacb7939863adb82673795a43470c75eb081e60,2024-10-29T16:15:14.280000 CVE-2023-32619,0,0,efedb5478e604f4427316aad5814054fb30dfe5a182f27be16e5658b3f9c9d2e,2024-09-26T21:35:17.523000 CVE-2023-3262,0,0,0211d95fb873faeefc7598b055ba57ab843a16b5034ef3301028eaae024fec2c,2023-08-25T06:15:09.797000 CVE-2023-32620,0,0,8d7d3fd55c1278b59cba81bffb9150a561d52098456668ec6539b6e54441b6c9,2023-07-06T23:39:14.747000 @@ -224852,16 +224852,16 @@ CVE-2023-32638,0,0,b212d7a25e497a363d9f2a5ffe9d57abf217be45607a360ea76b90ce98fe7 CVE-2023-32639,0,0,92fa33da269173c6591f736230fcaf4815d5f3960de4edde9bb1cfd769e5d700,2023-08-01T20:16:48.813000 CVE-2023-3264,0,0,81a7ddcdbbc6cfe1d08a4283bf1b5d12c3ca8e0f0af12b5e935928a7ff13618d,2023-08-25T06:15:10.350000 CVE-2023-32641,0,0,f8b6537ed8dfdfc5779178109225484b016c4959cb75be0c6ac546709ac26e3f,2023-11-21T20:29:33.007000 -CVE-2023-32642,0,0,d91c5380d189025aa5163a86d9509094b24974a0fd122edf9aac4db4f7db09fe,2024-02-14T15:01:51.137000 +CVE-2023-32642,0,1,ebd938a9851446aa8c073a3ae03c065d0fe004d2e885f0493c52e0e4a27a1dfd,2024-10-29T16:06:08.280000 CVE-2023-32643,0,0,d9aaa87dfc0b26a97d073d7950e12f1b9ce4ce7f2b4c69d5a00ae687ddb0388f,2024-04-26T09:15:07.127000 -CVE-2023-32644,0,0,a354953f4dc4989b7b46cb55cf08179c3a1e29618db34fa29ce42ae9c36e21d4,2024-02-14T15:01:51.137000 +CVE-2023-32644,0,1,29b413808adeacc10c17a60006750f210364fa4d4d01cf79b0549734745c5d63,2024-10-29T16:07:20.577000 CVE-2023-32645,0,0,857d6cc902eefc1d9512ca3bece7549ec7eef38c002db86a230c5d650c8de20d,2023-10-12T22:27:09.257000 CVE-2023-32646,0,0,a0e89ebe4d85458421245d42892ba840a989aa0a3ab5ac0c5b07fd3fb2b868da,2024-10-25T13:54:38.737000 CVE-2023-32647,0,0,d4be98a2699461c5cf8ecfffa4244f2c965da061cb23b2d8520d4bcc880a524d,2024-10-25T21:12:10.953000 CVE-2023-32649,0,0,22b9514becd10eb679dd28ac11c5883dd073215affaee5996a16965af56cdacc,2024-09-20T11:15:13.117000 CVE-2023-3265,0,0,471c4818cf3d140a8514e2ffc1948be656fcb1771a62c82080073ff1643bcfa6,2023-08-22T16:20:24.977000 CVE-2023-32650,0,0,bebe035dcd601dd36e4c165904cd4a21f7ee809614ac45add18da3be91ede908,2024-04-09T21:15:08.027000 -CVE-2023-32651,0,0,e84751d5182835b1a5435aa440dd49d94cb9c7b164bddde42f31052d1248666d,2024-02-14T15:01:51.137000 +CVE-2023-32651,0,1,15cae880959606791d281d2a999fc6c1018e955314d3e9eee4ca85b9d8cc5d8a,2024-10-29T15:58:52.823000 CVE-2023-32652,0,0,89d62d8cbf3ff6917490601f8fa32dd32362143953101f10f08633a3aeb94183,2023-07-13T22:40:26.373000 CVE-2023-32653,0,0,6b040df9d66908279be214b2ffddc148c7a8f2359c111265d6156e2ec3857e57,2023-09-26T16:26:41.753000 CVE-2023-32654,0,0,8f48e35acc65a14d839554aa90866cb076315fe8c12cbdf05fa2a269af2eaace,2023-08-03T17:00:15.653000 @@ -225786,7 +225786,7 @@ CVE-2023-33871,0,0,96c8ccbff62f4d12f55c1a905b7d0a1b516165541956dc1cc67fcf6b6e21d CVE-2023-33872,0,0,92cd4375c88626a6b81d41637ee6ce9adc07c40c298d7663144d91807417598f,2023-11-21T19:57:06.720000 CVE-2023-33873,0,0,d1ccb40050da5992e5ffdd027a839611bfa1cd04d6a7680944ff558dbe7f266c,2023-12-08T17:27:53.197000 CVE-2023-33874,0,0,53dd71954624e7f0e35cc175ad3c364b00687488d23d7af14508dd738d87fb45,2023-11-20T20:56:52.927000 -CVE-2023-33875,0,0,7c23afba776d49c1438a0dab898f5e77d9623d179a9c8fdb4cf413830dc210bf,2024-02-14T15:01:51.137000 +CVE-2023-33875,0,1,6d0897ef7f90024fefd308e6313ea71d7f4c1d60dc6e11cc75e33249be79a7db,2024-10-29T16:07:31.717000 CVE-2023-33876,0,0,1f5e615fb6f189959baf08eff7f09ee64f1021f4aded056d2172c6c1365b26d9,2023-09-15T19:15:07.867000 CVE-2023-33877,0,0,df8d1b902c949c0ebfa7b1733bc104db13c4e5e0f2f64118b58d61599bc73ad8,2023-11-07T04:15:26.310000 CVE-2023-33878,0,0,89163a001b62ea76859f3f0ca50a8fe42240e8a6f46979c1bd65040ff798b393,2023-11-20T20:57:36.867000 @@ -226260,7 +226260,7 @@ CVE-2023-34348,0,0,c3721c995208e3f2fba199a7a9f2dc4688470ecb2a3fb2aa5b403b1f7f5cc CVE-2023-34349,0,0,5a2000cb88a1bdf2b9e1bb2db28bc583608d6ef725619d6974b5080e5a41d1cf,2023-11-07T04:15:34.220000 CVE-2023-3435,0,0,acaf2567930e21a39b5931b68fe58590cbe4d49b5ff713b0021a83d0dd7de88b,2023-11-07T04:18:43.933000 CVE-2023-34350,0,0,998ba2d7b58ed4c07ef935523c6896f04bd8cb3865e83439bda7c2269fc50724,2023-11-21T19:57:25.250000 -CVE-2023-34351,0,0,af625fb86d0dbf3afbbea81b535cc2d2536c881b10eb55be60a95450ee28d315,2024-02-14T15:01:51.137000 +CVE-2023-34351,0,1,77be96e9581a2f4d486e938e0678e1bf3918b8f30cd0408a42d848ca68cefc21,2024-10-29T16:14:22.147000 CVE-2023-34352,0,0,76b9ab97dbc9d354985a88047830f11302a51958cf16d6d556c0f8c8e157d165,2023-09-09T03:47:04.510000 CVE-2023-34353,0,0,0a1d8a45ea043b23b3674f7d180d2f4046d4e59e299fe92216f195c7b7f54941,2023-09-08T17:34:45.550000 CVE-2023-34354,0,0,1861a1d1a0cb62011e5248413b4f8c9814257b12f9c27b7fe9ea906f72e51bb1,2023-10-17T20:43:40.507000 @@ -226588,7 +226588,7 @@ CVE-2023-34979,0,0,e633852ec5c5cdbd8daa52e407fd8518b14c0a8225c22834c0bee36f7e5f7 CVE-2023-34980,0,0,7421b70c66abd07a5d88b0843ee0000c9380414adbb83621b8449b4538a68f8d,2024-03-08T21:19:43.127000 CVE-2023-34981,0,0,9cb446cb67a297b7875e90260c6189a612aef964e8f554929592973a9722c1f1,2024-10-09T15:35:05.653000 CVE-2023-34982,0,0,69ddd85a34f25c63fa63f83f2232e3dfa5c88ebfb8548a87e8b550ae4963b78c,2023-12-08T18:53:18.187000 -CVE-2023-34983,0,0,bedefe397037b06016555351f71393eb7a255baa4b17a634efcd3d89fea4f603,2024-02-14T15:01:51.137000 +CVE-2023-34983,0,1,64ec24801d869566a3785ff66950b621f6871d2cbffae4033a64d9b3fde0f62b,2024-10-29T16:02:23.737000 CVE-2023-34984,0,0,570a947501d26249f350f1523e7ac826fb9b3f47429ec107901e1cec07cf2408,2023-11-07T04:15:51.207000 CVE-2023-34985,0,0,1e78056c68bd89b8ed5a4148325a465af2835ce3f3014b99acdbadd1dcf00e31,2023-11-07T04:15:51.367000 CVE-2023-34986,0,0,2479d12cac4654f348c5e1ce7265bedb7a6cb523557d9e8e98c0624b9e477e92,2023-11-07T04:15:51.533000 @@ -226652,9 +226652,9 @@ CVE-2023-35055,0,0,d31984f9289e50a43d74ddeec2846848a1afbb8b161ae95ba93ae56b208a1 CVE-2023-35056,0,0,73dece02e29995c731269a7a67d1c88c83a5361af6322a9faf3bd7eb7ae2b904,2023-10-12T22:47:22.200000 CVE-2023-35057,0,0,98e2fb42fc2e84207ce5441e63e4496870c58b19183a5b59337c1c0fd3a9ddad,2024-04-09T21:15:08.497000 CVE-2023-3506,0,0,367377c9bba5afeee6f9171fa21ddbb7e9422993b864f6a4f1f6e476896ec11e,2024-05-17T02:27:32.850000 -CVE-2023-35060,0,0,8e3fc69586629a270c34f51391a6dce1044c2c5073935eff026bb699dc149b29,2024-02-14T15:01:51.137000 +CVE-2023-35060,0,1,5a5c7996bd8718abd9847dd108af7d0d0fae165bab7b06c0a1c6e55c7ef34a83,2024-10-29T16:14:35.197000 CVE-2023-35061,0,0,67368fc6f67d8016fc8675b30aa4a78c23d6bbf91f44869540438aa22261d32e,2024-08-14T14:15:13.110000 -CVE-2023-35062,0,0,dd4e480abbe090574b83466d28ba78e7053423d285c7a4f529370f7ef49db101,2024-02-14T15:01:51.137000 +CVE-2023-35062,0,1,5045906837f23f74ca68de848256a6e44b10819527e7d0c0af23af8a3443e329,2024-10-29T16:14:45.247000 CVE-2023-35064,0,0,0655a76ebeec87bff84b81b0a62c9a549b374b5d3119a857ea6661f327de42cc,2023-06-23T19:21:19.787000 CVE-2023-35065,0,0,183bd8b63fbbd78df83768da9cd4bd10fb9594d0b0f96457370c7de1cc2cb34b,2023-09-11T18:30:59.393000 CVE-2023-35066,0,0,8cbd857d976a75c8ce74b9aea74a9c44f5836c966dd49214597d5479e80f4e4a,2023-07-31T18:10:22.557000 @@ -227044,7 +227044,7 @@ CVE-2023-35763,0,0,a1dde759b107bbb45fb117f852bced52176d7c1f1847cf500e4e2553b06e0 CVE-2023-35764,0,0,4273457863900c89f2f64f75a391c06d862e4dd907c30b5ae17770d0f4c54015,2024-08-12T21:35:01.167000 CVE-2023-35765,0,0,a8b212702a1999fbcfa726e6e1cc103b6c211f8d08f9c77445353ae69ee59d53,2023-07-13T22:38:39.083000 CVE-2023-35767,0,0,e035cc07419fd301ca88f2f05ef9f29def8e5d41b5af5a083c2d8d328a038e3a,2023-11-15T16:17:04.597000 -CVE-2023-35769,0,0,d346258de2ca20c3bf9ee42ff29e5dc34bdd314b4343cf5088b53c7411c4f177,2024-02-14T15:01:46.050000 +CVE-2023-35769,0,1,fcb2c5b48058ae9dac4783173eff35516b5713fe1b7b5c148cc33680fb827560,2024-10-29T16:14:53.857000 CVE-2023-3577,0,0,5057fd0385c77c94a2dfb96a9ce23eb3eaf6c0650c2562c0c3df3270b3582d9c,2023-07-27T20:04:24.007000 CVE-2023-35772,0,0,5152cff8d2f7608d8973790cf549ff56d53dcdb19d5d781ccfb0c5282ddb2fed,2023-06-27T09:16:29.973000 CVE-2023-35773,0,0,ca11c3c74b840f104c93ae82355752873e1e4cc95e3fa6ae28b9de379242ec03,2023-07-18T19:02:54.077000 @@ -227588,7 +227588,7 @@ CVE-2023-36489,0,0,dc3b2a16fb93102da57c7283fbace2014f377f0bd7bc62fc2588a28c19875 CVE-2023-3649,0,0,e5601b17dd56710e279a251177061f0fafab9b420c2e2a77a3dbf0de88036ac3,2023-07-25T18:20:46.537000 CVE-2023-36490,0,0,212625366332af3d57eec534d617401802f3ed4def9de6e9a6bbc60e2168ff1f,2024-10-25T19:40:43.417000 CVE-2023-36492,0,0,a6fdf1b6c1920694305ae38a0209cc3b60add5c0d6876bff239d05fef669fc26,2023-09-08T16:48:06.590000 -CVE-2023-36493,0,0,0616934dcaec5abb5bed6dc7f46ba3e7e0347b94b99ba052265b2e8e478656d0,2024-02-14T15:01:46.050000 +CVE-2023-36493,0,1,c348d4c68fd389a96a87dce3aafa6f0e26d324e20230fac1cb6c0504c7baf085,2024-10-29T16:15:03.767000 CVE-2023-36494,0,0,11b002c7660baf795f5041a7c39da6a423e11c613352f9cd1ef2e12fe703cd9a,2023-08-07T20:03:35.267000 CVE-2023-36495,0,0,28d1369c4f5d20cb9ac086ea97a0157af8f08160700d1f657cff8ddec1450159,2023-08-03T16:59:42.207000 CVE-2023-36496,0,0,91060cbffad2b263559dece756f0fa782e65c393652585e2593d2c58407be6e8,2024-02-09T19:47:24.757000 @@ -228608,7 +228608,7 @@ CVE-2023-3781,0,0,de223095b5640bb80ec6a860227a648539e83fbab26d9846367892357c5900 CVE-2023-37810,0,0,0a875c94ff411e8048d52a2836b483c297b1d96f9dd1665554f4e1c2688af156,2023-11-07T04:17:07.757000 CVE-2023-37811,0,0,6b91d97ab0606f2517f2c9379dfa3d23ccf09cd6269504f98278ec72bb3d5c8c,2023-11-07T04:17:07.790000 CVE-2023-3782,0,0,2695b83fd02c6f700b03c27b710c853c5a14e90e0e0062d57122bca01fb76baf,2023-08-02T18:31:47.947000 -CVE-2023-37822,0,1,5a026609b10936ca6911c7bb43cac19859e9a4def984486197e63a6831b4a639,2024-10-29T14:47:05.997000 +CVE-2023-37822,0,0,5a026609b10936ca6911c7bb43cac19859e9a4def984486197e63a6831b4a639,2024-10-29T14:47:05.997000 CVE-2023-37824,0,0,67a1a0cd59a7f9d8d253762869647c68969ae7b19d7a8cc945ab595d6122a4fa,2023-10-28T03:47:39.197000 CVE-2023-37826,0,0,d47577469ae104e7a65a3d5dc49db2bb73b8c88342393d1572c2e0caa1fbdd79,2023-09-07T13:04:10.693000 CVE-2023-37827,0,0,3da8fd77a63742c2db490aa6c50c9a119b2ed1fc587338155f117da39a85ff4d,2023-09-07T13:03:44.377000 @@ -238872,7 +238872,7 @@ CVE-2023-5212,0,0,94e5a058f86f6f689bfef0546fe23d85ba591a1deb0dc7588c41b48b5d6c87 CVE-2023-52120,0,0,4bace2af2e223cec3c7888320256eb31815e8a469d878fbe3ff1e7799cf8d2e1,2024-01-11T15:26:21.677000 CVE-2023-52121,0,0,15294fc74bdfd982bb18c557d754174b12d5809cb7061b37cb18e84a54581137,2024-01-11T15:46:03.370000 CVE-2023-52122,0,0,7bbb7ecebb21474234525f39e223db8c2261a25820af8cee6ed962fd04d978db,2024-01-11T15:48:19.517000 -CVE-2023-52123,0,1,74a2006d7e725a209ffa9dc395ab80ca627b6f34d4dd4d3d1683c244335adffd,2024-10-29T14:02:29.840000 +CVE-2023-52123,0,0,74a2006d7e725a209ffa9dc395ab80ca627b6f34d4dd4d3d1683c244335adffd,2024-10-29T14:02:29.840000 CVE-2023-52124,0,0,fe264bb544748f7f11646b10d551faccad50dfd1bacb9916f27c21fe4a20ac5c,2024-01-10T03:59:25.760000 CVE-2023-52125,0,0,cdb3a747001ae389e30c132b6c5c61d65c3198193fee7b568bad01851ad38375,2024-01-10T03:59:11.387000 CVE-2023-52126,0,0,644e944c7bb50f79114ccda1fcbd8cda54a531501230aa06f79554f3afbccd87,2024-01-10T03:58:24.213000 @@ -242092,7 +242092,7 @@ CVE-2024-0721,0,0,b3e54b524ecb49bb26ed0d759ebc14b4a80dd8725f3a792ac563e113a0d73f CVE-2024-0722,0,0,e3fd857d56c3e7a1ce18df94c2aad06d8e5ba0ba6f59fdbc875af0baef84e5b3,2024-05-17T02:34:53.843000 CVE-2024-0723,0,0,62b3b8158ed5f431f7c823843250dde65bc6b046016f1d806e5bf4a77c554601,2024-05-17T02:34:54.417000 CVE-2024-0725,0,0,9f34bbeb9ca65e262b0f114d97475b4588551a2e0d6e1b478b0fe96d6457c471,2024-05-17T02:34:54.540000 -CVE-2024-0726,0,1,8bf1a183063177f04b5f795cca93e3f33ff9f6b9f38df417fcedbb76cb67252b,2024-10-29T13:15:26.867000 +CVE-2024-0726,0,0,8bf1a183063177f04b5f795cca93e3f33ff9f6b9f38df417fcedbb76cb67252b,2024-10-29T13:15:26.867000 CVE-2024-0727,0,0,029a496ed427073edc27553aecd27066148acfe7af4675f627eb209fc5b1daaa,2024-10-14T15:15:13.100000 CVE-2024-0728,0,0,8e86daecc5b7cf2cd88ed5152fb6a2af57ca1a3f0df02f0db63414ebf20cd037,2024-05-17T02:34:54.780000 CVE-2024-0729,0,0,35aad4ab490381a796d82e9abc9a3e9bab04093ac6b38aa110e0a6401a78c4c6,2024-05-17T02:34:54.887000 @@ -242346,14 +242346,14 @@ CVE-2024-0997,0,0,40cbe7d07647cf304a8bc3bc11787b58a8f50582e3e8b65316a7ae7fa59c2b CVE-2024-0998,0,0,f7933578d5dbeb3f77563ebf1f5420d4cf36180b38c1c7cf760eedcdac974d39,2024-05-17T02:35:08.490000 CVE-2024-0999,0,0,84034800a287889c8e66f3ba01c1d930a06538aadfe1b375cfd8893390aed6f7,2024-05-17T02:35:08.593000 CVE-2024-1000,0,0,60c836cbd4d96144c97b06caa16452d33dc82172b5cc2c653a7406010f53b5df,2024-05-17T02:35:08.790000 -CVE-2024-10000,0,1,2dc410e1583cc50e0eec03ed76e09a77a8842fe67c7d9b7ac5bcf33a5d12b517,2024-10-29T14:34:04.427000 +CVE-2024-10000,0,0,2dc410e1583cc50e0eec03ed76e09a77a8842fe67c7d9b7ac5bcf33a5d12b517,2024-10-29T14:34:04.427000 CVE-2024-10002,0,0,b8ac1697c0b5dbe076b29d09227535990b771bd408babdf1ec6b4eb8a74fb84f,2024-10-25T21:20:39.167000 CVE-2024-10003,0,0,ef2c3c73bdb9c4390d998f61684e3cffa9d7cb4391873d2339bfd0892ebc38b9,2024-10-25T21:19:19.743000 CVE-2024-10004,0,0,2b01ad1fe33b0387cc6ecf8ca605118100ba1eac830a494972582a4b13530ed3,2024-10-16T20:35:08.850000 -CVE-2024-10008,0,1,93a7056d3eedb0f45bdd1f80f18e9d31f27172cc24baaadb6be41dc083092214,2024-10-29T14:34:04.427000 +CVE-2024-10008,0,0,93a7056d3eedb0f45bdd1f80f18e9d31f27172cc24baaadb6be41dc083092214,2024-10-29T14:34:04.427000 CVE-2024-1001,0,0,481a263280d7671352a0e81cdb22876e1831937aba78d275dcb085f339a7c9b0,2024-05-17T02:35:08.903000 CVE-2024-10011,0,0,b82cad7a266ac941493a6589c7af0eff273fe2e36d28fba66b1420614eed8185,2024-10-25T12:56:07.750000 -CVE-2024-10014,0,0,1395463dc1e29fd6db71d83f72260a8cd3462c205364f301260cc7f7b129af31,2024-10-18T12:52:33.507000 +CVE-2024-10014,0,1,e8d1f2b2bcba8c55790a5ab025cb991579911523f1b20331581610c1fd5c2ad1,2024-10-29T16:58:48.127000 CVE-2024-10016,0,0,21d0091eaff7fe7567d1651c36c431401391330eaae7a5e6c3e21a28cc10ea9f,2024-10-25T12:56:07.750000 CVE-2024-10018,0,0,2aa14605c63d984e9b2fdfd4b3872cd3e6ce36a0ab239799435cd07454bf385f,2024-10-16T18:35:03.460000 CVE-2024-1002,0,0,da9ff0a1d838ebe2cbec1ae9defbaf7310d6b3493363163f0389be14aee69800,2024-05-17T02:35:09.013000 @@ -242368,8 +242368,8 @@ CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 CVE-2024-10045,0,0,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 -CVE-2024-10048,0,1,753b7b10384148568802076e97b22f964c12e42cf7a3108618b3a771a6303c01,2024-10-29T14:34:04.427000 -CVE-2024-10049,0,1,885c4f58797b80385cdce80d924e46fe2b372795dfe14e40121472290c664142,2024-10-29T14:49:04.463000 +CVE-2024-10048,0,0,753b7b10384148568802076e97b22f964c12e42cf7a3108618b3a771a6303c01,2024-10-29T14:34:04.427000 +CVE-2024-10049,0,0,885c4f58797b80385cdce80d924e46fe2b372795dfe14e40121472290c664142,2024-10-29T14:49:04.463000 CVE-2024-1005,0,0,1191b4a20d5b719ff3ba58b8e13bb4278d19f2133e7221e782230a58acb2d18f,2024-05-17T02:35:09.367000 CVE-2024-10050,0,0,d8b5aaf0fed099523fa2ba7c0c86d11fc479440388170ed27b77f7313b983d74,2024-10-25T12:56:07.750000 CVE-2024-10055,0,0,f23c4e0430e3651b3e5a88876f1cbabbd51c53a5add393f17e3c2bc07307aa14,2024-10-22T16:28:59.297000 @@ -242448,11 +242448,11 @@ CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef CVE-2024-10176,0,0,142987a8f419783b163ba6354525e6bb8e3054620537017112986773c0d037e4,2024-10-25T12:56:07.750000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 CVE-2024-10180,0,0,eeda8a52eb376af37ac54d80ec17aa95c78c556dda331af160350bff0915b632,2024-10-25T12:56:07.750000 -CVE-2024-10181,0,1,e508d85fb29127dc9615d55a59c4f686aa113b77b39ab8d7dcfaa4fd4cd2c82b,2024-10-29T14:34:04.427000 +CVE-2024-10181,0,0,e508d85fb29127dc9615d55a59c4f686aa113b77b39ab8d7dcfaa4fd4cd2c82b,2024-10-29T14:34:04.427000 CVE-2024-10183,0,0,120f83031d6b056b9464662cc23a397a8370d5b6b85b4ebf16896e12042e7ae6,2024-10-23T15:12:34.673000 -CVE-2024-10184,0,1,82e323cdb696d7fc911e7053501b005fcd00bb282537fcf739cadb894187d0e9,2024-10-29T14:34:04.427000 -CVE-2024-10185,0,1,ca6dfd9088b0219f97894c0990b4ec594d404f7f2fe7b73023fa5dc239e3eb40,2024-10-29T14:34:04.427000 -CVE-2024-10189,0,0,c7e7e9c9433451acc4ead77e2398a65c092c06680c0a336db7286291fd8ac494,2024-10-23T15:12:34.673000 +CVE-2024-10184,0,0,82e323cdb696d7fc911e7053501b005fcd00bb282537fcf739cadb894187d0e9,2024-10-29T14:34:04.427000 +CVE-2024-10185,0,0,ca6dfd9088b0219f97894c0990b4ec594d404f7f2fe7b73023fa5dc239e3eb40,2024-10-29T14:34:04.427000 +CVE-2024-10189,0,1,44ab01729f421efaf03808ae973a9923c5f8c6b41f07f8511cb89b2ff9a7419b,2024-10-29T15:27:55.550000 CVE-2024-1019,0,0,9d34fb91efb6a448073ac765944da7eab7ec7fd07c6fef378639c859599f6841,2024-02-20T02:15:49.973000 CVE-2024-10191,0,0,4ecd88c27c34e37b94ed56c347924bf6837bbfb39d55fba1c828925d6337ab29,2024-10-22T14:33:12.313000 CVE-2024-10192,0,0,cefddc86e7199e5797c8520fdbef80b765c771e6fac9e1c4dccb50f7aa98e5c6,2024-10-22T15:09:16.517000 @@ -242468,21 +242468,21 @@ CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c4430 CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000 CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 -CVE-2024-10214,0,1,387761b00ca263850d15f9fc0085dd195781994f66bd9edc33fb8fef62fe7001,2024-10-29T14:34:50.257000 +CVE-2024-10214,0,0,387761b00ca263850d15f9fc0085dd195781994f66bd9edc33fb8fef62fe7001,2024-10-29T14:34:50.257000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 -CVE-2024-10226,1,1,5b578efa4cb98c9f5b6f02eac4f65de90209e937f40993cf9dca20324ab58f1b,2024-10-29T14:34:04.427000 -CVE-2024-10227,0,1,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000 +CVE-2024-10226,0,0,5b578efa4cb98c9f5b6f02eac4f65de90209e937f40993cf9dca20324ab58f1b,2024-10-29T14:34:04.427000 +CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000 CVE-2024-10229,0,0,d8b7c88d62022a9dc51348547e30f2a14480969b9761e4820e45f77df3ca533b,2024-10-25T17:04:54.080000 CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c4116,2024-07-25T21:15:10.280000 CVE-2024-10230,0,0,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000 CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000 -CVE-2024-10233,0,1,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000 +CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000 CVE-2024-10234,0,0,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 -CVE-2024-10241,0,1,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000 +CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 -CVE-2024-10266,0,1,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 +CVE-2024-10266,0,0,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 CVE-2024-10276,0,0,5e7ff159e65586309659d6baff08f635e7f7065d36341ca3fc8957b4d9175dc0,2024-10-23T15:12:34.673000 CVE-2024-10277,0,0,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000 @@ -242511,7 +242511,7 @@ CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884f CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000 CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 -CVE-2024-10312,0,1,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 +CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 CVE-2024-10327,0,0,5a1546502e73211d148718e818d15cec9bc5841df26bde254740ef77c9d65b28,2024-10-25T12:56:07.750000 @@ -242536,7 +242536,7 @@ CVE-2024-10354,0,0,d5bf96c00ae597f7009c34e3844c5889f0c0763a1e1b97eab0af94f26675c CVE-2024-10355,0,0,7a858a56547ed44307c9a540d3394b900b64454d40ccf6ae564bf35aa8fa4990,2024-10-25T12:56:07.750000 CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000 -CVE-2024-10360,0,1,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000 +CVE-2024-10360,0,0,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000 CVE-2024-10368,0,0,bd751cf8f0908c7885868477a03f4653af3e113fc89fdbd03353e34dff9f8f68,2024-10-25T12:56:07.750000 CVE-2024-10369,0,0,7ae7d6c6e004766971ac0d79eb28bd21cccdeb76fc8a447fe3f3b470463f1503,2024-10-25T12:56:07.750000 CVE-2024-1037,0,0,dc80ea945a1c7339fa73e61584161c3f0eb5c7e682984c3146b230e695ed7de9,2024-02-14T19:09:45.253000 @@ -242575,9 +242575,9 @@ CVE-2024-1042,0,0,87dc787933fa568693623eb2222edd1702eaf068420e0f5081ad1d377d2eb6 CVE-2024-10420,0,0,846d3922cfb082a18bf1a2aef53465928b43c3a0a5607fdf099784de849f1855,2024-10-29T00:21:35.717000 CVE-2024-10421,0,0,7bff10bb36996b4d62f9e25003b28c9405671f71764ca7defaceef2e7ade94fd,2024-10-29T00:19:35.110000 CVE-2024-10422,0,0,8238f03495deed1cfc2bc6657a30d42a132cd1a657f5c4eb6a7808938f211181,2024-10-29T00:16:35.510000 -CVE-2024-10423,0,1,7da6b57d8702a9ff0d8846d62f06cb0163e846663417286c202356caeba5127a,2024-10-29T13:11:44.690000 -CVE-2024-10424,0,1,0082f2c9329da5c28dc61d90822e77e972ce57e5080d3ba52361d4d460b4446e,2024-10-29T13:11:42.527000 -CVE-2024-10425,0,1,8adfa31fd985d4bc27743db745ec868540b0820dcf6294ef53f1f23cb0898627,2024-10-29T13:14:31.863000 +CVE-2024-10423,0,0,7da6b57d8702a9ff0d8846d62f06cb0163e846663417286c202356caeba5127a,2024-10-29T13:11:44.690000 +CVE-2024-10424,0,0,0082f2c9329da5c28dc61d90822e77e972ce57e5080d3ba52361d4d460b4446e,2024-10-29T13:11:42.527000 +CVE-2024-10425,0,0,8adfa31fd985d4bc27743db745ec868540b0820dcf6294ef53f1f23cb0898627,2024-10-29T13:14:31.863000 CVE-2024-10426,0,0,28b0546203467c7939d52a82523c488ba35fb615e4616239613197f9a3fa4d63,2024-10-28T13:58:09.230000 CVE-2024-10427,0,0,9b2f066d18b440b54fefaad47103e26dcc47db3306972f0530c451a917b87acd,2024-10-28T13:58:09.230000 CVE-2024-10428,0,0,da4ce94fc5734b784cd3dc14f57a304ad2272c949dac6a2208ebece092333393,2024-10-28T13:58:09.230000 @@ -242589,36 +242589,37 @@ CVE-2024-10432,0,0,0feeda3c5cdfbe1e06aa23ee0373b3f8448fc444aaeb6ffe58ff80bb8da9a CVE-2024-10433,0,0,1e21095aa44ed844c5521070f3a998ae62e31fd3b0fa5ff270c189969069c652,2024-10-28T13:58:09.230000 CVE-2024-10434,0,0,f9a031ee95bd658c2fe9253d4ed2ae867e5902a8cd9d172e239b9cea0516e525,2024-10-28T13:58:09.230000 CVE-2024-10435,0,0,8912a60b7c15872def4963355302dc88d9e35ad474f000f7a82d872c1d7ba62f,2024-10-28T13:58:09.230000 -CVE-2024-10436,0,1,a1797d9cd5fbed49a304a21cb6a3c6dedd7a712c79dd7d33ba3878a13f49582f,2024-10-29T14:34:04.427000 -CVE-2024-10437,0,1,d3bc9d2bb8e4c51579dc229bca1603ee4a47fb6c58b52787ed4dbb875d8f0331,2024-10-29T14:34:04.427000 +CVE-2024-10436,0,0,a1797d9cd5fbed49a304a21cb6a3c6dedd7a712c79dd7d33ba3878a13f49582f,2024-10-29T14:34:04.427000 +CVE-2024-10437,0,0,d3bc9d2bb8e4c51579dc229bca1603ee4a47fb6c58b52787ed4dbb875d8f0331,2024-10-29T14:34:04.427000 CVE-2024-10438,0,0,0b5aaabb7f01c5e8089681a78cf679c538d73fc8ba2b4c24425fb07aa84697f2,2024-10-28T13:58:09.230000 CVE-2024-10439,0,0,fd93bfe9b0f0ecf9fc9440fc27dbb51446dec5878669ccf6864d3c193f7cade2,2024-10-28T13:58:09.230000 CVE-2024-1044,0,0,aabb10708db1db153d691de2620429bf76b48269bc86aae28cbf6b6a3c047729,2024-02-29T13:49:29.390000 CVE-2024-10440,0,0,e0ec7dc189707988f606322a12ddcae2694f26b72c203d1a3e88fa2bb5134f0a,2024-10-28T13:58:09.230000 CVE-2024-10446,0,0,9a110001279aec61be0a01c28d9ac0a67361a3753f5f02059a709117bcd9c6a3,2024-10-28T13:58:09.230000 CVE-2024-10447,0,0,3d23036486de2cfd5c946a364af9798880f8285c7930da486574aaa8ca05b3f8,2024-10-28T13:58:09.230000 -CVE-2024-10448,0,1,8592ee07b49e81610af100bc63f005e0b694650efb1b3544bc63d15b3705903e,2024-10-29T14:34:50.257000 -CVE-2024-10449,0,1,37c2bcaf33d85978782c73468306745d1914d0da52c07cf95c1e143ce9f51251,2024-10-29T14:34:50.257000 -CVE-2024-10450,0,1,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 -CVE-2024-10455,0,1,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 -CVE-2024-10458,1,1,7226d5d845dae2d50cf0c67a709b76b4ee40123526a8a54fcaba4953dcdb6c62,2024-10-29T14:34:04.427000 -CVE-2024-10459,1,1,9d75223b7f4d8772f198dec4be94083c31b07915596609c3d6e28cafba36747c,2024-10-29T14:34:04.427000 +CVE-2024-10448,0,0,8592ee07b49e81610af100bc63f005e0b694650efb1b3544bc63d15b3705903e,2024-10-29T14:34:50.257000 +CVE-2024-10449,0,0,37c2bcaf33d85978782c73468306745d1914d0da52c07cf95c1e143ce9f51251,2024-10-29T14:34:50.257000 +CVE-2024-10450,0,0,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 +CVE-2024-10452,1,1,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b366238480a,2024-10-29T16:15:04.593000 +CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 +CVE-2024-10458,0,0,7226d5d845dae2d50cf0c67a709b76b4ee40123526a8a54fcaba4953dcdb6c62,2024-10-29T14:34:04.427000 +CVE-2024-10459,0,0,9d75223b7f4d8772f198dec4be94083c31b07915596609c3d6e28cafba36747c,2024-10-29T14:34:04.427000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 -CVE-2024-10460,1,1,b3dcc9daf7d6e1ca6a6660329788291f6c0dafaa9a6365aab9b6d0c1d3013608,2024-10-29T14:34:04.427000 -CVE-2024-10461,1,1,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000 -CVE-2024-10462,1,1,a6663c5927e85c0816750e9892f4d162113f2ae4b1471f0ab1ea841cd11d3b16,2024-10-29T14:34:04.427000 -CVE-2024-10463,1,1,ca2ccdfc7347f2b24f8c14d4cc993f27e84d642d3d52109568321c28c93cf394,2024-10-29T14:34:04.427000 -CVE-2024-10464,1,1,4abb59b7e2d328d8b9fccac915bd35791fe7d6a637843d39e1de71582cddb68e,2024-10-29T14:34:04.427000 -CVE-2024-10465,1,1,42e5258b4a08c5a48f5113e849eb96273f88b2539256da8e6e6e12a19a3fc6f5,2024-10-29T14:34:04.427000 -CVE-2024-10466,1,1,cbf25e33b587f350d79ceb15b4bc3d8f4e1014b27ff2a03d8d496cef08e40ace,2024-10-29T14:34:04.427000 -CVE-2024-10467,1,1,d65a732454df7eff558a09640bc909c686417401c80632fe163c8128932b813e,2024-10-29T14:34:04.427000 -CVE-2024-10468,1,1,becae250ce6b9adbf1949f6206905d525cd4f79c435372006703cecc1b957ebe,2024-10-29T14:34:04.427000 -CVE-2024-10469,0,1,ce754100df9ffde1a5a074de2751b11dd6f964ca496b3df4282e24ff877dc047,2024-10-29T14:34:50.257000 +CVE-2024-10460,0,0,b3dcc9daf7d6e1ca6a6660329788291f6c0dafaa9a6365aab9b6d0c1d3013608,2024-10-29T14:34:04.427000 +CVE-2024-10461,0,0,e62c3d73f027c24aa214194489d2f7ea4cb1a239ca62c4ab4737708ca7ae2098,2024-10-29T14:35:16.270000 +CVE-2024-10462,0,1,4a226303b41a8ef14593df9ad4016e062b22cd4809d4e55cc19ac201172497f0,2024-10-29T15:35:12.370000 +CVE-2024-10463,0,1,49a4454e7924bd767d5f280eb17ebe85a54b4c9d8efa81e94d360039ec5e86c3,2024-10-29T15:35:13.493000 +CVE-2024-10464,0,1,226d7a8498ceefc9403bcdc6921e29827150084c4c3e7048cfed5daa3ccfcf4c,2024-10-29T15:35:14.420000 +CVE-2024-10465,0,1,dc7ed0592a40fad02af55f50011ae4cb76440db4e16f8699e799457b405cb6e4,2024-10-29T15:35:15.247000 +CVE-2024-10466,0,1,63489517342254eb5db891b401be80f9748fc25d7cc27e56635baf0153cb523d,2024-10-29T15:35:16.103000 +CVE-2024-10467,0,1,7e4e71c60edecf9e458ee9a62bd8a9b75d5e9aa73408c25490c4535f84e333c0,2024-10-29T15:35:17.013000 +CVE-2024-10468,0,1,036adcfbbc7bf9f9c9537432c8783c40b87e341a47dda57c9e37f244069e8a6e,2024-10-29T15:35:17.917000 +CVE-2024-10469,0,0,ce754100df9ffde1a5a074de2751b11dd6f964ca496b3df4282e24ff877dc047,2024-10-29T14:34:50.257000 CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000 -CVE-2024-10474,1,1,37703d08df776f2812fd2ada14ad66d475779a685531687aea7bcbacb1785dcb,2024-10-29T14:35:17.140000 -CVE-2024-10477,0,1,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b307,2024-10-29T14:34:04.427000 -CVE-2024-10478,0,1,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000 -CVE-2024-10479,0,1,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 +CVE-2024-10474,0,0,37703d08df776f2812fd2ada14ad66d475779a685531687aea7bcbacb1785dcb,2024-10-29T14:35:17.140000 +CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b307,2024-10-29T14:34:04.427000 +CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000 +CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000 CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000 CVE-2024-1049,0,0,bd86fa3ef2f3a9c880f8a662bf41f8b013cc8d0ec2ff1efa897f3a7402b5b977,2024-03-25T01:51:01.223000 CVE-2024-1050,0,0,f9f89980ca3ef0ce2f5e1044207260b8a92a6effafa867ba6315fdcbfcd0b749,2024-05-06T12:44:56.377000 @@ -243552,7 +243553,7 @@ CVE-2024-20036,0,0,18c14171323f00b186271c31528dc99e37fd9b9059fcf223ab21b79a7fd11 CVE-2024-20037,0,0,adb1866d4c227394880a8656ea0442a9b76611b77fb814d4721a97640cafcc3a,2024-08-22T19:35:10.633000 CVE-2024-20038,0,0,b24fd54a338c5bcd125b3ff0e1aa517302167214bb3333a900e600b4cd1318a8,2024-03-04T13:58:23.447000 CVE-2024-20039,0,0,16957c5f03c6deb27e91c56e5a56c47ab9ce0361bbd04c3b1e9fc45aae937591,2024-08-01T15:35:05.340000 -CVE-2024-2004,0,0,306db60d89047f410d6d61c78e80dc7bb4c98731b18731d539f0ad8a070bfc68,2024-07-30T02:15:05.320000 +CVE-2024-2004,0,1,c2bb8f329a7d72a8f958bf6961e7ab1c1b13f0fe82c58ad2a8b0b0c03f602ab5,2024-10-29T16:35:12.027000 CVE-2024-20040,0,0,7794263a0ff9ef7a9a293c11fabe2693e4a31f8e28a938c194a6c9b335ae777e,2024-04-01T12:49:09.583000 CVE-2024-20041,0,0,797b0699213b143be2b5cc6707e3db6951b01d8acd1047588c4a44bd9a512123,2024-07-03T01:45:50.520000 CVE-2024-20042,0,0,32382b46cafc275eb8cb8740c3ccddf6582487704ec09b63083a965b2c45f6dc,2024-07-03T01:45:51.343000 @@ -245119,7 +245120,7 @@ CVE-2024-21917,0,0,26b80a891f430a1a7f15438662f05666dcf386f7141a1aed04c90316da82e CVE-2024-21918,0,0,742b173c7dcca847586b3391775dbdbe8cf845cb3792806068b182f51bb9a05c,2024-03-26T17:09:53.043000 CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eedea1,2024-03-26T17:09:53.043000 CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000 -CVE-2024-2193,0,0,e35708841989612ea53dfb73e293443b1951d4f238ca2a3ae9e5b26b07e3c0b0,2024-05-01T17:15:32.313000 +CVE-2024-2193,0,1,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000 CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000 CVE-2024-2195,0,0,bb0953f36325af10b37984088b8b1459185284ada2095a83a3bbf8eda597a9b0,2024-04-10T19:49:51.183000 CVE-2024-2196,0,0,8ec133a9075bc1567c504d98dff21f157cca962585a8b4ec57dc32003f56e460,2024-04-10T19:49:51.183000 @@ -245197,8 +245198,8 @@ CVE-2024-22060,0,0,7f79d2875f5a614fca219746c1bbf5a9acd1ca84384af60f4f2ea354a4c82 CVE-2024-22061,0,0,a2f8b1edabd606da9b855ff3e3612ece1cc2a51d553a7dadaf2301f49cdc94da,2024-07-03T01:47:02.763000 CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11ac3,2024-07-09T18:19:14.047000 CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000 -CVE-2024-22065,0,1,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000 -CVE-2024-22066,0,1,1ce1bc950a8db5e9cfb36d17e428405c7705fb0cd1e4f9d554437e156e9c5225,2024-10-29T14:34:04.427000 +CVE-2024-22065,0,0,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000 +CVE-2024-22066,0,0,1ce1bc950a8db5e9cfb36d17e428405c7705fb0cd1e4f9d554437e156e9c5225,2024-10-29T14:34:04.427000 CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000 CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000 CVE-2024-22074,0,0,597eb5b51f6f6f2c4d569289cef4a67d7a503bfba7b03a39a3d413dc000d2aae,2024-10-16T15:39:58.847000 @@ -245593,7 +245594,7 @@ CVE-2024-22520,0,0,57a4a0e95e01ac29a1644bc8dd95e1182aab0ee098645584e77b48608e2ef CVE-2024-22523,0,0,4d1bedf12f65c21e553a2d1d3b166e89d2d1d69d220c5bbcba3c4d692b00d258,2024-02-05T18:45:22.323000 CVE-2024-22524,0,0,ab2cdf019dd6c1da16c352738080a65ad88b074a9cf957a8b3e123f9ca828169,2024-10-15T20:41:01.773000 CVE-2024-22525,0,0,1a5690a22b6c338f7360e479d85cb27bc0ae0b34f0612e2bb4f2c7ef138f544c,2024-10-15T20:37:23.253000 -CVE-2024-22526,0,0,218c7b0985406f5be9160a4eba34edfa9ea3d3e7eea50564dba9ab623f1f5014,2024-04-12T12:43:46.210000 +CVE-2024-22526,0,1,693d062ddd73b2e0329dfe7dbfad844d682b6d21f4e04b1bec7a785e36e89ac5,2024-10-29T15:35:19.067000 CVE-2024-22529,0,0,c99a9546a8a1bf73954eb7152b5917a72a7df555ecc955a1c1717a6f52ba76ad,2024-01-31T18:42:44.573000 CVE-2024-2253,0,0,9e9e4eb36754a889ba12eae0616f7d1597a027d9b393d499aed081cb747c7f40,2024-05-30T13:15:41.297000 CVE-2024-22532,0,0,de186662f33e74d83cd8fffe00aab46fcd2955cb2806c1da45608ae2427d3c0c,2024-08-01T13:46:58.680000 @@ -247206,7 +247207,7 @@ CVE-2024-25075,0,0,bfed480b2306172449fd442aea4561660fa83ab81e8f534c8111cd2e1f0d7 CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000 CVE-2024-25077,0,0,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000 CVE-2024-25078,0,0,14ea593bbd760f1a861775a7e6100acb3fd7a8f88d884ae3f61694ec3c2b2927,2024-07-03T01:48:39.997000 -CVE-2024-25079,0,0,df3a5b95b7f6f4370caee005112754774cb6bfa4fa30f82a6ed48ecf2a7fc17d,2024-07-03T01:48:40.830000 +CVE-2024-25079,0,1,747dcc74f114c461c43dc15d8c7262cc52b3ea0a47dd0c2658850379b94eaa9d,2024-10-29T15:35:19.873000 CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000 CVE-2024-25080,0,0,18626c970f137cdb9398dd9a27a57c97c76048e9872d0484e7e3cc74df35e9d3,2024-04-01T12:49:00.877000 CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 @@ -247503,6 +247504,7 @@ CVE-2024-2556,0,0,d03e7f1784653a97f31dc4e2fd10447d6f2db7c14a279d58208c6467bb9e5b CVE-2024-25560,0,0,e7b7bd3b9b2bd4e7d45c7cc73f2078dfc39996dd7babf1c9bfbdcc4206fa2bb7,2024-05-08T17:05:24.083000 CVE-2024-25561,0,0,76009d8f511bac009453b1046a38e646e70f224b7d5698b6c84d95afebbbc42c,2024-09-12T18:50:32.413000 CVE-2024-25562,0,0,691463f616aff0c576eb38540790057cbc3fed7a44a49e5b85921154797d7fac,2024-08-31T03:40:47.857000 +CVE-2024-25566,1,1,bce4d48f91d3f108155e5a85bfef4dd59d760dcc7bad1735d165b1e6f1aaf94c,2024-10-29T16:15:04.947000 CVE-2024-25567,0,0,312765bfd106474db1f5aba6392fe2ea9517594a364566ff599d59e6c885b134,2024-03-22T12:45:36.130000 CVE-2024-25568,0,0,1f3b68eecdadc5fc067f1c6a6f3d0aecf716d94021ea1c3d5bfe3c2dbc91ce3d,2024-08-01T13:47:46.990000 CVE-2024-25569,0,0,dea2ee3f4df79c480f034907a060b1ff1648e15e76705f9587fe4b45a7f69cdc,2024-05-05T03:15:07.033000 @@ -249363,7 +249365,7 @@ CVE-2024-27835,0,0,80c6d96e906c8635ef6969508bf139f1543eebf14051cd8c997c4c8052553 CVE-2024-27836,0,0,cebab4c068470dfdc9e3a5c62e87416155cf98a1f8670f21b2ee301fe7d874e0,2024-07-03T16:28:15.957000 CVE-2024-27837,0,0,7e4bb4d9cc28d81f3afe01a685bcf2ea16ed26bf202a4b18649d6d977d69ced8,2024-07-03T01:51:08.273000 CVE-2024-27838,0,0,8f1cf242351f952c736e479e56e5138c5bf243d831755b412d2f2a5f48580c71,2024-07-03T16:27:38.277000 -CVE-2024-27839,0,0,d46bd088526541fa09779357ef3e51ad87d564c42ee4d8be4dc61e1618465be0,2024-09-06T18:35:11.870000 +CVE-2024-27839,0,1,891df2bd84a9a6425c499d13aed0ec4c8f680e0da574abab21725bb972850e0e,2024-10-29T15:35:20.747000 CVE-2024-2784,0,0,ac18ac10d4d26cbc8cc67c7d846cc7c2e5e5aeca34baa26ce3c69d9886b607fc,2024-05-24T13:03:11.993000 CVE-2024-27840,0,0,c861029ec7979509d3bf8ebb217fb6334f481422c29598e90c453a01f61edeca,2024-07-03T16:27:03.590000 CVE-2024-27841,0,0,c196712b25e7bd8d66323b49a59c084563ec41f23c04da910219b17a17279957,2024-07-03T01:51:10.377000 @@ -249373,7 +249375,7 @@ CVE-2024-27844,0,0,f47c820a9af800de343432c38bc9e2d59f37cb68e7684b8e09f702eb76aca CVE-2024-27845,0,0,0d564bfe9e561fcf31182cd0bbc6cacf5e39792be0769beb62d2dc37b802ea42,2024-07-03T16:24:57.930000 CVE-2024-27847,0,0,be6eb9a0d20bc008efd3235440ec5fe6670ad0bd2a6cedf0bc5d5f0b0c4962ca,2024-07-03T01:51:11.167000 CVE-2024-27848,0,0,ee1f57d57993dc2355133c7db4fe16e1b04f171eb2d17aa6e9b6d31c1607026c,2024-07-03T16:16:03.303000 -CVE-2024-27849,0,1,d06e2ced14c2d6572239df5b42f897095fe518712e55a9defeb063cbc8a74fee,2024-10-29T14:34:50.257000 +CVE-2024-27849,0,0,d06e2ced14c2d6572239df5b42f897095fe518712e55a9defeb063cbc8a74fee,2024-10-29T14:34:50.257000 CVE-2024-2785,0,0,c80d6189c649f881f5582594daf56ace11d883766a2f87b2cab5fb27986794c8,2024-05-14T16:13:02.773000 CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434e31,2024-07-03T16:14:52.247000 CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000 @@ -249540,11 +249542,11 @@ CVE-2024-28014,0,0,16fb600a35cd34a3bc2910bc5d71fb1c433afeb8bbc697318d98ea82c7efb CVE-2024-28015,0,0,ddab8347a9d5b773cb065bee42a10bfd446d895d29f2da6b469440cd52b2e1f0,2024-08-01T13:48:56.427000 CVE-2024-28016,0,0,a98b26e25e4286269fedcc6031733336ad844bd31295954b2cf043a68c799c14,2024-04-02T06:15:15.603000 CVE-2024-2802,0,0,4d7e48fbf79d86b86a336401cd7856f9a2e312e8845717a11d0136644698f700,2024-03-26T15:15:49.677000 -CVE-2024-28020,0,0,60bbaddce1e052f604b4df6e4226a190b3ae4639e3752fc86ca3638fe7ed3aa8,2024-10-09T17:08:57.697000 -CVE-2024-28021,0,0,698af9df63c869e8bcfc4e84d62db6e4d7ff182600a91f2bc02d26dab9f88c10,2024-08-15T21:29:46.697000 -CVE-2024-28022,0,0,05ab2292ec2d5764d60dc41d68acf6b7ed0f81413d1d5304ceb85ddefc5f7d7d,2024-08-15T21:44:20.677000 +CVE-2024-28020,0,1,5ccea74a65d1527e40fd5cf2e549b4f1d5fd1053b3c9cfb7acd6b24d27d3fa46,2024-10-29T15:15:09.207000 +CVE-2024-28021,0,1,d3b281f790deb0e028449c0547c897de30755152601ff8bfb79129f9a9b610f6,2024-10-29T15:15:09.347000 +CVE-2024-28022,0,1,ef2a0f9ac5b24286c03f1b67f9788efcbdfb6eb0e52bbe5a2ede8ed5d36c64a2,2024-10-29T15:15:09.573000 CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000 -CVE-2024-28024,0,0,023885276663800ce2b5419331ef97f1151e80df5fff534e76aea30066f91b6f,2024-08-15T21:46:11.737000 +CVE-2024-28024,0,1,b0c6ecf3013967d3efc0618c902b41d32c3ab34672126ec38ab8cb1948f54213,2024-10-29T15:15:09.697000 CVE-2024-28029,0,0,9e4bd22dac92b2ff82c0b0c8dd5314b634ca4785041ee3b60958f95130ac218e,2024-10-17T19:15:22.063000 CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000 CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000 @@ -250925,7 +250927,7 @@ CVE-2024-30102,0,0,319135154fd92fe7d8106fde2ca3c4802e21706ca62151c235c5521e43673 CVE-2024-30103,0,0,cbcd73720f86b02c166360f547f14e75567d871ea6a9bb35fd8a94c030f28d7b,2024-06-20T17:26:40.603000 CVE-2024-30104,0,0,0d6554d17808fae404c18fd87f0cb343eeacec3983f90ccf7acd89f92adcb133,2024-06-20T17:27:01.447000 CVE-2024-30105,0,0,5c287591f93c13e98077376ded79fc92f7e3c347ae72d3d5f10ca6d6cbe0e5e4,2024-10-08T17:15:32.123000 -CVE-2024-30106,0,1,8ab2ac7d3ad4bf5d3e8d0dff0555f704b19a1ca4388e028a4f9eb8ca3b3fa3cd,2024-10-29T14:34:04.427000 +CVE-2024-30106,0,0,8ab2ac7d3ad4bf5d3e8d0dff0555f704b19a1ca4388e028a4f9eb8ca3b3fa3cd,2024-10-29T14:34:04.427000 CVE-2024-30107,0,0,d3b5ab85a30627420755b961fce34a4b2d10a642f6dfcc200d0ec65e71213655,2024-07-03T01:53:50.107000 CVE-2024-30109,0,0,04881debc711277dac69677e9ba1bd3a604eac95048cd8a9d9b601fb19907fcf,2024-06-28T10:27:00.920000 CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf5482466d,2024-05-17T02:39:40.533000 @@ -250938,7 +250940,7 @@ CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f57 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 CVE-2024-30122,0,0,b78e8f60e4d0df5148447073604013d9d8b1860e36c446b761d204643c69cb09,2024-10-25T12:56:36.827000 -CVE-2024-30124,0,0,f7ed66bdff59058c393ed9ac26165b8f3f76b955467f6c28a2ed31fa02a2f9e6,2024-10-25T12:56:36.827000 +CVE-2024-30124,0,1,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000 CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000 CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e7b5,2024-09-26T13:32:02.803000 @@ -252120,13 +252122,13 @@ CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc5 CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000 CVE-2024-3168,0,0,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000 CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187619,2024-09-06T22:35:01.557000 -CVE-2024-31682,0,1,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 +CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 -CVE-2024-31714,0,0,e2cbcd04e6551aaebab596d7137808760f8842fa97ced3f3a7a7709d1ffb887c,2024-07-03T01:55:18.240000 +CVE-2024-31714,0,1,fca8cf3535ce1faab64a922bcd70a563f448d5faacc7ae78e0f09ff9c9198506,2024-10-29T15:35:23.120000 CVE-2024-3172,0,0,05dc82f6f22e88fbd8d06dbea6edbb204f6f1a0b12363688b71e4a27893b8a6f,2024-07-18T15:02:46.477000 CVE-2024-3173,0,0,0a00fa791c0beedd2224ddcaad68b63d69d779d7d822291cdbf8a4dfac758ac8,2024-08-01T13:56:25.427000 CVE-2024-3174,0,0,cc93afb1fba4ed5cb1d1b58e07131fbee1642590e2326d02f843f51030b35ac2,2024-08-01T13:56:26.347000 @@ -252755,7 +252757,7 @@ CVE-2024-32611,0,0,abc754efada8aafebf0fe0506c081c90cf76bdf375a890d26aade6a81a7fb CVE-2024-32612,0,0,fa0d8cb7dacac717a406d4aabafa79934264f1b91f48d6d8c4723fee6286bb46,2024-07-03T01:56:45.670000 CVE-2024-32613,0,0,f1f41ebc1e4e31cd144adfcffbfbbd261f6ca4f784d07dcc93c9e3cf304923f4,2024-07-03T01:56:46.420000 CVE-2024-32614,0,0,0586f7e2db361ba016a10a7d05822a68e00bab4a467fb3c2cc530efcd3b5819c,2024-07-03T01:56:47.230000 -CVE-2024-32615,0,0,eed0625c47474188933c85f87c3961846e531f538a59e0623622ab217be95b75,2024-07-03T01:56:48.017000 +CVE-2024-32615,0,1,ff1ddfb3437efea546936b4400a705ebe4cd91e94f67802790a54811aa3f4160,2024-10-29T15:35:24.107000 CVE-2024-32616,0,0,3470660bc21c15733b68c010ee9c1a1f6e6a37d50582163cfc4fb2ca8bf712a0,2024-07-03T01:56:48.773000 CVE-2024-32617,0,0,9808be4dd950599e3382ef2e43dc1ef6572adf7dec30285db7d549529012275c,2024-08-20T14:35:15.603000 CVE-2024-32618,0,0,56dab34cac4614715d8aac7022fd1103f44443bc68e99df871e1adb6c0e5eb8d,2024-07-03T01:56:49.560000 @@ -253073,7 +253075,7 @@ CVE-2024-32937,0,0,652f451b71d39d99a50a831c1d05a67aee4d871187572c128dccbf3c57743 CVE-2024-32939,0,0,231a2fa1e4d14286f5b9a08c8a32a2999ba97abf4192ef0188114e2b4511697a,2024-08-23T16:17:54.027000 CVE-2024-32940,0,0,b139056212e274cc43b1d8561af3c4d12757c7b4882dc265ebef55266df1f735,2024-09-23T14:44:21.763000 CVE-2024-32943,0,0,fd4b837b9a53617894ef752d7ffb15062de7d93bb7a78599ea7bd4a8fd1edccf,2024-06-21T11:22:01.687000 -CVE-2024-32944,0,0,4fb2f2be57e3c45f28985f6208cc39a6b7c152924d34534ee51269b999eeb2f4,2024-05-28T12:39:28.377000 +CVE-2024-32944,0,1,d0ec70387311640eb8535227f7e724b82fb2d27427be3369ff836aae4b979014,2024-10-29T15:35:25.073000 CVE-2024-32945,0,0,9f5b696ff44fb79b838efdedc4008405b04d813372a113ffadf8b85acf95286e,2024-07-16T18:03:50.067000 CVE-2024-32947,0,0,f4d3388d21b25a6b8abe5d47eaf1495f0195fc32275d8a68f778018af0164235,2024-04-24T17:16:50.397000 CVE-2024-32948,0,0,acdecd5f4ed0b407d74ae76d69c5bf1c1216a53f69bd869825d06aa6433de1ea,2024-04-24T13:39:42.883000 @@ -253237,9 +253239,9 @@ CVE-2024-33217,0,0,931f6caed27deca16afe48992fe19ff3bc360241c91b6cd818528eeb486c2 CVE-2024-33218,0,0,ee7d69983b37f9c6bf7e7a7a1874f78caedf9c878645e11206579f136a2c86ea,2024-08-01T13:51:46.453000 CVE-2024-33219,0,0,88db41ff645af4eb9aa3c0f9c25ab5a9fdf513c3fdf3a77e4c6808a67dc97b30,2024-08-20T15:35:08.557000 CVE-2024-3322,0,0,0211b467f4713c75ff39403f3818e6215f0f1e1d98c20a10ac87836ae1ccbec9,2024-10-17T20:20:34.677000 -CVE-2024-33220,0,0,94878fc1442fb742de617743986fbb0ae7d177efb074829742c5a4e187579f4f,2024-08-15T17:35:06.067000 +CVE-2024-33220,0,1,0c40f36bca42b909f92e46671b69f1180151365a84588a62b8ec4bef1b8a26a6,2024-10-29T15:35:25.910000 CVE-2024-33221,0,0,4c13ec1b720b7ec2ce94f445e942c2447ba67f3bae626d7dba251fb8b3437798,2024-08-01T13:51:47.243000 -CVE-2024-33222,0,0,826b88c0df0010107f0595e8bf718ff48038d9c2823c40b87f1e329d93d630c8,2024-08-01T13:51:48.023000 +CVE-2024-33222,0,1,909dc7e1cc7c5c5ef2203c7c2d648f88dca440e7d1906a5523724669aeb21ef2,2024-10-29T15:35:26.137000 CVE-2024-33223,0,0,726547f01cfae605317c6cfc99e2ef83243702d32495b560ecee9146a4a7a5c6,2024-08-29T20:36:42.837000 CVE-2024-33224,0,0,86736ad02528ece16e9971b6f9b2a1db298eb6e0829065eacffc71f386f1e027,2024-08-25T15:35:02.580000 CVE-2024-33225,0,0,71b85a02954864b84a33d179172a4f4b399e9e17bddb78acf1c5edd324250d90,2024-08-26T19:35:28.963000 @@ -253914,9 +253916,9 @@ CVE-2024-34193,0,0,e28053bd0a22d022848badc9c3f75e2fb164790fa29e948e479e4871e120d CVE-2024-34195,0,0,e936f15231dfa4d6a6e17686f81aced8b75779a489cec0fad79bd9273174e57c,2024-08-30T15:59:08.873000 CVE-2024-34196,0,0,fa10f060dde56de72ad527f194a43f50d5d3befcfd4eea3294712a1774de38b0,2024-08-01T13:52:15.947000 CVE-2024-34198,0,0,64762b78b18144217b11a78982a1bc311c217ced71d9dd99c5d6d58d14f2ea5c,2024-08-29T20:36:45.497000 -CVE-2024-34199,0,0,27f51e6e9a085d1edb0a1380e0bfff4433e52f8f9e25d5bec96a743b9a9ffd85,2024-07-03T01:59:29.647000 +CVE-2024-34199,0,1,60254b455db0af6c528639aa0e6ce70e6f6d96dfc712173ecda7bba1e59f824c,2024-10-29T15:35:26.360000 CVE-2024-3420,0,0,4a79874e63037882cf5f1fcd7dd6a1cad0c790500da420cf829e4ec3a26df5fc,2024-05-17T02:39:54.717000 -CVE-2024-34200,0,0,233f6ce04f4e95f03eaabab680c92f73f949e711725c4041d58add8301c7e04e,2024-07-03T01:59:30.427000 +CVE-2024-34200,0,1,04a6ef60f33af4d5210cca15ac720f37385f5f3834d1055c11935c81c70d37a9,2024-10-29T15:35:27.197000 CVE-2024-34201,0,0,331c15ea4d8678817fc4a039b90628979e4d12ceb52da635433fde95bd8259d3,2024-07-03T01:59:31.177000 CVE-2024-34202,0,0,10e2af653aecf5939b67ff5397946eb97268ba48cfc20999e9653a29203a02fa,2024-07-03T01:59:31.937000 CVE-2024-34203,0,0,7c4fea643e6e97753f9c8250ce54a3db82e8ad36a97a2537629259caa2f68d04,2024-07-03T01:59:32.703000 @@ -253936,7 +253938,7 @@ CVE-2024-34218,0,0,aac6cf7cfc70c4cde8ce5f0ee80848f4ce2c2520c2faf83b08bd31ed75ca5 CVE-2024-34219,0,0,e4a328632092998fdaa790d0453e25d1d23aa6d18db916c9ed2e43dfb23e65b7,2024-08-08T21:35:14.163000 CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c2e,2024-05-17T02:39:54.907000 CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000 -CVE-2024-34221,0,0,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000 +CVE-2024-34221,0,1,4fc0fe5a0a7d481229d82414975559b5ce7e394eebb1a6cc6af7f54bf077ba48,2024-10-29T15:35:28.087000 CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000 CVE-2024-34224,0,0,bc6821e7a1a1197e8806ef37396dfb61f1b6fcbd255743a94622a514f32eb2a4,2024-09-03T19:35:12.227000 @@ -254155,7 +254157,7 @@ CVE-2024-34532,0,0,dcb761bea457268d59c0be9416083baced4fef01729f53184cc4673fe1957 CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682bfc,2024-07-03T02:00:33.137000 CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000 CVE-2024-34535,0,0,83aae08bc421f9eef8621f242b24214806a581d0b260711ffa707015c3215f8f,2024-10-04T13:50:43.727000 -CVE-2024-34537,0,1,6a5bd37c8eda18d75698c309ae9100146ca82732c3ce161d9af9cbd057bb9624,2024-10-29T14:34:50.257000 +CVE-2024-34537,0,0,6a5bd37c8eda18d75698c309ae9100146ca82732c3ce161d9af9cbd057bb9624,2024-10-29T14:34:50.257000 CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 CVE-2024-3454,0,0,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000 @@ -254478,7 +254480,7 @@ CVE-2024-34947,0,0,1639e64ad64e3efff06c97dd9d715badbd33e6d8d7c52e5aa73aac445f5ce CVE-2024-34948,0,0,df6cbd6bc290a474122249ff224542f11fc34eaa4b942caf57452628541cff09,2024-08-15T17:35:06.870000 CVE-2024-34949,0,0,153f526975e57cbda3da567b214cb11ac9a77a410da95e9aba96a02a87ca6108,2024-08-08T15:35:11.187000 CVE-2024-3495,0,0,2d01763d9fd00934d213846ccfe97dfaae5495029603a64e4efbf7d1d6ec8266,2024-05-22T12:46:53.887000 -CVE-2024-34950,0,0,4b8267007ff70ad214b66a8a544774886740823c745cf811c7b1935620d9a19e,2024-07-03T02:01:01.753000 +CVE-2024-34950,0,1,bf808bbd8cae13fe5f84d0730b437576c0bad33c46386657fbf453c3bef28192,2024-10-29T15:35:28.890000 CVE-2024-34952,0,0,0b3ec7ed40085393e2071bc6d9d415733ee6d2bb94374bd8520452bf0007770e,2024-05-20T15:17:54.513000 CVE-2024-34953,0,0,9b4f59e590af18fd55ab03e8f9e2f9ac1fc4af0855347fdb3f9d86b63ec479e7,2024-07-03T02:01:02.633000 CVE-2024-34954,0,0,45e121e6345d7be55b9749f21543978dc6493002df1fa3a1d0cfcf004930bd3b,2024-07-03T02:01:03.443000 @@ -254488,7 +254490,7 @@ CVE-2024-34958,0,0,7772d236e28ce720831d1562351692ec3fb0f968280070f3d688477618524 CVE-2024-34959,0,0,5772ca0dd874715925cf4da6c25b5b6ba5531d062cdf4f1c5ebda80fd41560f3,2024-07-03T02:01:05.837000 CVE-2024-3496,0,0,bef13f538775198780ddc65a6f3a5a754b7e93a7523db13d7bd4c988bca6518d,2024-06-17T12:42:04.623000 CVE-2024-3497,0,0,7d099a902008f089d528b5135b45cb3cd9096ecc424d31781cee90aaac2e8bc3,2024-06-17T12:42:04.623000 -CVE-2024-34974,0,0,db93d6fc06c8e4d6ed75b4accd8acf59e9b9a04d41397a160c53843993ce1d4a,2024-07-03T02:01:06.613000 +CVE-2024-34974,0,1,aa2fa3e6ce07c2bee572e27c98d1900e34205a1191d0f2b25fbb0f6abd1d875f,2024-10-29T15:35:29.703000 CVE-2024-3498,0,0,1bc889e2e4668da9efb5b9dc009d274763e07092723971fbb26429901567412c,2024-06-17T12:42:04.623000 CVE-2024-34982,0,0,f411980c41fd405ef054f005411d2e1bcd318bde8c4ea15ac24cbc2eaadfce67,2024-08-01T13:52:29.093000 CVE-2024-34987,0,0,03a5b418cd2390173d5812103a575b1e25420d9d2e685e51b3f5e41dcf445202,2024-08-14T20:35:11.203000 @@ -257452,7 +257454,7 @@ CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3 CVE-2024-3920,0,0,d2ca1c7329cc368cadc82dfb98e46c7d8057a15d660865d8baa61df971f7435b,2024-08-09T19:35:09.360000 CVE-2024-39202,0,0,348a7ae5d8dd5240a11e31748e08097038b5b43463791ad3f8bbf301dcb39ab4,2024-08-01T13:55:45.870000 CVE-2024-39203,0,0,18c47ac3dccac84f7f75ab68882aa989c3675ff79ff1b24a1d72e6e148699036,2024-07-09T15:00:49.997000 -CVE-2024-39205,0,1,f4e69fa131329462127e5fdc9af158ac6672a688ccaef54ed7ede7955ce9502c,2024-10-29T14:34:50.257000 +CVE-2024-39205,0,0,f4e69fa131329462127e5fdc9af158ac6672a688ccaef54ed7ede7955ce9502c,2024-10-29T14:34:50.257000 CVE-2024-39206,0,0,ff238c7a799bd8156023ed396579b78ee6764c0b74ea4e700d568262004d102c,2024-07-08T14:18:50.487000 CVE-2024-39207,0,0,49494954d802f1c665c4a01f3343dfa603146f5c61e074b2d6ca53d1106856d7,2024-08-23T16:35:05.620000 CVE-2024-39208,0,0,bfca919135cb16c924d14a3e46a90c36fb45e8d6f50651e543c7c3b74462722a,2024-07-03T02:05:43.393000 @@ -257910,7 +257912,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 -CVE-2024-3980,0,1,ca3511d7901d042fa00bfa9c0d0aa676b250ea6c77161bee8a48883714e5741d,2024-10-29T14:15:06.670000 +CVE-2024-3980,0,0,ca3511d7901d042fa00bfa9c0d0aa676b250ea6c77161bee8a48883714e5741d,2024-10-29T14:15:06.670000 CVE-2024-39806,0,0,707dfc0ddef50ef77e39ddae9dd446416de56337e997263c3f5b5e8fa232a33d,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 @@ -258316,7 +258318,7 @@ CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000 -CVE-2024-40746,0,0,1162e1a27685b6cdb9477d6e763b56da4eadb8ca126f0caef412a4e4575d8849,2024-10-23T15:13:58.783000 +CVE-2024-40746,0,1,eead0b50026ce20d26effd54607d8bf55992b18b9630c4426d5bb7acadcc3473,2024-10-29T15:34:22.100000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 CVE-2024-40754,0,0,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000 @@ -258347,7 +258349,7 @@ CVE-2024-40789,0,0,d0cba5a2db3863932e9e1a9c379737076ce24b22d2521d505090b6fa80e9a CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40790,0,0,f74af1b6450b7abb69693b13c877ce53db126e23128080b9a116672c6aa27da8,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,1462bf4b5845ed6535d6a4bb5a36a3a889e0ddd7f70e74baa361a7ba6c70fe5c,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,1,a4c457b66231f97ca463d7d02b628d2b46a4a30858400c9b7714b3c6ea34d1d2,2024-10-29T14:34:50.257000 +CVE-2024-40792,0,0,a4c457b66231f97ca463d7d02b628d2b46a4a30858400c9b7714b3c6ea34d1d2,2024-10-29T14:34:50.257000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 @@ -258366,7 +258368,7 @@ CVE-2024-40806,0,0,de19bdc26ad947be78b25439a4c081cef03a9ac0cf8596ce40e06ed665906 CVE-2024-40807,0,0,a57ec3a3bb089ed252f2f8c175043165750e676422e4f67fbb537c1821f4ad1a,2024-08-15T16:35:50.210000 CVE-2024-40809,0,0,9737181761f09811942af1648871be698e164a1e26e2d7cb09625587b1583d46,2024-08-15T16:26:51.523000 CVE-2024-4081,0,0,2b1a13825488c3123a899d577616f27ebfa5f72481cbd0378e19b046630c7604,2024-09-12T16:43:42.490000 -CVE-2024-40810,0,0,b3ee1f427a02755546a6c3590116dbb871c7dd0e4c73818a72be9de7336a5140,2024-10-25T12:56:07.750000 +CVE-2024-40810,0,1,3f87576f34754b2cf4ae86b48cc9a57d65480dea4d8475b6babd083933d8e04a,2024-10-29T15:21:56.947000 CVE-2024-40811,0,0,58a2466a72dd67097326f2c18b9b99f24e15edfadd201715f3a11dc5fe430f0a,2024-08-01T13:58:09.693000 CVE-2024-40812,0,0,c246dcffc924270886f6bb5d99cc189e11e554cbf0acf5a0b6d7c76bf5b7cabf,2024-08-15T16:26:53.560000 CVE-2024-40813,0,0,eaec9d679620cbe04b5224752ba0981027a92f3e1bca89f18faeb08b9aaf1ce7,2024-08-15T16:15:52.613000 @@ -258407,10 +258409,10 @@ CVE-2024-40847,0,0,ac34ef361fd419d2c48bb6c61015668892d59a23316cf5cdc2086e1759e39 CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d92f,2024-09-24T15:57:03.893000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000 -CVE-2024-40851,0,1,25e5ec0f74dfefb8e795767adb9b7cbd92969119bc9336f0829dfa6a107177c8,2024-10-29T14:34:50.257000 +CVE-2024-40851,0,0,25e5ec0f74dfefb8e795767adb9b7cbd92969119bc9336f0829dfa6a107177c8,2024-10-29T14:34:50.257000 CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000 -CVE-2024-40853,0,1,1edd93b2cd04ef970830591d2fe9edf915eff310e2a5aa02f2d62ec6f87bce5e,2024-10-29T14:34:50.257000 -CVE-2024-40855,0,1,98eabe05e31ce8cc5e2afa7999e4c42a9d8250babdab092c0d84feb33fa2f26d,2024-10-29T14:34:50.257000 +CVE-2024-40853,0,0,1edd93b2cd04ef970830591d2fe9edf915eff310e2a5aa02f2d62ec6f87bce5e,2024-10-29T14:34:50.257000 +CVE-2024-40855,0,0,98eabe05e31ce8cc5e2afa7999e4c42a9d8250babdab092c0d84feb33fa2f26d,2024-10-29T14:34:50.257000 CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000 CVE-2024-40859,0,0,e6bef66eff66d00ffd29922d241a25fd31e85836830114d7614152c90136861b,2024-09-24T20:31:34.780000 @@ -258421,7 +258423,7 @@ CVE-2024-40862,0,0,0525786495a6d1734dd38aea7fe1aa5e14f710766343f641e193e4a65abe8 CVE-2024-40863,0,0,3ea35050167861a83960968323563384b01739f65920198953c160f9bccf9a87,2024-09-25T13:40:28.967000 CVE-2024-40865,0,0,86a860e5905b6728c79a2b0220fe6fe620623c98d110f80f056e40b418685ee4,2024-09-19T17:58:37.370000 CVE-2024-40866,0,0,b70b7495abe739ca87ac99d55432fe61ef90e14c7b56889eeedb3e6da6ebe6de,2024-09-24T19:02:09.850000 -CVE-2024-40867,0,1,611f5e093ce725c56f21401987cb4ebb55c10ccc4802784536e85daa483d258d,2024-10-29T14:34:50.257000 +CVE-2024-40867,0,0,611f5e093ce725c56f21401987cb4ebb55c10ccc4802784536e85daa483d258d,2024-10-29T14:34:50.257000 CVE-2024-4087,0,0,559dc8fcb531eb7d96e390fa33463b50a20c5a688e8dbefeb3187bf1d2c5f774,2024-06-03T14:46:24.250000 CVE-2024-40872,0,0,61b6054f8d04261e92c08a44feec16dc1d8422a97543a2162e5dea5f0a6c8f9d,2024-07-26T12:38:41.683000 CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a9bf,2024-08-02T19:57:17.407000 @@ -258689,8 +258691,8 @@ CVE-2024-41143,0,0,e8899d473fa3a8ea11660d6f2ba88aff617e29347ef6b002447e4155241e1 CVE-2024-41144,0,0,a99ced5ff39791199789f8b7404cf70d5ada3bff5c6dc65a7803cc1121e905e5,2024-09-04T17:25:48.123000 CVE-2024-4115,0,0,89bc89df66a101d446d6568b359dec67345256fa579984420e2e2fe7ea4994ac,2024-06-04T19:20:29.937000 CVE-2024-41150,0,0,f29e18c57230cbc3b76f00f0b7fe1001f55bb08bda82442884bf5072f9726b00,2024-08-27T14:35:09.013000 -CVE-2024-41153,1,1,9bc9accd9b726d5fba594979c6c735fc93239f267ae9c2deed394ca446093523,2024-10-29T14:34:04.427000 -CVE-2024-41156,1,1,ca86062aae39225a6c7806ef2ef661a811a46a081d50c06c4bddce682b10ff55,2024-10-29T14:34:04.427000 +CVE-2024-41153,0,0,9bc9accd9b726d5fba594979c6c735fc93239f267ae9c2deed394ca446093523,2024-10-29T14:34:04.427000 +CVE-2024-41156,0,0,ca86062aae39225a6c7806ef2ef661a811a46a081d50c06c4bddce682b10ff55,2024-10-29T14:34:04.427000 CVE-2024-41157,0,0,7a282611d45c2fbb6f2dc936e4617dedd23e7f4d2ca4cbf354d2844aba4fb55d,2024-09-04T16:30:40.737000 CVE-2024-4116,0,0,6ee64e85b69f8f11f599040da371bf02d3a94742e1ecd0f467d9a48f26243458,2024-05-17T02:40:16.110000 CVE-2024-41160,0,0,4405f1fa554ba7d9df44bc4bbb96ea93e068b229b76d85cd7934b300d79543d0,2024-09-09T12:21:53.383000 @@ -259180,8 +259182,8 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 -CVE-2024-42011,0,1,6c3467251e164c596233c97e56a2ece8699104c8d56c773b7e497bb18011c226,2024-10-29T14:34:50.257000 -CVE-2024-42017,0,0,7f9a4913b1239026519e3fb7d6fc6d114e8e4e346f101e97cc1469132655da88,2024-10-04T13:51:25.567000 +CVE-2024-42011,0,0,6c3467251e164c596233c97e56a2ece8699104c8d56c773b7e497bb18011c226,2024-10-29T14:34:50.257000 +CVE-2024-42017,0,1,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000 CVE-2024-42018,0,0,48c29334c5da2098d436407e3b178f068ba556edf0bd6315b98cc5d6fe724ba8,2024-10-15T12:58:51.050000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 @@ -259192,7 +259194,7 @@ CVE-2024-42023,0,0,53353d8a90b9dac8026225178af7324a7ea88240793050bf3d93683b0cc81 CVE-2024-42024,0,0,eea273d7d39998984ace805bb73fbe19d77f000a62e0385bbb38378893265667,2024-09-09T14:35:06.053000 CVE-2024-42025,0,0,8c1d228ed90571100df9823974eb0ba9e627f86789cc232c3042885df4b8d2fe,2024-09-28T18:35:02.277000 CVE-2024-42027,0,0,9b88726482b48ccc583b18a00f310466c06f5dc176ed5d6222ca3def4192088b,2024-10-07T19:37:18.967000 -CVE-2024-42028,0,1,98a8f00881cc1445f43a3028f98fad5697aaf777c46354f753a7fd56ae5c8e41,2024-10-29T14:34:50.257000 +CVE-2024-42028,0,0,98a8f00881cc1445f43a3028f98fad5697aaf777c46354f753a7fd56ae5c8e41,2024-10-29T14:34:50.257000 CVE-2024-42029,0,0,b7c83a25bc8a9601f6f3c6ebb603ce94146556b10d1f548176b0b38619ce3b21,2024-08-01T13:59:17.407000 CVE-2024-4203,0,0,52cf8a9be62388459acdc9c8c655685172127a00eca72ac9344c4d8920cfc78f,2024-05-02T18:00:37.360000 CVE-2024-42030,0,0,59fa56f47f76e92b6c6c6a3fdcb37d68b092a6ac90822c136b288bb49e8250df,2024-08-20T16:55:16.100000 @@ -259810,7 +259812,7 @@ CVE-2024-42918,0,0,657578840f633e762a27e4a0853fb47eccdc1027e81e0975d029fe8916be4 CVE-2024-42919,0,0,9d550152ff2dbb619a2352d654d17d8b55fb6100bbcd2b5aebd58ed74198ad98,2024-09-06T17:35:15.190000 CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59b0,2024-06-04T19:20:35.097000 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 -CVE-2024-42930,0,1,b548e9676bae466ea67c6eb53ec6451cac89781b577c7007794d9a6e80930823,2024-10-29T14:34:50.257000 +CVE-2024-42930,0,0,b548e9676bae466ea67c6eb53ec6451cac89781b577c7007794d9a6e80930823,2024-10-29T14:34:50.257000 CVE-2024-42934,0,0,5b485bf0fdf98b0bf0cffd2e2fdf9041db2ed703f1341f5eedd90fef284d1734,2024-10-10T12:51:56.987000 CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000 CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000 @@ -260395,13 +260397,13 @@ CVE-2024-43834,0,0,76e2d6369e7d6ad23c4c79e5f16adb028cca8d18769694b501fae11b3f998 CVE-2024-43835,0,0,a46066252489ca07ac33084bac581d7b6db1ff03c684ec702a7865c83c61bd6f,2024-09-12T12:15:48.653000 CVE-2024-43836,0,0,e20113b16d82c5c2e4bb122ce52a725f5444590d487c2fb8daa577de32ce154c,2024-08-22T15:43:26.303000 CVE-2024-43837,0,0,2029cea2c86194c36b6c131e1ea74e1961ace80d0c79989b0fb86fab2b65d1ae,2024-08-22T15:44:03.417000 -CVE-2024-43838,0,0,aea18ddc95b4597b8fcc9d42c5f12cf2294cab2381941209a829361028b9d783,2024-08-19T12:59:59.177000 +CVE-2024-43838,0,1,2480a954d968f3e267b20a4110dfe9f9920a54770c095c0be83be1f10105947b,2024-10-29T16:24:43.273000 CVE-2024-43839,0,0,8837353b52a881be05b25b7fd8ffdec6b5f99540c518bf74d996a0bee6721fa2,2024-08-19T12:59:59.177000 CVE-2024-4384,0,0,9e6f6b1cee0183a069a2a4eaff8415209b35f5a05fd8cbbb389885858a6f3133,2024-07-17T03:01:34.710000 -CVE-2024-43840,0,0,23c960f08c72e92672042c1b393c21288af5920aee8a16c3fbfc5fa814adb315,2024-08-19T12:59:59.177000 -CVE-2024-43841,0,0,e1a2c38a635a3f723bb13f01d4b145d0059affd305089e3a07adc4eba6ffd3eb,2024-08-19T12:59:59.177000 +CVE-2024-43840,0,1,e4dee48acba0e5711e0c8205d3b661f6b97f71218e390f4e82cb7dedbc331581,2024-10-29T16:25:29.913000 +CVE-2024-43841,0,1,bf8d4686e51a52f9db93a5ddb1bee22d70913c2b3675a4f4a06e184495fdf67a,2024-10-29T16:27:14.167000 CVE-2024-43842,0,0,79cd60e4a4023eb7c9a6d86176017ee449ccbc0688862836e1c280871c39de83,2024-09-30T13:55:17.007000 -CVE-2024-43843,0,0,a0131aafc1fe810a712c7a36d5efccca41cdcb3c562b11e8dec7755521d56b27,2024-08-19T12:59:59.177000 +CVE-2024-43843,0,1,545b772e9cf47fc9b674664ed9b444ec7d64feb9f3dd7cbec712c75fc0e49fff,2024-10-29T16:29:16.960000 CVE-2024-43844,0,0,f8e0e9c6309b78819993f04abd3f0fabe15d23e7d433454c8fc7a70ef34d9adc,2024-10-25T19:49:05.987000 CVE-2024-43845,0,0,caaa023c02e31720553b20117af210f2452fe00e9e2b31c2df183843a916f65c,2024-10-25T19:51:07.187000 CVE-2024-43846,0,0,f266cac61831a851876149b3774436f495d75f984b51eb837eba29752a3f1863,2024-10-25T19:52:01.380000 @@ -260649,11 +260651,11 @@ CVE-2024-44116,0,0,f539024555f2c30aff387b07786f96ec82aa197562db4318d2a4d0edb7b50 CVE-2024-44117,0,0,e1e7d2c07b8cb4271ea5948f1fafb7d04df2168a6fe40662a14c8cff93dd2ef2,2024-09-10T12:09:50.377000 CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 -CVE-2024-44122,0,1,1340f3ecd616551294893c5095ac9698cf86e08271dc9bf65a4c6024a5af8f09,2024-10-29T14:34:50.257000 -CVE-2024-44123,0,1,e1755eb06b144b6cfbd6699d6335d3e8b6cdb9c2aa5401ff7c6a1ed48732203a,2024-10-29T14:34:50.257000 +CVE-2024-44122,0,0,1340f3ecd616551294893c5095ac9698cf86e08271dc9bf65a4c6024a5af8f09,2024-10-29T14:34:50.257000 +CVE-2024-44123,0,0,e1755eb06b144b6cfbd6699d6335d3e8b6cdb9c2aa5401ff7c6a1ed48732203a,2024-10-29T14:34:50.257000 CVE-2024-44124,0,0,b949c056982f734366ebf1f4c4aa8cc757f083818be7d4fc7a8adedf42e1b398,2024-09-25T15:14:13.593000 CVE-2024-44125,0,0,2a52003a3bce56ec678ccb08ea5263fde16f13ab11416a9f08770bae07d00ea4,2024-09-25T13:30:11.570000 -CVE-2024-44126,0,1,90938a085a57c8cfb05cb5bb5b13e40f51df0d29110ab06b74c77b3df02fc0e9,2024-10-29T14:34:50.257000 +CVE-2024-44126,0,0,90938a085a57c8cfb05cb5bb5b13e40f51df0d29110ab06b74c77b3df02fc0e9,2024-10-29T14:34:50.257000 CVE-2024-44127,0,0,dd0c6b9721104380f6a5b85cab540e81cef5152e26883b5789fde70c5e555690,2024-09-20T12:31:20.110000 CVE-2024-44128,0,0,31555c43ca60d63549870b44df4840a93ce230d541458f545dde00e85aa241af,2024-09-25T13:29:42.343000 CVE-2024-44129,0,0,c8270bbae401ab1d5afde2ca2f0a32e9c92767e5f49c7b8de1d49243ede89f42,2024-09-25T13:28:21.447000 @@ -260664,11 +260666,11 @@ CVE-2024-44132,0,0,025bc39178c8aaeeedde19fa86578cab56517e73471c42ea3a47af8718cfd CVE-2024-44133,0,0,37c73fbc80b87f8103d86196f929aadb6f994b40eadcbf5f51a2a2f17f44fe6e,2024-09-24T18:24:44.733000 CVE-2024-44134,0,0,6acd0998d9e90144e37860d44f416ff49a5729889dc934ad2ba9b80a8196fb3c,2024-09-24T18:26:26.963000 CVE-2024-44135,0,0,2e30daeacd1c058db0b211917dd4f5e9ef4b14081fb1be4edc5057672e88cbd8,2024-09-25T13:28:09.067000 -CVE-2024-44137,0,1,79d8c21f444be873db08890a2861623fa980ff76aca5b482418334247708e8fe,2024-10-29T14:34:50.257000 +CVE-2024-44137,0,0,79d8c21f444be873db08890a2861623fa980ff76aca5b482418334247708e8fe,2024-10-29T14:34:50.257000 CVE-2024-44139,0,0,1e5a55dd4e3bf6761362df168af8ec5360faa5b360c06fdbf37c0f9ce70d7baf,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,57715e2d990f9d527737048c7f2d3ad8cfd6106560321ec000dbd72a512ea712,2024-10-25T12:56:07.750000 -CVE-2024-44144,0,1,c716c024cea4546575d5c46874888b6e9317a1b578a46335bd5629680a0b269c,2024-10-29T14:34:50.257000 -CVE-2024-44145,0,1,61196886e731f714891067a20c53eefb6667f07cb96b5fcd610eb0fa4c068181,2024-10-29T14:34:04.427000 +CVE-2024-44144,0,0,c716c024cea4546575d5c46874888b6e9317a1b578a46335bd5629680a0b269c,2024-10-29T14:34:50.257000 +CVE-2024-44145,0,0,61196886e731f714891067a20c53eefb6667f07cb96b5fcd610eb0fa4c068181,2024-10-29T14:34:04.427000 CVE-2024-44146,0,0,c66454fdf1b0d7a7564849f02f2f09da6c49b1097620ca2f5b88a9c465a751e4,2024-09-24T16:14:02.090000 CVE-2024-44147,0,0,8d82d5566ea29b70940c9c9f21d951cc6eb5498675d184ba22b8d555bbcad202,2024-09-20T12:31:20.110000 CVE-2024-44148,0,0,059ce4bebff22300cb485a8cc23c3238cb5bdcfaba9ac22cf4f5aea163483afa,2024-09-24T16:09:49.490000 @@ -260677,11 +260679,11 @@ CVE-2024-44151,0,0,54a719217bc8b8ee4e32503231faaae29cd72902e5e2fca3e1446643fb218 CVE-2024-44152,0,0,b3dfe3e6aad4927c4120819b90ad93e4589e439a4acd3f9652fbd2503123fc62,2024-09-24T15:55:06.100000 CVE-2024-44153,0,0,b4cd2fe3eed07a503bba11676bf795575e23a0692dcefb729ec0053f448cf187,2024-09-24T16:19:32.593000 CVE-2024-44154,0,0,52420e716bdaf0c7fece3d5feef7b52e02f0f1fb32372b8f2d13dde79a13206d,2024-09-24T16:16:39.947000 -CVE-2024-44155,0,1,666f08a4095b9d1c3f09991e8f388be769c689973d6ac2d0e961fcf952e9a9b6,2024-10-29T14:34:50.257000 -CVE-2024-44156,0,1,9f35e2868655885b1503d4332ff3a4cdc9357da07044a4d25396a3baa5f3decb,2024-10-29T14:34:50.257000 +CVE-2024-44155,0,0,666f08a4095b9d1c3f09991e8f388be769c689973d6ac2d0e961fcf952e9a9b6,2024-10-29T14:34:50.257000 +CVE-2024-44156,0,0,9f35e2868655885b1503d4332ff3a4cdc9357da07044a4d25396a3baa5f3decb,2024-10-29T14:34:50.257000 CVE-2024-44157,0,0,97a910630a3e98feb305f0a101a5c0c80098e87c8c858ed1c75250af3ffe7b5f,2024-10-27T02:35:03.400000 CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000 -CVE-2024-44159,0,1,961c4250cb7c3a2d662931ad9064a8a8cfcd8fa14ac4e1e987158bf2e3a0a46d,2024-10-29T14:34:50.257000 +CVE-2024-44159,0,0,961c4250cb7c3a2d662931ad9064a8a8cfcd8fa14ac4e1e987158bf2e3a0a46d,2024-10-29T14:34:50.257000 CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000 CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000 CVE-2024-44162,0,0,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000 @@ -260695,8 +260697,8 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 CVE-2024-44170,0,0,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000 -CVE-2024-44174,0,1,0223165b1cbe06673786506076d3de8e8eb0dad3d24b6ddf78b08de38f2de840,2024-10-29T14:34:50.257000 -CVE-2024-44175,0,1,0805e9680cd4598d38e2619ed87e7fe43d1a4e74e8e872e4630253007f322a07,2024-10-29T14:34:50.257000 +CVE-2024-44174,0,0,0223165b1cbe06673786506076d3de8e8eb0dad3d24b6ddf78b08de38f2de840,2024-10-29T14:34:50.257000 +CVE-2024-44175,0,0,0805e9680cd4598d38e2619ed87e7fe43d1a4e74e8e872e4630253007f322a07,2024-10-29T14:34:50.257000 CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000 @@ -260706,7 +260708,7 @@ CVE-2024-44181,0,0,6968e89bcc34da95b275f481a5e61eaf93b419f4e1f0ac49b3eaa4255a65d CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988b16,2024-09-24T16:52:49.767000 CVE-2024-44183,0,0,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000 CVE-2024-44184,0,0,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000 -CVE-2024-44185,0,0,b0c76e47df58347d88a892dfb664184118ae2a25a70c8397a93c48227ba7199c,2024-10-25T12:56:07.750000 +CVE-2024-44185,0,1,8473ea59582fac16714f99db767193dfeb6d727db3a0eec56d667af7073d7402,2024-10-29T15:22:45.677000 CVE-2024-44186,0,0,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000 CVE-2024-44187,0,0,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000 CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136ffb2,2024-09-24T20:38:27.090000 @@ -260715,80 +260717,80 @@ CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c281 CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000 CVE-2024-44193,0,0,f17ea6ad74232cbfafb0dc23bcf4b401977d8786ab1d3a877fc57ebc775c3168,2024-10-04T13:50:43.727000 -CVE-2024-44194,0,1,a903dcdde1fd9d3163ec05258db0160ebd2ed91097df8b113a89edcdc22938c4,2024-10-29T14:34:50.257000 -CVE-2024-44196,0,1,b08bc757892408337b10d6ec5d606c09363a1579be4fa3f75b1eb90bab9bb059,2024-10-29T14:34:50.257000 -CVE-2024-44197,0,1,e38e0235fcf85579dbe16d1dc7df7b31f0e5ecba2c502c313f48d42f4d4e4171,2024-10-29T14:34:50.257000 +CVE-2024-44194,0,0,a903dcdde1fd9d3163ec05258db0160ebd2ed91097df8b113a89edcdc22938c4,2024-10-29T14:34:50.257000 +CVE-2024-44196,0,0,b08bc757892408337b10d6ec5d606c09363a1579be4fa3f75b1eb90bab9bb059,2024-10-29T14:34:50.257000 +CVE-2024-44197,0,0,e38e0235fcf85579dbe16d1dc7df7b31f0e5ecba2c502c313f48d42f4d4e4171,2024-10-29T14:34:50.257000 CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000 CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000 CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000 -CVE-2024-44203,0,1,fe3ae1b04117351d872ca462cd193c59f091d3699ff66923561d7699fb5cc5d4,2024-10-29T14:34:50.257000 +CVE-2024-44203,0,0,fe3ae1b04117351d872ca462cd193c59f091d3699ff66923561d7699fb5cc5d4,2024-10-29T14:34:50.257000 CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000 -CVE-2024-44205,0,0,59fd42a513f8b9b05510dc4d5cd2410ebf696fddc2b7f785062aa10ccb8441c9,2024-10-25T12:56:07.750000 -CVE-2024-44206,0,0,6d32fe777ad4ad629602e838e02c2bf263ced12e49e4f955b73bb10ec754db34,2024-10-25T12:56:07.750000 +CVE-2024-44205,0,1,e33dfb139154886257e161081c01cc4f82c900563ff347637d97391b0de316f3,2024-10-29T15:27:08.630000 +CVE-2024-44206,0,1,0dee03077037b5bedfd5810735cd4c9d1f4f0ec504b17081ef96258683a63d8b,2024-10-29T15:31:02.493000 CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000 -CVE-2024-44208,0,1,d9c90ab83e9966704661dc1dbbaf16880493e16688d4cb3e4d97fb1b40b33aaf,2024-10-29T14:34:50.257000 -CVE-2024-44213,0,1,8f3af05cc28637515ddd7c72b05e054e2da62bf3199c29442c79bb3fd6a47a3a,2024-10-29T14:34:50.257000 -CVE-2024-44215,0,1,857f244c4b6f0129b65da808880593dd1da0efe0b6a97e93140557ee3b01e4f9,2024-10-29T14:34:50.257000 -CVE-2024-44216,0,1,8a22d717307edd2963aefe79220e9b12f1b5e7d0db9f246878930d2be4e96b9d,2024-10-29T14:34:04.427000 -CVE-2024-44217,0,1,8b60f51ef8644c438039e06b8992ee66edeebbbd14221559db35349bd3ce234e,2024-10-29T14:34:04.427000 -CVE-2024-44218,0,1,5e78ad3891c577ae40b5b1c743613204fd22830c4fb22669ad5665bd144df815,2024-10-29T14:34:50.257000 +CVE-2024-44208,0,0,d9c90ab83e9966704661dc1dbbaf16880493e16688d4cb3e4d97fb1b40b33aaf,2024-10-29T14:34:50.257000 +CVE-2024-44213,0,0,8f3af05cc28637515ddd7c72b05e054e2da62bf3199c29442c79bb3fd6a47a3a,2024-10-29T14:34:50.257000 +CVE-2024-44215,0,0,857f244c4b6f0129b65da808880593dd1da0efe0b6a97e93140557ee3b01e4f9,2024-10-29T14:34:50.257000 +CVE-2024-44216,0,0,8a22d717307edd2963aefe79220e9b12f1b5e7d0db9f246878930d2be4e96b9d,2024-10-29T14:34:04.427000 +CVE-2024-44217,0,0,8b60f51ef8644c438039e06b8992ee66edeebbbd14221559db35349bd3ce234e,2024-10-29T14:34:04.427000 +CVE-2024-44218,0,0,5e78ad3891c577ae40b5b1c743613204fd22830c4fb22669ad5665bd144df815,2024-10-29T14:34:50.257000 CVE-2024-4422,0,0,19c238465441950f6a856008185dbc8a7b4e94407f1040ce4816040c86860490,2024-05-30T13:15:41.297000 -CVE-2024-44222,0,1,430e43230c18cb76b0c6a5776e43d6984589993d5e4e16522b5e6f96310d424e,2024-10-29T14:34:50.257000 -CVE-2024-44228,0,1,b4ec0c286c90b7d110826c3e3050b88cf72adf886ea6358e084ef440fad91f6c,2024-10-29T14:34:50.257000 -CVE-2024-44229,0,1,0d821d59fa68c4f6699d76b52e3fa7165222d86e16164a61bb15f4854a8f65fe,2024-10-29T14:34:50.257000 +CVE-2024-44222,0,0,430e43230c18cb76b0c6a5776e43d6984589993d5e4e16522b5e6f96310d424e,2024-10-29T14:34:50.257000 +CVE-2024-44228,0,0,b4ec0c286c90b7d110826c3e3050b88cf72adf886ea6358e084ef440fad91f6c,2024-10-29T14:34:50.257000 +CVE-2024-44229,0,0,0d821d59fa68c4f6699d76b52e3fa7165222d86e16164a61bb15f4854a8f65fe,2024-10-29T14:34:50.257000 CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 -CVE-2024-44235,0,1,286733f8c5a68de9c8fb971876ae84b3c9daf32f559dc19006287da0e5f6f126,2024-10-29T14:34:50.257000 -CVE-2024-44236,0,1,63dc023055d62715d02d7757545e9c305c5de9f2e48481980e7aa98b7bee53e9,2024-10-29T14:34:50.257000 -CVE-2024-44237,0,1,67841c059fe7a0535a392295730ef15e50508d709ee3c5904a837cd50e2c0c32,2024-10-29T14:34:04.427000 -CVE-2024-44239,0,1,6572c4bd50e97c915779c9681dec90ff254e0ffa6df2363add5efde003d61b9f,2024-10-29T14:34:50.257000 +CVE-2024-44235,0,0,286733f8c5a68de9c8fb971876ae84b3c9daf32f559dc19006287da0e5f6f126,2024-10-29T14:34:50.257000 +CVE-2024-44236,0,0,63dc023055d62715d02d7757545e9c305c5de9f2e48481980e7aa98b7bee53e9,2024-10-29T14:34:50.257000 +CVE-2024-44237,0,0,67841c059fe7a0535a392295730ef15e50508d709ee3c5904a837cd50e2c0c32,2024-10-29T14:34:04.427000 +CVE-2024-44239,0,0,6572c4bd50e97c915779c9681dec90ff254e0ffa6df2363add5efde003d61b9f,2024-10-29T14:34:50.257000 CVE-2024-4424,0,0,f0ec85c26b242f03f1dda01796c703344a9d3cb93681b5b37fa83e955b9558c1,2024-05-14T16:11:39.510000 -CVE-2024-44240,0,1,185e7fe99a086851f3813e2fc4dba328997e038ef58b8ffee754df543f88d5e3,2024-10-29T14:34:04.427000 -CVE-2024-44244,0,1,30aeed51fbbfd226df0eec4456cf731bd27b2cd7c71970d76a2ba0b7d174b801,2024-10-29T14:34:04.427000 -CVE-2024-44247,0,1,d7b92efdaa300dd98e4987c2d8849c05e732d8243dade9113cd309b9e95e3b2f,2024-10-29T14:34:04.427000 +CVE-2024-44240,0,0,185e7fe99a086851f3813e2fc4dba328997e038ef58b8ffee754df543f88d5e3,2024-10-29T14:34:04.427000 +CVE-2024-44244,0,0,30aeed51fbbfd226df0eec4456cf731bd27b2cd7c71970d76a2ba0b7d174b801,2024-10-29T14:34:04.427000 +CVE-2024-44247,0,0,d7b92efdaa300dd98e4987c2d8849c05e732d8243dade9113cd309b9e95e3b2f,2024-10-29T14:34:04.427000 CVE-2024-4425,0,0,42da9fd06b4c286cf2ec4b279ef4c006e94043f167bd5abbfb6b02300a24e0e6,2024-07-03T02:07:33.267000 -CVE-2024-44251,0,1,406183b990c31e8b289d3648e898b17ee3f61e9384718d2bc8b02eb22ceb576d,2024-10-29T14:34:04.427000 -CVE-2024-44252,0,1,1f56156c1b3504c9e6ce29efa3aa1850aadb21fc5cc83f9d279e387e16772ccd,2024-10-29T14:34:04.427000 -CVE-2024-44253,0,1,9dfc45ca17e6731fbad34191bc8c6dd082b2ad98644cfc4500dc83643e48425f,2024-10-29T14:34:04.427000 -CVE-2024-44254,0,1,9ffc01c4a01fb0cf2dfa1b937b902fdcdac883a07b08df9e5c9982b891104dde,2024-10-29T14:34:04.427000 -CVE-2024-44255,0,1,c293b56d90061943fca03b3c22094ae16c5cc4b9fe38c830f913fdf59fc5c0ed,2024-10-29T14:34:04.427000 -CVE-2024-44256,0,1,98d942d6a9d59f1af584e5bd1bc5f9388bafd2b33f312fa8187b69e94e48ace6,2024-10-29T14:34:04.427000 -CVE-2024-44257,0,1,6bba3e0f67307ea0c3e8120f777b72620e4f81e0e2ecd0184d7952182961a617,2024-10-29T14:34:04.427000 -CVE-2024-44258,0,1,cc430542de7d98821c8b71a980b44111ab28852dadd6ee720ceb482eaccacf5c,2024-10-29T14:34:04.427000 -CVE-2024-44259,0,1,b33d61ba14321cd629b5384b5755a71fd96b24fb8d98530def81d7b250119a8e,2024-10-29T14:34:04.427000 +CVE-2024-44251,0,0,406183b990c31e8b289d3648e898b17ee3f61e9384718d2bc8b02eb22ceb576d,2024-10-29T14:34:04.427000 +CVE-2024-44252,0,0,1f56156c1b3504c9e6ce29efa3aa1850aadb21fc5cc83f9d279e387e16772ccd,2024-10-29T14:34:04.427000 +CVE-2024-44253,0,0,9dfc45ca17e6731fbad34191bc8c6dd082b2ad98644cfc4500dc83643e48425f,2024-10-29T14:34:04.427000 +CVE-2024-44254,0,0,9ffc01c4a01fb0cf2dfa1b937b902fdcdac883a07b08df9e5c9982b891104dde,2024-10-29T14:34:04.427000 +CVE-2024-44255,0,0,c293b56d90061943fca03b3c22094ae16c5cc4b9fe38c830f913fdf59fc5c0ed,2024-10-29T14:34:04.427000 +CVE-2024-44256,0,0,98d942d6a9d59f1af584e5bd1bc5f9388bafd2b33f312fa8187b69e94e48ace6,2024-10-29T14:34:04.427000 +CVE-2024-44257,0,0,6bba3e0f67307ea0c3e8120f777b72620e4f81e0e2ecd0184d7952182961a617,2024-10-29T14:34:04.427000 +CVE-2024-44258,0,0,cc430542de7d98821c8b71a980b44111ab28852dadd6ee720ceb482eaccacf5c,2024-10-29T14:34:04.427000 +CVE-2024-44259,0,0,b33d61ba14321cd629b5384b5755a71fd96b24fb8d98530def81d7b250119a8e,2024-10-29T14:34:04.427000 CVE-2024-4426,0,0,438c7e77bba5537169c045ba2dc210873849174945e68052d5a8bbbd94b93b11,2024-05-30T13:15:41.297000 -CVE-2024-44260,0,1,52cd827ed188e2ba87c94f3763c13e0c3db6d730465a38e348b9fbbbcf519ef7,2024-10-29T14:34:04.427000 -CVE-2024-44261,0,1,22fd5a823bbc562d733fa25b554334b6c66a67b7c9a20626885d5951caa0d590,2024-10-29T14:34:04.427000 -CVE-2024-44262,0,1,1e84b5b5e920ae0a5d39bb092052fca1937f3b656c20347fc26958279d3169e6,2024-10-29T14:34:04.427000 -CVE-2024-44263,0,1,136e35ae5da9571910fb8139bfedb30afe70554d37ea2b002ad552501aa73d5b,2024-10-29T14:34:04.427000 -CVE-2024-44264,0,1,373b827613c9a9c7f3a770e81e0fe9608c0c7e87e15a1473f6a79c0a693604a6,2024-10-29T14:34:04.427000 -CVE-2024-44265,0,1,15fd2e5ab0bd9692c8b85fcbfa245a300e35e9c55661f38c9ca204f7cedba610,2024-10-29T14:34:04.427000 -CVE-2024-44267,0,1,f5c2dfd9358b1edbc0f2868c6f458bbbeb2bb0f961b2dba9781285f6322034e4,2024-10-29T14:34:04.427000 -CVE-2024-44269,0,1,1c9a87340d5e4e82f40555347c8caadf6fa5b6f66b0f5a9614db97e3a7ef4b37,2024-10-29T14:34:04.427000 +CVE-2024-44260,0,0,52cd827ed188e2ba87c94f3763c13e0c3db6d730465a38e348b9fbbbcf519ef7,2024-10-29T14:34:04.427000 +CVE-2024-44261,0,0,22fd5a823bbc562d733fa25b554334b6c66a67b7c9a20626885d5951caa0d590,2024-10-29T14:34:04.427000 +CVE-2024-44262,0,0,1e84b5b5e920ae0a5d39bb092052fca1937f3b656c20347fc26958279d3169e6,2024-10-29T14:34:04.427000 +CVE-2024-44263,0,0,136e35ae5da9571910fb8139bfedb30afe70554d37ea2b002ad552501aa73d5b,2024-10-29T14:34:04.427000 +CVE-2024-44264,0,0,373b827613c9a9c7f3a770e81e0fe9608c0c7e87e15a1473f6a79c0a693604a6,2024-10-29T14:34:04.427000 +CVE-2024-44265,0,0,15fd2e5ab0bd9692c8b85fcbfa245a300e35e9c55661f38c9ca204f7cedba610,2024-10-29T14:34:04.427000 +CVE-2024-44267,0,0,f5c2dfd9358b1edbc0f2868c6f458bbbeb2bb0f961b2dba9781285f6322034e4,2024-10-29T14:34:04.427000 +CVE-2024-44269,0,0,1c9a87340d5e4e82f40555347c8caadf6fa5b6f66b0f5a9614db97e3a7ef4b37,2024-10-29T14:34:04.427000 CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666b0,2024-05-30T13:15:41.297000 -CVE-2024-44270,0,1,fa1da7541e315914d13db03404f7944f7fff55d48c82c634d2d8fa5d00e47e2f,2024-10-29T14:34:04.427000 -CVE-2024-44273,0,1,11a628ab450ae1f43cfd6e9012e9c8730804b871d63d3b05a279a1370eed85aa,2024-10-29T14:34:04.427000 -CVE-2024-44274,0,1,7042f1a17d79ad7857d5d12b1176335958b275fae27c4e0945876e2b01ab9aec,2024-10-29T14:34:04.427000 -CVE-2024-44275,0,1,77f960a6c909a3fb64168321393f7fb91df2928e5a403ea1281205d85c48e809,2024-10-29T14:34:04.427000 -CVE-2024-44277,0,1,fe261596084ebbb2024c9ef906f0ef31586c9b779d9ed86fafd7c7620d98c2d1,2024-10-29T14:34:04.427000 -CVE-2024-44278,0,1,45d301e85733876f61356281523db1b97bd7d9239c67f80b5edc2a6444ad1fc3,2024-10-29T14:34:04.427000 -CVE-2024-44279,0,1,3d3d2782cf38cfbab9143a09adbd7eeae67209432aad5b737f58221076c4a8cf,2024-10-29T14:34:04.427000 +CVE-2024-44270,0,0,fa1da7541e315914d13db03404f7944f7fff55d48c82c634d2d8fa5d00e47e2f,2024-10-29T14:34:04.427000 +CVE-2024-44273,0,0,11a628ab450ae1f43cfd6e9012e9c8730804b871d63d3b05a279a1370eed85aa,2024-10-29T14:34:04.427000 +CVE-2024-44274,0,0,7042f1a17d79ad7857d5d12b1176335958b275fae27c4e0945876e2b01ab9aec,2024-10-29T14:34:04.427000 +CVE-2024-44275,0,0,77f960a6c909a3fb64168321393f7fb91df2928e5a403ea1281205d85c48e809,2024-10-29T14:34:04.427000 +CVE-2024-44277,0,0,fe261596084ebbb2024c9ef906f0ef31586c9b779d9ed86fafd7c7620d98c2d1,2024-10-29T14:34:04.427000 +CVE-2024-44278,0,0,45d301e85733876f61356281523db1b97bd7d9239c67f80b5edc2a6444ad1fc3,2024-10-29T14:34:04.427000 +CVE-2024-44279,0,0,3d3d2782cf38cfbab9143a09adbd7eeae67209432aad5b737f58221076c4a8cf,2024-10-29T14:34:04.427000 CVE-2024-4428,0,0,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000 -CVE-2024-44280,0,1,21de8a35b7363cadebf78d71c9679cbfa65e9991e7a3abe607be7008a71fbb5f,2024-10-29T14:34:04.427000 -CVE-2024-44281,0,1,836ebb72fd4fec7a9d20e240194eb06c62bd346b60d324b256da0dcc1d64341f,2024-10-29T14:34:04.427000 -CVE-2024-44282,0,1,2ce9add6bca6a5fb5f9e2a9927b9d377072eb7ea4d31e698829cc2ba8842de38,2024-10-29T14:34:04.427000 -CVE-2024-44283,0,1,a423cd05f62df911ca6ddacbb8c38c7df53f15d86abee9d91d2471a48967b603,2024-10-29T14:34:04.427000 -CVE-2024-44284,0,1,c76de62ca97b26366f3caef3b2ac2c50f1359a184662302dbdc75806232b62e6,2024-10-29T14:34:04.427000 -CVE-2024-44285,0,1,b656a197156ce3f639f54c5926d64ea036ead860c09dc50b8dcfb70113581d04,2024-10-29T14:34:04.427000 -CVE-2024-44287,0,1,4b2b7e8101daf580110e865664d09e9b8e738d0759f08414f92a6a6cfd3889a2,2024-10-29T14:34:04.427000 -CVE-2024-44289,0,1,17ea3e31cbf229ba697914c0bb3a6428c768ba70e730ea12af09c5d0c2b9e013,2024-10-29T14:34:04.427000 +CVE-2024-44280,0,0,21de8a35b7363cadebf78d71c9679cbfa65e9991e7a3abe607be7008a71fbb5f,2024-10-29T14:34:04.427000 +CVE-2024-44281,0,0,836ebb72fd4fec7a9d20e240194eb06c62bd346b60d324b256da0dcc1d64341f,2024-10-29T14:34:04.427000 +CVE-2024-44282,0,0,2ce9add6bca6a5fb5f9e2a9927b9d377072eb7ea4d31e698829cc2ba8842de38,2024-10-29T14:34:04.427000 +CVE-2024-44283,0,0,a423cd05f62df911ca6ddacbb8c38c7df53f15d86abee9d91d2471a48967b603,2024-10-29T14:34:04.427000 +CVE-2024-44284,0,0,c76de62ca97b26366f3caef3b2ac2c50f1359a184662302dbdc75806232b62e6,2024-10-29T14:34:04.427000 +CVE-2024-44285,0,0,b656a197156ce3f639f54c5926d64ea036ead860c09dc50b8dcfb70113581d04,2024-10-29T14:34:04.427000 +CVE-2024-44287,0,0,4b2b7e8101daf580110e865664d09e9b8e738d0759f08414f92a6a6cfd3889a2,2024-10-29T14:34:04.427000 +CVE-2024-44289,0,0,17ea3e31cbf229ba697914c0bb3a6428c768ba70e730ea12af09c5d0c2b9e013,2024-10-29T14:34:04.427000 CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000 -CVE-2024-44294,0,1,fa812b7e03fe790d73b0aac952d1f53f6ad4492b6a56aeea2457ae94b001b0b6,2024-10-29T14:34:04.427000 -CVE-2024-44295,0,1,e21fb01feb4b35c66953337c3e4ea909631ed01420e1b8c957b47fb33e8b6e42,2024-10-29T14:34:04.427000 -CVE-2024-44296,0,1,8eae18df893df94f7a0550282d74d94b11ab475bc0e7df7b22fda27831ec706c,2024-10-29T14:34:04.427000 -CVE-2024-44297,0,1,5340f0bfd5196685137d920973c09b0e792fd4738c99aad86b1c7ddfacfd18ec,2024-10-29T14:34:04.427000 +CVE-2024-44294,0,0,fa812b7e03fe790d73b0aac952d1f53f6ad4492b6a56aeea2457ae94b001b0b6,2024-10-29T14:34:04.427000 +CVE-2024-44295,0,0,e21fb01feb4b35c66953337c3e4ea909631ed01420e1b8c957b47fb33e8b6e42,2024-10-29T14:34:04.427000 +CVE-2024-44296,0,0,8eae18df893df94f7a0550282d74d94b11ab475bc0e7df7b22fda27831ec706c,2024-10-29T14:34:04.427000 +CVE-2024-44297,0,0,5340f0bfd5196685137d920973c09b0e792fd4738c99aad86b1c7ddfacfd18ec,2024-10-29T14:34:04.427000 CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000 -CVE-2024-44301,0,1,1947d3abeb8f3c617a953d82aff9239aa51a781f132c513eb9bd113e9e3104ce,2024-10-29T14:34:04.427000 -CVE-2024-44302,0,1,135dd022b19581dad4cc89a6e95bc2764f06cd4002b60ed18a51aacb9b5fcb7d,2024-10-29T14:34:04.427000 +CVE-2024-44301,0,0,1947d3abeb8f3c617a953d82aff9239aa51a781f132c513eb9bd113e9e3104ce,2024-10-29T14:34:04.427000 +CVE-2024-44302,0,0,135dd022b19581dad4cc89a6e95bc2764f06cd4002b60ed18a51aacb9b5fcb7d,2024-10-29T14:34:04.427000 CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000 CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 @@ -260879,7 +260881,7 @@ CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000 CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc1915,2024-09-20T13:15:19.850000 CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000 -CVE-2024-44667,0,0,67bc66d5934efb1ec507a459f00d72755f90d65f712e9b4a25f261f89a211afc,2024-09-10T20:35:11.007000 +CVE-2024-44667,0,1,e43a813befca048ea5f49bd98c811f22bdfab3b63e771950591cc913fc9d6486,2024-10-29T16:35:13.953000 CVE-2024-4467,0,0,57c2229fa6c3e84bff363dc59d2c80befb785107da1c6be3c514b7e8bc55ed5c,2024-09-13T22:15:02.260000 CVE-2024-44674,0,0,78532ab5feb22da158d1ca77bfa4a9481318fd90b7728fb7942741a2fe56392d,2024-10-10T12:57:21.987000 CVE-2024-44676,0,0,b0f0617031a60967a8b797cadadb8c5f870cf4ed39d40d10e892a55bec1fea8b,2024-09-25T19:20:25.073000 @@ -261422,7 +261424,7 @@ CVE-2024-45473,0,0,865aa159e69490a974a9134607670a0c10ee3f357ea596017add2302228a8 CVE-2024-45474,0,0,0077a4784ce6e6c47b98449e48d902bd7a576357740b2f012aa0621077fe9ec1,2024-10-15T17:31:54.730000 CVE-2024-45475,0,0,ceca83f140e5142ec9e788bac45b6a2b3e6a9f421935b40e9d1d34e5a20ee9c9,2024-10-15T17:31:52.313000 CVE-2024-45476,0,0,caca7fe790f916474a7ca41537f465a0ddfe22def297e5b30824f70c2c729b14,2024-10-15T17:31:50.310000 -CVE-2024-45477,0,1,aa55128afa07e2ec27cbce9484fb81a6e1f19ece5efbf84e973d00438f6220ed,2024-10-29T14:34:04.427000 +CVE-2024-45477,0,0,aa55128afa07e2ec27cbce9484fb81a6e1f19ece5efbf84e973d00438f6220ed,2024-10-29T14:34:04.427000 CVE-2024-4548,0,0,c312b0154ade9cb7e93b29cf6468875ea09abcdae811bc20c1f6b28cb1f08ef2,2024-05-06T16:00:59.253000 CVE-2024-45488,0,0,02812af338aadc4a80122f84f222d800d57fc191e3e2ef216830d55dc271ef45,2024-08-30T19:35:06.870000 CVE-2024-45489,0,0,6ea1c310f6732949eac7ded3c08e0687f1be76a01c2bdfe6c41533999acd86e8,2024-09-26T13:32:55.343000 @@ -261492,7 +261494,7 @@ CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44 CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000 CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000 -CVE-2024-45656,0,1,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8cf5,2024-10-29T14:34:04.427000 +CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8cf5,2024-10-29T14:34:04.427000 CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 @@ -261565,7 +261567,7 @@ CVE-2024-45799,0,0,57236f37d51cb52dc4abff4e8ae9968f58089f5668de4fddcdb24ddcded04 CVE-2024-4580,0,0,f99138bfd0684bd0d747f9e33cce7b8336876269ba637f66c2865bb254a7b704,2024-05-16T13:03:05.353000 CVE-2024-45800,0,0,e84cff012b7d4b74db66a83e7b935dc1edfec9ef774b30490760e7407aa53849,2024-09-20T12:31:20.110000 CVE-2024-45801,0,0,4f22389c9c4d2fd289d85319452f0dd4a424809e7db0e4cdef14a74db91bd025,2024-09-20T12:31:20.110000 -CVE-2024-45802,0,1,c052cc984d83b3c466685649bceabfc2d5154b3dcc0e3066983d946a070e58ab,2024-10-29T14:34:50.257000 +CVE-2024-45802,0,0,c052cc984d83b3c466685649bceabfc2d5154b3dcc0e3066983d946a070e58ab,2024-10-29T14:34:50.257000 CVE-2024-45803,0,0,a103e4b6ec153497af7929b1abcca6c81c3d6f7a709474f445551e656cc860a0,2024-10-07T17:05:16.440000 CVE-2024-45804,0,0,9c3150fd449f47d5e8da1aa073c6ed29687a211817f4370f22049a4ad2a93841,2024-09-17T18:15:05.110000 CVE-2024-45806,0,0,1ea4fb4c712bb48146dcc90039539097532217007de9e1bf4affe475258a028d,2024-10-15T16:03:44.943000 @@ -262101,7 +262103,7 @@ CVE-2024-46869,0,0,9ed81572871432f968131373b48d9116fc414e30c1ec7495d6906513924c2 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 CVE-2024-46870,0,0,652ca601a7652d849ccf9f3fa227a6384ea9072535f4139d45e923bcd7c9f15f,2024-10-23T14:26:28.690000 CVE-2024-46871,0,0,4bbafc222a5b983e7eee48edc0ec35209cfa7a3a04fb16a3dfef1b1e5b5df95d,2024-10-23T16:10:48.077000 -CVE-2024-46872,0,1,b3c1445c6544e844aa85eceda3b1dbb6578b4c4e7e3957479208ade9105061c7,2024-10-29T14:34:04.427000 +CVE-2024-46872,0,0,b3c1445c6544e844aa85eceda3b1dbb6578b4c4e7e3957479208ade9105061c7,2024-10-29T14:34:04.427000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 @@ -262209,7 +262211,7 @@ CVE-2024-47063,0,0,ef8c248d98e47bb74e839363585e029685cdee789de6732fef6e4d24b3b66 CVE-2024-47064,0,0,21420490a45b8aaefdc1b6d4bd2c7e4a0799d2dee64a3d505838007bd45e04be,2024-10-04T13:51:25.567000 CVE-2024-47066,0,0,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000 CVE-2024-47067,0,0,11c88cd23cf1a822b362b5c4da6e6e5aad4cf4ba8be6cf32fd08cc0b90e2e962,2024-10-04T13:51:25.567000 -CVE-2024-47068,0,0,70050872d840caaa2d3a7b4935edacfa0f683641a39a86ef80c1feff7746bbfc,2024-09-30T17:39:45.350000 +CVE-2024-47068,0,1,264a648ddebf754f99098ce6835c5c225a8b5d43bf206a3d80cb7c7fc0e3a5d3,2024-10-29T16:15:05.583000 CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000 CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000 @@ -262420,7 +262422,7 @@ CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000 CVE-2024-4740,0,0,439bcc64d74362dfc2e1f6f7e2fb88748e7e0a568332807fb055a46f95bae835,2024-10-18T15:13:42.123000 -CVE-2024-47401,0,1,8a5e86c64c6250f94cf1f6a4606f4c5ff007b348a25f8869f6f018d7119e028e,2024-10-29T14:34:04.427000 +CVE-2024-47401,0,0,8a5e86c64c6250f94cf1f6a4606f4c5ff007b348a25f8869f6f018d7119e028e,2024-10-29T14:34:04.427000 CVE-2024-47406,0,0,e1bbc16ab2610d9234ce1d6efcd9c6b88f75df26ec8f2e71694220745ef52ef1,2024-10-25T12:56:07.750000 CVE-2024-47410,0,0,42b59896d371aa29c83e01a1ce08752b8288a889a8db3630a5c6ba7966f3731c,2024-10-10T18:26:44.857000 CVE-2024-47411,0,0,5875ac529772763bf76adfec6337ced119d16dc7bedac06df0488c853721b19e,2024-10-10T18:26:54.153000 @@ -262449,7 +262451,7 @@ CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190 CVE-2024-47481,0,0,c62f751f5883956274ffbb7fb20d002a8639b328715d32e48ced4180b14f0e12,2024-10-25T12:56:07.750000 CVE-2024-47483,0,0,0f4b7569df71b2649716d0de895970912d67c410a2793dbed81cec8c0843ce79,2024-10-25T12:56:07.750000 CVE-2024-47485,0,0,70c31bc26651c666f1f81bb314c02989bd53a835a51d6fdce38b5fab47a41c05,2024-10-22T16:23:22.890000 -CVE-2024-47486,0,0,d0e2cdb063c29469a8d3896035823ed37b083b056a6c7ff12d1a7f59bad20ea5,2024-10-22T16:11:07.547000 +CVE-2024-47486,0,1,43958a0e891d7258e97449cddb5a6fc0daab4c3d3966c24c551afbcbc8a15ca8,2024-10-29T15:35:31.557000 CVE-2024-47487,0,0,89e5f946b42ae69712fe53b468ea8b777288a7068d88dd6a3031473d76e487d6,2024-10-22T16:10:08.027000 CVE-2024-47489,0,0,b60e5447ef49080d8bcb541a004c5061338369ecebcb53ef8b0c02387b615511,2024-10-15T12:58:51.050000 CVE-2024-4749,0,0,21df5bc0093c94425462a6e59e75544f486b5326a781fcb494e0f25aa2f7ef93,2024-08-01T13:59:33.520000 @@ -262542,7 +262544,7 @@ CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986a CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 -CVE-2024-47640,1,1,95bb8b8fb9369a390ee388c1d4883a0589cc554d5729ec74ea199151c8e3b5c0,2024-10-29T14:34:04.427000 +CVE-2024-47640,0,0,95bb8b8fb9369a390ee388c1d4883a0589cc554d5729ec74ea199151c8e3b5c0,2024-10-29T14:34:04.427000 CVE-2024-47641,0,0,20121fa3c4c5a3e4a909974f90b64e2e442d0d40e7dbc52d4d9a68852218f553,2024-10-04T13:51:25.567000 CVE-2024-47642,0,0,e0dd8bf4e7cdbede3134dd86ccb7de1e590ba6182abfb8f96b44dafe6cbb1c08,2024-10-07T17:47:48.410000 CVE-2024-47643,0,0,8a3ec59bba07c503924b1001c49d13f876ea3327bd5600be5208638f48d0f661,2024-10-07T17:47:48.410000 @@ -262716,7 +262718,7 @@ CVE-2024-47823,0,0,aba6c10bf903d75799cabb92b24bf5cc826ec4b52223e2aab9a9f7d8d8298 CVE-2024-47824,0,0,60e3e0b82e04fc3016ce5ff7f0485ad8429207cb4be5065515079214bfa51129,2024-10-16T16:38:43.170000 CVE-2024-47825,0,0,e319259d9b937a2cf2775125b51ccc3a135e4cd0dcfdc35845c8f95f676fc6af,2024-10-23T15:13:25.583000 CVE-2024-47826,0,0,e0e92319bd7ff9f0b6142ef26fd12487604c5bd0a7b38d2c0ea52634274a8fe7,2024-10-15T12:57:46.880000 -CVE-2024-47827,0,1,7438babf7e62dcbf2f668453032f34317303c2ca726f8edc25487ba673dcf5fb,2024-10-29T14:34:50.257000 +CVE-2024-47827,0,0,7438babf7e62dcbf2f668453032f34317303c2ca726f8edc25487ba673dcf5fb,2024-10-29T14:34:50.257000 CVE-2024-47828,0,0,a6b81ff1073f19581e05e8c790863d706cba88272fb227df996495bf444dca26,2024-10-17T13:55:23.577000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 CVE-2024-47830,0,0,457ed410238dd49134235c9291fcb215f555d7bf33b38d5e70e7cf82b4377f0f,2024-10-15T12:58:51.050000 @@ -262754,7 +262756,7 @@ CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2 CVE-2024-47880,0,0,2aa03bc0f7d4d0c41d7c5b5270f0ebbd14a95aa63bdaf3ae3d1fe08d4da240e2,2024-10-25T12:56:07.750000 CVE-2024-47881,0,0,0ca7d0c4ea2ef98dc6fa44b67e25e5f8500f3dd12648b54a5ed0735593ea5d45,2024-10-28T14:14:02.157000 CVE-2024-47882,0,0,4b03398d595b6f930af95937fe2262f7f6cefa2a162c2aed1edc416b90ac1433,2024-10-28T14:26:11.707000 -CVE-2024-47883,0,0,1c1d6fec8df9eb0b860cf214b7833343df9c062f4d8dfc6161c5f58daedc8ebd,2024-10-25T12:56:07.750000 +CVE-2024-47883,0,1,83a589cc0dbabc4ecea54b79d6959561de3acb3cdc41dd039a81f860b3c45f3b,2024-10-29T15:38:11.573000 CVE-2024-47884,0,0,4b7292fdbf8233f599cca6380416fda96798ff386a0442d2b37eeea12dd398ed,2024-10-15T12:57:46.880000 CVE-2024-47885,0,0,0d40ba494c86913544c4c9553c55befe8904b360cb2214c55ae6a6aeadb78d12,2024-10-15T12:57:46.880000 CVE-2024-47887,0,0,a738abaa50c0f4cc119f2ab1db4d555ac635e57265d1892adcc800cfdded0011,2024-10-18T12:53:04.627000 @@ -262840,7 +262842,7 @@ CVE-2024-48074,0,0,9f8e87819b4cbd70b424fc1b1beb1686903edc8cbc94afedd20cf2ce6d292 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 -CVE-2024-48107,0,1,b3b56031af4c83db1aa8c8b7592d603d12b933dd8dd7f5c4ea819744e41aed3a,2024-10-29T14:34:04.427000 +CVE-2024-48107,0,0,b3b56031af4c83db1aa8c8b7592d603d12b933dd8dd7f5c4ea819744e41aed3a,2024-10-29T14:34:04.427000 CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000 CVE-2024-48119,0,0,6022221da5fd10d70715948b01fe2f7f8a0f43256a22ac2ee84f2922fba50de7,2024-10-17T18:35:09.890000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 @@ -262860,15 +262862,15 @@ CVE-2024-48153,0,0,ed2a32bb2c14f00255ae97ac8d2c6b7371ced6a3b47f478082697408eb2ec CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000 CVE-2024-48168,0,0,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000 -CVE-2024-48177,0,1,5acd39b3771ea9ccd3637329c33f61cdb08ead2a4464b21a81ec1b448fad5613,2024-10-29T14:34:04.427000 -CVE-2024-48178,0,1,a5ac25bbc8787ba3cc9ebf81d8786aee148069ca8f15c68fbc88514fb8317fb1,2024-10-29T14:34:50.257000 +CVE-2024-48177,0,0,5acd39b3771ea9ccd3637329c33f61cdb08ead2a4464b21a81ec1b448fad5613,2024-10-29T14:34:04.427000 +CVE-2024-48178,0,0,a5ac25bbc8787ba3cc9ebf81d8786aee148069ca8f15c68fbc88514fb8317fb1,2024-10-29T14:34:50.257000 CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000 CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f40ed,2024-10-18T12:53:04.627000 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 -CVE-2024-48191,0,1,9ba7fcbb9576126d52a944517bc9b5d6157dc8b3575acddab54b0bd9380c7365,2024-10-29T14:34:50.257000 +CVE-2024-48191,0,0,9ba7fcbb9576126d52a944517bc9b5d6157dc8b3575acddab54b0bd9380c7365,2024-10-29T14:34:50.257000 CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000 -CVE-2024-48195,0,1,3054a51a5210b07d7faf145209b3abc8afc3e28d4e10bf6f8fe8cb40d2a3b462,2024-10-29T14:34:50.257000 -CVE-2024-48196,0,1,d2cd7ad27e7af883e5b6f39983b5e91f258998d179c5a9da881899be449dd56d,2024-10-29T14:34:50.257000 +CVE-2024-48195,0,0,3054a51a5210b07d7faf145209b3abc8afc3e28d4e10bf6f8fe8cb40d2a3b462,2024-10-29T14:34:50.257000 +CVE-2024-48196,0,0,d2cd7ad27e7af883e5b6f39983b5e91f258998d179c5a9da881899be449dd56d,2024-10-29T14:34:50.257000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 @@ -262910,11 +262912,11 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48291,0,1,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 +CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 CVE-2024-48343,0,0,bbc85276f1233bf8cda5fb28da7b9d61383e810674b2a1c30f2b4d48eae2eb1d,2024-10-28T13:58:09.230000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 -CVE-2024-48356,0,1,eb83e1244399418d09f0af15f0e28266d6d5b9219ba01c88a810a4fca8aabef3,2024-10-29T14:34:04.427000 -CVE-2024-48357,0,1,6b9632f69af5b85b728c9706bae3831119448965b03733f601b0a0d518bb13b0,2024-10-29T14:34:50.257000 +CVE-2024-48356,0,0,eb83e1244399418d09f0af15f0e28266d6d5b9219ba01c88a810a4fca8aabef3,2024-10-29T14:34:04.427000 +CVE-2024-48357,0,0,6b9632f69af5b85b728c9706bae3831119448965b03733f601b0a0d518bb13b0,2024-10-29T14:34:50.257000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 @@ -262942,11 +262944,11 @@ CVE-2024-48450,0,0,f5aa5cc58edfc45011da40939fe7187d94727340304abe3913585d89b4a40 CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0f53,2024-10-25T12:56:07.750000 CVE-2024-48459,0,0,65ca4f10924c21cc174ad9ec301c89dd215bdae747929dfbd469f345081a8a5f,2024-10-28T13:58:09.230000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 -CVE-2024-48465,0,1,b7bc8b7cfc9842a5d866167a988ef7343bad75516e5493e6477a6a79f57bd11b,2024-10-29T14:34:50.257000 +CVE-2024-48465,0,0,b7bc8b7cfc9842a5d866167a988ef7343bad75516e5493e6477a6a79f57bd11b,2024-10-29T14:34:50.257000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000 -CVE-2024-48509,0,1,284c4916946b05559ac72d79c6f8c0c88af2de3a287de63c88a681a518cf7360,2024-10-29T13:38:16.893000 +CVE-2024-48509,0,0,284c4916946b05559ac72d79c6f8c0c88af2de3a287de63c88a681a518cf7360,2024-10-29T13:38:16.893000 CVE-2024-4851,0,0,444f4e959fbd50fab42bb9cd6f5b1019a6d50ea56a5371bcf4f4fa6566e3e360,2024-10-17T18:45:13.093000 CVE-2024-48514,0,0,772c22a7c82f7a2ba09c35b523755c3d2e15343c5a23d7fb25f81b1d3b219920,2024-10-25T12:56:07.750000 CVE-2024-4853,0,0,7e943be0a2434f6362f67f453fe22910f05fecde26076344b21d97f20b2d6efa,2024-08-29T15:15:31.687000 @@ -262970,7 +262972,7 @@ CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b94 CVE-2024-48580,0,0,cecfbaeb166c1997f85eff468048926c1d6a76c932cf18638f27e79db1bfe914,2024-10-28T13:58:09.230000 CVE-2024-48581,0,0,fd7c149e40f4a27b5093e18e40ce454de675d636c2c72ee484afba9e2e6f192b,2024-10-28T13:58:09.230000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 -CVE-2024-48594,0,1,d746a9ab267fb3d6366b49f5e1e810ae4be71ae5de5276f3f9d9297a22ea4ee6,2024-10-29T14:34:04.427000 +CVE-2024-48594,0,0,d746a9ab267fb3d6366b49f5e1e810ae4be71ae5de5276f3f9d9297a22ea4ee6,2024-10-29T14:34:04.427000 CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 CVE-2024-48605,0,0,c6fe6d7786e01bf3c07bbcc6dab9ca443b7f4a840bac8f1d3880bbfc76bd164d,2024-10-23T15:12:34.673000 @@ -263012,7 +263014,7 @@ CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba4 CVE-2024-48712,0,0,26c5ef0ec7563b7eb021e1452100a4e706852158c36c374f8078b72afb6523b7,2024-10-16T17:35:04.483000 CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35eca,2024-10-16T17:35:05.450000 CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000 -CVE-2024-4872,0,1,8b2c6820c717681d25c56a744060fc3e2d72667acf04ef8505ca37b89fed7638,2024-10-29T14:15:07.950000 +CVE-2024-4872,0,0,8b2c6820c717681d25c56a744060fc3e2d72667acf04ef8505ca37b89fed7638,2024-10-29T14:15:07.950000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,5291e828b5f933381ba044fe83ffa30a9574aa3244ef7e9ed3868e54f2102d06,2024-10-28T13:58:09.230000 @@ -263057,8 +263059,8 @@ CVE-2024-48821,0,0,bacabe03ec9f89b5265709188c25b3f847a116b26433e5bc3285ba68cbdbd CVE-2024-48822,0,0,33e7e72a841539b756d8e81e286546360560772d3a59e9e42ee72ea342d844c8,2024-10-15T15:35:21.887000 CVE-2024-48823,0,0,1aba983e62a885979e02cb791116a00e379a5949592156d79fd5ef8d26455419,2024-10-15T15:35:22.140000 CVE-2024-48824,0,0,d6d0f4584129fd346e0e9fbe3994976e485ae1972b08f2a06e763bdf12528646,2024-10-15T15:35:22.403000 -CVE-2024-48825,0,1,d9524f2e37516b65dfb5220c80baafb64a063d442a9eaa76f6a5e2668c5806a8,2024-10-29T14:34:50.257000 -CVE-2024-48826,0,1,73e23842f367eecdabbf52a8da74f665aeb85747a4dc90c6a1cb3c394c038e89,2024-10-29T14:34:50.257000 +CVE-2024-48825,0,0,d9524f2e37516b65dfb5220c80baafb64a063d442a9eaa76f6a5e2668c5806a8,2024-10-29T14:34:50.257000 +CVE-2024-48826,0,0,73e23842f367eecdabbf52a8da74f665aeb85747a4dc90c6a1cb3c394c038e89,2024-10-29T14:34:50.257000 CVE-2024-48827,0,0,b8784c14c4c0a2af4d656264bee611472f424ecc32bdba68ae4a9cb4ecb6178a,2024-10-15T12:58:51.050000 CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000 CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000 @@ -263082,6 +263084,7 @@ CVE-2024-48918,0,0,37d8ea84d8110f3a600a1d2f557058b666848b057b36b01b41785c57ee923 CVE-2024-48919,0,0,a0a7ee1576689ebc33e8b3ae0ac8ebb40e27885e788e12cb9b562903133f149c,2024-10-23T15:12:34.673000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 CVE-2024-48920,0,0,a03bdbd7875951f84a0ddd56d8e819e54834e1b20b1220c7604c44f7db3ea361,2024-10-18T12:52:33.507000 +CVE-2024-48921,1,1,7a337822bc8d79bfd55b0eb44f807ad13df85f056a7c48a477bfb4bc74aa157a,2024-10-29T15:15:10.593000 CVE-2024-48924,0,0,e474b369eaf4331d2ff3a579fbee4e63e8ec29b93749a9c533ecb0a1775a3de6,2024-10-18T12:52:33.507000 CVE-2024-48925,0,0,c9fcd7e04639957ea66d2331abf3d50745ade802e21b5a3409a8d69b208718a8,2024-10-25T14:12:18.833000 CVE-2024-48926,0,0,d45a9da5f6f1b245a6d729f168d41330fc51c968405a1c91c3b061c128e5b29d,2024-10-25T16:19:17.073000 @@ -263139,7 +263142,7 @@ CVE-2024-49209,0,0,7815188905707c2f76092b0250e46fa9658c3c02368a05bd7a2ebfc97747d CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 CVE-2024-49210,0,0,8424ab4c00391981dbea8fb400ab567e22b8f079a4e2f9fbe1929ef4146f150a,2024-10-23T15:12:34.673000 CVE-2024-49211,0,0,a47517181b3e75750b7f10cabddc80665e773679b6531198c52d52e7b124250b,2024-10-23T15:12:34.673000 -CVE-2024-49214,0,0,4421e2282d31894802376d02d8bd5564e11b8590218433c4394ddc3df2a81c0d,2024-10-15T12:57:46.880000 +CVE-2024-49214,0,1,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000 CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 CVE-2024-49217,0,0,d03ae3ae7bb906a5c0350c53ea3af5b288e7f6463b03cb7a32bb31d9e72767bc,2024-10-18T12:52:33.507000 @@ -263200,7 +263203,7 @@ CVE-2024-4927,0,0,4ddbe2418b736eceb0ee18662dc9ab0b7588d5e8a0dde06117bae0c9075b36 CVE-2024-49270,0,0,616a2e437b03b1730ae710990d1f9b5d13bcf5a41263b98d33736d5e3831391d,2024-10-16T16:38:14.557000 CVE-2024-49271,0,0,6fd9d076a620483355861bd31b6d3fba7a6e8c77968d9b9b52f107ebea5c9f8b,2024-10-16T16:38:14.557000 CVE-2024-49272,0,0,ce388816844d0bf419ecca70bd1847b8484ab313dd293704a8265f36084e981a,2024-10-22T18:40:40.787000 -CVE-2024-49273,0,0,a5a897527b0067d7fc9bedecaf463cda4dbaa650e993c2c454d9055227c03f02,2024-10-21T17:09:45.417000 +CVE-2024-49273,0,1,8905bf104e2ffbfb71302aa76b6e12e02aad22935d4854b226e494085e2d9a7b,2024-10-29T15:48:10.617000 CVE-2024-49274,0,0,096f2f284546af0d97e6ddfaac32f5bc2a7003315ce6be804bf83fbc016caf5b,2024-10-22T18:39:19.980000 CVE-2024-49275,0,0,55aff7f12be858e4d39e3782edf366ff64e3f42849d1ad1a14e88de49c5d3432,2024-10-22T18:36:53.817000 CVE-2024-49276,0,0,6a6b58791e9512e826c457e3bee8f08f7b1de60db24c986554adb1b116c01f0f,2024-10-18T12:52:33.507000 @@ -263216,13 +263219,13 @@ CVE-2024-49284,0,0,bec1f0da1bcb0850e4841345e95550bca16d99530b59e5207d183ff1f4e1c CVE-2024-49285,0,0,6f46c329c3d1526d526943e0333d6d72992c68afd2913a4ef362b73e606f2e17,2024-10-18T12:52:33.507000 CVE-2024-49286,0,0,8c28a82bd9391036ea30ce185d824d073b6f340cb9bbf2f8121b077632895379,2024-10-23T16:13:37.823000 CVE-2024-49287,0,0,0066d2fce1ed85532c90a9906dc911278ca46d873038b8dcfb2d0c4b3b95c685,2024-10-18T12:52:33.507000 -CVE-2024-49288,0,0,9794858fdab905561c3b5d43269f1d3f1bacba7fba1bb0436d9d456534b0053f,2024-10-18T12:52:33.507000 +CVE-2024-49288,0,1,055bd249458244bab70c983c1fbb1ef5aa3a8c0c5ac3a999718f04e096ffc581,2024-10-29T16:59:05.867000 CVE-2024-49289,0,0,1007ec713acd15fdb5c2262f73a22207aad725968297cd9b79b0f4fcd3d741cb,2024-10-18T12:52:33.507000 CVE-2024-4929,0,0,6b801c4c5a7fb7e65ec83572f903c6a563e938f183cb222d57e6a2e237461199,2024-06-04T19:20:54.337000 CVE-2024-49290,0,0,ccbfae725612d034db518fc020b12b0de83319514a2d0a5b3be41c3ff9bf8173,2024-10-22T18:35:55.413000 CVE-2024-49291,0,0,44e011055ffcc94f31147e91008bfca453f458c355b4c10d5e081a4748d73d9a,2024-10-18T12:52:33.507000 CVE-2024-49292,0,0,5f09a14990b6c411313ed3c0517e00101a5bacb90324a262f26a26dc9ec6f772,2024-10-18T12:52:33.507000 -CVE-2024-49293,0,0,85b3188f5ad662f7c78c35d48b4fe82df910c07f89c757b60e18d9db28978d29,2024-10-21T17:09:45.417000 +CVE-2024-49293,0,1,730bfb95d823a7f3fc4a00e35d04f3989283733e6763e5f3ae190a1bab038044,2024-10-29T15:07:39.407000 CVE-2024-49295,0,0,2233f6c9986d9f1a990d0d54b1c1d91ca1475b5db77026f702ef776949b63fa2,2024-10-18T12:52:33.507000 CVE-2024-49296,0,0,f1042f70e89016c7f4e9d2a0f572f4f930b555774f6b329b232673bc13de033a,2024-10-18T12:52:33.507000 CVE-2024-49297,0,0,c01c0683901cb1b114e43805eef512c87c392594a83094740c5f93a462c76e65,2024-10-18T12:52:33.507000 @@ -263250,7 +263253,7 @@ CVE-2024-49318,0,0,02cca54ff58508f7015bdc78b225c5402ac891d24584c9a2512f1a35e3987 CVE-2024-49319,0,0,42677cde087b60b4589de437a49f5349c2181024ba44b1ead05df0b607435f60,2024-10-18T12:52:33.507000 CVE-2024-4932,0,0,c4279e0e81804cf3f06e3c52edfd706c295877ccc3771ef54ad83261fb500b37,2024-05-17T02:40:43.357000 CVE-2024-49320,0,0,f646a0aed9b94f9c2a4b6085270ae6d0667dce332670da7784078783e12bfcb6,2024-10-18T12:52:33.507000 -CVE-2024-49321,0,0,6ce68241db10c7838e4a51d2227fb9952bea2f4d972829a40692939256bd9db9,2024-10-21T17:09:45.417000 +CVE-2024-49321,0,1,7280805f370c92996f00d5aa4da8af9bce0a6b241cfd99a9258428d3a74ed661,2024-10-29T15:20:12.503000 CVE-2024-49322,0,0,541e4efebd0d76588052862000e37b2e98e8b9ac15619c2b0422f26ed3288fd3,2024-10-18T12:52:33.507000 CVE-2024-49323,0,0,2f124cdc22e81391d598884667e36f6fa2d8c8661fccd4b5b6bdeb72951248d2,2024-10-23T16:05:49.617000 CVE-2024-49324,0,0,2794d0fa1220cbc25924e4f7f45b2c0f87b574911fff8706f118c7c8b3b48c92,2024-10-24T16:11:41.700000 @@ -263347,51 +263350,51 @@ CVE-2024-49629,0,0,60f0852b23beb1819b5458d406150de82aa310255dbbddedffa202b89c290 CVE-2024-4963,0,0,ef1fba35c0790604656a5e5622c9c7f4af0f1d1414e5784cd7a21207910d8397,2024-08-01T21:15:54.113000 CVE-2024-49630,0,0,34d75746c00996da3a49f93eed6bc8a4f3be9da6c45cb9f15692d41526269ce7,2024-10-23T20:44:41.857000 CVE-2024-49631,0,0,5230732de6a35313190c213cb431a622620f306560265c0ab55df925f02e4a2a,2024-10-24T14:12:59.600000 -CVE-2024-49632,1,1,b6aa910a6238793d01d711b67c611605efa05142f4f99d683b1ce55d6a3eae5d,2024-10-29T14:34:04.427000 -CVE-2024-49634,1,1,de32cef9ec4be91fae2af05a390224a872c2af3d4660f72a891aa49fb4d4c85b,2024-10-29T14:34:04.427000 -CVE-2024-49635,1,1,956efdcd813edd8b0c50992e432c2791dae865785bdc2e31ed9219302f43b26d,2024-10-29T14:34:04.427000 -CVE-2024-49636,1,1,3c5cd3322412893431ab599636ad02b1e97a1da1ded89c93d6a7bb6f1d29b087,2024-10-29T14:34:04.427000 -CVE-2024-49637,1,1,2dc745c056a34cece786d276c398bf69e1907ff02375dd8fb09ffac8208e14dd,2024-10-29T14:34:04.427000 -CVE-2024-49638,1,1,d01827d0ee488b9070f09ced5eb1c69a68c899bea097d695348d27feae15ba2f,2024-10-29T14:34:04.427000 -CVE-2024-49639,1,1,1eeafd0406a64062b1bfa5d7382f0a0e30de4a38ffa7fec244a4d5f8a12a5359,2024-10-29T14:34:04.427000 +CVE-2024-49632,0,0,b6aa910a6238793d01d711b67c611605efa05142f4f99d683b1ce55d6a3eae5d,2024-10-29T14:34:04.427000 +CVE-2024-49634,0,0,de32cef9ec4be91fae2af05a390224a872c2af3d4660f72a891aa49fb4d4c85b,2024-10-29T14:34:04.427000 +CVE-2024-49635,0,0,956efdcd813edd8b0c50992e432c2791dae865785bdc2e31ed9219302f43b26d,2024-10-29T14:34:04.427000 +CVE-2024-49636,0,0,3c5cd3322412893431ab599636ad02b1e97a1da1ded89c93d6a7bb6f1d29b087,2024-10-29T14:34:04.427000 +CVE-2024-49637,0,0,2dc745c056a34cece786d276c398bf69e1907ff02375dd8fb09ffac8208e14dd,2024-10-29T14:34:04.427000 +CVE-2024-49638,0,0,d01827d0ee488b9070f09ced5eb1c69a68c899bea097d695348d27feae15ba2f,2024-10-29T14:34:04.427000 +CVE-2024-49639,0,0,1eeafd0406a64062b1bfa5d7382f0a0e30de4a38ffa7fec244a4d5f8a12a5359,2024-10-29T14:34:04.427000 CVE-2024-4964,0,0,786ceb95d48675f478c0edd25187f0304d39eb81096edb79d2e9ae0401f68be3,2024-08-01T21:15:54.223000 -CVE-2024-49640,1,1,15b8429bfc6b07e3359aecb2089ebf7e02496d8842e0b2634f6ac0caf135c572,2024-10-29T14:34:04.427000 -CVE-2024-49641,1,1,b281893547c51d112e722ba7b5f0cb5a0d41921321f08527e7e9885a3f846a0c,2024-10-29T14:34:04.427000 -CVE-2024-49642,0,1,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000 -CVE-2024-49643,1,1,fe1ed03525bdcff2f5736c096712681532b386cf4e119c9eaa196cfab5e8ff58,2024-10-29T14:34:04.427000 -CVE-2024-49645,1,1,fbc7fb365d72db2b32d09d4bc36811ca2875e91a7b163c8ae6bcdfeef6df51d2,2024-10-29T14:34:04.427000 -CVE-2024-49646,0,1,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000 -CVE-2024-49647,0,1,e60b9143544a8c8127edc259fcd544ebde14e3b3a21fa4bf3041175f98777227,2024-10-29T14:34:04.427000 -CVE-2024-49648,0,1,882728f062a6477fd5d5596cbadd02c75634cd7d8a2e421ad711333bc5f1d005,2024-10-29T14:34:04.427000 +CVE-2024-49640,0,0,15b8429bfc6b07e3359aecb2089ebf7e02496d8842e0b2634f6ac0caf135c572,2024-10-29T14:34:04.427000 +CVE-2024-49641,0,0,b281893547c51d112e722ba7b5f0cb5a0d41921321f08527e7e9885a3f846a0c,2024-10-29T14:34:04.427000 +CVE-2024-49642,0,0,2938115e957c516a2204660e9dee7ba3c340bc4776e855853c758dc52a1a7e6c,2024-10-29T14:34:04.427000 +CVE-2024-49643,0,0,fe1ed03525bdcff2f5736c096712681532b386cf4e119c9eaa196cfab5e8ff58,2024-10-29T14:34:04.427000 +CVE-2024-49645,0,0,fbc7fb365d72db2b32d09d4bc36811ca2875e91a7b163c8ae6bcdfeef6df51d2,2024-10-29T14:34:04.427000 +CVE-2024-49646,0,0,494afe5cb42a3659410b30eebe3ebd4867d873db4432f980b767a7abcb0bd3a7,2024-10-29T14:34:04.427000 +CVE-2024-49647,0,0,e60b9143544a8c8127edc259fcd544ebde14e3b3a21fa4bf3041175f98777227,2024-10-29T14:34:04.427000 +CVE-2024-49648,0,0,882728f062a6477fd5d5596cbadd02c75634cd7d8a2e421ad711333bc5f1d005,2024-10-29T14:34:04.427000 CVE-2024-4965,0,0,5bd9bf33c1ad1b27237ab2761363d4d9817c8f50155c84d844f98b12772718a0,2024-08-08T15:15:18.730000 -CVE-2024-49650,0,1,113f1d8fcd4a91401a9e7eb21542e0be268f44720e90bf593259606093fc1561,2024-10-29T14:34:04.427000 -CVE-2024-49651,0,1,455f9ac4f1f89505213df17cf8002ad2571eeeed41c794b6710f9e41a424d959,2024-10-29T14:34:04.427000 +CVE-2024-49650,0,0,113f1d8fcd4a91401a9e7eb21542e0be268f44720e90bf593259606093fc1561,2024-10-29T14:34:04.427000 +CVE-2024-49651,0,0,455f9ac4f1f89505213df17cf8002ad2571eeeed41c794b6710f9e41a424d959,2024-10-29T14:34:04.427000 CVE-2024-49652,0,0,58dff88968ac6ebf50ac5ee5e6f0dbbe476efcb65a1763b3700d032abe2d574d,2024-10-25T12:56:36.827000 CVE-2024-49653,0,0,44403c7923c745007b13c40f85dd660179917ab02fffac37cb7e731d1660569b,2024-10-25T12:56:36.827000 -CVE-2024-49654,0,1,9849e2b6d31fd9ad5cb0449adb4166585aded22c5c60fa2d1b21911f39b8a982,2024-10-29T14:34:04.427000 -CVE-2024-49656,0,1,1fa1eca3083d359ca2d8725d6a0df5d8707a8628cb91da8ff04085832f88d4ec,2024-10-29T14:34:04.427000 +CVE-2024-49654,0,0,9849e2b6d31fd9ad5cb0449adb4166585aded22c5c60fa2d1b21911f39b8a982,2024-10-29T14:34:04.427000 +CVE-2024-49656,0,0,1fa1eca3083d359ca2d8725d6a0df5d8707a8628cb91da8ff04085832f88d4ec,2024-10-29T14:34:04.427000 CVE-2024-49657,0,0,e92a5c0df7de7f82cf60825f720ce06f676c04466a67c860a119e8449aacc814,2024-10-25T12:56:36.827000 CVE-2024-49658,0,0,75da9a8594fc78f2625eb2a430c46e94efcf375c07d5d68f964ab85a724848b9,2024-10-25T12:56:36.827000 -CVE-2024-49659,0,1,61d0f3ade1082f6b5c5c149e94c5cc078bc8df99d3c8d246e3a532e6e6aa1da5,2024-10-29T14:34:04.427000 +CVE-2024-49659,0,0,61d0f3ade1082f6b5c5c149e94c5cc078bc8df99d3c8d246e3a532e6e6aa1da5,2024-10-29T14:34:04.427000 CVE-2024-4966,0,0,ca96dc16e6a41cb4de3af3c10d7787996b0688fd8eb0522e09efb3ad5052b418,2024-05-17T02:40:44.507000 -CVE-2024-49660,0,1,13eaea752ec6b314e4adcc3925b4bec480df888903b69d3a8defe724ba520efd,2024-10-29T14:34:04.427000 -CVE-2024-49661,0,1,c3ba564e616ab55f5f484632961663cf23b466bbd214761a9ce094a232fbf911,2024-10-29T14:34:04.427000 -CVE-2024-49662,0,1,d23628a207918d1abea406e4e59c9543e026ea8a8163d8aada9f4b91806ef451,2024-10-29T14:34:04.427000 -CVE-2024-49663,0,1,a059d4db73c3a6f109e52ff1e9963a12ea16e39d8d51c67d387c3bc37a1f722c,2024-10-29T14:34:04.427000 -CVE-2024-49664,0,1,a585980fa0c468bd227b32a9cfc1c229640a922e8ed2cd0a6bad8db82143c23c,2024-10-29T14:34:04.427000 -CVE-2024-49665,0,1,1fba7c5aced38c8654760398599efed942aafcafe37f175867e63ef31d7a1f73,2024-10-29T14:34:04.427000 -CVE-2024-49667,0,1,d0d2893a08bbe05370c0efbe07623867cc21abc78bc1959078d39fb472d7ab87,2024-10-29T14:34:04.427000 +CVE-2024-49660,0,0,13eaea752ec6b314e4adcc3925b4bec480df888903b69d3a8defe724ba520efd,2024-10-29T14:34:04.427000 +CVE-2024-49661,0,0,c3ba564e616ab55f5f484632961663cf23b466bbd214761a9ce094a232fbf911,2024-10-29T14:34:04.427000 +CVE-2024-49662,0,0,d23628a207918d1abea406e4e59c9543e026ea8a8163d8aada9f4b91806ef451,2024-10-29T14:34:04.427000 +CVE-2024-49663,0,0,a059d4db73c3a6f109e52ff1e9963a12ea16e39d8d51c67d387c3bc37a1f722c,2024-10-29T14:34:04.427000 +CVE-2024-49664,0,0,a585980fa0c468bd227b32a9cfc1c229640a922e8ed2cd0a6bad8db82143c23c,2024-10-29T14:34:04.427000 +CVE-2024-49665,0,0,1fba7c5aced38c8654760398599efed942aafcafe37f175867e63ef31d7a1f73,2024-10-29T14:34:04.427000 +CVE-2024-49667,0,0,d0d2893a08bbe05370c0efbe07623867cc21abc78bc1959078d39fb472d7ab87,2024-10-29T14:34:04.427000 CVE-2024-49668,0,0,9e642c910e64115d4a4e8e29c9e810812ac3764efb5993cdb3bf654939e09f4c,2024-10-25T12:56:36.827000 CVE-2024-49669,0,0,5ad5e91f97554ca3daa6c0ce2501004e522438a31e6641aa150e6fd0e7f90c0f,2024-10-25T12:56:36.827000 CVE-2024-4967,0,0,8025a234fc289bdab04f9acbdc2478b7155048b60320bc8b6b7a0758b314e3b9,2024-06-04T19:20:55.777000 -CVE-2024-49670,0,1,c61a4837644d7cf5e15a855fcac7e221e729733e4300d91657fbdc9de179cc5b,2024-10-29T14:34:04.427000 +CVE-2024-49670,0,0,c61a4837644d7cf5e15a855fcac7e221e729733e4300d91657fbdc9de179cc5b,2024-10-29T14:34:04.427000 CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b12d,2024-10-25T12:56:36.827000 -CVE-2024-49672,0,1,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000 -CVE-2024-49673,0,1,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000 +CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000 +CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000 CVE-2024-49675,0,0,c6e09b39dfdaf468c89ebc29589596eee519705df1761375fc6ab1777046823b,2024-10-25T12:56:36.827000 CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000 -CVE-2024-49678,0,1,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000 -CVE-2024-49679,0,1,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000 +CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000 +CVE-2024-49679,0,0,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000 CVE-2024-4968,0,0,e5876599ebc72fb366518fd24786abd136bd58674cfc6b7ffb1fde29b7dfc2f8,2024-06-04T19:20:55.910000 CVE-2024-49681,0,0,3b093dfd5a970f736ccea994447fae465682222fe1b4c870be33e2b5aeaae4d6,2024-10-25T12:56:07.750000 CVE-2024-49682,0,0,4e47b24b4ccb89d6b9391034a4d9fd92d4e065ca66c40176951d133f1432962c,2024-10-25T12:56:07.750000 @@ -263400,7 +263403,7 @@ CVE-2024-49684,0,0,e9a627af5ddca9b4822ee6da7152da731788ee6f4ca218c2e1132330b65bb CVE-2024-4969,0,0,ab0804889b5a888b9b65e9fe2bbd8691478393df4e0fc992e2c82c7a1daa3f54,2024-07-08T14:19:14.173000 CVE-2024-49690,0,0,f8519a1e374a57a825b896cd1faf37ef6f9748445cc3d9105d4f22d925afe4f1,2024-10-25T12:56:36.827000 CVE-2024-49691,0,0,8a34c0fdaee81aff7458f4efa7a33cb09c53971e5ca42eec6727b794ae5c88cf,2024-10-25T12:56:07.750000 -CVE-2024-49692,0,1,a88655a398fcd3b1f3a7f0105e563a26deb8bf364bc3853b349284c831b8cc5c,2024-10-29T14:34:04.427000 +CVE-2024-49692,0,0,a88655a398fcd3b1f3a7f0105e563a26deb8bf364bc3853b349284c831b8cc5c,2024-10-29T14:34:04.427000 CVE-2024-49693,0,0,a6bc6e01718813c6856835300eb59007ffc63a5d82fdf60f6cd2f3594806ee66,2024-10-25T12:56:07.750000 CVE-2024-49695,0,0,8a5b9aeadf7d14e4b9f3b28f3c39052ed1af2bd2ed904e93755acbf54f7db166,2024-10-25T12:56:07.750000 CVE-2024-49696,0,0,a1b9111a692b97228f861a7c3aa5f8357700339f49226938288f062844c6a3b1,2024-10-25T12:56:07.750000 @@ -263416,17 +263419,19 @@ CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c15207 CVE-2024-49750,0,0,a7e8b2a926889afed7f90910ab6e5ec3cbfd5fe1c3a7f940d8c01d024ee8d1a6,2024-10-25T12:56:07.750000 CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000 CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000 -CVE-2024-49755,0,1,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000 +CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000 CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000 CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000 CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000 CVE-2024-49760,0,0,73350c3c15eb518e634dec8ba3e2da01f8968eca1d80c5872e6dfc5d4ab4dd78,2024-10-25T12:56:07.750000 -CVE-2024-49761,0,1,91dbe3ae22d59346162697cdf21d954a80519158ed01f8f13e3e3e00f37e4bfb,2024-10-29T14:34:50.257000 +CVE-2024-49761,0,0,91dbe3ae22d59346162697cdf21d954a80519158ed01f8f13e3e3e00f37e4bfb,2024-10-29T14:34:50.257000 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 CVE-2024-49766,0,0,5a8c5c0a2bd94e828f2c3a22888613b17d32cf5a4207ce143b3606496d9774b9,2024-10-28T13:58:09.230000 CVE-2024-49767,0,0,ef1423fe811e432f28d0c3f95d411793ec90858ffbf4947a2737bd5fe1b70dce,2024-10-28T13:58:09.230000 +CVE-2024-49768,1,1,8b43ec3e180036c3aca9d7dd6d01385965f11b81903643de2b418280062390c8,2024-10-29T15:15:11.440000 +CVE-2024-49769,1,1,6e0e0b59d53b97879b39c29d5eb2735eeb78be9d68c4ab745f2b599da8813ebe,2024-10-29T15:15:12.030000 CVE-2024-4977,0,0,f1472b15d6219c627718fd70559881283845ced10173940d62dfa6e1d38696a9,2024-08-01T13:59:37.487000 -CVE-2024-49771,0,1,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000 +CVE-2024-49771,0,0,e1b8e33c9beff5e15c760e02f136747e5a30aef91dfde0840d1776c2c5b9964b,2024-10-29T14:34:50.257000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -263557,7 +263562,7 @@ CVE-2024-49967,0,0,f92f6192704c8d30fb1b877d6399c880863ff64783a228d60dfdd51b9d90f CVE-2024-49968,0,0,19a93f4a6384a37e0e479ce1fc4610aee20a39bc275896118b96ca5904112124,2024-10-23T15:13:25.583000 CVE-2024-49969,0,0,87996c90e1672445fe5815f19cbdae838e57430f8b66f0e3e569e0c7abd0a9cb,2024-10-25T20:15:51.520000 CVE-2024-4997,0,0,8869d8cee41a7f38be4f03ad1383841d0fd18dd2f92c0e8b0f0fd7c6f2096580,2024-06-04T16:57:41.053000 -CVE-2024-49970,0,0,05aca179b29c638548a8f21052c8ccbafdc943e81b23beda746307887e7bcbaf,2024-10-23T15:13:25.583000 +CVE-2024-49970,0,1,638a6e5f6f7a4a7972cb76754ec52808db9beef3f8062893a90ac926493da3ef,2024-10-29T15:57:41 CVE-2024-49971,0,0,60c83f32ab70eca3cd14f38dc4040565edae34a7c11d6016f53aaf212ad0bc15,2024-10-23T15:13:25.583000 CVE-2024-49972,0,0,985809352bdfeb655e911cb32258e8e8a65029ce7fe386242f6e0bc275afc60f,2024-10-23T15:13:25.583000 CVE-2024-49973,0,0,cbc8317e69e991b61b33286118a69f0b5499d236a65e0770daff1dbdf352cd5d,2024-10-23T15:13:25.583000 @@ -263571,8 +263576,8 @@ CVE-2024-4998,0,0,fe1bc994ac10ee97dd90e00ffa3b2211d68ef77cdb160f8aaa68bd1eee2d92 CVE-2024-49980,0,0,1b7f876e1e74006c4cbc36f26a364fbc1043d115c2b25809299afdde070e9fbd,2024-10-23T15:13:25.583000 CVE-2024-49981,0,0,be8906564b57b0b9a043fe42c3d38b8548c4c2cbb0858120a7fa2fad8e2b8ee7,2024-10-25T14:56:40.073000 CVE-2024-49982,0,0,1ae51728dfad6dc77da9a9af15e226c1ee61eeb30c84012b23419f82a91617a3,2024-10-25T15:08:03.790000 -CVE-2024-49983,0,0,a8ab82f4196f5cdde113b23acc0e392f7ce69758223b37afd8356b634ec56e89,2024-10-23T15:13:25.583000 -CVE-2024-49984,0,0,52132884d98254bcf3670a6c5035fab9415ac6c1e9ca87fbf0878fa15bfb5d0a,2024-10-23T15:13:25.583000 +CVE-2024-49983,0,1,9274e8e7a27d798fd4c38e26ef366e23490e6efa1ece0fb652aec8a9e521a033,2024-10-29T16:23:31.943000 +CVE-2024-49984,0,1,44bbefb1c9b0fa3991d8d00fdccc0a477c2a15ae2838387996afee04a422cbc3,2024-10-29T16:22:25.833000 CVE-2024-49985,0,0,737ec1b651784d094b345c7c186c8a413f48e3fd02bb539872da5bf851174c95,2024-10-28T16:22:29.887000 CVE-2024-49986,0,0,1069db2199b30e02a56c3460641141ec41e9f11ee8af8a2794866b64042f2043,2024-10-25T20:02:54.517000 CVE-2024-49987,0,0,7825fe9d4de7029121e6c0f770d84a0a58ddbd606a7f766c220913055561ec36,2024-10-28T16:23:44.477000 @@ -263586,7 +263591,7 @@ CVE-2024-49993,0,0,173745e8fc0b2f51f6583b765f43b75fc7379f37eeab514e19093d1e0bbc2 CVE-2024-49994,0,0,b259470c6938b01fe0b06a9ea53deb1f1b59fb7f77762cb60813754903d6329f,2024-10-25T14:52:32.877000 CVE-2024-49995,0,0,dda237a1fe4774b5eebf428932a14ed6406dee0beb5398e416cf454331edef02,2024-10-28T17:07:51.270000 CVE-2024-49996,0,0,81c0545f780fa695d599970a227ba85a22409c164ec567cfb530b43ba7149524,2024-10-25T19:56:10.320000 -CVE-2024-49997,0,0,4f0d5cbc938668da4cca12e8619053d4fe51e93b90646e0ffb3c7559200d809e,2024-10-23T15:13:25.583000 +CVE-2024-49997,0,1,cf5723beb2d565000e47548f495cd0fbfb40a16e23a8183bd208246596745eee,2024-10-29T16:20:49.107000 CVE-2024-49998,0,0,dc2b1c1752af1746445d713a06a03643e693f616cacbb49fca8b0a6d6c19fcfd,2024-10-23T15:13:25.583000 CVE-2024-49999,0,0,78b6148f41a15652bfa26256a49a5e5917d5dbd35564ac4e51ba7d691f423879,2024-10-23T15:13:25.583000 CVE-2024-5000,0,0,78aa4b3aa9bab8131501fa8740489ecb0fe42637a1055cb7cfa2d7935a7c9e42,2024-06-04T16:57:41.053000 @@ -263646,7 +263651,7 @@ CVE-2024-50048,0,0,d005bc43ac7dffe85bb1b4c62a0be79335a5f23ef87660a48780d7c73272a CVE-2024-50049,0,0,8a3f3791bfb77ef3d490e872a72df28d44a50dd01f038b8f63798b04c8c73740,2024-10-23T21:45:43.657000 CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506ca,2024-10-15T12:58:51.050000 CVE-2024-50050,0,0,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000 -CVE-2024-50052,0,1,bf2b7a67576b83d69e87d14ac4239bf8784a5a388f0a9d54bedc6a322c97af62,2024-10-29T14:34:04.427000 +CVE-2024-50052,0,0,bf2b7a67576b83d69e87d14ac4239bf8784a5a388f0a9d54bedc6a322c97af62,2024-10-29T14:34:04.427000 CVE-2024-50055,0,0,223ed98e7a7f4160f8634a62679e487b1296c8eb2d61be84de5731c91a2cb49b,2024-10-23T21:45:15.137000 CVE-2024-50056,0,0,67d5758c0ace6615570a11511305d2b63ab44abb1709d3f0417dc90e404e22ad,2024-10-23T15:12:34.673000 CVE-2024-50057,0,0,ba05620682b6a9a556450ee0eed48c115fc6212d5ab9174ae69859e3d6638159,2024-10-24T16:12:52.007000 @@ -263660,29 +263665,29 @@ CVE-2024-50063,0,0,1d1881a47d554fc29d203efb6c8521669e1b28611f2bbf99ab231399dab59 CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7eab,2024-10-23T21:49:29.423000 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 -CVE-2024-50067,0,0,811aadeb33d4d613d0b6c5e5e29ec88fffd6b7633646dfc1ca37d9fe494feb7f,2024-10-28T13:58:09.230000 -CVE-2024-50068,0,1,fa1ea3e6f599930bfb2d31adb8599332b75a045a05a427c5acbfef84f36f4dea,2024-10-29T14:34:04.427000 -CVE-2024-50069,0,1,e0d06dfcabcc31158b42dd1756b72698f3ce1bc24c6ee15265e842e9564c6424,2024-10-29T14:34:04.427000 -CVE-2024-50070,0,1,18255d00f69620f2a638568afe228ad3578ea04a84acf63eb1e68ce68ed74c13,2024-10-29T14:34:04.427000 -CVE-2024-50071,0,1,62707d07bb4d39afcfce746e848fc0ec2081f01347fce6c0d69c478aa69fbee9,2024-10-29T14:34:04.427000 -CVE-2024-50072,0,1,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000 -CVE-2024-50073,0,1,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000 -CVE-2024-50074,0,1,88a57db36e785df4cc21dcc18102af1a36a44aab602ea5f2f857fa91d7cda796,2024-10-29T14:34:04.427000 -CVE-2024-50075,0,1,f254549f01ba2f5ee239dee6fc0e7ecbe8fe1b2c6da566e1dc2c41565299fc49,2024-10-29T14:34:04.427000 -CVE-2024-50076,0,1,960b5306eb9d7d5b99e64da9813531f1a11820802abfb99e23dd9c044d60901e,2024-10-29T14:34:04.427000 -CVE-2024-50077,0,1,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299d1e,2024-10-29T14:34:04.427000 -CVE-2024-50078,0,1,edfd843daaab21e8f3881bc9f52685650308d1e7e15f322d52dbb99d6ddc0e3a,2024-10-29T14:34:04.427000 -CVE-2024-50079,0,1,86e00e39a4c6f4df698328fa6af74ef3f8403f4eb5813cad15aa3ecbc54c0116,2024-10-29T14:34:04.427000 +CVE-2024-50067,0,1,24c4c2a9f57cbbf60955a0b70b9105797845f089603805c65d417718be190cc3,2024-10-29T16:30:44.217000 +CVE-2024-50068,0,0,fa1ea3e6f599930bfb2d31adb8599332b75a045a05a427c5acbfef84f36f4dea,2024-10-29T14:34:04.427000 +CVE-2024-50069,0,0,e0d06dfcabcc31158b42dd1756b72698f3ce1bc24c6ee15265e842e9564c6424,2024-10-29T14:34:04.427000 +CVE-2024-50070,0,0,18255d00f69620f2a638568afe228ad3578ea04a84acf63eb1e68ce68ed74c13,2024-10-29T14:34:04.427000 +CVE-2024-50071,0,0,62707d07bb4d39afcfce746e848fc0ec2081f01347fce6c0d69c478aa69fbee9,2024-10-29T14:34:04.427000 +CVE-2024-50072,0,0,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000 +CVE-2024-50073,0,0,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000 +CVE-2024-50074,0,0,88a57db36e785df4cc21dcc18102af1a36a44aab602ea5f2f857fa91d7cda796,2024-10-29T14:34:04.427000 +CVE-2024-50075,0,0,f254549f01ba2f5ee239dee6fc0e7ecbe8fe1b2c6da566e1dc2c41565299fc49,2024-10-29T14:34:04.427000 +CVE-2024-50076,0,0,960b5306eb9d7d5b99e64da9813531f1a11820802abfb99e23dd9c044d60901e,2024-10-29T14:34:04.427000 +CVE-2024-50077,0,0,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299d1e,2024-10-29T14:34:04.427000 +CVE-2024-50078,0,0,edfd843daaab21e8f3881bc9f52685650308d1e7e15f322d52dbb99d6ddc0e3a,2024-10-29T14:34:04.427000 +CVE-2024-50079,0,0,86e00e39a4c6f4df698328fa6af74ef3f8403f4eb5813cad15aa3ecbc54c0116,2024-10-29T14:34:04.427000 CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000 -CVE-2024-50080,0,1,b30143addf096230090c103659efad2d89f35cfe5d0ae20511cc4ad130fbd073,2024-10-29T14:34:04.427000 -CVE-2024-50081,0,1,4a716ec09fe3b7525e6ca3fc44a39dfce5c1bec47408b7be31dc943bdcd98f01,2024-10-29T14:34:04.427000 -CVE-2024-50082,0,1,1aac9135fc440cb927bdd34817c9b125ae2db53fb07a95ac91cd63b20c0c1e06,2024-10-29T14:34:04.427000 -CVE-2024-50083,0,1,fd94a2eeda3538db1b988576d10356ed0f22eab342d054a435bf2bf1d428df1d,2024-10-29T14:34:04.427000 -CVE-2024-50084,0,1,5f8d3ba9bf6b3a2c27d8d69fafe6a5b945efebb0f6460f9530015e1ca78492d4,2024-10-29T14:34:04.427000 -CVE-2024-50085,0,1,3735911e6825e9aab8ccfa4703fb042b171a4743ccb03ab792a9cd72a82626ef,2024-10-29T14:34:04.427000 -CVE-2024-50086,0,1,63b570173a2655baa4c5831419c68504e7a2b436a5f1c37f1fbfd53425078a18,2024-10-29T14:34:04.427000 -CVE-2024-50087,0,1,31fd566e6a56828680e68693f4de8add14bb4e5f1dc842a2e094074736caae30,2024-10-29T14:34:04.427000 -CVE-2024-50088,0,1,828e69b5de052dd08d7caf34940c2f4feb712b819955838e907f99359e0b0c88,2024-10-29T14:34:04.427000 +CVE-2024-50080,0,0,b30143addf096230090c103659efad2d89f35cfe5d0ae20511cc4ad130fbd073,2024-10-29T14:34:04.427000 +CVE-2024-50081,0,0,4a716ec09fe3b7525e6ca3fc44a39dfce5c1bec47408b7be31dc943bdcd98f01,2024-10-29T14:34:04.427000 +CVE-2024-50082,0,0,1aac9135fc440cb927bdd34817c9b125ae2db53fb07a95ac91cd63b20c0c1e06,2024-10-29T14:34:04.427000 +CVE-2024-50083,0,0,fd94a2eeda3538db1b988576d10356ed0f22eab342d054a435bf2bf1d428df1d,2024-10-29T14:34:04.427000 +CVE-2024-50084,0,0,5f8d3ba9bf6b3a2c27d8d69fafe6a5b945efebb0f6460f9530015e1ca78492d4,2024-10-29T14:34:04.427000 +CVE-2024-50085,0,0,3735911e6825e9aab8ccfa4703fb042b171a4743ccb03ab792a9cd72a82626ef,2024-10-29T14:34:04.427000 +CVE-2024-50086,0,0,63b570173a2655baa4c5831419c68504e7a2b436a5f1c37f1fbfd53425078a18,2024-10-29T14:34:04.427000 +CVE-2024-50087,0,0,31fd566e6a56828680e68693f4de8add14bb4e5f1dc842a2e094074736caae30,2024-10-29T14:34:04.427000 +CVE-2024-50088,0,0,828e69b5de052dd08d7caf34940c2f4feb712b819955838e907f99359e0b0c88,2024-10-29T14:34:04.427000 CVE-2024-5009,0,0,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000 CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 CVE-2024-5011,0,0,4026c0ac2cac7aea5c94096b029296404a58ceafdfae2ce6d40eb650db37ee86,2024-09-06T22:41:46.253000 @@ -263706,6 +263711,7 @@ CVE-2024-50311,0,0,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c CVE-2024-50312,0,0,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 +CVE-2024-50334,1,1,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 @@ -263715,88 +263721,88 @@ CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000 CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000 -CVE-2024-50407,0,1,f9688f4b448fa6261be66d0317a572bd7a88062577e578fa12fbb434c00a6869,2024-10-29T14:34:04.427000 -CVE-2024-50408,0,0,edb7f0f85bfafef7e8ac88d62c131156e57f2deeb9c9f1cedcf4188104733a55,2024-10-28T13:58:09.230000 -CVE-2024-50409,0,1,d7ec10c5e1543bca47bfdf414d287c32f5601d40bab44b017b5b1321eddc073f,2024-10-29T14:34:04.427000 +CVE-2024-50407,0,0,f9688f4b448fa6261be66d0317a572bd7a88062577e578fa12fbb434c00a6869,2024-10-29T14:34:04.427000 +CVE-2024-50408,0,1,42895de3e084cedaf6647f131c47bd546b78f0bd37cacbb2a46053fdc5504c96,2024-10-29T16:01:08.447000 +CVE-2024-50409,0,0,d7ec10c5e1543bca47bfdf414d287c32f5601d40bab44b017b5b1321eddc073f,2024-10-29T14:34:04.427000 CVE-2024-5041,0,0,50ceb705fe91e3598f01bb8363d7099f99df3d44a38bb258c5294ff805069b46,2024-05-31T13:01:46.727000 -CVE-2024-50410,0,1,b0e5f19d3e850e75bae53f582d220aeb13e9ae300eafba739d117cde04cd904e,2024-10-29T14:34:04.427000 -CVE-2024-50411,0,1,2125caa96e2fd794a28994bdb07b4bb7596f8c4a6de822aea393e9e8d4d53bc7,2024-10-29T14:34:04.427000 -CVE-2024-50412,0,1,631b195ca92c8239dedf128815fcbb14f2f3794e78d494b800069471ed0f1296,2024-10-29T14:34:04.427000 -CVE-2024-50413,0,1,7bd7e93e9534d8f928af3202deae1fbb2549aee1ab43b478d04f1c666ef4a515,2024-10-29T14:34:04.427000 -CVE-2024-50414,0,1,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6e78,2024-10-29T14:34:04.427000 -CVE-2024-50415,0,1,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000 -CVE-2024-50416,0,0,39357adb67741247bbe7502eb5cb836076efd8caa2fa9868b5fc46acd300fc80,2024-10-28T13:58:09.230000 -CVE-2024-50418,0,1,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000 +CVE-2024-50410,0,0,b0e5f19d3e850e75bae53f582d220aeb13e9ae300eafba739d117cde04cd904e,2024-10-29T14:34:04.427000 +CVE-2024-50411,0,0,2125caa96e2fd794a28994bdb07b4bb7596f8c4a6de822aea393e9e8d4d53bc7,2024-10-29T14:34:04.427000 +CVE-2024-50412,0,0,631b195ca92c8239dedf128815fcbb14f2f3794e78d494b800069471ed0f1296,2024-10-29T14:34:04.427000 +CVE-2024-50413,0,0,7bd7e93e9534d8f928af3202deae1fbb2549aee1ab43b478d04f1c666ef4a515,2024-10-29T14:34:04.427000 +CVE-2024-50414,0,0,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6e78,2024-10-29T14:34:04.427000 +CVE-2024-50415,0,0,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000 +CVE-2024-50416,0,1,d6fa8ee755917351e975e2572b208d1eff8656e05d108ea493511ed3f6bbfdc0,2024-10-29T16:02:10.660000 +CVE-2024-50418,0,0,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000 CVE-2024-5042,0,0,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000 -CVE-2024-50420,0,1,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000 -CVE-2024-50426,0,1,8c5b315a447e6f468e14c6e3c0f3b3dad8b0380a565a9ff8ab2bba148da55efc,2024-10-29T14:34:04.427000 -CVE-2024-50427,0,1,c947d7dd64ae860e517413b4b81860fbb1384b9bd6793051f54c5fcec86b216e,2024-10-29T14:34:04.427000 -CVE-2024-50429,0,1,5b7b3cf65b98ce6ba120d1c668accfcc3a79e322ba032a3171f1e988fa226234,2024-10-29T14:34:50.257000 +CVE-2024-50420,0,0,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000 +CVE-2024-50426,0,0,8c5b315a447e6f468e14c6e3c0f3b3dad8b0380a565a9ff8ab2bba148da55efc,2024-10-29T14:34:04.427000 +CVE-2024-50427,0,0,c947d7dd64ae860e517413b4b81860fbb1384b9bd6793051f54c5fcec86b216e,2024-10-29T14:34:04.427000 +CVE-2024-50429,0,0,5b7b3cf65b98ce6ba120d1c668accfcc3a79e322ba032a3171f1e988fa226234,2024-10-29T14:34:50.257000 CVE-2024-5043,0,0,e8af684a96b52a20f139d3c6a27bd63fd7606ea9b2bbde97322bc475920cc410,2024-06-04T19:20:57.007000 -CVE-2024-50431,0,1,23389882ec4121935e05df0356e494c78e8d1268608baa8c1c5a53c8f4335929,2024-10-29T14:34:50.257000 -CVE-2024-50432,0,1,01c52483051ea5e3551ef1e9d2ae7523a10d55ee4fb140a2bb1b5d65d19caa5f,2024-10-29T14:34:50.257000 -CVE-2024-50433,0,1,150a829edae4ce546dd094153a60d69be53d2b79916e9e5a92824bb3fba02bcf,2024-10-29T14:34:50.257000 -CVE-2024-50434,0,1,6d6643fe04e2f4efd721ed8db7bc20e6e04df9218ab37703e5f70b805526a35f,2024-10-29T14:34:50.257000 -CVE-2024-50435,0,1,de671c00539421a873b997241a69dbfe856aaed1f4c333dbd6b66b7248094073,2024-10-29T14:34:50.257000 -CVE-2024-50436,0,1,71d582c994ed708a75d4e540ed6d8f819c5501cc71e8d1c51fae2be130e1d064,2024-10-29T14:34:50.257000 -CVE-2024-50437,0,1,40b87a35f71e1bff2e4bd49aee1e264d6fcf504625bcd539243812317d4ead71,2024-10-29T14:34:50.257000 -CVE-2024-50438,0,1,44dbdfc258cf2359804b81f783a589bf99b655d3de606eb84fa45f0f23ea086b,2024-10-29T14:34:50.257000 -CVE-2024-50439,0,1,a4ab7802095fd3f3ddba5a98cd5ff96e477c6dc16130bc7735e2720027fd6b30,2024-10-29T14:34:50.257000 +CVE-2024-50431,0,0,23389882ec4121935e05df0356e494c78e8d1268608baa8c1c5a53c8f4335929,2024-10-29T14:34:50.257000 +CVE-2024-50432,0,0,01c52483051ea5e3551ef1e9d2ae7523a10d55ee4fb140a2bb1b5d65d19caa5f,2024-10-29T14:34:50.257000 +CVE-2024-50433,0,0,150a829edae4ce546dd094153a60d69be53d2b79916e9e5a92824bb3fba02bcf,2024-10-29T14:34:50.257000 +CVE-2024-50434,0,0,6d6643fe04e2f4efd721ed8db7bc20e6e04df9218ab37703e5f70b805526a35f,2024-10-29T14:34:50.257000 +CVE-2024-50435,0,0,de671c00539421a873b997241a69dbfe856aaed1f4c333dbd6b66b7248094073,2024-10-29T14:34:50.257000 +CVE-2024-50436,0,0,71d582c994ed708a75d4e540ed6d8f819c5501cc71e8d1c51fae2be130e1d064,2024-10-29T14:34:50.257000 +CVE-2024-50437,0,0,40b87a35f71e1bff2e4bd49aee1e264d6fcf504625bcd539243812317d4ead71,2024-10-29T14:34:50.257000 +CVE-2024-50438,0,0,44dbdfc258cf2359804b81f783a589bf99b655d3de606eb84fa45f0f23ea086b,2024-10-29T14:34:50.257000 +CVE-2024-50439,0,0,a4ab7802095fd3f3ddba5a98cd5ff96e477c6dc16130bc7735e2720027fd6b30,2024-10-29T14:34:50.257000 CVE-2024-5044,0,0,a4e177741479e530ad4105167bd81efc2f0690ac50664dc5a5f1c197ba9e227b,2024-06-04T19:20:57.117000 -CVE-2024-50440,0,1,d16b0a66995b7152dbf6636c54994a2845eea5e628000309614e635be4aaed58,2024-10-29T14:34:50.257000 -CVE-2024-50441,0,1,fa3535407c4df4f136174ab7a3bfffe4262ed285d5efdc948f074837395d4dbe,2024-10-29T14:34:50.257000 -CVE-2024-50442,0,0,2afcd1aa801f318495da42f93e0ab314cdb9f85940b643c33313699a69f402eb,2024-10-28T13:58:09.230000 -CVE-2024-50443,0,1,180e825e47af6aa7fd93ef1820ce36fbe1349a43a10b0578a9c8d2057b8d6ac7,2024-10-29T14:34:50.257000 -CVE-2024-50445,0,1,93d89254abe8d40bb096b13dda2339158b8c0b9fc53ca7e36a35764b3a308f3e,2024-10-29T14:34:50.257000 -CVE-2024-50446,0,1,93fc12db73b1a11c3d258d0474f684d854db3cd3ac5ae3a6af4f2ed00f2ab977,2024-10-29T14:34:50.257000 -CVE-2024-50447,0,1,fe40e9143b13f8e1f69a66378622848e38fb6faae543e2bbf63f254032c9548a,2024-10-29T14:34:50.257000 -CVE-2024-50448,0,1,cc688c2531021780281369f6ec6cb194413205dbce8f2efb8d8db3f406e21f55,2024-10-29T14:34:50.257000 -CVE-2024-50449,0,1,3429d02802ce52441f57341c160ef52c98eb06b4e6bb46b5301d5d27cda8788f,2024-10-29T14:34:50.257000 +CVE-2024-50440,0,0,d16b0a66995b7152dbf6636c54994a2845eea5e628000309614e635be4aaed58,2024-10-29T14:34:50.257000 +CVE-2024-50441,0,0,fa3535407c4df4f136174ab7a3bfffe4262ed285d5efdc948f074837395d4dbe,2024-10-29T14:34:50.257000 +CVE-2024-50442,0,1,666bbf20a669cebf02b3631074982e930833bf3617b341b3c93380d86c5ba3a2,2024-10-29T16:04:29.950000 +CVE-2024-50443,0,0,180e825e47af6aa7fd93ef1820ce36fbe1349a43a10b0578a9c8d2057b8d6ac7,2024-10-29T14:34:50.257000 +CVE-2024-50445,0,0,93d89254abe8d40bb096b13dda2339158b8c0b9fc53ca7e36a35764b3a308f3e,2024-10-29T14:34:50.257000 +CVE-2024-50446,0,0,93fc12db73b1a11c3d258d0474f684d854db3cd3ac5ae3a6af4f2ed00f2ab977,2024-10-29T14:34:50.257000 +CVE-2024-50447,0,0,fe40e9143b13f8e1f69a66378622848e38fb6faae543e2bbf63f254032c9548a,2024-10-29T14:34:50.257000 +CVE-2024-50448,0,0,cc688c2531021780281369f6ec6cb194413205dbce8f2efb8d8db3f406e21f55,2024-10-29T14:34:50.257000 +CVE-2024-50449,0,0,3429d02802ce52441f57341c160ef52c98eb06b4e6bb46b5301d5d27cda8788f,2024-10-29T14:34:50.257000 CVE-2024-5045,0,0,2cc3bc060710a5f4f076b17bfc4c763ffc9b4201a30a5ba725a69c9c0d38befe,2024-06-20T20:15:20.153000 -CVE-2024-50450,0,0,04cbd025de2c722126b65e4ff86c189c6aa33d1d4fb651a146a617e6bdee158a,2024-10-28T13:58:09.230000 -CVE-2024-50451,0,1,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000 -CVE-2024-50453,0,1,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000 -CVE-2024-50457,0,1,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000 -CVE-2024-50458,0,1,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000 +CVE-2024-50450,0,1,7fc26bfa183b8562e84f6ef3fdd2ced88c72fd71cbb7684963fe6a0f34f112bc,2024-10-29T16:05:40.250000 +CVE-2024-50451,0,0,9e10a2730d4d224fc008f74af7e4e87adb7173c98f4e87f05a6cb935f28f1c9e,2024-10-29T14:34:50.257000 +CVE-2024-50453,0,0,e89d52ae701410acfefb72264206cd0820e07df81338b3098b8559b944b0ec5e,2024-10-29T14:34:50.257000 +CVE-2024-50457,0,0,b84fdbe3b1d8ff69f56f7c8a32f23f6e8146042c72bee30b99bdcba52b7fe0e2,2024-10-29T14:34:50.257000 +CVE-2024-50458,0,0,a843b6f3ada563d8daf61990461bdb89f598755b6880d14df2bc84efdc8206c4,2024-10-29T14:34:50.257000 CVE-2024-5046,0,0,61eff6fbe16c762ff136f32fbf7c7454761f98bd61a41d7bf57a3431cdb819c7,2024-06-04T19:20:57.247000 -CVE-2024-50460,0,1,82d4ab7fefa246ce57a72383ca35008e1c66070e05dd2e7ddad07c6838704d66,2024-10-29T14:34:50.257000 -CVE-2024-50461,0,1,e926adc646135f96a8c30b094b43a59a8c4d2ffe68507adf959cf049381e29b7,2024-10-29T14:34:50.257000 -CVE-2024-50462,0,1,4ccfb8409add318d1d381a3ba39c166e299f826cc0027453ac31d88195954a9c,2024-10-29T14:34:50.257000 -CVE-2024-50463,0,0,52af3747c1c12656e614229d802eac49aeb3053d00b51467f4096bd66f6f251e,2024-10-28T13:58:09.230000 -CVE-2024-50464,0,1,cf609d0bd47c8857d574d513c156d84098d01d1e1d4103f4808d20a068af8082,2024-10-29T14:34:50.257000 +CVE-2024-50460,0,0,82d4ab7fefa246ce57a72383ca35008e1c66070e05dd2e7ddad07c6838704d66,2024-10-29T14:34:50.257000 +CVE-2024-50461,0,0,e926adc646135f96a8c30b094b43a59a8c4d2ffe68507adf959cf049381e29b7,2024-10-29T14:34:50.257000 +CVE-2024-50462,0,0,4ccfb8409add318d1d381a3ba39c166e299f826cc0027453ac31d88195954a9c,2024-10-29T14:34:50.257000 +CVE-2024-50463,0,1,41f5357ec154cc687872e4ff2451d70da03c70ee2d1be893e9fa2dcf4c51e71e,2024-10-29T16:25:01.827000 +CVE-2024-50464,0,0,cf609d0bd47c8857d574d513c156d84098d01d1e1d4103f4808d20a068af8082,2024-10-29T14:34:50.257000 CVE-2024-50465,0,0,00483e074c079de056773fdab6eb221b7f1834669791e4a86b920536bcd400c0,2024-10-28T13:58:09.230000 -CVE-2024-50467,0,1,4552ef78134a17bc23e57cbfd601f4e3eea4839d3e1dfc8a1846ef7af61ace53,2024-10-29T14:34:50.257000 -CVE-2024-50468,0,1,dcb5fc7c0ad36e7911e6c02d0d96134d3b094fc419a37a9b5d1969d6d7f9c083,2024-10-29T14:34:50.257000 -CVE-2024-50469,0,1,abcf4835413ee0cc04940d284cf5f3c90b0ebd44c44430c8cbae403d769d726a,2024-10-29T14:34:50.257000 +CVE-2024-50467,0,0,4552ef78134a17bc23e57cbfd601f4e3eea4839d3e1dfc8a1846ef7af61ace53,2024-10-29T14:34:50.257000 +CVE-2024-50468,0,0,dcb5fc7c0ad36e7911e6c02d0d96134d3b094fc419a37a9b5d1969d6d7f9c083,2024-10-29T14:34:50.257000 +CVE-2024-50469,0,0,abcf4835413ee0cc04940d284cf5f3c90b0ebd44c44430c8cbae403d769d726a,2024-10-29T14:34:50.257000 CVE-2024-5047,0,0,e6e20cd833e11113812d3bb3ced9f49583bfb3bc949749c30a550d4892cec52a,2024-06-20T20:15:20.333000 CVE-2024-50470,0,0,5685398d77bb3f31bce3d88bb8c36f240b8c7ab9a21b6213181df8a6331e7011,2024-10-28T13:58:09.230000 CVE-2024-50471,0,0,406365b17b52e654e612cf21ddf745c489dfe09eaf29c3be1d5776cb8f893d37,2024-10-28T13:58:09.230000 CVE-2024-50472,0,0,e16f1dbafc2e4404bab26f152aa15712653fbf049d57c18bb5a66aec9b12d63d,2024-10-28T13:58:09.230000 -CVE-2024-50473,0,1,b8199066d4d70afabe47990a677527c466f525d32bde81f9c86c2253d3676d86,2024-10-29T14:34:04.427000 -CVE-2024-50475,0,1,36f0716dcab36685f56e76af410832e5c6a209caa40371aa54bc3fa36e47c3b4,2024-10-29T14:34:04.427000 -CVE-2024-50476,0,1,03d0282cf6fe1ea02e5a0236d992f96a633bb2360c708089005fbef43f31b2f1,2024-10-29T14:34:04.427000 +CVE-2024-50473,0,0,b8199066d4d70afabe47990a677527c466f525d32bde81f9c86c2253d3676d86,2024-10-29T14:34:04.427000 +CVE-2024-50475,0,0,36f0716dcab36685f56e76af410832e5c6a209caa40371aa54bc3fa36e47c3b4,2024-10-29T14:34:04.427000 +CVE-2024-50476,0,0,03d0282cf6fe1ea02e5a0236d992f96a633bb2360c708089005fbef43f31b2f1,2024-10-29T14:34:04.427000 CVE-2024-50477,0,0,882b8c48a4ffe76f4b297a1251f439a05793b7127c19801e26bc55c870b615f9,2024-10-28T13:58:09.230000 CVE-2024-50478,0,0,1e570d69b0d1cd5285899bfea517d9a94df7267e4da40c94d674c6e166eb27e4,2024-10-28T13:58:09.230000 CVE-2024-50479,0,0,e9f5da762cccd3d6b96aaa1a931d48759479a75251159238dd8b5a49149bddce,2024-10-28T13:58:09.230000 CVE-2024-5048,0,0,1988e01de8a973c004f1ed34b391d1facc45cbb912e138052c0f7d6310398087,2024-06-04T19:20:57.353000 -CVE-2024-50480,0,1,9c6e44b2ad8cf235f8be06fa94bbc4d18226aff4b3790f429ce6a0c7315d34ce,2024-10-29T14:34:04.427000 -CVE-2024-50481,0,1,5405cf2423a54dd83747cd2bd6fe4fee0c2c27112bd62081838b851d73fdc674,2024-10-29T14:34:04.427000 -CVE-2024-50482,0,1,4c46db4544a2adb3c3153011ed323f9f2e4e58f44e74fcdad316d5a91a78a6b5,2024-10-29T14:34:04.427000 +CVE-2024-50480,0,0,9c6e44b2ad8cf235f8be06fa94bbc4d18226aff4b3790f429ce6a0c7315d34ce,2024-10-29T14:34:04.427000 +CVE-2024-50481,0,0,5405cf2423a54dd83747cd2bd6fe4fee0c2c27112bd62081838b851d73fdc674,2024-10-29T14:34:04.427000 +CVE-2024-50482,0,0,4c46db4544a2adb3c3153011ed323f9f2e4e58f44e74fcdad316d5a91a78a6b5,2024-10-29T14:34:04.427000 CVE-2024-50483,0,0,dc34782ca3b1404a071528e59ae2af91e68795a468368cf730f902ebe6c7f1c8,2024-10-28T13:58:09.230000 -CVE-2024-50484,0,1,fb5831468b35cba53c55a495474b64b7a8b6ec35859af8dabef2b71806e20ffa,2024-10-29T14:34:04.427000 -CVE-2024-50485,0,1,9ed12dd296d38fb6cbdb7c8752c66128ce6bd15ef5deace517d3530a40748c87,2024-10-29T14:34:04.427000 -CVE-2024-50486,0,0,40a88ff3c96226c53c633948f63e119c168c02f84967d8db7e2c9f680375c917,2024-10-28T13:58:09.230000 +CVE-2024-50484,0,0,fb5831468b35cba53c55a495474b64b7a8b6ec35859af8dabef2b71806e20ffa,2024-10-29T14:34:04.427000 +CVE-2024-50485,0,0,9ed12dd296d38fb6cbdb7c8752c66128ce6bd15ef5deace517d3530a40748c87,2024-10-29T14:34:04.427000 +CVE-2024-50486,0,1,2469de3018a70da3d3ba9f22de0bba39364400ac5239e2e8af62e693ee3e1607,2024-10-29T16:07:03.833000 CVE-2024-50487,0,0,0c4a1a3926921a2bcae14c8f09af31d6eb548ac4221df28e381f9c80ff644140,2024-10-28T13:58:09.230000 CVE-2024-50488,0,0,40d73b73129fb31724f8cd6a2898439824447d424f82ee41cc22f4a5e1f15204,2024-10-28T13:58:09.230000 CVE-2024-50489,0,0,39cf546ab4f49bcf53bc1df298c27ba2dc398fce12e81fa0caf07e0bcec9f312,2024-10-28T13:58:09.230000 CVE-2024-5049,0,0,5a3f3841afc31b2308320d9a79229ff3b2e78886b62ff0b6a021008032b5bd1d,2024-05-17T18:35:35.070000 -CVE-2024-50490,0,1,df5308d43aea0811e64f7f34c1741602a9a3be24440d41ba19ac9b091f537e4b,2024-10-29T14:34:04.427000 +CVE-2024-50490,0,0,df5308d43aea0811e64f7f34c1741602a9a3be24440d41ba19ac9b091f537e4b,2024-10-29T14:34:04.427000 CVE-2024-50491,0,0,d45e80298b2cd498e088c8e8fd696359aaf1f4ee17096c915de4f90118bf6c0d,2024-10-28T13:58:09.230000 CVE-2024-50492,0,0,0384fa23daa22133a07ff5e59a6b63c0a184d9a706db63fa7a2352fae491a288,2024-10-28T13:58:09.230000 -CVE-2024-50493,0,1,1b86e41beced3d67b90f334d27db11237a706dc3447bbfcf4216e988a60b9a9c,2024-10-29T14:34:04.427000 -CVE-2024-50494,0,1,9569aa1d34f7229fbd2091c58d08802086f733f20697c3538e6874d12444dba9,2024-10-29T14:34:04.427000 -CVE-2024-50495,0,1,dbb01d9e1ce3a0d2a398c602b6c55fb03dd093568dcc101086f2d71c70104b40,2024-10-29T14:34:04.427000 -CVE-2024-50496,0,1,8759135a902bd5e1d547f7a30947e1e84eb491a378f48e131323791258ffeb16,2024-10-29T14:34:04.427000 +CVE-2024-50493,0,0,1b86e41beced3d67b90f334d27db11237a706dc3447bbfcf4216e988a60b9a9c,2024-10-29T14:34:04.427000 +CVE-2024-50494,0,0,9569aa1d34f7229fbd2091c58d08802086f733f20697c3538e6874d12444dba9,2024-10-29T14:34:04.427000 +CVE-2024-50495,0,0,dbb01d9e1ce3a0d2a398c602b6c55fb03dd093568dcc101086f2d71c70104b40,2024-10-29T14:34:04.427000 +CVE-2024-50496,0,0,8759135a902bd5e1d547f7a30947e1e84eb491a378f48e131323791258ffeb16,2024-10-29T14:34:04.427000 CVE-2024-50497,0,0,235457ebd93f01c24a3c8c9023bb2f110341f8129e7743d0ff22d3f8a38b91aa,2024-10-28T13:58:09.230000 CVE-2024-50498,0,0,912d320d5bc70abc44f5433160c1e04f0fceafbecfd579c4c0bff65ce91ca00d,2024-10-28T13:58:09.230000 CVE-2024-5050,0,0,619081545361528557d824107c37f32918188d04adf33ba524a4859e2e6341a3,2024-06-04T19:20:57.457000 @@ -263806,7 +263812,7 @@ CVE-2024-5051,0,0,f233f4614a9daf0499b6db53ac9877312730fd59d85cfffcfb1c75738230a7 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 CVE-2024-5053,0,0,85ba036ea0ce8a641df5f4bb0e9116ce37b7603e5543e179441180f635dd17ca,2024-10-04T16:02:22.037000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 -CVE-2024-50550,0,1,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 +CVE-2024-50550,0,0,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 CVE-2024-5057,0,0,6ac23c507e757b24b72de98245da87576f9a2b62e0f8d57278541740a6070ccf,2024-09-20T19:31:39.437000 CVE-2024-50573,0,0,62b7a59f6b72947509f942a7a6ce94757dabc683ee1247a240dd34e5fae47c4a,2024-10-28T13:58:09.230000 @@ -263875,8 +263881,8 @@ CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 CVE-2024-5107,0,0,f5453befe05d8931f9c9a9c4f41bacf3f3f4a7efb50cfd25019760201fcefc62,2024-06-04T19:20:59.600000 -CVE-2024-51075,1,1,552654645a7aa81d5ed2831dafeaafc72eb231e0261d5c643a1680368a0d4e42,2024-10-29T14:34:04.427000 -CVE-2024-51076,1,1,f29f14a6d6263f0ea29fba266cf4eb680f3fd81509f85036f71e3215970a786a,2024-10-29T14:34:04.427000 +CVE-2024-51075,0,0,552654645a7aa81d5ed2831dafeaafc72eb231e0261d5c643a1680368a0d4e42,2024-10-29T14:34:04.427000 +CVE-2024-51076,0,0,f29f14a6d6263f0ea29fba266cf4eb680f3fd81509f85036f71e3215970a786a,2024-10-29T14:34:04.427000 CVE-2024-5108,0,0,b8eaa0c49e3b7a0772fb8d227eefbcd229b705e71c1ea537a10c0b9ca289502f,2024-06-04T19:20:59.700000 CVE-2024-5109,0,0,ceb18a5d96497e9a6ac7740a19ad17f4e12924c64b1533f15150f5dd2571e331,2024-06-04T19:20:59.803000 CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000 @@ -263888,8 +263894,8 @@ CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3d CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 -CVE-2024-51180,1,1,ec97a9e97d18a7900cf99e5896474449d0db8231f779e8fc5a292a25cc3455cc,2024-10-29T14:34:04.427000 -CVE-2024-51181,1,1,c1316549e099a4a2c3e3cd425574fa5ef167c2c9a4fa1f57146fbe739c1e1d23,2024-10-29T14:34:04.427000 +CVE-2024-51180,0,0,ec97a9e97d18a7900cf99e5896474449d0db8231f779e8fc5a292a25cc3455cc,2024-10-29T14:34:04.427000 +CVE-2024-51181,0,0,c1316549e099a4a2c3e3cd425574fa5ef167c2c9a4fa1f57146fbe739c1e1d23,2024-10-29T14:34:04.427000 CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000 CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 @@ -263918,10 +263924,10 @@ CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe73 CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb77,2024-09-03T12:59:02.453000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 -CVE-2024-51506,0,1,c88e78bfaf14f8d0bca992fe3403170d31c1a380aad632270c875e55067a55f0,2024-10-29T14:34:04.427000 -CVE-2024-51507,0,1,7fe2110c0e3dea0d2c93789d83d24e5f3a0499c9a799c4c9d2c88a63c0ea584d,2024-10-29T14:34:04.427000 -CVE-2024-51508,0,1,3dd011dfae2ceaccb8259eabd1aca7b9fece5a037f8ba43555f2e4288d978d02,2024-10-29T14:34:04.427000 -CVE-2024-51509,0,1,19f103a17824310cb94f455901fbb6e58a26940599face0db6183ee10f94fe7c,2024-10-29T14:34:04.427000 +CVE-2024-51506,0,0,c88e78bfaf14f8d0bca992fe3403170d31c1a380aad632270c875e55067a55f0,2024-10-29T14:34:04.427000 +CVE-2024-51507,0,0,7fe2110c0e3dea0d2c93789d83d24e5f3a0499c9a799c4c9d2c88a63c0ea584d,2024-10-29T14:34:04.427000 +CVE-2024-51508,0,0,3dd011dfae2ceaccb8259eabd1aca7b9fece5a037f8ba43555f2e4288d978d02,2024-10-29T14:34:04.427000 +CVE-2024-51509,0,0,19f103a17824310cb94f455901fbb6e58a26940599face0db6183ee10f94fe7c,2024-10-29T14:34:04.427000 CVE-2024-5151,0,0,b696148b4b4d31279fb07ba468cbee496fd48b395a603a703c253d2f424d78b8,2024-08-01T13:59:41.310000 CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b306f,2024-07-24T17:58:12.617000 CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000 @@ -264275,7 +264281,7 @@ CVE-2024-5527,0,0,331ae87f67986356dc980ea3627872b6fdf17356300466b2fa99a93693833d CVE-2024-5529,0,0,937974f4dc8452080813e8845278bacd700ec1506795ce300b5e02849590121d,2024-07-25T15:21:02.647000 CVE-2024-5530,0,0,c11f1d7738a3ef2fbe260923ece5c37664d50f681ba992e1f901b970619d3d58,2024-06-11T13:54:12.057000 CVE-2024-5531,0,0,6e18bd4c00ec4db4743368aa05b5d810d40ae0d6bb9ac604deef69554fbe362e,2024-06-11T13:54:12.057000 -CVE-2024-5532,0,1,c4735ce0b226069f7c0d7656ffef3707587f07540d25cf387b14889e6a88ef53,2024-10-29T14:34:50.257000 +CVE-2024-5532,0,0,c4735ce0b226069f7c0d7656ffef3707587f07540d25cf387b14889e6a88ef53,2024-10-29T14:34:50.257000 CVE-2024-5533,0,0,9bad1fab6a90d68c007069d0bfcbdd7a7d72da6f38ffeb11140e803bac3bba45,2024-07-05T14:01:37.470000 CVE-2024-5535,0,0,a4c9a52c5762644097b9202aaddafb08e0f65ed76c571265ed2ff38052925bcd,2024-07-12T14:15:16.790000 CVE-2024-5536,0,0,73dcec0849972f2d05562926289a190dfff8aecd0c504065927b960620a16fb3,2024-06-11T17:28:37.343000 @@ -264524,7 +264530,7 @@ CVE-2024-5819,0,0,ff5f9599a99761c75338a6f351d5018b6b4257daf87dc238a533c6ea2133dd CVE-2024-5820,0,0,4c9e3224ff2f58cd9b00410a197234419444c7f4cb436de63372b9de4c6303c2,2024-07-12T08:15:11.560000 CVE-2024-5821,0,0,14c66e5b9fe266ccf4bf59e0254237da8c439f65c9de7d774ed6c1950ac6b04a,2024-07-12T08:15:11.640000 CVE-2024-5822,0,0,baf10ed90614f0ff900c6a4bdea84fcaae14f3f7ead2ea1122c706f066c79b96,2024-06-27T19:25:12.067000 -CVE-2024-5823,1,1,ec47d53329a1ee03be3ba89e6fe485f37225b2548233a1bbea771572cc692f66,2024-10-29T14:34:04.427000 +CVE-2024-5823,0,0,ec47d53329a1ee03be3ba89e6fe485f37225b2548233a1bbea771572cc692f66,2024-10-29T14:34:04.427000 CVE-2024-5824,0,0,a626487511d1e6b65da2c7fdc7f30939ba46505ead241212d2b122818200e9ab,2024-06-27T19:25:12.067000 CVE-2024-5825,0,0,682d9c8db78e32760516d35e8d80736a485272125d13ba44bf7f0b379940e54f,2024-06-11T10:15:13.960000 CVE-2024-5826,0,0,ab74f2650ad7ec867beb938c7b9b39007cedba2567b06756b5e245e8edb717b0,2024-06-27T19:25:12.067000 @@ -264658,7 +264664,7 @@ CVE-2024-5977,0,0,4e816ebc7667057f83765d2758ec72f0b5ebf68f5f0bba511fae25da758158 CVE-2024-5979,0,0,2890db7bdc2045eea751460532af007391576d7da8d9f838bf14583c0290ae73,2024-06-27T19:25:12.067000 CVE-2024-5980,0,0,915920a5c8bdff0e9b559c6fdf1db06079562e1ee1f1333b9d9e824a78939fce,2024-06-27T19:25:12.067000 CVE-2024-5981,0,0,ef1af743cedf4b6b2a243e8210155140211219a91ac8483d52ff9c2f041ab697,2024-08-16T20:29:35.287000 -CVE-2024-5982,1,1,78ec85d4df3ef45b07a13b2648b7689e9ed03986d3be24189eaad8006d2fd855,2024-10-29T14:35:20.400000 +CVE-2024-5982,0,0,78ec85d4df3ef45b07a13b2648b7689e9ed03986d3be24189eaad8006d2fd855,2024-10-29T14:35:20.400000 CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018a7,2024-07-24T02:39:24.200000 CVE-2024-5984,0,0,02adfef3fce737b6a79614009e0e348625eec114041041ad04a7ccaf8be7e88b,2024-10-09T18:37:10.747000 CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000 @@ -264891,7 +264897,7 @@ CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654d CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000 CVE-2024-6243,0,0,af3e968f15710e52d1218645566e4f111ef2efb93699a091cf90e62d1a93b4e5,2024-08-01T14:00:17.580000 CVE-2024-6244,0,0,4cbb950433f554609a829b59a39adf424a1ad2c2835842fe2854036e922c35b5,2024-07-25T15:15:39.890000 -CVE-2024-6245,0,1,8b8bfbb38c7d17d7193b203c71c8c11e065591251b6ce73925be5ef71125bb66,2024-10-29T14:34:50.257000 +CVE-2024-6245,0,0,8b8bfbb38c7d17d7193b203c71c8c11e065591251b6ce73925be5ef71125bb66,2024-10-29T14:34:50.257000 CVE-2024-6250,0,0,65144edeea3f44f34a4643fe614f57e1f379d6c9ac265963a9d3e1dd464fb73c,2024-06-27T19:25:12.067000 CVE-2024-6251,0,0,16b10e1cddc7eff45d98af1185a636a3580f45224711e6588b6edb55d20841be,2024-09-19T16:50:07.723000 CVE-2024-6252,0,0,422fd4c7b8f89267d92d3bf66ac85edf294b5267c233f79a68b2879491fdff76,2024-09-19T16:51:12.527000 @@ -265183,7 +265189,7 @@ CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070 CVE-2024-6578,0,0,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 -CVE-2024-6581,1,1,9055383cfe6fbc4db3cd9a46d79cd3f07357c51de5fc104a3766cd43c81a7a49,2024-10-29T14:34:04.427000 +CVE-2024-6581,0,0,9055383cfe6fbc4db3cd9a46d79cd3f07357c51de5fc104a3766cd43c81a7a49,2024-10-29T14:34:04.427000 CVE-2024-6582,0,0,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000 CVE-2024-6585,0,0,21557c5e847867bddd52df3ea3c8bef1c24ed1d84f80217fb776a5f25fb72332,2024-09-03T15:35:16.350000 CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de0a,2024-09-03T15:35:16.577000 @@ -265261,8 +265267,8 @@ CVE-2024-6669,0,0,87233746e73dcd3cc336669e330764691e93b16935dab43ac512a989f6e36e CVE-2024-6670,0,0,0385af7065d3a7949a98d24fadefdba9efb8f4526cb416df9a2b29c5ec309f96,2024-09-17T01:00:01.320000 CVE-2024-6671,0,0,0f334db29395e8161e019908d1c259201b627ca1c9d0cfd40be71a12cb877045,2024-09-04T15:53:07.733000 CVE-2024-6672,0,0,f03acb9d245a8919bddd732053bec54770cb0a4b96386add16d0f2ae9269f678,2024-09-04T14:23:58.403000 -CVE-2024-6673,1,1,ad9a4f04bf798b606ffdd21df5d11e5b238ea5c1f759b81ecab3e4b3e07b9b7c,2024-10-29T14:34:04.427000 -CVE-2024-6674,1,1,95172d2f34e9d18da2b06836b0b9bc7d9517793385eef1d5aa7da5d332fa957d,2024-10-29T14:34:04.427000 +CVE-2024-6673,0,0,ad9a4f04bf798b606ffdd21df5d11e5b238ea5c1f759b81ecab3e4b3e07b9b7c,2024-10-29T14:34:04.427000 +CVE-2024-6674,0,0,95172d2f34e9d18da2b06836b0b9bc7d9517793385eef1d5aa7da5d332fa957d,2024-10-29T14:34:04.427000 CVE-2024-6675,0,0,efdcf1bd038d8c9716519636ba8adbdaf757c6f9212f3c0c6f277c3b8045a346,2024-07-24T12:55:13.223000 CVE-2024-6676,0,0,b617e99f4ff839e117300b1a5f3c494dc1ceb13864a576e2b1519c7ec5960d34,2024-07-11T13:05:54.930000 CVE-2024-6677,0,0,d8004a1441e952f05633a34727a4f9223ac5077c2123fd1507a1955287de18f3,2024-07-12T12:49:07.030000 @@ -265407,7 +265413,7 @@ CVE-2024-6862,0,0,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7 CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 CVE-2024-6867,0,0,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000 -CVE-2024-6868,1,1,d5104475e31e0fb90cc1d3df44800cd264971d04228c9c8702fdfaa233a7a0b4,2024-10-29T14:34:04.427000 +CVE-2024-6868,0,0,d5104475e31e0fb90cc1d3df44800cd264971d04228c9c8702fdfaa233a7a0b4,2024-10-29T14:34:04.427000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 CVE-2024-6870,0,0,b8787438d65804a2db5bbc8c04084c34ae58bc1819956a7afefdca8ed2b91985,2024-09-27T00:52:03.737000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 @@ -265537,7 +265543,7 @@ CVE-2024-7006,0,0,d510a15f87dd1c79e35f8009bc9e9e19d5574ea60c240c6e393b2fbd477adf CVE-2024-7007,0,0,6c2603aae32d52f56620cb62e82bb337e026d3d4a4716b72dab9674c5cf4b216,2024-08-26T16:40:44.500000 CVE-2024-7008,0,0,e9008eac80639f6b75fc8244a6b0baab3d6a7fa095b7e9aa58d7626a117a490a,2024-08-19T17:19:25.390000 CVE-2024-7009,0,0,63b067a161bbf9c0630f63b1d51ac801565652e58cd58fdd4516392106a400e2,2024-08-19T17:18:50.290000 -CVE-2024-7010,1,1,e8197466fb2c1bac0f4d4a1323b7c9da17e9a3898507a8699fc4886432b9e8aa,2024-10-29T14:34:04.427000 +CVE-2024-7010,0,0,e8197466fb2c1bac0f4d4a1323b7c9da17e9a3898507a8699fc4886432b9e8aa,2024-10-29T14:34:04.427000 CVE-2024-7011,0,0,fafa14a9632dbca7dce2bf31a9559a65baefeba7773bf0dacaafeb6e3837c6c8,2024-09-30T12:46:20.237000 CVE-2024-7012,0,0,7505e34b161e28dbe95eb89541c44fc261402b7bb3b4a766cd0492f45404fdcf,2024-09-19T06:15:03.777000 CVE-2024-7013,0,0,b2d18f592f803beaaf02ae1066b68bd9f1fd65046672577949ac6ff9d71880f4,2024-08-21T12:30:33.697000 @@ -265557,7 +265563,7 @@ CVE-2024-7032,0,0,c9fbd7c25c8986098b0db02c8f6b35abbde59d7f3338b2f6bf6ad9dd6ca450 CVE-2024-7037,0,0,dd49934fb89a4cd9156479561f4579716c8bbefb475939312544c6bfe1fd2c69,2024-10-10T12:51:56.987000 CVE-2024-7038,0,0,c6c61a8209299a027f404e23e0f880dbd94e569f03cadf08307c0ee843f5816f,2024-10-15T19:04:48.627000 CVE-2024-7041,0,0,dcc586a9589d4da0815c96bc2883ae49d30920986ca4c102055deacb752acc00,2024-10-10T12:51:56.987000 -CVE-2024-7042,1,1,c2b56d96db71d7f0eeea4cc3b752ac5c45d47525d7b3c34a951eebddd72552c7,2024-10-29T14:34:04.427000 +CVE-2024-7042,0,0,c2b56d96db71d7f0eeea4cc3b752ac5c45d47525d7b3c34a951eebddd72552c7,2024-10-29T14:34:04.427000 CVE-2024-7047,0,0,21985a71701c23251b30e756f6f2c4f75baa147c34a8c282b34b811aa42e2336,2024-08-26T16:07:27.837000 CVE-2024-7048,0,0,89e7f79a80eda12c2b26c43fb062e41b4f4492714694bac6a9f3919e1af92730,2024-10-10T12:51:56.987000 CVE-2024-7049,0,0,0a245acb222c9415b34bdd2b50731367d88750a93745ace19c048218b6b8c0be,2024-10-17T14:22:44.653000 @@ -265900,10 +265906,10 @@ CVE-2024-7467,0,0,1635aa1540733ea32e6f2c1b73b541d5af5dfcd94c3797172bd89de0083b56 CVE-2024-7468,0,0,beaf0f0ce0713b119a6aad075faba99ddbbf9b51410059760701d7a29a28a4df,2024-08-06T17:35:40.080000 CVE-2024-7469,0,0,9480167bec5dcea6298d57f7311e33d09ca16fde559c0d2101bf57fd073ab050,2024-08-06T17:36:19.150000 CVE-2024-7470,0,0,c378df60a1369914caa48d0c9b95c12c12b8030c63ff1d7f88f18ec0798c6329,2024-08-06T17:37:07.923000 -CVE-2024-7472,1,1,1915bf4a426a37e46e592b133c645563f3fd303e31151501720f3e9bed750db8,2024-10-29T14:34:04.427000 -CVE-2024-7473,1,1,9d07607226699ccf0acd9f494035f0dc8e05b8c8f6ea397eba5f7678020a2147,2024-10-29T14:34:04.427000 -CVE-2024-7474,1,1,fd603ba5192c32c81661db241a24a16d96938f0a539e4ad024748791a7268266,2024-10-29T14:35:21.207000 -CVE-2024-7475,1,1,2b037db3837162a776e57f7b2c7175870a05e0cd0e7064c84fd1c023e8b92b59,2024-10-29T14:35:21.403000 +CVE-2024-7472,0,0,1915bf4a426a37e46e592b133c645563f3fd303e31151501720f3e9bed750db8,2024-10-29T14:34:04.427000 +CVE-2024-7473,0,0,9d07607226699ccf0acd9f494035f0dc8e05b8c8f6ea397eba5f7678020a2147,2024-10-29T14:34:04.427000 +CVE-2024-7474,0,0,fd603ba5192c32c81661db241a24a16d96938f0a539e4ad024748791a7268266,2024-10-29T14:35:21.207000 +CVE-2024-7475,0,0,2b037db3837162a776e57f7b2c7175870a05e0cd0e7064c84fd1c023e8b92b59,2024-10-29T14:35:21.403000 CVE-2024-7477,0,0,b965ae55657c73e31f78218a320569adb7f93e50d4b13da2aa9ac96583a28b42,2024-09-11T15:03:06.637000 CVE-2024-7479,0,0,a6b359841d759122cd71cb2a661ca0e606e049ff6b266c86e006d82fc6844772,2024-09-26T13:32:02.803000 CVE-2024-7480,0,0,3513e9b1b40322abc4857852444e6547d08e759bdd020204145d34efe837e109,2024-09-11T15:03:37.293000 @@ -266147,14 +266153,14 @@ CVE-2024-7763,0,0,5d291ab0f3abe69aaa5cb8b4e2fe2341213a548e109030bc89fadbabcbfad5 CVE-2024-7766,0,0,4e35bee576a6abfaafa62da3f1b54e408714e45f4e43f63a810722c69e36afe2,2024-09-26T20:37:18.900000 CVE-2024-7770,0,0,c7cdbe9f10cd7fded45408e87450036bd23da653083b9d55869a5992b7da25b8,2024-09-26T17:49:17.457000 CVE-2024-7772,0,0,10ae3b8ddfb97cd1facaede4399b22bddced2619c3d70ce3a321e07353f3ff86,2024-10-02T16:10:49.387000 -CVE-2024-7774,1,1,3070a44c277e1333f0d2427da259897acbab258510f6f047fc960459be5c30e9,2024-10-29T14:34:04.427000 +CVE-2024-7774,0,0,3070a44c277e1333f0d2427da259897acbab258510f6f047fc960459be5c30e9,2024-10-29T14:34:04.427000 CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000 CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000 CVE-2024-7778,0,0,2fe0c9b8600c103dc69d73ebe792b6f5d96c6eaccbc88de74e66c7097ae3a047,2024-09-26T22:22:04.053000 CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000 CVE-2024-7781,0,0,195406e4d26756061eec11348aa250b24d79fc541f740fe89b1afbbb454c19eb,2024-10-02T16:21:03.113000 CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000 -CVE-2024-7783,1,1,daa273ed833d4bd306655d31b756f6dc53d7a862dd88feb2d4839be026c12aa6,2024-10-29T14:34:04.427000 +CVE-2024-7783,0,0,daa273ed833d4bd306655d31b756f6dc53d7a862dd88feb2d4839be026c12aa6,2024-10-29T14:34:04.427000 CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000 CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000 CVE-2024-7786,0,0,fc116ee7a384561ad006648b89134c44e9184040e8b317407aecf4e96010cf80,2024-10-07T17:46:08.943000 @@ -266171,7 +266177,7 @@ CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 CVE-2024-7801,0,0,bed682b6222cb0c9f77cc5a0751ff36b1d3476d22f8b98362a2b5472dbe7cc5b,2024-10-17T15:19:27.053000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 -CVE-2024-7807,1,1,0e2a44959ae3bb0b2cc26db4ea86f0388763df06b2c8c2674bf1a9f0faa7707b,2024-10-29T14:35:21.773000 +CVE-2024-7807,0,0,0e2a44959ae3bb0b2cc26db4ea86f0388763df06b2c8c2674bf1a9f0faa7707b,2024-10-29T14:35:21.773000 CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 CVE-2024-7810,0,0,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 @@ -266303,7 +266309,7 @@ CVE-2024-7955,0,0,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 CVE-2024-7960,0,0,6a2bab47d6fb588f4b238853d16e03fdaf4248afb98afbb54a62ccac2359c7cf,2024-09-19T01:52:55.193000 CVE-2024-7961,0,0,54fcb6c11cb4fffe551975ea2c4e2b806861e5ed35f30fcbecfeddbc47fcfbb8,2024-09-19T01:52:24.530000 -CVE-2024-7962,1,1,582658592d187b202de2d11d01b70d2fae80e8abf3cb2975e04203cb3deaa696,2024-10-29T14:34:04.427000 +CVE-2024-7962,0,0,582658592d187b202de2d11d01b70d2fae80e8abf3cb2975e04203cb3deaa696,2024-10-29T14:34:04.427000 CVE-2024-7963,0,0,5d9d56257af0c8a46d80addfe5060ee179dc9f0bcbd8087ed3e38a0505c107e7,2024-10-10T12:51:56.987000 CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000 CVE-2024-7965,0,0,97b62e193bdcda79c7557e9a31668077fb71dcc6db54dee06fbdef6c26c1aa29,2024-09-18T12:40:05.597000 @@ -266323,6 +266329,7 @@ CVE-2024-7978,0,0,67c4229f7235438f3aa7b05e7807f93765050dcc016da021af4e6ebc6fa52e CVE-2024-7979,0,0,7197dd548ee44d45e84f2f2c61d6a52a80bd0fd2ed16f305497f42e667362bae,2024-08-26T15:13:19.383000 CVE-2024-7980,0,0,cda5d0604d61479305f3aa6d24c7a46f2d1d2a7e936538d9b59a5f61a8d4d4b3,2024-08-26T15:14:10.730000 CVE-2024-7981,0,0,558a7e30af48c73a27172093229eee673e34b504c9731b910b5af4369614c86c,2024-08-22T17:36:24.803000 +CVE-2024-7985,1,1,0ccddadc1691019ae8034fc6395191a1e6135cc582660ad5f7e788c298ddf873,2024-10-29T16:15:06.180000 CVE-2024-7986,0,0,a43751c0931e4929788be7df13e0b692f335646e8ba6bbd66f7625d734a5daf5,2024-08-23T16:18:28.547000 CVE-2024-7987,0,0,76927c94eae9954117a932c513da8aebd30f47001e85e588d746e509b6294d24,2024-08-26T18:35:13.553000 CVE-2024-7988,0,0,f1ca0f1a43359526a6c9585e72942b31e1455ffa80a01c452c09ecf831a670e6,2024-08-26T18:35:14.617000 @@ -266423,7 +266430,7 @@ CVE-2024-8139,0,0,30a28567f99fee6c1c6f825267497f95b5b28ab0436eee99757c8433aaff2e CVE-2024-8140,0,0,5905102d90fa9e01c1c294a1e12efca1eb0a1890a608c263dfef788228e71855,2024-08-26T19:09:52.653000 CVE-2024-8141,0,0,d494eb4aa5e779d518a311786c18c827e0ced59860399587e09c025afdbaf176,2024-08-26T19:09:16.763000 CVE-2024-8142,0,0,d4b24d12d326b40d1c063c9a3edca906c8e404b0436fcc16715466b79bbf260c,2024-08-26T19:08:38.493000 -CVE-2024-8143,1,1,102604b462c1d031990c2db79f517efbf3988c959905abd72423d86ae965bbcc,2024-10-29T14:34:04.427000 +CVE-2024-8143,0,0,102604b462c1d031990c2db79f517efbf3988c959905abd72423d86ae965bbcc,2024-10-29T14:34:04.427000 CVE-2024-8144,0,0,8c217cf77629850f2a31ec00f7904f772883a591a54b72411e3d3cd24bcf1f00,2024-09-18T18:24:46.730000 CVE-2024-8145,0,0,bd81408bdf46da0e2582ac2e30e29c3e5c1bfb2c062e1e74f1ce357731354e4f,2024-09-18T15:34:47.007000 CVE-2024-8146,0,0,a2a80ffef156fb85ffee90216beed89480bdca821cd7147cd0b42bd2951a2961,2024-09-24T17:00:38.933000 @@ -266542,7 +266549,7 @@ CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6 CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000 CVE-2024-8305,0,0,d66b035463acddb1c93013687fce349938f4d85da7d81154c45e44366bbf218f,2024-10-21T17:09:45.417000 CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000 -CVE-2024-8309,1,1,5dff4fef0d4324a90e57d60a54c6b9e704405bbfae6e5c7c96b7582afd9d776d,2024-10-29T14:34:04.427000 +CVE-2024-8309,0,0,5dff4fef0d4324a90e57d60a54c6b9e704405bbfae6e5c7c96b7582afd9d776d,2024-10-29T14:34:04.427000 CVE-2024-8310,0,0,7c8549a7a64d3579b34aa56e199885805550ab7f5a2102b636629253bc8a75c3,2024-09-30T12:45:57.823000 CVE-2024-8311,0,0,5b6832ab4de9e09983d490e9b9cfb24e40403bdf974bac09340ae2b77983823b,2024-09-18T19:12:52.810000 CVE-2024-8312,0,0,0efa58c9a3b7df8f2c5bdfd09c1052f11675ef50d9e2c1eaba18c214a796103b,2024-10-25T12:56:07.750000 @@ -266847,7 +266854,7 @@ CVE-2024-8733,0,0,2ad75c4913be224ff75684fa724a275e53b709dc0d7f918cc99544f1d75453 CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000 CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000 CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000 -CVE-2024-8740,0,1,344648ec73420b23dee0eff45da9579413da1d5a4cc904056aa5b9f023dadc49,2024-10-29T14:46:02.103000 +CVE-2024-8740,0,0,344648ec73420b23dee0eff45da9579413da1d5a4cc904056aa5b9f023dadc49,2024-10-29T14:46:02.103000 CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000 CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000 CVE-2024-8743,0,0,65920323e1d664fd8f354bc76b73276103c2d19a537eecec01fa5cc8c5638d58,2024-10-07T17:48:28.117000 @@ -266881,7 +266888,7 @@ CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c94343 CVE-2024-8786,0,0,98535b365547eb81c56b86d17170e324effeb134cfd99a6f8a9199c7d69b6f51,2024-10-04T13:51:25.567000 CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0ed8,2024-10-16T16:38:14.557000 CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000 -CVE-2024-8790,0,1,c35e20798e104d347809d26eec2137cb82ecdc52b92a3f74d2215cdbc40f5b61,2024-10-29T14:44:59.497000 +CVE-2024-8790,0,0,c35e20798e104d347809d26eec2137cb82ecdc52b92a3f74d2215cdbc40f5b61,2024-10-29T14:44:59.497000 CVE-2024-8791,0,0,fb5b0ac36efac34bc9b2b46a1f471f8bc629f8b19dafbbe4161ffb4834ecffd5,2024-09-26T16:25:34.120000 CVE-2024-8793,0,0,959b266c850b42df4ff44733c3776bf7c1d0fcf64b78d7cab419106b5de40dbb,2024-10-07T16:04:08.490000 CVE-2024-8794,0,0,71d6f226610d884ee512fa4051f8594e0cafa29b4878c9ac672c3de2ccd4c022,2024-09-26T16:23:46.740000 @@ -266940,13 +266947,14 @@ CVE-2024-8912,0,0,a4286937675e049e61563468e21e8ee394eb8618a71f95672d8446231a80ed CVE-2024-8913,0,0,fca416d77c5623788a9db07f1a3764802595b9fed9406445b458bbb4d1cd4d8c,2024-10-15T12:58:51.050000 CVE-2024-8914,0,0,c67ce2c8d24044b482c9bbb33384856203ff5bb870309850d7df3d6267c1b679,2024-09-26T13:32:02.803000 CVE-2024-8915,0,0,80988e61f2deb23ce0d3db6a9db0275f7f6c7eec9c9b53e27317ff9faa29da01,2024-10-15T12:57:46.880000 -CVE-2024-8916,0,1,6ce934fcc9c0de731f667a3ddfb098320397ac17d3f336b1e58c762df8bae46f,2024-10-29T14:37:42.877000 +CVE-2024-8916,0,0,6ce934fcc9c0de731f667a3ddfb098320397ac17d3f336b1e58c762df8bae46f,2024-10-29T14:37:42.877000 CVE-2024-8917,0,0,32a69b030ac61cd4e144a233fc55362cc6115ccb6ecca5ec236644320a2aecf1,2024-09-30T14:30:38.687000 CVE-2024-8918,0,0,adf87d72fe8bb71bb4e84db31b9473b9ff815dc1f43bef94a15bce0226f2d2fa,2024-10-17T18:25:46.967000 CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc540,2024-09-30T15:08:14.077000 CVE-2024-8920,0,0,42fc84557f46536ee5298e40d09a285310a4aead85db529ff9c7f89249448d09,2024-10-18T12:52:33.507000 CVE-2024-8921,0,0,284c01e369230b6750ee6b9940d65eaadc6d5f92caf4598fee3000ae2f72d29e,2024-10-16T16:38:14.557000 CVE-2024-8922,0,0,8e0e34187cf2453e3fbc920fc9b2ec5c27a6978605c90cb2daa5d0ef90213fbe,2024-10-04T19:11:47.217000 +CVE-2024-8923,1,1,d929bf8fea44a42c72702483ecd4b30f26b21f5148486e4adb94932ff36ba094,2024-10-29T16:15:06.417000 CVE-2024-8925,0,0,7b6e4b4e016d861119aaef8d6752703732a07441653d2fc6f49b309099d5a5d4,2024-10-16T18:53:39.957000 CVE-2024-8926,0,0,a754d1da087a38a540f43b496a74701704f80b11b38ca93965866e0a4f56c5ab,2024-10-16T18:35:59.500000 CVE-2024-8927,0,0,111a4443e95a74bdfce7c0d0d95c5c978a35ed475f30166e617d9fcf08b6e72f,2024-10-16T18:28:34.573000 @@ -267203,7 +267211,7 @@ CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f559 CVE-2024-9347,0,0,131d08ad666b2357ecd19b3118dbe82da22a41e64a4f3a4f02af3909537af845,2024-10-18T12:53:04.627000 CVE-2024-9348,0,0,5306ee8a501834848c65c39ccde679f8538adcf6268b8dd12eab61572d72a494,2024-10-16T16:38:14.557000 CVE-2024-9349,0,0,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000 -CVE-2024-9350,0,1,aa8e581f7289e7bd37e76e94e3964b82de5f4fbd95aa75417bef570e71a86c63,2024-10-29T13:44:03.897000 +CVE-2024-9350,0,0,aa8e581f7289e7bd37e76e94e3964b82de5f4fbd95aa75417bef570e71a86c63,2024-10-29T13:44:03.897000 CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 @@ -267219,7 +267227,7 @@ CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7 CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000 CVE-2024-9374,0,0,71b6734f379ef9a804fdc66eda125efbaf96377b76395ed89ad6eee48b26d41e,2024-10-25T12:56:07.750000 CVE-2024-9375,0,0,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000 -CVE-2024-9376,0,1,472bd386b6be1b9de442acc8b3b717a859ed7aa97aa97328870deb21c6524bb9,2024-10-29T14:34:04.427000 +CVE-2024-9376,0,0,472bd386b6be1b9de442acc8b3b717a859ed7aa97aa97328870deb21c6524bb9,2024-10-29T14:34:04.427000 CVE-2024-9377,0,0,3c01b2152e67b0ec56dfdcb67187215bc3a0a790ca5dfe0c8b3edfb9194a5eaf,2024-10-15T14:18:12.483000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 @@ -267255,7 +267263,7 @@ CVE-2024-9425,0,0,bc1d05d29533f5db80147aca0ebcf5dcf1807c002307822e9b1efd4c274ae3 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 CVE-2024-9436,0,0,e30b504278d7461ced9f3cdf7218be31f384e3265b531ba87e7d14e133fbe3e1,2024-10-15T12:58:51.050000 -CVE-2024-9438,0,1,f23988b383ffc7b9a8be3f13a0e81848cd3463f82ea0b782cf2d1c7c8dbf0f4a,2024-10-29T14:34:04.427000 +CVE-2024-9438,0,0,f23988b383ffc7b9a8be3f13a0e81848cd3463f82ea0b782cf2d1c7c8dbf0f4a,2024-10-29T14:34:04.427000 CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 CVE-2024-9444,0,0,5871ece6e08e2e034d7a3616fcef31689e8667809591fe9662a10d21d3c836c0,2024-10-16T16:38:14.557000 @@ -267288,7 +267296,7 @@ CVE-2024-9486,0,0,1369350ab2629110ffa188dbd15b41ead2245f88a49115aa36147be3bd87c7 CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9a7,2024-10-15T12:58:51.050000 CVE-2024-9488,0,0,3154f25401247f46098357ebd2d84fe95bb2164e861af1c275743e022d6c3976,2024-10-25T12:56:07.750000 CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000 -CVE-2024-9505,1,1,9f563819d874cda28d933cc3759112519ce910489eea1287ec5cc51a40bde8da,2024-10-29T14:34:04.427000 +CVE-2024-9505,0,0,9f563819d874cda28d933cc3759112519ce910489eea1287ec5cc51a40bde8da,2024-10-29T14:34:04.427000 CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000 CVE-2024-9507,0,0,9477ee329318032ff294d196e1a50966e1c5d89bdb9b9dc24092f58cf1f5f346,2024-10-15T12:58:51.050000 CVE-2024-9513,0,0,8bf69fcd896ef2c6d740d4e3fb7359c13bcd3037f3f5c5ca172d72ee575fdaa7,2024-10-07T21:15:19.450000 @@ -267351,11 +267359,11 @@ CVE-2024-9585,0,0,51bc02706f102b87905f6aabb2c8a9fcc3c7b76d44b671d05f95ce83ace331 CVE-2024-9586,0,0,a482a25f032ea940edbd74f8dc11272d0d4fecf517c5613466c04b8bd798dc3e,2024-10-15T12:58:51.050000 CVE-2024-9587,0,0,081ae6ebdba381265a40b327141c3458d6ec1c5b94d7fb86236bf633a93923d3,2024-10-15T12:58:51.050000 CVE-2024-9588,0,0,17edfb44b6dceb63c8cfe98df84bd537badbdd9e7eab4717bc301aff2d50d2c8,2024-10-25T21:15:39.970000 -CVE-2024-9589,0,0,12420b2f38d2c93f0b54cb162fd986b1e3bc035cb82aa25afa709b3dca72935b,2024-10-23T15:12:34.673000 -CVE-2024-9590,0,0,f04908a66c8eee122a17cc23cd10db8f2eac72ab6acc6c9d623f58ed2f5d06ed,2024-10-23T15:12:34.673000 -CVE-2024-9591,0,0,18f850846f634f78ac97108e7dec46e1c5c5e29d9be70684269dc0702592824d,2024-10-23T15:12:34.673000 +CVE-2024-9589,0,1,39afa64c0fe2a317a8959b276ea9fa5d62f4bfd393e1c38cfe8c40def7eb0f61,2024-10-29T16:07:54.387000 +CVE-2024-9590,0,1,3ea221ce5737c7461b642f4b40c8f88f2882c3fc1e287dc4995c8dfdd067fbb4,2024-10-29T16:07:43.737000 +CVE-2024-9591,0,1,52d0197d17e908729023f30744d453ad1a46477297400d8fb8b5026f822177e2,2024-10-29T16:04:23.463000 CVE-2024-9592,0,0,6f7f83fab1eebba9a1f954ec84a1bbaa3c51a5f9b9c0e4a02c7010d63a53fba8,2024-10-15T12:57:46.880000 -CVE-2024-9593,0,1,02cbbab3c962db41b4f7d8f2fd2455e47a515515a926a898431a74600b7b719f,2024-10-29T13:40:23.983000 +CVE-2024-9593,0,0,02cbbab3c962db41b4f7d8f2fd2455e47a515515a926a898431a74600b7b719f,2024-10-29T13:40:23.983000 CVE-2024-9594,0,0,76152af657dea527c4e562a1c5799c4834f4bf18cf4ca885159373bfd78ad4ca,2024-10-16T16:38:14.557000 CVE-2024-9595,0,0,6e91591cc8fc6f8664de9cf116e0c3ff35185abd26eee85b7100e07838bd2f63,2024-10-15T12:57:46.880000 CVE-2024-9596,0,0,b127f83f2b318ff048db80701b5c7105ea78e0681a89ee2fdf37846a5fa10d86,2024-10-16T17:00:19.787000 @@ -267374,7 +267382,7 @@ CVE-2024-9623,0,0,86dd85464498f6d194e548538328537f5fc627208085718de66c1a06e69de6 CVE-2024-9626,0,0,e174d8fa002534e0ae5c7abc483c6616428df822a2503b0b0dc31fa5eea5bcb8,2024-10-28T13:58:09.230000 CVE-2024-9627,0,0,2b255751ca76c819864c389a91dcfc3f65321be83e43cc5abce958b149b5f5f2,2024-10-25T21:19:48.757000 CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d0b,2024-10-25T16:15:10.160000 -CVE-2024-9629,0,1,31c72e7d62d8dbf8ba1681676a61a2f04680ade1749c367b775242f4864b6d17,2024-10-29T14:34:50.257000 +CVE-2024-9629,0,0,31c72e7d62d8dbf8ba1681676a61a2f04680ade1749c367b775242f4864b6d17,2024-10-29T14:34:50.257000 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 CVE-2024-9637,0,0,bfd23401e1c5bf70ae99ee491fd04ce8ab223b8247ed87e78ca84ed9446a1b72,2024-10-28T13:58:09.230000 @@ -267444,7 +267452,7 @@ CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47 CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000 CVE-2024-9823,0,0,918595934cb9b43f50abc93ebc9bbb9148088fae18c39570ebc344ac634d3e40,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 -CVE-2024-9825,0,1,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000 +CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 CVE-2024-9837,0,0,bb6af129df538114e71c369a037f26903d10504dcd81ada4fc7f4b05786c12dd,2024-10-15T12:57:46.880000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000