diff --git a/CVE-2022/CVE-2022-458xx/CVE-2022-45856.json b/CVE-2022/CVE-2022-458xx/CVE-2022-45856.json new file mode 100644 index 00000000000..9c18d9a503d --- /dev/null +++ b/CVE-2022/CVE-2022-458xx/CVE-2022-45856.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-45856", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:13.823", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper certificate validation vulnerability [CWE-295] in FortiClientWindows 6.4 all versions, 7.0.0 through 7.0.7, FortiClientMac 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientLinux 6.4 all versions, 7.0 all versions, 7.2.0 through 7.2.4, FortiClientAndroid 6.4 all versions, 7.0 all versions, 7.2.0 and FortiClientiOS 5.6 all versions, 6.0.0 through 6.0.1, 7.0.0 through 7.0.6 SAML SSO feature may allow an unauthenticated attacker to\u00a0man-in-the-middle the communication between the FortiClient and\u00a0 both the service provider and the identity provider." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-230", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37226.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37226.json new file mode 100644 index 00000000000..535f67d4ff2 --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37226.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2023-37226", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T14:15:11.927", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Loftware Spectrum before 4.6 HF14 has Missing Authentication for a Critical Function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://code-white.com", + "source": "cve@mitre.org" + }, + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37227.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37227.json new file mode 100644 index 00000000000..2aff4f1b5fe --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37227.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2023-37227", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T14:15:12.063", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Loftware Spectrum before 4.6 HF13 Deserializes Untrusted Data." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://code-white.com", + "source": "cve@mitre.org" + }, + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF13.htm", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37229.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37229.json new file mode 100644 index 00000000000..0e083e41ad0 --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37229.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-37229", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T14:15:12.140", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Loftware Spectrum before 5.1 allows SSRF." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://code-white.com", + "source": "cve@mitre.org" + }, + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37230.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37230.json new file mode 100644 index 00000000000..a6db1546231 --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37230.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-37230", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T14:15:12.210", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Loftware Spectrum (testDeviceConnection) before 5.1 allows SSRF." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://code-white.com", + "source": "cve@mitre.org" + }, + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-372xx/CVE-2023-37231.json b/CVE-2023/CVE-2023-372xx/CVE-2023-37231.json new file mode 100644 index 00000000000..6231ea01d38 --- /dev/null +++ b/CVE-2023/CVE-2023-372xx/CVE-2023-37231.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2023-37231", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T14:15:12.283", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Loftware Spectrum before 4.6 HF14 uses a Hard-coded Password." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://code-white.com", + "source": "cve@mitre.org" + }, + { + "url": "https://code-white.com/public-vulnerability-list/", + "source": "cve@mitre.org" + }, + { + "url": "https://docs.loftware.com/spectrum-releasenotes/Content/Hotfix/4.6_HF14.htm", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-419xx/CVE-2023-41988.json b/CVE-2023/CVE-2023-419xx/CVE-2023-41988.json index a45ab499cae..48dcf1d3d11 100644 --- a/CVE-2023/CVE-2023-419xx/CVE-2023-41988.json +++ b/CVE-2023/CVE-2023-419xx/CVE-2023-41988.json @@ -2,8 +2,8 @@ "id": "CVE-2023-41988", "sourceIdentifier": "product-security@apple.com", "published": "2023-10-25T19:15:10.160", - "lastModified": "2023-11-02T18:00:25.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-10T15:35:02.160", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44254.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44254.json new file mode 100644 index 00000000000..24ee35eb9c5 --- /dev/null +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44254.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-44254", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:14.173", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authorization bypass through user-controlled key\u00a0[CWE-639] vulnerability in FortiAnalyzer version 7.4.1 and before 7.2.5 and FortiManager version 7.4.1 and before 7.2.5 may allow a remote attacker with low privileges to read sensitive data via a crafted HTTP request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-23-204", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-508xx/CVE-2023-50883.json b/CVE-2023/CVE-2023-508xx/CVE-2023-50883.json index 0c6b9b50a58..baf4f0555ec 100644 --- a/CVE-2023/CVE-2023-508xx/CVE-2023-50883.json +++ b/CVE-2023/CVE-2023-508xx/CVE-2023-50883.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50883", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T20:15:03.640", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2024-09-10T15:35:05.733", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los documentos de ONLYOFFICE anteriores a la versi\u00f3n 8.0.1 permiten XSS porque una macro es una expresi\u00f3n de funci\u00f3n invocada inmediatamente (IIFE) y, por lo tanto, es posible un escape de la zona protegida llamando directamente al constructor del objeto Funci\u00f3n. NOTA: este problema existe debido a una correcci\u00f3n incorrecta de CVE-2021-43446." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.onlyoffice.com/", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21753.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21753.json new file mode 100644 index 00000000000..4fc170681ce --- /dev/null +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21753.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21753", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:14.543", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiClientEMS versions 7.2.0 through 7.2.4, 7.0.0 through 7.0.13, 6.4.0 through 6.4.9, 6.2.0 through 6.2.9, 6.0.0 through 6.0.8, 1.2.1 through 1.2.5 allows attacker to perform a denial of service, read or write a limited number of files via specially crafted HTTP requests" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-362", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23184.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23184.json new file mode 100644 index 00000000000..22c6225a723 --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23184.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23184", + "sourceIdentifier": "security@open-xchange.com", + "published": "2024-09-10T15:15:14.763", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Having a large number of address headers (From, To, Cc, Bcc, etc.) becomes excessively CPU intensive. With 100k header lines CPU usage is already 12 seconds, and in a production environment we observed 500k header lines taking 18 minutes to parse. Since this can be triggered by external actors sending emails to a victim, this is a security issue. An external attacker can send specially crafted messages that consume target system resources and cause outage. One can implement restrictions on address headers on MTA component preceding Dovecot. No publicly available exploits are known." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2024/oxdc-adv-2024-0002.json", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23185.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23185.json new file mode 100644 index 00000000000..9b5ec56714e --- /dev/null +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23185.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23185", + "sourceIdentifier": "security@open-xchange.com", + "published": "2024-09-10T15:15:14.967", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Very large headers can cause resource exhaustion when parsing message. The message-parser normally reads reasonably sized chunks of the message. However, when it feeds them to message-header-parser, it starts building up \"full_value\" buffer out of the smaller chunks. The full_value buffer has no size limit, so large headers can cause large memory usage. It doesn't matter whether it's a single long header line, or a single header split into multiple lines. This bug exists in all Dovecot versions. Incoming mails typically have some size limits set by MTA, so even largest possible header size may still fit into Dovecot's vsz_limit. So attackers probably can't DoS a victim user this way. A user could APPEND larger mails though, allowing them to DoS themselves (although maybe cause some memory issues for the backend in general). One can implement restrictions on headers on MTA component preceding Dovecot. No publicly available exploits are known." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@open-xchange.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.open-xchange.com/dovecot/security/advisories/csaf/2024/oxdc-adv-2024-0003.json", + "source": "security@open-xchange.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json b/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json index e061421155c..7bc128fab95 100644 --- a/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json +++ b/CVE-2024/CVE-2024-233xx/CVE-2024-23321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23321", "sourceIdentifier": "security@apache.org", "published": "2024-07-22T10:15:02.540", - "lastModified": "2024-08-01T13:47:17.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:15:43.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.2", + "versionEndExcluding": "5.3.0", + "matchCriteriaId": "DA5E569D-038D-4D61-B341-82F2C017CC34" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/22/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/lr8npobww786nrnddd1pcy974r17c830", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25073.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25073.json new file mode 100644 index 00000000000..d364f295e05 --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25073.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-25073", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T15:15:15.170", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Semiconductor Mobile Processor, Automotive Processor, and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the CC (Call Control module), which can lead to Denial of Service (Untrusted Pointer Dereference)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-25073/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25074.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25074.json new file mode 100644 index 00000000000..004bb61548b --- /dev/null +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25074.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-25074", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T15:15:15.370", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Semiconductor Mobile Processor, Automotive Processor, and Modem Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, Exynos Modem 5300. The baseband software does not properly check a pointer specified by the SM (Session Management module), which can lead to Denial of Service (Untrusted Pointer Dereference)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-25074/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27257.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27257.json new file mode 100644 index 00000000000..6a0e6a43ae2 --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27257.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-27257", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-09-10T15:15:15.570", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM OpenPages 8.3 and 9.0 potentially exposes information about client-side source code through use of JavaScript source maps to unauthorized users." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-540" + } + ] + } + ], + "references": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/283966", + "source": "psirt@us.ibm.com" + }, + { + "url": "https://www.ibm.com/support/pages/node/7167702", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json index df1fca76980..bb99882de4a 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29014", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-07-18T08:15:02.173", - "lastModified": "2024-08-01T13:49:23.520", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T14:12:21.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sonicwall:netextender:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "10.2.341", + "matchCriteriaId": "E46B90F9-C6DD-44B8-AE8A-ABE37FF22D3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0011", - "source": "PSIRT@sonicwall.com" + "source": "PSIRT@sonicwall.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2937.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2937.json index 69e2f0b442d..21195853f29 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2937.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2937.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2937", "sourceIdentifier": "arm-security@arm.com", "published": "2024-08-05T12:15:34.593", - "lastModified": "2024-08-05T16:35:09.543", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:03:49.607", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "arm-security@arm.com", "type": "Secondary", @@ -51,10 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r50p0", + "matchCriteriaId": "98F67DF9-8978-475C-99AF-A09BB9B66012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r50p0", + "matchCriteriaId": "052571C0-5278-44DC-B84D-A461A76A0FD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r50p0", + "matchCriteriaId": "A40D4A14-E504-4E8A-8431-8677CA91B30A" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31489.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31489.json new file mode 100644 index 00000000000..8e7d800ae4d --- /dev/null +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31489.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-31489", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:15.787", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AAn improper certificate validation vulnerability [CWE-295] in FortiClientWindows 7.2.0 through 7.2.2, 7.0.0 through 7.0.11, FortiClientLinux 7.2.0, 7.0.0 through 7.0.11 and FortiClientMac 7.0.0 through 7.0.11, 7.2.0 through 7.2.4 may allow a remote and unauthenticated attacker to perform a Man-in-the-Middle attack on the communication channel between the FortiGate and the FortiClient during the ZTNA tunnel creation" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-282", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31490.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31490.json new file mode 100644 index 00000000000..8b39ec19590 --- /dev/null +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31490.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-31490", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:15.983", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.2 through 3.2.4 and 3.1.5 allows attacker to information disclosure via HTTP get requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.com/psirt/FG-IR-24-051", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json index e76d8c447e8..3a78236e154 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3297.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3297", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-07-24T08:15:02.880", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:41:15.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve-requests@bitdefender.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cve-requests@bitdefender.com", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:csa-iot:matter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06D3E01D-2B76-4997-93CE-962515E04CEC" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.bitdefender.com/support/security-advisories/session-establishment-lock-up-during-replay-of-case-sigma1-messages/", - "source": "cve-requests@bitdefender.com" + "source": "cve-requests@bitdefender.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33508.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33508.json new file mode 100644 index 00000000000..8c91c0a41b0 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33508.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33508", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:16.187", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper neutralization of special elements used in a command\u00a0('Command Injection') vulnerability [CWE-77] in Fortinet FortiClientEMS 7.2.0 through 7.2.4, 7.0.0 through 7.0.12 may allow an unauthenticated attacker to execute limited and temporary operations on the underlying database via crafted requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-123", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json index ffe6155287e..6aff6feb702 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34457", "sourceIdentifier": "security@apache.org", "published": "2024-07-22T10:15:03.607", - "lastModified": "2024-07-22T14:15:04.883", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:09:36.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,44 @@ "value": "En versiones anteriores a la 2.1.4, despu\u00e9s de que un usuario normal inicia sesi\u00f3n con \u00e9xito, puede realizar una solicitud manualmente utilizando el token de autorizaci\u00f3n para ver la informaci\u00f3n de flink de todos los usuarios, incluidos runSQL y config. Mitigaci\u00f3n: todos los usuarios deben actualizar a 2.1.4" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -28,14 +61,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:streampark:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.4", + "matchCriteriaId": "43F40411-3380-4B0F-BA0D-18C85BD8C615" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/22/2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.apache.org/thread/brlfrmvw9dcv38zoofmhxg7qookmwn7j", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json index 20c26fca3c4..0571ea2e6cc 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3454.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3454", "sourceIdentifier": "cve-requests@bitdefender.com", "published": "2024-07-24T08:15:03.123", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:40:28.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + }, { "source": "cve-requests@bitdefender.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "cve-requests@bitdefender.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cve-requests@bitdefender.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:csa-iot:matter:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06D3E01D-2B76-4997-93CE-962515E04CEC" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.bitdefender.com/support/security-advisories/in-fabric-matter-cluster-attribute-disclosure/", - "source": "cve-requests@bitdefender.com" + "source": "cve-requests@bitdefender.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35282.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35282.json new file mode 100644 index 00000000000..19a7e582fa1 --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35282.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-35282", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:16.397", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cleartext storage of sensitive information in memory vulnerability [CWE-316] affecting FortiClient VPN iOS 7.2 all versions, 7.0 all versions, 6.4 all versions, 6.2 all versions, 6.0 all versions may allow an unauthenticated attacker that has physical access to a jailbroken device to obtain cleartext passwords via keychain dump." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-316" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-139", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36511.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36511.json new file mode 100644 index 00000000000..7f7c8ce6ac2 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36511.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36511", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:16.610", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improperly implemented security check for standard vulnerability [CWE-358] in FortiADC Web Application Firewall (WAF) 7.4.0 through 7.4.4, 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.2 all versions, 6.1 all versions, 6.0 all versions when cookie security policy is enabled may allow an attacker, under specific conditions, to retrieve the initial encrypted and signed cookie protected by the feature" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-22-256", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37728.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37728.json new file mode 100644 index 00000000000..5b895bf7d12 --- /dev/null +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37728.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-37728", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T14:15:12.463", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Arbitrary File Read vulnerability in Xi'an Daxi Information Technology Co., Ltd OfficeWeb365 v.7.18.23.0 and v8.6.1.0 allows a remote attacker to obtain sensitive information via the \"Pic/Indexes\" interface" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/wy876/POC/blob/main/OfficeWeb365/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/xuetang1125/OfficeWeb365/blob/main/OfficeWeb365_%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20.md", + "source": "cve@mitre.org" + }, + { + "url": "https://ti.qianxin.com/vulnerability/notice-list?value=officeweb365", + "source": "cve@mitre.org" + }, + { + "url": "https://www.cnnvd.org.cn/home/warn", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38503.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38503.json index 272378f4bd9..5ed812952ef 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38503.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38503.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38503", "sourceIdentifier": "security@apache.org", "published": "2024-07-22T10:15:08.723", - "lastModified": "2024-07-22T14:15:05.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:07:19.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,44 @@ "value": " Al editar un usuario, grupo o cualquier objeto en Syncope Console, se podr\u00edan agregar etiquetas HTML a cualquier campo de texto y podr\u00edan dar lugar a posibles exploits. La misma vulnerabilidad se encontr\u00f3 en Syncope Enduser, al editar \u201cPersonal Information\u201d o \u201cUser Requests\u201d. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.0.8, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { - "source": "security@apache.org", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "security@apache.org", + "type": "Secondary", "description": [ { "lang": "en", @@ -28,14 +61,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.1.0", + "versionEndIncluding": "2.1.14", + "matchCriteriaId": "D773E581-822F-4431-BEFB-48BE61A743EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:syncope:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.8", + "matchCriteriaId": "79835E04-29F1-42AD-BCA2-B1452B9FE448" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/22/3", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://syncope.apache.org/security#cve-2024-38503-html-tags-can-be-injected-into-console-or-enduser", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40754.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40754.json index e18f84b1b88..390d77a98f1 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40754.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40754.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40754", "sourceIdentifier": "PSIRT@samsung.com", "published": "2024-09-10T11:15:10.503", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2024-09-10T14:35:04.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json b/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json index 8494f337c7b..8aada5557ea 100644 --- a/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json +++ b/CVE-2024/CVE-2024-407xx/CVE-2024-40764.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40764", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2024-07-18T08:15:02.340", - "lastModified": "2024-08-01T13:58:00.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T14:03:09.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "PSIRT@sonicwall.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, + { + "source": "PSIRT@sonicwall.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,224 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.5.4.v-21s-rc2457", + "matchCriteriaId": "8842B1FC-9CC4-4DB8-8119-B435CD33A5D1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv10:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F5B29EE-9D04-44CC-BB1F-C3C6130D2708" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB6153BB-7B2C-4307-ABE0-0E7E1745DEC7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv1600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93914C8C-69ED-480C-80F2-4334C00788D8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE26ECE3-9E17-456F-A416-E23A758C9E4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv25:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67EEA85D-8F9E-4E41-B8B3-119738375A84" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0D33997-0D65-464E-8AA5-043499C667D1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D13CD6CF-B048-4214-AAA8-AB58BE6C6C5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv50:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA838CC7-083A-4BF1-9C95-BED6F5A2992C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0171D69-14A6-4AB0-8377-C233F5E192D8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "7.0.1-5161", + "matchCriteriaId": "BE881F9C-CE9E-4D1B-92BA-D28B2B16178A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sonicos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.1-7040", + "versionEndExcluding": "7.1.1-7058", + "matchCriteriaId": "797C9FA3-70EF-492A-ACA3-CE21422D5AAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_2700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D8B0C7A-FD65-47CA-A625-150A90EFA7A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_3700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A69E000B-5806-46FD-A233-4E2CC9DD38D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DF4A322-7CC7-4AB9-B10E-FFF34DF2182D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_5700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C15FED5-C48C-47CF-9645-0563D77883C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsa_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A884B1BB-F201-4C77-9F6E-B8A884DCD4C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_10700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C3BA5A3-1160-4793-A8D6-40B9D264BCC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_11700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6739DEA3-06FF-4FEB-9931-0DB27F63B70E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_13700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0250EDF9-0AEF-4711-8EF6-D447CF48BCAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nssp_15700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D6CF3CF-256C-4C04-8BDF-B16398CD0459" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2ABC8D8-2943-4073-9568-E87961A18998" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F57D527-AA3F-45E9-9BCE-6F76691066B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:nsv_870:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5ECCCF0-A5D8-42A8-8EC1-D12B49B1124A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70340DD4-687B-402C-85AF-C2B80D0F1600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz270w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52847BA2-470B-4078-A79B-52095DB9214B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9853AE3A-B0EA-4249-AA7D-1F2051C9BF91" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz370w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DBDD10C-F89D-4051-BC70-67B41167FF9B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C23940E-2F9D-447B-A740-42035ED5D400" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz470w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "90C790AD-C40E-4527-8F83-D278282A9600" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7DF76E0-8E3D-4E0D-A3BB-F5AE05A4C7C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "352DFCF9-E333-41C0-8033-91265768FD8E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz570w:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C882C38-9DA5-4C03-BB23-AB2B448E3307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:tz670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEEA6065-48D3-4EC7-BD94-CBAE3D1010FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0012", - "source": "PSIRT@sonicwall.com" + "source": "PSIRT@sonicwall.com", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json index d4e1247910d..c73c6c9c593 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41107.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41107", "sourceIdentifier": "security@apache.org", "published": "2024-07-19T11:15:03.323", - "lastModified": "2024-08-01T13:58:18.103", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T14:30:55.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +71,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.5.0", + "versionEndExcluding": "4.18.2.2", + "matchCriteriaId": "36C67E7A-D4BB-4387-B6E3-BBD3664BAC4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.19.0.0", + "versionEndExcluding": "4.19.1.0", + "matchCriteriaId": "3754C895-06B3-4750-B59E-AB9902E0BD73" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/19/1", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://www.openwall.com/lists/oss-security/2024/07/19/2", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://cloudstack.apache.org/blog/security-release-advisory-cve-2024-41107", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://github.com/apache/cloudstack/issues/4519", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.apache.org/thread/5q06g8zvmhcw6w3tjr6r5prqdw6zckg3", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Mailing List", + "Vendor Advisory" + ] }, { "url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-cve-2024-41107", - "source": "security@apache.org" + "source": "security@apache.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42423.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42423.json new file mode 100644 index 00000000000..e009e49b252 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42423.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42423", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-09-10T15:15:17.013", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Citrix Workspace App version 23.9.0.24.4 on Dell ThinOS 2311 contains an Incorrect Authorization vulnerability when Citrix CEB is enabled for WebLogin. A local unauthenticated user with low privileges may potentially exploit this vulnerability to bypass existing controls and perform unauthorized actions leading to information disclosure and tampering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000225289/dsa-2024-229-security-update-for-dell-thinos-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43796.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43796.json new file mode 100644 index 00000000000..0f2e21cccca --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43796.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43796", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-10T15:15:17.510", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Express.js minimalist web framework for node. In express < 4.20.0, passing untrusted user input - even after sanitizing it - to response.redirect() may execute untrusted code. This issue is patched in express 4.20.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/expressjs/express/commit/54271f69b511fea198471e6ff3400ab805d6b553", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/expressjs/express/security/advisories/GHSA-qw6h-vgh9-j6wx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43799.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43799.json new file mode 100644 index 00000000000..6d793cdd792 --- /dev/null +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43799.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43799", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-10T15:15:17.727", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Send is a library for streaming files from the file system as a http response. Send passes untrusted user input to SendStream.redirect() which executes untrusted code. This issue is patched in send 0.19.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/pillarjs/send/commit/ae4f2989491b392ae2ef3b0015a019770ae65d35", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/pillarjs/send/security/advisories/GHSA-m6fv-jmcg-4jfg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43800.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43800.json new file mode 100644 index 00000000000..0b3c8a35ddb --- /dev/null +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43800.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-43800", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-10T15:15:17.937", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "serve-static serves static files. serve-static passes untrusted user input - even after sanitizing it - to redirect() may execute untrusted code. This issue is patched in serve-static 1.16.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/expressjs/serve-static/commit/0c11fad159898cdc69fd9ab63269b72468ecaf6b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/expressjs/serve-static/commit/ce730896fddce1588111d9ef6fdf20896de5c6fa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/expressjs/serve-static/security/advisories/GHSA-cm22-4g7w-348p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-440xx/CVE-2024-44085.json b/CVE-2024/CVE-2024-440xx/CVE-2024-44085.json index 87c5d6fc89d..6a5ab9f2d48 100644 --- a/CVE-2024/CVE-2024-440xx/CVE-2024-44085.json +++ b/CVE-2024/CVE-2024-440xx/CVE-2024-44085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44085", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T20:15:04.980", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2024-09-10T15:35:08.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los documentos de ONLYOFFICE anteriores a la versi\u00f3n 8.1.0 permiten ataques XSS a trav\u00e9s de un objeto GeneratorFunction contra una macro. Esto est\u00e1 relacionado con el uso de una expresi\u00f3n de funci\u00f3n invocada inmediatamente (IIFE) para una macro. NOTA: este problema existe debido a una correcci\u00f3n incorrecta de CVE-2021-43446 y CVE-2023-50883." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.onlyoffice.com/", diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44410.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44410.json index d66009c2d02..b4f1c330465 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44410.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44410.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44410", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T21:15:11.503", - "lastModified": "2024-09-10T12:09:50.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:35:10.157", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "D-Link DI-8300 v16.07.26A1 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n upgrade_filter_asp." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/LYaoBoL/IOTsec/blob/main/D-Link/DI-8300A1/CVE-2024-44410", diff --git a/CVE-2024/CVE-2024-444xx/CVE-2024-44411.json b/CVE-2024/CVE-2024-444xx/CVE-2024-44411.json index 501b1b4545b..2eb9a239a93 100644 --- a/CVE-2024/CVE-2024-444xx/CVE-2024-44411.json +++ b/CVE-2024/CVE-2024-444xx/CVE-2024-44411.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44411", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-09T21:15:11.567", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2024-09-10T14:35:06.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "D-Link DI-8300 v16.07.26A1 es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de la funci\u00f3n msp_info_htm." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/LYaoBoL/IOTsec/blob/main/D-Link/DI-8300A1/CVE-2024-44411", diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44867.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44867.json new file mode 100644 index 00000000000..c83a251cfa8 --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44867.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-44867", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-10T14:15:13.103", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "phpok v3.0 was discovered to contain an arbitrary file read vulnerability via the component /autoload/file.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ChengZyin/CVE-2024-44867/blob/main/CVE-2024-44867.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ChengZyin/Exploit/blob/ChengZyin-patch-1/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45044.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45044.json new file mode 100644 index 00000000000..590701e1c38 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45044.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-45044", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-10T15:15:18.217", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bareos is open source software for backup, archiving, and recovery of data for operating systems. When a command ACL is in place and a user executes a command in bconsole using an abbreviation (i.e. \"w\" for \"whoami\") the ACL check did not apply to the full form (i.e. \"whoami\") but to the abbreviated form (i.e. \"w\"). If the command ACL is configured with negative ACL that should forbid using the \"whoami\" command, you could still use \"w\" or \"who\" as a command successfully. Fixes for the problem are shipped in Bareos versions 23.0.4, 22.1.6 and 21.1.11. If only positive command ACLs are used without any negation, the problem does not occur." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/bareos/bareos/commit/2a026698b87d13bd1c6275726b5e826702f81dd5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/bareos/bareos/pull/1875", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/bareos/bareos/security/advisories/GHSA-jfww-q346-r2r8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45323.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45323.json new file mode 100644 index 00000000000..7a9b3229865 --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45323.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45323", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-09-10T15:15:18.420", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper access control vulnerability\u00a0[CWE-284] in FortiEDR Manager API 6.2.0 through 6.2.2, 6.0 all versions may allow in a shared environment context an authenticated admin with REST API permissions in his profile and restricted to a specific organization to access backend logs that include information related to other organizations." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-371", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45393.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45393.json new file mode 100644 index 00000000000..c003310be7e --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45393.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-45393", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-10T15:15:18.657", + "lastModified": "2024-09-10T15:50:47.237", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Computer Vision Annotation Tool (CVAT) is an interactive video and image annotation tool for computer vision. An attacker with a CVAT account can access webhook delivery information for any webhook registered on the CVAT instance, including that of other users. For each delivery, this contains information about the event that caused the delivery, typically including full details about the object on which an action was performed (such as the task for an \"update:task\" event), and the user who performed the action. In addition, the attacker can redeliver any past delivery of any webhook, and trigger a ping event for any webhook. Upgrade to CVAT 2.18.0 or any later version." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/cvat-ai/cvat/commit/0fafb797fdf022fb83ce81c6405ba19b583a236f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-p3c9-m7jr-jxxj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45845.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45845.json index f36df7519d9..76eeaa8d7db 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45845.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45845.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45845", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-10T11:15:10.660", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2024-09-10T14:35:08.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "nix 2.24 a 2.24.5 permite el directory traversal a trav\u00e9s de un enlace simb\u00f3lico en un archivo nar, debido al manejo incorrecto de un directorio que contiene un enlace simb\u00f3lico y un directorio con el mismo nombre, tambi\u00e9n conocido como GHSA-h4vv-h3jq-v493." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://github.com/NixOS/nix/tags", diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4607.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4607.json index ebe12f7b4d3..af9d475bda1 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4607.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4607.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4607", "sourceIdentifier": "arm-security@arm.com", "published": "2024-08-05T12:15:34.707", - "lastModified": "2024-08-05T16:35:14.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:03:24.710", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "arm-security@arm.com", "type": "Secondary", @@ -51,10 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r50p0", + "matchCriteriaId": "98F67DF9-8978-475C-99AF-A09BB9B66012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r50p0", + "matchCriteriaId": "052571C0-5278-44DC-B84D-A461A76A0FD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*", + "versionStartIncluding": "r41p0", + "versionEndExcluding": "r50p0", + "matchCriteriaId": "A40D4A14-E504-4E8A-8431-8677CA91B30A" + } + ] + } + ] + } + ], "references": [ { "url": "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities", - "source": "arm-security@arm.com" + "source": "arm-security@arm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5561.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5561.json index 1101c06f6e9..1bde254441e 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5561.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5561.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5561", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-09T06:15:01.850", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-10T15:35:12.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Popup Maker WordPress anterior a la versi\u00f3n 1.19.1 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/6a87cc25-bd7d-40e3-96f9-26646cd6f736/", diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6089.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6089.json index 892154d9674..7a27ab23fea 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6089.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6089.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6089", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2024-07-16T17:15:11.817", - "lastModified": "2024-07-16T18:00:02.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T14:05:16.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "PSIRT@rockwellautomation.com", "type": "Secondary", @@ -73,10 +105,42 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:rockwellautomation:5015-aenftxt_firmware:2.011:*:*:*:*:*:*:*", + "matchCriteriaId": "436F7BB7-A8CA-4E00-9F42-6DDB0D995E09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:rockwellautomation:5015-aenftxt:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C699B471-D2E4-4B2F-B0A4-6045B8170354" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1680.html", - "source": "PSIRT@rockwellautomation.com" + "source": "PSIRT@rockwellautomation.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6282.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6282.json index 7e0359986c3..602b939c303 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6282.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6282", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-10T12:15:02.137", - "lastModified": "2024-09-10T12:15:02.137", - "vulnStatus": "Received", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6799.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6799.json index e3b8bd80a10..19b33e5af1e 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6799.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6799.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6799", "sourceIdentifier": "security@wordfence.com", "published": "2024-07-19T08:15:03.153", - "lastModified": "2024-07-19T13:01:44.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:05:48.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,26 +61,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:yithemes:yith_essential_kit_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.35.0", + "matchCriteriaId": "0476FA4B-EDBE-419C-BD13-A28A8423B795" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L425", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L457", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/yith-essential-kit-for-woocommerce-1/trunk/class-yith-jetpack.php#L487", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3120283/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca497ffa-6306-46dc-895f-94f1d5236e28?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json index 3690a2f910d..1c05ca9f5f1 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6874", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2024-07-24T08:15:03.413", - "lastModified": "2024-08-01T14:00:45.683", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-10T15:27:04.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,22 +59,66 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:haxx:libcurl:8.8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "759E33B7-1F1E-4050-A400-A2176BF35469" + } + ] + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/24/2", - "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + "source": "2499f714-1537-4658-8207-48ae4bb9eae9", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://curl.se/docs/CVE-2024-6874.html", - "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + "source": "2499f714-1537-4658-8207-48ae4bb9eae9", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://curl.se/docs/CVE-2024-6874.json", - "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + "source": "2499f714-1537-4658-8207-48ae4bb9eae9", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://hackerone.com/reports/2604391", - "source": "2499f714-1537-4658-8207-48ae4bb9eae9" + "source": "2499f714-1537-4658-8207-48ae4bb9eae9", + "tags": [ + "Exploit", + "Issue Tracking", + "Technical Description" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6928.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6928.json index 703710ee712..77fcaf01bb2 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6928.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6928.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6928", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-08T06:15:02.747", - "lastModified": "2024-09-09T13:03:38.303", + "lastModified": "2024-09-10T14:35:09.507", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Opti Marketing para WordPress hasta la versi\u00f3n 2.0.9 no desinfecta ni escapa adecuadamente un par\u00e1metro antes de usarlo en una declaraci\u00f3n SQL a trav\u00e9s de una acci\u00f3n AJAX disponible para usuarios no autenticados, lo que genera una inyecci\u00f3n SQL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/7bb9474f-2b9d-4856-b36d-a43da3db0245/", diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7955.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7955.json index 857ea248b2f..2e1f2dd64a6 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7955.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7955.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7955", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-10T06:15:02.730", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2024-09-10T15:35:13.013", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Starbox para WordPress anterior a la versi\u00f3n 3.5.2 no desinfecta ni escapa de algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/cbfcbe57-553d-490a-b7f3-48aa0022f63d/", diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8369.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8369.json index f1d2f116253..e9c5cef40ee 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8369.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8369.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8369", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-10T12:15:02.463", - "lastModified": "2024-09-10T12:15:02.463", - "vulnStatus": "Received", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8443.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8443.json new file mode 100644 index 00000000000..4d037642e42 --- /dev/null +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8443.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-8443", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-09-10T14:15:13.440", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A heap-based buffer overflow vulnerability was found in the libopensc OpenPGP driver. A crafted USB device or smart card with malicious responses to the APDUs during the card enrollment process using the `pkcs15-init` tool may lead to out-of-bound rights, possibly resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.4, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-8443", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2310494", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8557.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8557.json index 269cc7c8c3c..dcd8944128a 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8557.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8557.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8557", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T15:15:10.670", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T14:19:36.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,63 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0C23C3FE-AF1E-4806-8E1D-010C47C3F72C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/tldjgggg/cve/blob/main/sql2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276777", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.276777", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403082", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8558.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8558.json index a07033ba3f9..65eb2ff94b1 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8558.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8558.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8558", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T16:15:02.780", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:50:24.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,64 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0C23C3FE-AF1E-4806-8E1D-010C47C3F72C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Niu-zida/cve/blob/main/Payment%20loopholes.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276778", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.276778", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403345", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8559.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8559.json index 5c882731a28..24fd2dbff13 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8559.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8559.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8559", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T18:15:02.000", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:31:32.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:online_food_menu:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "64211CD5-1C6A-4F07-86E3-8C9DE949BB47" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.276779", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276779", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403497", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8560.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8560.json index b0a89e9ee3e..2f2c453bf9b 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8560.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8560.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8560", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T18:15:02.263", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:32:39.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:simple_invoice_generator_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "25AA5E92-7F05-45F7-8DA4-93B25AE54C33" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.276780", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276780", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.403629", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8561.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8561.json index 92c8f5acc41..58d097980fe 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8561.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8561.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8561", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T19:15:11.627", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:35:01.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.276781", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276781", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.403651", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8562.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8562.json index 016f6d135ff..0f8b97a49bf 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8562.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8562.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8562", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T19:15:11.890", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:36:34.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,18 +140,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.276782", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276782", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8563.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8563.json index 29af1a4decb..a336daf08da 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8563.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8563.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8563", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T20:15:01.977", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:37:48.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.276783", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276783", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403661", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8564.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8564.json index dd55eacd221..0461133d743 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8564.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8564.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8564", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T21:15:10.160", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:38:42.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:rems:php_crud:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2A932782-C497-4B69-8D58-D58A11495C49" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.276784", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276784", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403662", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8565.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8565.json index 9b2d3732423..175faf27ac9 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8565.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8565.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8565", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-07T23:15:10.233", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:40:31.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -109,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +150,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:clinic\\'s_patient_management_system:2.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7C42E685-5417-462F-8547-C6D1E64BFE26" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gurudattch/CVEs/blob/main/Sourcecodester-Clinic's-Patient-Management-System-SQLi.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276785", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276785", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.402425", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8566.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8566.json index e7c4d411b15..2fc70868af5 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8566.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8566.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8566", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T00:15:02.037", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:42:03.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:online_shop_store_project:online_shop_store:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FFCBDB09-5BC6-4FCE-9A20-064B722595AD" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://drive.google.com/file/d/1MmShihcKuzB9Sw54asriKkRKvdUD8-Ag/view?usp=sharing", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?ctiid.276796", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276796", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403671", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8567.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8567.json index da0f1d9a105..3f63a80f04c 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8567.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8567", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T02:15:10.643", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:44:31.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:payroll_management_system_project:payroll_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BFB980ED-C02B-49D9-845F-8953C6709DB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/ha/issues/8", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://itsourcecode.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.276797", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276797", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403998", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8569.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8569.json index 8a212325fea..cbad857e421 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8569.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8569.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8569", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T05:15:10.763", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:45:24.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fabianros:hospital_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7FD44159-7FA3-4BA5-AD83-C1D439EEF374" + } + ] + } + ] + } + ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/teachersongsec/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276799", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276799", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.403125", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8579.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8579.json index 522938b8ed8..5496dea84fa 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8579.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8579.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8579", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T20:15:01.757", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:47:10.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/setWiFiRepeaterCfg.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276813", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276813", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401292", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8580.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8580.json index c0d49473168..fd21869b80b 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8580.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8580", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T21:15:11.107", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:47:47.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,73 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*", + "matchCriteriaId": "E235EB56-5A37-485F-8C11-A05FC19E595F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16621725-1296-4792-BDF4-43E0ABF3B744" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadow.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276814", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276814", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.401293", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.totolink.net/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8582.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8582.json index ccab3575281..1f185ce747d 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8582.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8582.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8582", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T22:15:01.880", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:48:30.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0C23C3FE-AF1E-4806-8E1D-010C47C3F72C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Niu-zida/cve/blob/main/Cross-Site%20Scripting.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276818", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276818", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.404604", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8583.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8583.json index e30174e3715..07f99cdd6af 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8583.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8583.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8583", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-08T22:15:02.170", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-10T15:49:29.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,61 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_bank_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ABBA1FA6-5C99-4BE2-B748-53ED203CD5DD" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Niu-zida/cve/blob/main/Storage-optimized%20Cross-site%20scripting%20vulnerability.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276819", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276819", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.404611", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8654.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8654.json new file mode 100644 index 00000000000..5fae3cd0e44 --- /dev/null +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8654.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8654", + "sourceIdentifier": "cna@mongodb.com", + "published": "2024-09-10T14:15:13.710", + "lastModified": "2024-09-10T15:50:57.713", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "MongoDB Server may access non-initialized region of memory leading to unexpected behaviour when zero arguments are called in internal aggregation stage. This issue affected MongoDB Server v6.0 version 6.0.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "cna@mongodb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://jira.mongodb.org/browse/SERVER-71477", + "source": "cna@mongodb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 436cb70fab6..c487d13184d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-10T14:00:33.301427+00:00 +2024-09-10T16:00:22.052198+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-10T13:59:42.720000+00:00 +2024-09-10T15:50:57.713000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262334 +262363 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `29` -- [CVE-2024-6282](CVE-2024/CVE-2024-62xx/CVE-2024-6282.json) (`2024-09-10T12:15:02.137`) -- [CVE-2024-8369](CVE-2024/CVE-2024-83xx/CVE-2024-8369.json) (`2024-09-10T12:15:02.463`) +- [CVE-2023-37230](CVE-2023/CVE-2023-372xx/CVE-2023-37230.json) (`2024-09-10T14:15:12.210`) +- [CVE-2023-37231](CVE-2023/CVE-2023-372xx/CVE-2023-37231.json) (`2024-09-10T14:15:12.283`) +- [CVE-2023-44254](CVE-2023/CVE-2023-442xx/CVE-2023-44254.json) (`2024-09-10T15:15:14.173`) +- [CVE-2024-21753](CVE-2024/CVE-2024-217xx/CVE-2024-21753.json) (`2024-09-10T15:15:14.543`) +- [CVE-2024-23184](CVE-2024/CVE-2024-231xx/CVE-2024-23184.json) (`2024-09-10T15:15:14.763`) +- [CVE-2024-23185](CVE-2024/CVE-2024-231xx/CVE-2024-23185.json) (`2024-09-10T15:15:14.967`) +- [CVE-2024-25073](CVE-2024/CVE-2024-250xx/CVE-2024-25073.json) (`2024-09-10T15:15:15.170`) +- [CVE-2024-25074](CVE-2024/CVE-2024-250xx/CVE-2024-25074.json) (`2024-09-10T15:15:15.370`) +- [CVE-2024-27257](CVE-2024/CVE-2024-272xx/CVE-2024-27257.json) (`2024-09-10T15:15:15.570`) +- [CVE-2024-31489](CVE-2024/CVE-2024-314xx/CVE-2024-31489.json) (`2024-09-10T15:15:15.787`) +- [CVE-2024-31490](CVE-2024/CVE-2024-314xx/CVE-2024-31490.json) (`2024-09-10T15:15:15.983`) +- [CVE-2024-33508](CVE-2024/CVE-2024-335xx/CVE-2024-33508.json) (`2024-09-10T15:15:16.187`) +- [CVE-2024-35282](CVE-2024/CVE-2024-352xx/CVE-2024-35282.json) (`2024-09-10T15:15:16.397`) +- [CVE-2024-36511](CVE-2024/CVE-2024-365xx/CVE-2024-36511.json) (`2024-09-10T15:15:16.610`) +- [CVE-2024-37728](CVE-2024/CVE-2024-377xx/CVE-2024-37728.json) (`2024-09-10T14:15:12.463`) +- [CVE-2024-42423](CVE-2024/CVE-2024-424xx/CVE-2024-42423.json) (`2024-09-10T15:15:17.013`) +- [CVE-2024-43796](CVE-2024/CVE-2024-437xx/CVE-2024-43796.json) (`2024-09-10T15:15:17.510`) +- [CVE-2024-43799](CVE-2024/CVE-2024-437xx/CVE-2024-43799.json) (`2024-09-10T15:15:17.727`) +- [CVE-2024-43800](CVE-2024/CVE-2024-438xx/CVE-2024-43800.json) (`2024-09-10T15:15:17.937`) +- [CVE-2024-44867](CVE-2024/CVE-2024-448xx/CVE-2024-44867.json) (`2024-09-10T14:15:13.103`) +- [CVE-2024-45044](CVE-2024/CVE-2024-450xx/CVE-2024-45044.json) (`2024-09-10T15:15:18.217`) +- [CVE-2024-45323](CVE-2024/CVE-2024-453xx/CVE-2024-45323.json) (`2024-09-10T15:15:18.420`) +- [CVE-2024-45393](CVE-2024/CVE-2024-453xx/CVE-2024-45393.json) (`2024-09-10T15:15:18.657`) +- [CVE-2024-8443](CVE-2024/CVE-2024-84xx/CVE-2024-8443.json) (`2024-09-10T14:15:13.440`) +- [CVE-2024-8654](CVE-2024/CVE-2024-86xx/CVE-2024-8654.json) (`2024-09-10T14:15:13.710`) ### CVEs modified in the last Commit -Recently modified CVEs: `120` +Recently modified CVEs: `41` -- [CVE-2024-6796](CVE-2024/CVE-2024-67xx/CVE-2024-6796.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-6979](CVE-2024/CVE-2024-69xx/CVE-2024-6979.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7260](CVE-2024/CVE-2024-72xx/CVE-2024-7260.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7318](CVE-2024/CVE-2024-73xx/CVE-2024-7318.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7341](CVE-2024/CVE-2024-73xx/CVE-2024-7341.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7618](CVE-2024/CVE-2024-76xx/CVE-2024-7618.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7655](CVE-2024/CVE-2024-76xx/CVE-2024-7655.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7698](CVE-2024/CVE-2024-76xx/CVE-2024-7698.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7699](CVE-2024/CVE-2024-76xx/CVE-2024-7699.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7734](CVE-2024/CVE-2024-77xx/CVE-2024-7734.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7770](CVE-2024/CVE-2024-77xx/CVE-2024-7770.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7784](CVE-2024/CVE-2024-77xx/CVE-2024-7784.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7891](CVE-2024/CVE-2024-78xx/CVE-2024-7891.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-7955](CVE-2024/CVE-2024-79xx/CVE-2024-7955.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8241](CVE-2024/CVE-2024-82xx/CVE-2024-8241.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8258](CVE-2024/CVE-2024-82xx/CVE-2024-8258.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8268](CVE-2024/CVE-2024-82xx/CVE-2024-8268.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8478](CVE-2024/CVE-2024-84xx/CVE-2024-8478.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8543](CVE-2024/CVE-2024-85xx/CVE-2024-8543.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8554](CVE-2024/CVE-2024-85xx/CVE-2024-8554.json) (`2024-09-10T13:52:23.250`) -- [CVE-2024-8555](CVE-2024/CVE-2024-85xx/CVE-2024-8555.json) (`2024-09-10T13:53:11.847`) -- [CVE-2024-8573](CVE-2024/CVE-2024-85xx/CVE-2024-8573.json) (`2024-09-10T12:08:12.567`) -- [CVE-2024-8610](CVE-2024/CVE-2024-86xx/CVE-2024-8610.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8611](CVE-2024/CVE-2024-86xx/CVE-2024-8611.json) (`2024-09-10T12:09:50.377`) -- [CVE-2024-8645](CVE-2024/CVE-2024-86xx/CVE-2024-8645.json) (`2024-09-10T12:09:50.377`) +- [CVE-2024-4607](CVE-2024/CVE-2024-46xx/CVE-2024-4607.json) (`2024-09-10T15:03:24.710`) +- [CVE-2024-5561](CVE-2024/CVE-2024-55xx/CVE-2024-5561.json) (`2024-09-10T15:35:12.400`) +- [CVE-2024-6089](CVE-2024/CVE-2024-60xx/CVE-2024-6089.json) (`2024-09-10T14:05:16.183`) +- [CVE-2024-6282](CVE-2024/CVE-2024-62xx/CVE-2024-6282.json) (`2024-09-10T15:50:57.713`) +- [CVE-2024-6799](CVE-2024/CVE-2024-67xx/CVE-2024-6799.json) (`2024-09-10T15:05:48.583`) +- [CVE-2024-6874](CVE-2024/CVE-2024-68xx/CVE-2024-6874.json) (`2024-09-10T15:27:04.190`) +- [CVE-2024-6928](CVE-2024/CVE-2024-69xx/CVE-2024-6928.json) (`2024-09-10T14:35:09.507`) +- [CVE-2024-7955](CVE-2024/CVE-2024-79xx/CVE-2024-7955.json) (`2024-09-10T15:35:13.013`) +- [CVE-2024-8369](CVE-2024/CVE-2024-83xx/CVE-2024-8369.json) (`2024-09-10T15:50:57.713`) +- [CVE-2024-8557](CVE-2024/CVE-2024-85xx/CVE-2024-8557.json) (`2024-09-10T14:19:36.280`) +- [CVE-2024-8558](CVE-2024/CVE-2024-85xx/CVE-2024-8558.json) (`2024-09-10T15:50:24.143`) +- [CVE-2024-8559](CVE-2024/CVE-2024-85xx/CVE-2024-8559.json) (`2024-09-10T15:31:32.443`) +- [CVE-2024-8560](CVE-2024/CVE-2024-85xx/CVE-2024-8560.json) (`2024-09-10T15:32:39.927`) +- [CVE-2024-8561](CVE-2024/CVE-2024-85xx/CVE-2024-8561.json) (`2024-09-10T15:35:01.837`) +- [CVE-2024-8562](CVE-2024/CVE-2024-85xx/CVE-2024-8562.json) (`2024-09-10T15:36:34.703`) +- [CVE-2024-8563](CVE-2024/CVE-2024-85xx/CVE-2024-8563.json) (`2024-09-10T15:37:48.183`) +- [CVE-2024-8564](CVE-2024/CVE-2024-85xx/CVE-2024-8564.json) (`2024-09-10T15:38:42.570`) +- [CVE-2024-8565](CVE-2024/CVE-2024-85xx/CVE-2024-8565.json) (`2024-09-10T15:40:31.103`) +- [CVE-2024-8566](CVE-2024/CVE-2024-85xx/CVE-2024-8566.json) (`2024-09-10T15:42:03.630`) +- [CVE-2024-8567](CVE-2024/CVE-2024-85xx/CVE-2024-8567.json) (`2024-09-10T15:44:31.283`) +- [CVE-2024-8569](CVE-2024/CVE-2024-85xx/CVE-2024-8569.json) (`2024-09-10T15:45:24.237`) +- [CVE-2024-8579](CVE-2024/CVE-2024-85xx/CVE-2024-8579.json) (`2024-09-10T15:47:10.393`) +- [CVE-2024-8580](CVE-2024/CVE-2024-85xx/CVE-2024-8580.json) (`2024-09-10T15:47:47.397`) +- [CVE-2024-8582](CVE-2024/CVE-2024-85xx/CVE-2024-8582.json) (`2024-09-10T15:48:30.537`) +- [CVE-2024-8583](CVE-2024/CVE-2024-85xx/CVE-2024-8583.json) (`2024-09-10T15:49:29.103`) ## Download and Usage diff --git a/_state.csv b/_state.csv index af94245234f..eeecb34b92c 100644 --- a/_state.csv +++ b/_state.csv @@ -210286,6 +210286,7 @@ CVE-2022-45852,0,0,8367ad8d8ca781f5d520dfaec9d624ac88b1854631f6d8ea84357ba8b8d67 CVE-2022-45853,0,0,e0d152599feddeb4c9617357802b839b7f07e05bf0a8819c2d55b60b2d7ef5e8,2023-06-06T21:08:54.183000 CVE-2022-45854,0,0,abd06e8f4d7163d554d5329f88d3abeb3656cb88532c9e9c4e47699963f890f7,2023-12-29T07:15:10.010000 CVE-2022-45855,0,0,125ed2525d649d907c8ff766cd08f2c706357098513c6d47a8810e647f05084c,2023-07-20T01:19:07.767000 +CVE-2022-45856,1,1,548c04bb9e2f985f5113c8820c970d7c0461e65ae396d22e605e89581e1aa22e,2024-09-10T15:50:47.237000 CVE-2022-45857,0,0,36ff837a492e56eff00cc1bfef94b73984a02c592457088e1abd6d8a68030a34,2023-11-07T03:54:53.863000 CVE-2022-45858,0,0,6e893e21fde78883afd394e001c06b0460bf616bcf167c3e476ac1ca580aa903,2023-11-07T03:54:54.040000 CVE-2022-45859,0,0,e348c03f2d659f2f5386e4f909b6e1cb2796eaee095e3e655cb0987893244af9,2023-11-07T03:54:54.287000 @@ -221780,7 +221781,7 @@ CVE-2023-28821,0,0,4b09838e4d4a8a2917bcf5cdf5f612433b074dcb7548d0d3a766e80a60b71 CVE-2023-28823,0,0,87894b474b71bc3e46b9c394031dd0006588b5abb19d7f1ecdad5a5928c0beff,2023-11-07T04:10:54.510000 CVE-2023-28824,0,0,6217e10c10df3a710e40602c4b5f6e2e19457c4fb3b380905849d51ad7a71391,2023-06-08T13:47:32.470000 CVE-2023-28826,0,0,72ba642b7be16a1b258eb748f3c254740948996853f940079d44c2390c589230,2024-03-13T23:15:45.693000 -CVE-2023-28827,0,1,f44108e508cde369d66ca1dbd483ecbe772822ac164d5e3df873ccb3ff8f8959,2024-09-10T12:09:50.377000 +CVE-2023-28827,0,0,f44108e508cde369d66ca1dbd483ecbe772822ac164d5e3df873ccb3ff8f8959,2024-09-10T12:09:50.377000 CVE-2023-28828,0,0,7c01788f5690e47da77e68839cb118243068e2077bb180cffc0de77a5125e0bc,2023-05-09T13:15:17.273000 CVE-2023-28829,0,0,4b5cff9cda965725817b3e2e0f35976766e508ef08936a9897600a6795af5299,2023-07-05T17:36:45.750000 CVE-2023-2883,0,0,ab9ed73cbe69a88b6f18d08ae8534916fdeccc2f5c106eb1ff09b4e5989738f8,2023-05-31T22:45:30.307000 @@ -222083,7 +222084,7 @@ CVE-2023-29186,0,0,ca337c32ecd54aaa6a20ec16dcbb51606fb6bbc389b9588c61c48b5ef3e48 CVE-2023-29187,0,0,37cbc4fc5b69bdaf8977690c2054b7318ae9c92be87dc71d8fffa14a4c6fa4d2,2023-04-26T18:44:56.017000 CVE-2023-29188,0,0,c8d6b342b1f470e012069a59253d87a9442371c20c6a02a2d8c5e75f8e5eb9c6,2023-05-12T20:38:28.087000 CVE-2023-29189,0,0,5c4829e9fc65a8a0b7677e115bc730c39c808943db2b53817e35dac9785369ee,2023-04-18T19:12:51.917000 -CVE-2023-2919,0,1,d44b5e8e0d57981bedf8bdd149de52ae8e941740c55578ad90589d1fd6cd328b,2024-09-10T12:09:50.377000 +CVE-2023-2919,0,0,d44b5e8e0d57981bedf8bdd149de52ae8e941740c55578ad90589d1fd6cd328b,2024-09-10T12:09:50.377000 CVE-2023-29192,0,0,73670fa84f26434b779f2c20e3669fdb19858c7fa2bf5bf6a721c3b4f9d813e7,2023-04-14T18:44:16.613000 CVE-2023-29193,0,0,6543396042e55a615e10b4819b5e1667d84c8522046ba09dfe814b3173c02517,2023-04-24T16:22:01.430000 CVE-2023-29194,0,0,1310b1d37e385d5ecd34739249a58dc353236e51fef4f2f920700bb6fccfa3ce,2023-04-25T14:33:00.543000 @@ -223165,8 +223166,8 @@ CVE-2023-30751,0,0,ae585a47db8a0602ef91743e13477f6236e5e01cada54890879cfcffb4e05 CVE-2023-30752,0,0,935f7908189bd82539e41a2d86f8ebb2a263a876dda7e975f2a2fdba167b8ce6,2023-08-18T18:32:55.423000 CVE-2023-30753,0,0,0d0c2545d7d29d64dd2e70bb8b3d2a933e4c99689927dfa0f64a67ee4a45ee8d,2023-06-16T03:54:31.040000 CVE-2023-30754,0,0,579004194887953c85b1a9666a3045cdf4105f26b24ce5699a1033d5b90f0ded,2023-12-29T18:02:41.543000 -CVE-2023-30755,0,1,aca86603717293817b2b267f967bbb30dcf130f9482aabf464f65707c494afb0,2024-09-10T12:09:50.377000 -CVE-2023-30756,0,1,e2fc66e0643cf74203acacd4f0cc6a7e4626de1c0eb9d2ba457111132d0ba4df,2024-09-10T12:09:50.377000 +CVE-2023-30755,0,0,aca86603717293817b2b267f967bbb30dcf130f9482aabf464f65707c494afb0,2024-09-10T12:09:50.377000 +CVE-2023-30756,0,0,e2fc66e0643cf74203acacd4f0cc6a7e4626de1c0eb9d2ba457111132d0ba4df,2024-09-10T12:09:50.377000 CVE-2023-30757,0,0,cff556189dd9382efd68fbcfab505f5642dfa6d74057f5975422bc45636e64b1,2023-12-12T10:15:09.900000 CVE-2023-30758,0,0,eac657fe1eec4de76cf32cf68bed951e739823521119936a2e7bd3651d4c2b3d,2023-06-07T12:57:12.083000 CVE-2023-30759,0,0,c79c26a74dc1361d051573d8f2f37b5ac0b7264a94b4d0636fc9dfbc866e044d,2023-06-27T18:36:55.627000 @@ -227908,7 +227909,12 @@ CVE-2023-37222,0,0,1fbdeb8eb7a4e2d78e6a1b8c62ff798f54346848df8aa204eb582fb9c8fea CVE-2023-37223,0,0,d0235be5a4062402ff483e36fc907b2056e60453658d9454bd48cfdcbc910813,2023-07-26T17:31:44.957000 CVE-2023-37224,0,0,56757c3d318e5ccdefbc3606fc1b70199839f3440746a029a61956009615528e,2023-07-26T17:19:57.800000 CVE-2023-37225,0,0,6c6fc5523358fc5c31dfe4302415c9111d78bb8c86af38b6363cadfecba42f1f,2023-12-29T18:38:05.730000 +CVE-2023-37226,1,1,184f1e973b887b4e7335ba979cbcb7ad1a0e3ac524b0191c7d6306673002d566,2024-09-10T15:50:57.713000 +CVE-2023-37227,1,1,9cab3cb52477018e2e9c17d4979b15879f07916c80ffa436a10736830151667d,2024-09-10T15:50:57.713000 CVE-2023-37228,0,0,643ba6d022c49330496a6c23ea43a1b4794516f1d1a88ce155ebc80364021378,2024-08-15T16:15:16.890000 +CVE-2023-37229,1,1,f15091edec8f678b7363e7bb6e905a9021d6650f9e05e08819b504fb8c57afe3,2024-09-10T15:50:57.713000 +CVE-2023-37230,1,1,6fa865781f1c9143f4c45e27891664a22ee7c7510666260023d5a8573afaf706,2024-09-10T15:50:57.713000 +CVE-2023-37231,1,1,186b922796acee3f309110b9fad224037b83941e0fc557bec3a3a15b003f06a5,2024-09-10T15:50:57.713000 CVE-2023-37237,0,0,29a5f3af5199aad5af4f0fdd6511141f4d2b435f709fd260dd5041911ad086ec,2023-07-07T16:00:14.390000 CVE-2023-37238,0,0,8c5d217b62a8efe0c30f15bea3a5d6293d9c6e0abe28ac04e3704ef99c34ccb0,2023-07-12T22:51:22.043000 CVE-2023-37239,0,0,2a2a4e372334e66e5f41ce012a4e3ce6edee956c498345781b72b50751b6e2f3,2023-07-12T18:57:30.653000 @@ -231734,7 +231740,7 @@ CVE-2023-41983,0,0,7c619f460714936c647722021cb39b4962f5fe5f4f1b4d5ffc62d654d13f0 CVE-2023-41984,0,0,9ddf80974283475101cedd2720565974698edcfbe64158b8161d487b57688b27,2023-11-07T04:21:11.400000 CVE-2023-41986,0,0,16c44ae34b137074aa5d69b0c49ff4092316ccf9c4dc7d30ac6d7b0db923b796,2023-10-05T13:41:34 CVE-2023-41987,0,0,be75c78d1854c13942da9ec99a874e5d9d92126e8d2b45f4b961f9abf8aed0e2,2024-01-12T14:42:06.437000 -CVE-2023-41988,0,0,a085363db97fa30b6845118ff529e2f050f0340ed8a4683f87505c4a1abc2717,2023-11-02T18:00:25.943000 +CVE-2023-41988,0,1,d5c0cfdead9e8e0e375f7814161638c832d9fc92829326cc119f2f0772ddc264,2024-09-10T15:35:02.160000 CVE-2023-41989,0,0,15f79255385af8fb2c8a30eb63e3493891c5848369d603df8b11d0b204f7007c,2024-07-17T02:15:09.923000 CVE-2023-4199,0,0,a8ea3fa4d5e12ff9268e1923814442991e8e8fd68b876f0d3acd52313915f0a2,2024-05-17T02:31:25.960000 CVE-2023-41990,0,0,5ba8b6def663374646378872ff93a9391a3657c78fae38ef93933ff666d86ee5,2024-02-16T18:45:01.993000 @@ -233293,6 +233299,7 @@ CVE-2023-44250,0,0,eb38c0154b6983d19aaeabb629983f3bdf0e67e76d34f1ccc1b32fd16f858 CVE-2023-44251,0,0,60ad3e8bd99914522574db812b53a318cb7fe0b1057fd5d59a8fb8c991bcceb2,2023-12-18T17:34:13.253000 CVE-2023-44252,0,0,c18e31969fe55318dc34cdcae06d8b35b920d99915cca01a86c8e6e9e5d91093,2023-12-18T17:34:39.763000 CVE-2023-44253,0,0,b94586d93ff7b12102ad0c3e79155b5172e9e5dab827ce60a53904c92536ddba,2024-03-11T22:15:54.337000 +CVE-2023-44254,1,1,dbeb61d5aedfa3bb5e059f3cfc936dda48486b6fcb1736ef68337a6588377515,2024-09-10T15:50:47.237000 CVE-2023-44256,0,0,3a47f8714449fba575f4306ec8fb3c9c1958c7bc0c5e1b109cba6f7638ba3dde,2023-11-07T04:21:34.997000 CVE-2023-44257,0,0,6d9b01019b2cfe81d2e4c80b77f48870a867993b0ccc3f7e8616b833975a5d04,2023-10-12T01:48:28.493000 CVE-2023-44259,0,0,e536f0c314a79ffaadd8d22b948548f70b43b3a40f213b998434d3188c2c6c0b,2023-10-12T00:41:15.513000 @@ -236606,7 +236613,7 @@ CVE-2023-49060,0,0,0f125d0d07dbe270a6f07b57aa641d1848f31c22fb855ca4bf11b4d5b4ef2 CVE-2023-49061,0,0,dc7136ec78ed5cf0b1889d9e499076dc7861b57a74e858b10a634425002df41f,2023-11-28T19:45:33.650000 CVE-2023-49062,0,0,1d72476c88fb45368b58247aec1688b0093de275b1093249720b62193de89ed0,2023-12-04T19:46:20.953000 CVE-2023-49068,0,0,182c6949abe2a827480e4301e5ed188cb126ad03424cd6905a2140b6a730140b,2023-12-01T13:53:23.050000 -CVE-2023-49069,0,1,72cd9601407d01de420331536695fd645b9d4f647b999936934dbe640c617168,2024-09-10T12:09:50.377000 +CVE-2023-49069,0,0,72cd9601407d01de420331536695fd645b9d4f647b999936934dbe640c617168,2024-09-10T12:09:50.377000 CVE-2023-4907,0,0,ee7fec7a11df58ff005b9b63ad49a50bb70f5f4e575258375cd0f49a03cc2ad7,2024-01-31T17:15:17.750000 CVE-2023-49070,0,0,631766166232ba486ccd48cb00f4afe564eec8aa0b473067715b1f04d1a8cd4e,2023-12-29T18:15:39.103000 CVE-2023-49073,0,0,2a69c4407ae45adf60baf11d8aa993141dc3f78b1f8dc71c70987fff6214c4d6,2024-07-11T16:00:30.427000 @@ -237781,7 +237788,7 @@ CVE-2023-50879,0,0,96bc2fd32893df60dc9a12b33c7f08370036fdb61954bbfa932079a273859 CVE-2023-5088,0,0,c94ffb02c96a8cec4af6a59312fdcdd2c710029206668225298aa8079f360387,2024-05-22T17:16:06.710000 CVE-2023-50880,0,0,6790987cb5f9234fbf6fa4800d32d2b366b9894f66925894955eb736ceafee95,2024-01-05T17:36:02.743000 CVE-2023-50881,0,0,b97c9521d0ccc06c46d7026a15154e62734f7c976beadea9cbc341c0527cbcfa,2024-01-05T17:37:29.017000 -CVE-2023-50883,0,1,db5b9587de7f1d1e78d12d32c370332b5d82066b612702548e2442b13e62fe55,2024-09-10T12:09:50.377000 +CVE-2023-50883,0,1,bc21e9735c6cf5463a988737111b21ae061b1cad85afd8a63c99e2e6a80e685b,2024-09-10T15:35:05.733000 CVE-2023-50885,0,0,81dfb4b037f813572746bcfda051f21a4cb6e042f33a7cad7f68642740792968,2024-04-18T13:04:28.900000 CVE-2023-50886,0,0,6fe5ac5b8352865db3415bb4996e1dbfb205e15fe11bb4f9cdc4705846004af1,2024-03-15T16:26:49.320000 CVE-2023-50889,0,0,924cfe0a1b2cb6a0413f11e4aed6ec165eaea3add0fa68ffe02d6fb074452a47,2024-01-05T17:39:22.253000 @@ -241195,7 +241202,7 @@ CVE-2024-0055,0,0,6423f35fac503e2236303ae5d235d6e391a2b6d4054c8cfb0ff929b519b2bf CVE-2024-0056,0,0,250eb566c316b11de6e07df616e14b6841dc4cdae760cc615b211d8501ed88cc,2024-05-29T00:15:10.920000 CVE-2024-0057,0,0,5ab5673f2af739399b07e147370322a5ca65cb1474378035b1d3b1b450eb99db,2024-05-29T00:15:11.080000 CVE-2024-0066,0,0,edf104f3d6f2429ec397ec7f6a0c69119750ee227dae9f3b2af25d9d29a03213,2024-06-20T12:44:01.637000 -CVE-2024-0067,0,1,2510f3abf6d60bd3be95f588e4263e97377d419d6cb8663648142812a03c6ccf,2024-09-10T12:09:50.377000 +CVE-2024-0067,0,0,2510f3abf6d60bd3be95f588e4263e97377d419d6cb8663648142812a03c6ccf,2024-09-10T12:09:50.377000 CVE-2024-0068,0,0,6b8371ca9b4345af5aaf5fdf9359976122506646a267dd907e8079f7bfa63e11,2024-03-01T14:04:26.010000 CVE-2024-0069,0,0,f3ce66513994f3ff028688e20278f0458e6258ba59cf74f690ee7dcc06e666da,2023-11-28T00:15:07.140000 CVE-2024-0070,0,0,cd3a46a295206562a4be32633daf482f59e1d323193385e7677ae8b6c52e190f,2023-11-28T00:15:07.183000 @@ -244045,7 +244052,7 @@ CVE-2024-21524,0,0,94f71300cc1d59487169e73d8c8122613dc6982f44c5510e0a3db2e12961d CVE-2024-21525,0,0,b0b4bb7ac52f850d274c4462f4e1c3c5bb13c947283cf1a8b69a39e30d235a9e,2024-07-11T13:05:54.930000 CVE-2024-21526,0,0,effd07762d29cbaa402155d2c949789e21ab2c387b4e4af3dcba88775e370e17,2024-07-11T15:05:20.940000 CVE-2024-21527,0,0,5f68d3fcedc529f8c61b21687ff27d1dfc424d6b1048d7df4e422495549fd852,2024-07-19T13:01:44.567000 -CVE-2024-21528,0,1,20243e12426582c16920a0ab3a8036a5493484e122893e1731a0b03945a2d62b,2024-09-10T12:09:50.377000 +CVE-2024-21528,0,0,20243e12426582c16920a0ab3a8036a5493484e122893e1731a0b03945a2d62b,2024-09-10T12:09:50.377000 CVE-2024-2153,0,0,d3abacc4f79f5ae0d18412563134adcd72e3650da9619fcc6b902801eca849d9,2024-05-17T02:38:04.867000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-2155,0,0,499612150b3a1be829ef430bb3388eb54a55d7bb52271f37f2a76ceb8af6c56f,2024-05-17T02:38:05.063000 @@ -244191,6 +244198,7 @@ CVE-2024-2175,0,0,e25106a44fdb025eeacb5d45a3528175fd9b5c4474d6e05002e4ccb474d65b CVE-2024-21750,0,0,77ee2ee926eafbd02beff6a52a22a1b4fb591f80299b5d5a917971a11bfe423d,2024-02-03T00:41:15.460000 CVE-2024-21751,0,0,55d06ade7b40f70a88f44c4672adccf43ead813dee575220c2752c77b1d36f34,2024-06-10T12:40:41.360000 CVE-2024-21752,0,0,1c3f8b9711eb134dc24ac607b805147df44f1f88998d9833be077b129a214185,2024-02-29T13:49:29.390000 +CVE-2024-21753,1,1,443c3fea7cc955ab97d13fb300e2ade956ae833045f9ab73283f3629ed87b639,2024-09-10T15:50:47.237000 CVE-2024-21754,0,0,b97eddd3100f107222ee5e32da6dcd88fb7b0ee9149673b247db14c9970fccbe,2024-06-13T18:36:45.417000 CVE-2024-21755,0,0,9a466316a66e45e4d0307d7e1708925f9ce7b32c6c8fd1a33c7d4ec0ae073e31,2024-04-10T13:24:22.187000 CVE-2024-21756,0,0,bfc7206c5a35bb9a2182cf343b6e246cc54f15a3cfdddaffd353644c2951bedd,2024-04-10T13:24:22.187000 @@ -245091,6 +245099,8 @@ CVE-2024-23180,0,0,3547d7545728d0f45bd4fd56a1db615172f3e4fc040563d8c505e772c571c CVE-2024-23181,0,0,dde157bb4f52ee4b22f024a3ba7ea060d2d998a8e3ccecc1ceac77ce9f175e4b,2024-01-29T22:55:15.377000 CVE-2024-23182,0,0,532a9e7c3fe41ce5da92fdf7acf18d8d51e72cc2a28e69e9e77af8657af74758,2024-01-29T22:55:36.183000 CVE-2024-23183,0,0,23beaf649604b2942bc2e4c48f7ef05509300370f801b7e64bf8c9cf92c3a776,2024-01-29T22:55:48.787000 +CVE-2024-23184,1,1,c670aba6f1915987e59b8c7e1688c9816fde8f7fef3f2176f4a94585faf9acf9,2024-09-10T15:50:47.237000 +CVE-2024-23185,1,1,f41fe669b1c9fb7d4283ed628db4ed4c4584d677783652dc6e94186c1e409322,2024-09-10T15:50:47.237000 CVE-2024-23186,0,0,50054448acbac6c991b97841b79b6be5ba071ab51bb20603e8d84994d302b81a,2024-05-07T01:15:06.237000 CVE-2024-23187,0,0,9d6dc16c878516b4cb24114919d4c96343f31016c71d39468be4eadb147bc77b,2024-05-07T01:15:06.333000 CVE-2024-23188,0,0,ce1c34d2ff7cdb555552e77ea8d56a52e7e8358bfb4cacf42906fa2a1a9d9495,2024-07-03T01:47:37.067000 @@ -245224,7 +245234,7 @@ CVE-2024-23317,0,0,b3d4db9a6c4ba1ce642dcb721062f8e13232707c61d4a2c28ce4845f9c04f CVE-2024-23319,0,0,4a7fda9e8071d1fa76d196825210fd8cd3d29e8648472f0b500740dc1467f4fc,2024-02-15T18:44:04.737000 CVE-2024-2332,0,0,cc5467ba19ca1d2bf5a2ec6b13b0c5d8a5ce3b3eab4f44d8463709803f4da34a,2024-05-17T02:38:10.740000 CVE-2024-23320,0,0,6fd5aa31e372843847f4e959f0e968559315a9dd978b50b33c878f1d03cfcac6,2024-08-01T13:47:17.360000 -CVE-2024-23321,0,0,d8392c23948026fc9815ec91d0430a7e82baad2a231bfe58a33ae6a2942c78d3,2024-08-01T13:47:17.543000 +CVE-2024-23321,0,1,0df55a4fdbde98717690458efdcc5c3b3ac47d7a732b62704f74b849a9d8b0d8,2024-09-10T15:15:43.803000 CVE-2024-23322,0,0,6c6980b136285edc46373134483ed816f3fd3ee6fbb7f3e1febbb6f33bcbf690,2024-02-15T04:48:20.247000 CVE-2024-23323,0,0,f603fe6a083c2cd5c48c5d3a316c9a1d4ec2c37ff8f0e7d0d927e564c077bd85,2024-02-15T04:48:09.937000 CVE-2024-23324,0,0,bf60e6965b5ce278543e16b9ab637ce05df1815af3d2d0d4acd276370e6add4e,2024-02-15T04:46:33.747000 @@ -245962,7 +245972,7 @@ CVE-2024-2450,0,0,755e866a7b0db6589d3e0a883887ca70c54bd78a033c510c6d171025dcde46 CVE-2024-24506,0,0,300162b102880c909fef7627ff3cbf7be694917201d061517c5fddd5106c6c17,2024-08-15T20:35:02.267000 CVE-2024-24507,0,0,df900bfc618cee6fc96303e9e74a6c7f402219022adee42ced57945155073210,2024-09-05T16:59:07.437000 CVE-2024-2451,0,0,ed8963260b73d0c2914199c7ccad86d4c10e40338037d43fae0b6a4b737eaa20,2024-05-28T17:11:55.903000 -CVE-2024-24510,0,1,3f514afc3000466823a186cd4ba12bbd9555f00846700cf910d766ccccb0a2d1,2024-09-10T12:09:50.377000 +CVE-2024-24510,0,0,3f514afc3000466823a186cd4ba12bbd9555f00846700cf910d766ccccb0a2d1,2024-09-10T12:09:50.377000 CVE-2024-24511,0,0,19e56e69a02039183df0e76b3f6b366a0c7fe610ce5511009ebec6b3e2899678,2024-08-06T16:35:04.493000 CVE-2024-24512,0,0,46fb434c74a35036e4b3e461f16bf1067dceccece23e9aa7bd866d4f9010f0c7,2024-08-15T21:35:05.897000 CVE-2024-2452,0,0,cca6a173274889cd69a2095d63054482ce0ac9763c76eccaa731ce2a40b02048,2024-06-10T19:15:53.417000 @@ -246360,6 +246370,8 @@ CVE-2024-25063,0,0,974af0bcd393eeee85e8240282eb20080b5485f8c7ead439e836ce3c3fbcd CVE-2024-25064,0,0,0770f9d742da8a4ef1654f2a903e2066b829d91dbbc42fb7f1f0759a089ebb88,2024-03-04T22:43:15.337000 CVE-2024-25065,0,0,ee86c2c4ae99b640b23ec2509e27ca1e8877189c550c4b4e7d30422934d42841,2024-08-29T20:36:15.613000 CVE-2024-2507,0,0,059cda731f595d08cc9a92bc2f36829afe22653a29c81bf0cc15e53c1729da6d,2024-04-10T13:23:38.787000 +CVE-2024-25073,1,1,e66c63e181d5e4caf7444fe28d52b515fc52363e04ea33752bedbd4713c843bb,2024-09-10T15:50:47.237000 +CVE-2024-25074,1,1,afe322ab5db2d940d19e93ccbf8c4165307ce5ededdfe276ce9309597e9d29a3,2024-09-10T15:50:47.237000 CVE-2024-25075,0,0,bfed480b2306172449fd442aea4561660fa83ab81e8f534c8111cd2e1f0d7f14,2024-04-03T12:38:04.840000 CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000 CVE-2024-25077,0,0,9936dfb9fa263db917d226ab0cd6f8d094e5b95fa936d5098b62c9aa7f5236ab,2024-08-08T14:35:02.810000 @@ -248081,6 +248093,7 @@ CVE-2024-27247,0,0,c68b98a47507a62cf1fddd5d92d1e3599a3dae9836f9e1673dea5313964a3 CVE-2024-2725,0,0,4b109228f09a586dab91b667f3a16d225e84b90e57a03d6425e2c43a43711564,2024-03-22T15:34:43.663000 CVE-2024-27254,0,0,eaa78de626e7bc9892d9bd1a4aa44647e13738f964703ed91ff89367d49eda4f,2024-06-10T17:16:22.873000 CVE-2024-27255,0,0,1c110eb7d9ab046aa4890f29967f590ea7f23942ac21f596c2e113d0e316c046,2024-03-04T13:58:23.447000 +CVE-2024-27257,1,1,ff864a5bf7af5f189845b8a4060f64d7987b2285db2d5fd4c8cd7936eb9e01c7,2024-09-10T15:50:47.237000 CVE-2024-2726,0,0,72988f9ad68bbbf63dda740202678870f683cc61908e4f60fba7dfbe58dffd21,2024-03-22T15:34:43.663000 CVE-2024-27260,0,0,f122b75dc7c284609059d79b31ed18883cf9cf95a5516e6a4f3964931201ea16,2024-05-17T18:36:31.297000 CVE-2024-27261,0,0,87b5e9d2f195775295533a95bd370dfad0b5646f877a2530f26fd9575376c86d,2024-04-15T13:15:51.577000 @@ -248186,11 +248199,11 @@ CVE-2024-27360,0,0,33246297884723d4ff8bb58853158d18ca6235582cb6c304b20ea59c67448 CVE-2024-27361,0,0,e36b02dee6138d8db49ead5ecd9bf32ca156e68e27cc50daa8adffe6cb1ea663,2024-07-11T13:06:13.187000 CVE-2024-27362,0,0,9d431a1116edfb20ae4c799537e5e9f5d11ebb0847e9e8bdd27f35d143873f1d,2024-07-12T14:58:02.413000 CVE-2024-27363,0,0,f6352d5e26499e6478b31ffa535bfa444a95ad102dd84d5e4c2e7b2372cfbda9,2024-07-11T13:06:13.187000 -CVE-2024-27364,0,1,4a222ff17386a6cd55108ddc2d5cc55e9acf58e57ee7c04f6958d2f553c249ec,2024-09-10T12:09:50.377000 -CVE-2024-27365,0,1,9058f84b5d198b35970a80108ecfe455ca7140ed2b490cd16c3e02517cc2fe18,2024-09-10T12:09:50.377000 -CVE-2024-27366,0,1,20dc881e7bf571dd0c8dbc3ff49783310b35c9dcc4221185f67fd27cbe3e625a,2024-09-10T12:09:50.377000 -CVE-2024-27367,0,1,ed06e5f40633daa7017df3992768b03a4eac6bfac27e84caa263debc60731b71,2024-09-10T12:09:50.377000 -CVE-2024-27368,0,1,63e2a7f6937ffbae9620ec0fef226696ba4ec5e0c8503261f6b3ffb1fa5e47c9,2024-09-10T12:09:50.377000 +CVE-2024-27364,0,0,4a222ff17386a6cd55108ddc2d5cc55e9acf58e57ee7c04f6958d2f553c249ec,2024-09-10T12:09:50.377000 +CVE-2024-27365,0,0,9058f84b5d198b35970a80108ecfe455ca7140ed2b490cd16c3e02517cc2fe18,2024-09-10T12:09:50.377000 +CVE-2024-27366,0,0,20dc881e7bf571dd0c8dbc3ff49783310b35c9dcc4221185f67fd27cbe3e625a,2024-09-10T12:09:50.377000 +CVE-2024-27367,0,0,ed06e5f40633daa7017df3992768b03a4eac6bfac27e84caa263debc60731b71,2024-09-10T12:09:50.377000 +CVE-2024-27368,0,0,63e2a7f6937ffbae9620ec0fef226696ba4ec5e0c8503261f6b3ffb1fa5e47c9,2024-09-10T12:09:50.377000 CVE-2024-27370,0,0,d787ca1729f6374f316c8229cfb768db5a8087155da314897f8dbb9bbd830bc1,2024-08-20T16:35:05.843000 CVE-2024-27371,0,0,9f9543c2ab901d26d97e0899583296b8d79cc83789296e1252e008496317a15f,2024-08-21T16:35:04.317000 CVE-2024-27372,0,0,8907778c9fe6bbf87ab271d97dfb25ffd83018598cb715d55ddafede9aab4b45,2024-08-15T16:35:04.970000 @@ -248205,10 +248218,10 @@ CVE-2024-2738,0,0,a7fee4844aa4ff2acb90aab32559c9a1bc272ae0ec6a90bd82a5f6f4cc4b67 CVE-2024-27380,0,0,faebc4a3baa432ef5ecb31e1bffac55af4502d0bd3a145e79e126fdf104360dd,2024-06-27T15:52:55.140000 CVE-2024-27381,0,0,ca56a1eacfe1d85ad323f094ca6ce6a781e7b45770dc3b39a1a4a3ad0c28ba97,2024-06-27T15:54:29.327000 CVE-2024-27382,0,0,5cdede5ba0c355d88eed84640c66ff7fece892ae23f7a48063c692f8bc7ac8c7,2024-06-27T15:54:47.727000 -CVE-2024-27383,0,1,2720587ba1d09fc49923ce7fcaec594f8dccb0b624b514e67645dbf25865f724,2024-09-10T12:09:50.377000 +CVE-2024-27383,0,0,2720587ba1d09fc49923ce7fcaec594f8dccb0b624b514e67645dbf25865f724,2024-09-10T12:09:50.377000 CVE-2024-27385,0,0,003e283023f566a2385aab18dff3e37100c8b762c1c6dc798e412558e0acbc12,2024-08-01T13:48:25.863000 CVE-2024-27386,0,0,392763fc5ad1ba2fe130e662b117c81c5508cfa52b8d41cd60a9bfd68ddf8e96,2024-08-01T13:48:26.553000 -CVE-2024-27387,0,1,d5713554e4922e570a2d233ee94788548287393c2d740fde62d03e88269a0f60,2024-09-10T12:09:50.377000 +CVE-2024-27387,0,0,d5713554e4922e570a2d233ee94788548287393c2d740fde62d03e88269a0f60,2024-09-10T12:09:50.377000 CVE-2024-27388,0,0,8ca5a384d8f8d9a2091e5293e5ac316155597802cc78feac2a6594da98404e69,2024-06-27T13:15:57.940000 CVE-2024-27389,0,0,cc01c74893b07f0b811b8decf7e0d285abe38929fae54a3365d798c7016df82f,2024-05-01T19:50:25.633000 CVE-2024-2739,0,0,f67ee20b2bc2ca284467eaab4487259eaa12927229efc313e4a8f27526c7f5dd,2024-04-15T13:15:31.997000 @@ -249255,7 +249268,7 @@ CVE-2024-29010,0,0,a9ff9c65174c33f2e792fcb56ee4004994b28661d6208ebb1e88e717582f6 CVE-2024-29011,0,0,eb92887d9a2ecd248daea80b2641ebf2c57344e5f41ce9050910fcddaf740a0c,2024-05-01T19:50:25.633000 CVE-2024-29012,0,0,7c7c32533c82aaf22406acd8a658ea95d36fb7375f5076084cc597754864b6a9,2024-08-19T19:34:59.167000 CVE-2024-29013,0,0,67b4d9c80d914ad0bed565ffb846138fde0fb1daab078996874ed199eeb14f9e,2024-08-19T19:21:08.777000 -CVE-2024-29014,0,0,727bca255016a056117f183cd0537f37a7ac804396b0c606f5bbb22eb38674ae,2024-08-01T13:49:23.520000 +CVE-2024-29014,0,1,ac8715a4a47e6a3b023ec51c55bec9d1eaaba0c154e192bb9db1535747591f1c,2024-09-10T14:12:21.223000 CVE-2024-29015,0,0,026a67da0abe325ccd1937a90042fd1199a49a631917fe4d1ce76b94dacdc497,2024-08-14T17:49:14.177000 CVE-2024-29018,0,0,0688752b1434844c55e6cd721e2221622ec0094595898dc16074b9d8a9b658da,2024-03-21T12:58:51.093000 CVE-2024-29019,0,0,ad22499f8dda93d004eb62f1b9a36df352f03e492a86d6142b84d27273c03d4d,2024-04-11T12:47:44.137000 @@ -249409,7 +249422,7 @@ CVE-2024-29174,0,0,8810eaafac9310c2bc7fa35be0ee59667dfed889d6f0406ec9e8e9a2e84e1 CVE-2024-29175,0,0,9e1c30d68374a67297243430511b61dcb57896195e7592bda865652864e933fb,2024-06-26T12:44:29.693000 CVE-2024-29176,0,0,4481bed72498e83281c3c71f1079bcbb25fd95752a4713e0302f19027e575dfe,2024-06-26T12:44:29.693000 CVE-2024-29177,0,0,c250b8bebc6f69d83485fb761553b3777ab8e096ccd436d863289f72ba5f24cc,2024-06-26T12:44:29.693000 -CVE-2024-29178,0,1,22d635a1cbe75908c0019b5950f190aa3a6a7a13b04dc63306f00cc64a0a2d72,2024-09-10T13:59:42.720000 +CVE-2024-29178,0,0,22d635a1cbe75908c0019b5950f190aa3a6a7a13b04dc63306f00cc64a0a2d72,2024-09-10T13:59:42.720000 CVE-2024-29179,0,0,fe840eaf09e7a8e7dd10821c2db25070488ae9547e1cdb2c88feef71c243f949,2024-03-26T12:55:05.010000 CVE-2024-2918,0,0,970042595bd5643e2d862aca742e1125b1b743ac1b05c46b57da300ff31e85eb,2024-04-10T13:23:38.787000 CVE-2024-29180,0,0,868fb8f0af2dabbfadb8670233d0ccacca72ce41e4c728fc488a08eccd08c9c9,2024-03-21T19:47:03.943000 @@ -249506,7 +249519,7 @@ CVE-2024-2935,0,0,34d6864aa9c90788d7b06b2eba324f36e7b4a9a81ef161d4acdecd1aa98731 CVE-2024-2936,0,0,ded3e6858b21938cc6332525608363ca633684eee87859a8f9504838347f2c1a,2024-03-29T12:45:02.937000 CVE-2024-29366,0,0,c6def951532345f5745b43a5275ceff56f9c33aee73b404cffac4524e7e2c006,2024-08-01T13:49:29.947000 CVE-2024-29368,0,0,0901e7b80a5ee0e48b0a83048196418207989c0e792e75fa11268199f70a424c,2024-04-23T14:15:08.440000 -CVE-2024-2937,0,0,79954cfe98c2940c0942106d942fe05f3c11cf3e503a3ae1500fa6b5fca01f84,2024-08-05T16:35:09.543000 +CVE-2024-2937,0,1,20e4368eb9bf892738732958af36e28720f1d15eb06551fe7b0431e053a164e7,2024-09-10T15:03:49.607000 CVE-2024-29374,0,0,be8e602eebbb83c03bdd549b3faaa1f0dfc77d0ca5e7f9526b71be3aea9cae09,2024-08-15T20:35:09.683000 CVE-2024-29375,0,0,716fc3c8e0ccb042475d24e7fe2ab7abf1b6955d8021a6ba9e6aecf5e8253511,2024-04-04T12:48:41.700000 CVE-2024-29376,0,0,ef2434b33b4ebabd1988c2573e7e291cc10d7cd1308168626cdd5db2860751e3,2024-07-03T01:52:24.250000 @@ -251059,7 +251072,9 @@ CVE-2024-31485,0,0,95e7eeaa8d3876cb40bd1169861bc0a7332c54b51b97ae90600f4cdafa502 CVE-2024-31486,0,0,8bbeb872b9695d04b4cd3936fc99563ad2e7fa2388523728e9f4697b70eb399e,2024-07-04T07:15:10.823000 CVE-2024-31487,0,0,368cd96ee83829999b330b1c4a6d940da3ad3f90b7509cd8e5ad307aa0e2655f,2024-04-10T13:24:22.187000 CVE-2024-31488,0,0,79579231c3d990bd5ef2153181bf0543059b6f4db5405c31f48fd4d89be58434,2024-05-14T19:17:55.627000 +CVE-2024-31489,1,1,8faed6493c7acb5fb0783a541745d775ce2ca95dd5f10fd3c4a96539fe024f26,2024-09-10T15:50:47.237000 CVE-2024-3149,0,0,2a5a29258a667d67886d42edddd31c7bc22884b912d7a2ac6637398264c93b4d,2024-06-07T14:56:05.647000 +CVE-2024-31490,1,1,49bf2dc553931e85b486cc789e2682b4b7951acbaf0fcadd980cb7b6a8837c26,2024-09-10T15:50:47.237000 CVE-2024-31491,0,0,a256f5e0e4e8048b4dc739c834231f6c11313abc3e9f6f4080e9c9cbce9e2f02,2024-05-14T19:17:55.627000 CVE-2024-31492,0,0,b06ceb7c9f7436cf71baa2d42bf8bc10377af2691ce98c83805eb2ca0bae07bf,2024-04-10T19:49:51.183000 CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79af54,2024-06-03T14:46:24.250000 @@ -251342,7 +251357,7 @@ CVE-2024-32002,0,0,8b152fa71cb7888d307cedcb6036ff42410fe299ac886c8397e8f14b70468 CVE-2024-32003,0,0,31311e12a1795761553a56c6af2bf7b204ba79f18fac5a0250a8b13fef254e1b,2024-04-15T13:15:31.997000 CVE-2024-32004,0,0,46c6e95c184179de4512a1da85cf6fbcce6fe2ac4189ff7da433e0234267bb88,2024-06-26T10:15:12.050000 CVE-2024-32005,0,0,d156f3f94a9502713f64771d89d9d58b72987fd70cae51625e32aa2c9e6ee96e,2024-04-15T13:15:31.997000 -CVE-2024-32006,0,1,5c7c5410e5ebae0aed6768d38595cf423ecabed031907824543afcdd9e531195,2024-09-10T12:09:50.377000 +CVE-2024-32006,0,0,5c7c5410e5ebae0aed6768d38595cf423ecabed031907824543afcdd9e531195,2024-09-10T12:09:50.377000 CVE-2024-32007,0,0,dac6e800b17b27260fecd9bce96903f007f5eec2446ab0ae841fc54dc30923d0,2024-08-01T13:51:19.560000 CVE-2024-3201,0,0,9d746fb1c422de83f85c51388b2057631f70f2332b71bf082d5fbeff58a4ab1e,2024-05-24T01:15:30.977000 CVE-2024-32017,0,0,4171151be280ba186c662a4712cd0108f86c659cb0491f443a14bc31a4f95a77,2024-06-10T18:15:31.880000 @@ -252098,7 +252113,7 @@ CVE-2024-32964,0,0,b623874e6a0274971696b1b7da0d2f443f746dffed315cb1a514ae93f0a27 CVE-2024-32966,0,0,c438f55196809bbbc973f729157ff8c0c6df1250009855187f1fc3a5f9a87d17,2024-05-01T13:01:51.263000 CVE-2024-32967,0,0,edb16c37f9c2fc6d1e9a47803a7b1119309dad5cfcac07761a5d0ee65a1bacec,2024-05-01T13:01:51.263000 CVE-2024-32969,0,0,6ef0f8d88265e6683965945b29c1106dae41ceee98d494ed8c3a06c6d351066c,2024-05-24T01:15:30.977000 -CVE-2024-3297,0,0,1d78b9b9ec8cf08b428212aae468d0b6a6340efa6b238bd5187fbcecf64d21ad,2024-07-24T12:55:13.223000 +CVE-2024-3297,0,1,8038489b40412866bb516ddcd1ba51b58fe82d756afc36be2c391969796f5667,2024-09-10T15:41:15.547000 CVE-2024-32970,0,0,5a01359cfb986ee6b849bc2a7e60567b8f37d4b5ce19db35dccc9f7464a14062,2024-05-01T13:02:20.750000 CVE-2024-32971,0,0,ab8a148088c73648f89e5b394dd5a94a547e8c2e4b0230a8c2d6e56a7f3b753a,2024-05-02T13:27:25.103000 CVE-2024-32972,0,0,dc515bb8aec39a31fdf47e578fc51873affc085f71d155b12852513b737283e1,2024-05-06T16:00:59.253000 @@ -252358,6 +252373,7 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000 CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000 +CVE-2024-33508,1,1,b5720d4773a94bd180e4067354df564e5dbeed41c3434e7014c2a9693d0110f3,2024-09-10T15:50:47.237000 CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000 CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000 CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 @@ -252532,7 +252548,7 @@ CVE-2024-33694,0,0,26d440cb75dcd86544ffadb69d95d3097f1e6a23ac05fe9a05fb2494be46d CVE-2024-33695,0,0,496bc8a3b6cc06e0f2cb2ff5ef3180780eefdd07d63e68d063cf97ba79dd8598,2024-04-26T15:32:22.523000 CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe731e7,2024-04-26T15:32:22.523000 CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000 -CVE-2024-33698,0,1,a8c5e7c040b3c6d1c0f9bc21543a8682893b5aa4922da330e8b0355256cea828,2024-09-10T12:09:50.377000 +CVE-2024-33698,0,0,a8c5e7c040b3c6d1c0f9bc21543a8682893b5aa4922da330e8b0355256cea828,2024-09-10T12:09:50.377000 CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000 CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000 CVE-2024-3374,0,0,3ebd1bd07a69ff470e060c4c065f62c59313c2dfc13f260402ece495f026b11b,2024-05-14T19:17:55.627000 @@ -253067,7 +253083,7 @@ CVE-2024-34452,0,0,0601c8beed111acadaba988be3618d3e8a2a7b19905fce659ac719cace1be CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000 CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 -CVE-2024-34457,0,0,b14d1b09a16733cbe8e237801f72eb2ee4d363ca08aadfa585a48dbe12e38c8f,2024-07-22T14:15:04.883000 +CVE-2024-34457,0,1,d2b7076c5126ec3b1fbfaa19049f43761d8e3c29c7c94ffa7c70c4c46e72c84a,2024-09-10T15:09:36.840000 CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000 CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000 CVE-2024-3446,0,0,cb97091f9e4759b1c0912bd51a56b30e45443e03748f74b42eff2bfcc530cf53,2024-04-18T08:15:38.340000 @@ -253121,7 +253137,7 @@ CVE-2024-34533,0,0,8566d0e8dbd9cd4017bd3a534ac0fd9822a90bf76d2b3f6401a871fd79682 CVE-2024-34534,0,0,bc0f446d96fd1bff04cb40a3d47d7cedb5384511135e58f39b13d3fecfe87cc4,2024-07-03T02:00:34.370000 CVE-2024-34538,0,0,feba2430cb16511882082bb58c8b82ea01c0b09af4d84fa976b42058411470a6,2024-07-03T02:00:35.197000 CVE-2024-34539,0,0,9ef63927e8927d2fb2816c186d7e6407d6365bb9385ba11a715c86bc1697a83f,2024-07-03T02:00:36.057000 -CVE-2024-3454,0,0,7dc4bcdd2a945b795b21148e6388bc0be4868de234be8b0b4ce54b7e0cd35a3a,2024-07-24T12:55:13.223000 +CVE-2024-3454,0,1,f566b799730d97b5188e88dce61422723578c42a47e0d20db27696cb277428f1,2024-09-10T15:40:28.457000 CVE-2024-34546,0,0,8800da10c69fec688483057d2cb770a66eb40079057655e7555d9e5ef263c46b,2024-05-08T13:15:00.690000 CVE-2024-34547,0,0,823aa1b861a91366dddc57a5e7dd1048515142481ea3eeb344f690ed0a7ca84c,2024-05-08T13:15:00.690000 CVE-2024-34548,0,0,8caa33bdc3c5be33f667017355107b8d8cdf99ab7255d3c04528b6e278893606,2024-05-08T13:15:00.690000 @@ -253603,6 +253619,7 @@ CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e CVE-2024-35271,0,0,3f199c76ff3f5650b64bac70365416389832a7a31f0f804814fbf23ea034da6e,2024-08-20T15:47:07.247000 CVE-2024-35272,0,0,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a2a4,2024-08-20T15:47:09.880000 CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000 +CVE-2024-35282,1,1,f32b7831347c16186af21de4d457e50606ddfc68fcd04e016bb74c29ca535ad6,2024-09-10T15:50:47.237000 CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000 CVE-2024-3529,0,0,b7433b023ce9172d03becfe0cc0d18595c43e3d8737e87c779d288c2827cf3e8,2024-05-17T02:39:59.247000 @@ -253919,7 +253936,7 @@ CVE-2024-35779,0,0,706445338be7aae5f251c8b956a0c3bf0868336274fe9963a1a9e43c59067 CVE-2024-35780,0,0,685b106b3d65ae1869c2c1c35a0354f69b2eb70c614d38b4e2c684c295e7d786,2024-06-20T12:44:01.637000 CVE-2024-35781,0,0,aa3ec547f8f8f306fe8ea0fb55240637cbf26b27603624da2638b54b69436759,2024-06-24T19:15:58.517000 CVE-2024-35782,0,0,dbc038df298fe5384dd87379cd2931409975f0d218f64474d4c9dcc1abcf8e97,2024-06-05T19:50:20.463000 -CVE-2024-35783,0,1,8acb9b63137f8c44b720317f1c62716f73ba2d38715c4524cc52873fd8917bf6,2024-09-10T12:09:50.377000 +CVE-2024-35783,0,0,8acb9b63137f8c44b720317f1c62716f73ba2d38715c4524cc52873fd8917bf6,2024-09-10T12:09:50.377000 CVE-2024-35784,0,0,5d7a60327e3aea236c6954addcecd342bc4303bf9f4ddbf6fdcb56f7d7e890e7,2024-05-17T18:35:35.070000 CVE-2024-35785,0,0,99251cf0758a83ae7f60c2f912cfb4919a76584c6054f38cf9392b41ad4b090a,2024-06-25T23:15:30.160000 CVE-2024-35786,0,0,e8af1ef6ccd4fa218271a6a20ff9f509feb225a9368ed4f0a4c142495813a3de,2024-05-17T18:35:35.070000 @@ -254540,6 +254557,7 @@ CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 +CVE-2024-36511,1,1,bd247cc30297a9605da4cbbd65bbbe080e34ee77c21cb1a16ebf8701cb4237ea,2024-09-10T15:50:47.237000 CVE-2024-36514,0,0,ae3ea1b58c1af4d84bf3b1df047767075b97747b2aba92d2b8d841814d31aaad,2024-08-27T13:28:33.090000 CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14e64,2024-08-27T13:28:09.360000 CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000 @@ -255300,6 +255318,7 @@ CVE-2024-3770,0,0,fa4beea78617deed554c70cf304b7e2f927660a5dd6add7de1e76f7fc1d644 CVE-2024-3771,0,0,1646ed765465efbfe9b2c4ddd2884445b41a894fc37412177344b47d5bf8f677,2024-05-17T02:40:07.477000 CVE-2024-3772,0,0,e9317cbebb79e9be22e844c8c1723d1676d09eadc1e2aeffc34a2fcfe946260f,2024-04-26T02:15:06.983000 CVE-2024-37726,0,0,a5107b068d66c3570343545c901feb79b0c7fc6600c054d9141acb4f14ca7b1a,2024-08-01T13:54:14.057000 +CVE-2024-37728,1,1,6714547b3462983e259e183857dedf6181255588d2aa53d0a61693d1555a7a1d,2024-09-10T15:50:57.713000 CVE-2024-37732,0,0,8bcaa977ac18e5833de4fd0520da90883ea1f9cf5405317587bb381c54de852f,2024-07-03T02:04:38.513000 CVE-2024-37734,0,0,0e5d8052c40ece19eb47666a762eea5411abf63f936921b36baec3d43e53baa8,2024-07-03T02:04:39.343000 CVE-2024-3774,0,0,593479bdd908b3498d235d74677575dd1f3896886cab276c51a981ed2e66af92,2024-04-15T13:15:31.997000 @@ -255452,12 +255471,12 @@ CVE-2024-37987,0,0,f4bc331a9b09a336ebf69cac5128f3ddb41a4064b564c097fc6645464fecd CVE-2024-37988,0,0,c86291a0f061c05259fe7a7336e8616b7d2b496dae2d1e3292124af3161a49e9,2024-07-12T19:01:50.753000 CVE-2024-37989,0,0,3b94113ccd1695e55c704a3f38d763d5ec54c44f354e4b1fe1efc7884dacd2de,2024-07-12T18:52:38.387000 CVE-2024-3799,0,0,099fb34e0ee28d9311fbf29cfaad6b5950bd5e198b1ff9c15d8b2a88d4538973,2024-07-12T10:15:02.353000 -CVE-2024-37990,0,1,4c2e549dfe3c32bd6733e321a7a5bf1a47d36824476d06d26c1eb9e0aa52cb94,2024-09-10T12:09:50.377000 -CVE-2024-37991,0,1,395f13648abe82e124688d2b3bdd56a31bb8d55b98b55e3c04595080c247ab9c,2024-09-10T12:09:50.377000 -CVE-2024-37992,0,1,f3f4cd9dc8e32fd04676bff956d157aec4bd22a3d407a83b9e6039f334b21c9c,2024-09-10T12:09:50.377000 -CVE-2024-37993,0,1,1bbd5d8658672e1ae5e7055ef4dd0898911b0530bc22a64689bedaa7a5440ee3,2024-09-10T12:09:50.377000 -CVE-2024-37994,0,1,3d2fd095bc10290e9d4551f9166a6d756f8d9dabc6f27fbc57810d342e13dd2b,2024-09-10T12:09:50.377000 -CVE-2024-37995,0,1,cb759ea01bea375688534bc6a96f42a0caa82edc7f473e683e2d4c546ecbf1e3,2024-09-10T12:09:50.377000 +CVE-2024-37990,0,0,4c2e549dfe3c32bd6733e321a7a5bf1a47d36824476d06d26c1eb9e0aa52cb94,2024-09-10T12:09:50.377000 +CVE-2024-37991,0,0,395f13648abe82e124688d2b3bdd56a31bb8d55b98b55e3c04595080c247ab9c,2024-09-10T12:09:50.377000 +CVE-2024-37992,0,0,f3f4cd9dc8e32fd04676bff956d157aec4bd22a3d407a83b9e6039f334b21c9c,2024-09-10T12:09:50.377000 +CVE-2024-37993,0,0,1bbd5d8658672e1ae5e7055ef4dd0898911b0530bc22a64689bedaa7a5440ee3,2024-09-10T12:09:50.377000 +CVE-2024-37994,0,0,3d2fd095bc10290e9d4551f9166a6d756f8d9dabc6f27fbc57810d342e13dd2b,2024-09-10T12:09:50.377000 +CVE-2024-37995,0,0,cb759ea01bea375688534bc6a96f42a0caa82edc7f473e683e2d4c546ecbf1e3,2024-09-10T12:09:50.377000 CVE-2024-37996,0,0,e39e1581961cad8f5d5dd910100078a11657ad2090cbed7264c9a8bad1310bf5,2024-07-09T18:19:14.047000 CVE-2024-37997,0,0,880ea769e8919f97f57b9878ce449ed40b5cbca31c8883be4629ac4f6a893243,2024-07-09T18:19:14.047000 CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f023c0,2024-07-24T12:55:13.223000 @@ -255659,7 +255678,7 @@ CVE-2024-3824,0,0,e8430e8e74668eaaf1515aab02bbd50450b435f6ff0c9f12ee70566d9f9578 CVE-2024-3825,0,0,0797baa725c3e17399d5d91a8de7a7a1a558d256247589a07a334c4f415b4b15,2024-04-17T15:31:50.160000 CVE-2024-3826,0,0,121760e16d238bf81106004c4251c8d93e688e0e085277d4609f0e751627011d,2024-07-02T17:44:45.700000 CVE-2024-3827,0,0,fe9452c74994fbdb1f4a1edea576f588d513e300bcd491a382890605454b836b,2024-08-02T12:59:43.990000 -CVE-2024-38270,0,1,a7e3c9f02d0f7e453ff34e04c4a859b0797321d763a9d9fdcbf2be7383df41e4,2024-09-10T12:09:50.377000 +CVE-2024-38270,0,0,a7e3c9f02d0f7e453ff34e04c4a859b0797321d763a9d9fdcbf2be7383df41e4,2024-09-10T12:09:50.377000 CVE-2024-38271,0,0,a55d517f1e451a20db301f87d88d99f6d0173df1fa03dd913b12a59d024f897d,2024-07-29T22:15:04.757000 CVE-2024-38272,0,0,0d362d9df49b138200ab4f12d59df7df286d43127ca17e43b2d79b45065d1568,2024-07-29T22:15:04.883000 CVE-2024-38273,0,0,98139fcc5d27706ddcb6f85d322a9c3ffe167225916ac0c861ab393656c9d382,2024-06-27T03:15:50.130000 @@ -255811,7 +255830,7 @@ CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939a CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000 CVE-2024-38501,0,0,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000 CVE-2024-38502,0,0,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000 -CVE-2024-38503,0,0,57a42403e1de4dcbf683abc4eaadb7a1ac23c4ac22608d1c4298e8a1a0c607e4,2024-07-22T14:15:05.780000 +CVE-2024-38503,0,1,062ca2bc661b34b058f0fa65fe5cd42ea3b52898b059829f1d483a0d7ef7e275,2024-09-10T15:07:19.587000 CVE-2024-38504,0,0,bdcaf5074354faf0cdfff183ef409e2ea10b03e0260d7e3d48701d88660181c6,2024-08-23T02:49:51.450000 CVE-2024-38505,0,0,32ccdd92e433f3db8ed7bb675bb92e4152d96b3c6994f28b5055afef76402fb9,2024-08-23T02:51:03.663000 CVE-2024-38506,0,0,12b82ad8cd179e1fb82826519690b684292f639073a92190db19fb8cdd1d4cc4,2024-08-23T02:52:39.013000 @@ -256500,15 +256519,15 @@ CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd780649 CVE-2024-39570,0,0,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000 CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000 CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 -CVE-2024-39574,0,1,f3617c3480c5c817f80d209e43a6e357a3c75aa85f25d9ab947f73a4beb0db2c,2024-09-10T12:09:50.377000 +CVE-2024-39574,0,0,f3617c3480c5c817f80d209e43a6e357a3c75aa85f25d9ab947f73a4beb0db2c,2024-09-10T12:09:50.377000 CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000 CVE-2024-39579,0,0,3b10efac241247907da1969516918327fdf07736fefefce9e8f33c60526e18a1,2024-09-03T20:57:32.607000 CVE-2024-3958,0,0,d5a5e3b155f3063c251dfec6027d4759e62e1ec9e2382396e782467b23eef014,2024-08-29T15:50:33.257000 -CVE-2024-39580,0,1,7b8d8c1d6a50e1a41f04f40ce051ab7e1ce6498b4fc0291ba6041057f8315e70,2024-09-10T12:09:50.377000 -CVE-2024-39581,0,1,a76083afb037c0260be5ab45e82cedaa3e154405ad9ce330c14a297745767da4,2024-09-10T12:09:50.377000 -CVE-2024-39582,0,1,c0f1f765184c3de9ca8225b5d213c9b642e4764a4885d324cd00d423b614e2f7,2024-09-10T12:09:50.377000 -CVE-2024-39583,0,1,2595854d2609ec80581d5c8e20bd16c50016792474e66d9b02fb6dca96d2549d,2024-09-10T12:09:50.377000 +CVE-2024-39580,0,0,7b8d8c1d6a50e1a41f04f40ce051ab7e1ce6498b4fc0291ba6041057f8315e70,2024-09-10T12:09:50.377000 +CVE-2024-39581,0,0,a76083afb037c0260be5ab45e82cedaa3e154405ad9ce330c14a297745767da4,2024-09-10T12:09:50.377000 +CVE-2024-39582,0,0,c0f1f765184c3de9ca8225b5d213c9b642e4764a4885d324cd00d423b614e2f7,2024-09-10T12:09:50.377000 +CVE-2024-39583,0,0,2595854d2609ec80581d5c8e20bd16c50016792474e66d9b02fb6dca96d2549d,2024-09-10T12:09:50.377000 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-39585,0,0,d477ac70d70122b93a30d70fba939fc56092d9a6275e57b99e3a0b2a412cd216,2024-09-06T12:08:04.550000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 @@ -256935,7 +256954,7 @@ CVE-2024-40604,0,0,96707551e8fc94b334085d5bf2926e369955211afc96673efa337699ead3d CVE-2024-40605,0,0,3b7d08be38342ed975d3a802af7734eccce4b6fa70dd407ef7f8c6cca68429e4,2024-07-09T16:09:30.277000 CVE-2024-4061,0,0,3d64526f6b4051e690acf87533a742bc5fa8b9683de463655fd6184fe7fa5bfb,2024-05-21T12:37:59.687000 CVE-2024-40614,0,0,5a8c90c94f1b0dc56355424420ebae65c618d536c580acb4e248f7802de2136c,2024-07-10T13:15:10.833000 -CVE-2024-40617,0,1,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000 +CVE-2024-40617,0,0,2efaf69feebd32907e47dcfdd1d9a6531eebf60e579d5726cae13557574657a9,2024-09-10T13:45:37.100000 CVE-2024-40618,0,0,339cc634a42e8a7db54f4bb39e56482affa65b57dfd2765250a61f2e694456da,2024-07-12T16:12:00.597000 CVE-2024-40619,0,0,71752a5fbb09ad3b98ad49ccde5e7b24e7278b9eb9f9bc361b3decfc42effc78,2024-08-15T13:01:10.150000 CVE-2024-4062,0,0,695b7b6d53140e91ee1c447f6f5acafad0b73fbbd2558cb89ae9d4c0c7616ec0,2024-06-04T19:20:29.007000 @@ -257014,9 +257033,9 @@ CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f CVE-2024-40743,0,0,4e2bb12b39654c0a7fc101446a81422e3ca7ab692f01d12e73f708088891a69c,2024-08-21T12:30:33.697000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 -CVE-2024-40754,0,1,62e463593f6e5d1d602a06f8ddff8731970c836281d49b94cd64fa4930736cf2,2024-09-10T12:09:50.377000 +CVE-2024-40754,0,1,1ec64db92f9c8a84c8628e1cdeeb1b227a772e83fb8bf52c0f582741174a2abb,2024-09-10T14:35:04.833000 CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d36,2024-08-01T13:59:24.073000 -CVE-2024-40764,0,0,ab85577e2cb5d9a786ef6b191ba8264da7952ad06ab8f1b0e070c99f55710d56,2024-08-01T13:58:00.227000 +CVE-2024-40764,0,1,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000 CVE-2024-40766,0,0,eff4b00cf0f55270aa38e0ff790e6ee6498c48000cd3eb1d26bf51c060a6a61b,2024-09-10T01:00:01.537000 CVE-2024-40767,0,0,0f0f227d49db4f76a18af060eeadd57ea0ca5da0ccc7bd26ef12905f9453740a,2024-07-30T19:19:40.767000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 @@ -257307,7 +257326,7 @@ CVE-2024-41095,0,0,98a605be3304014b7bcfedec75080b0924875a65426f1c380d6fa3a9f53a5 CVE-2024-41096,0,0,380b567efa67b77a71ed1fc29233b828e2a8544af931856ed913e8fdba3486fe,2024-09-08T08:15:12.540000 CVE-2024-41097,0,0,8ffa9b9e856e2e1225333d7bfce6fb672cf2f57b102ea514cd3f552a0421fd70,2024-08-22T13:14:48.640000 CVE-2024-41098,0,0,237dbea03703cdca512eadfee5b46e503b7d4deeacfff8f1388ee9743f950b5e,2024-09-04T12:15:04.447000 -CVE-2024-41107,0,0,915f86d966f5052f8f4738594970b5192d92a928e05127ecefed6fd25d76d731,2024-08-01T13:58:18.103000 +CVE-2024-41107,0,1,3cc2cd61d61c256eeeef8c80137c1bc0a5769f3fc77f5dc3448b5a46e98fa47f,2024-09-10T14:30:55.217000 CVE-2024-41108,0,0,a789f7b30bfa16589037e73208bf53d149517f9d21b7a48a75aded9d6e98d22f,2024-09-05T16:27:50.103000 CVE-2024-41109,0,0,6e64213670db8f08136c5da3a157b68e75923efed5e9eb7ffeadc18fa0a3ced8,2024-07-31T12:57:02.300000 CVE-2024-4111,0,0,a3e4bcb39778569b3be84e8d38a6497dbc2fc6b5a3693d9cc21532b8df994ada,2024-06-04T19:20:29.827000 @@ -257351,8 +257370,8 @@ CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413 CVE-2024-41162,0,0,e54fc1a9823f936d00354799974ba06adb4cc451d56f48d5711fb6c0d45b612e,2024-09-04T17:03:53.010000 CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 -CVE-2024-41170,0,1,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000 -CVE-2024-41171,0,1,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000 +CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000 +CVE-2024-41171,0,0,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000 CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000 CVE-2024-41173,0,0,a32d0d9cca7b111b26d35b49c29c3c8130c1f7828fce2b3badc03095e7e93d7f,2024-08-27T13:01:37.913000 CVE-2024-41174,0,0,a822cde4328796519e509a3e4c690c9e9350782e4bad75b387a246a5f3be44f1,2024-08-27T13:01:37.913000 @@ -257596,8 +257615,8 @@ CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000 CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000 -CVE-2024-41728,0,1,a44236b8b8381750bb6b36d92fffe5b7b52d9e26a485ce4cee57ecc37824df44,2024-09-10T12:09:50.377000 -CVE-2024-41729,0,1,d9349e4b0c516aa096dba9dc989576fef69f0da894dceaf82929700fdd5be9c4,2024-09-10T12:09:50.377000 +CVE-2024-41728,0,0,a44236b8b8381750bb6b36d92fffe5b7b52d9e26a485ce4cee57ecc37824df44,2024-09-10T12:09:50.377000 +CVE-2024-41729,0,0,d9349e4b0c516aa096dba9dc989576fef69f0da894dceaf82929700fdd5be9c4,2024-09-10T12:09:50.377000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 CVE-2024-41730,0,0,c3a91737f2e086c1acf47dd27a2418a435b72c75c0ef95092d81c10a62890c2b,2024-08-13T12:58:25.437000 CVE-2024-41731,0,0,d5e6b6d25037e68a1f79c484f53ff7d64e1c1ae1a43b0c3615ae42e47ee6cc50,2024-08-13T12:58:25.437000 @@ -258042,8 +258061,8 @@ CVE-2024-42340,0,0,708aac03ef44aeea471e9a045b752e905888f9d429c0c9806a766c67411a6 CVE-2024-42341,0,0,234d9ee0d2444d0f626546c3e75285abadcc74d0ab9516ab0f8349b21637c96a,2024-09-09T13:03:38.303000 CVE-2024-42342,0,0,54f316c3acda489d4f5402e147c2f368362071c79662dc92c6705a36381091a9,2024-09-09T13:03:38.303000 CVE-2024-42343,0,0,7ede109c28f5f3cebcd81363a812aca5202eed2bcb3b73c15fbe079b521efbdc,2024-09-09T13:03:38.303000 -CVE-2024-42344,0,1,a5ef6ee85375265ef6c37db842d194def2525a424f7581fd20c1b467ec204227,2024-09-10T12:09:50.377000 -CVE-2024-42345,0,1,9a28cd44aa06490aed35f23da931ef5d48021ca50f93ec8060a066d281aba8d9,2024-09-10T12:09:50.377000 +CVE-2024-42344,0,0,a5ef6ee85375265ef6c37db842d194def2525a424f7581fd20c1b467ec204227,2024-09-10T12:09:50.377000 +CVE-2024-42345,0,0,9a28cd44aa06490aed35f23da931ef5d48021ca50f93ec8060a066d281aba8d9,2024-09-10T12:09:50.377000 CVE-2024-42347,0,0,9d56c3d6f460e2251d08d50a3e874b7efeb364cadb050367418d1be0b31e15cb,2024-08-12T18:52:08.163000 CVE-2024-42348,0,0,9049ba06c12fadbe924de4e1d7650091813be7f3a3306b9434f7ebd8620eed32,2024-08-05T12:41:45.957000 CVE-2024-42349,0,0,7c83a1a3a31095b7c061367c56e1e2185d3951ede9de2f7c2b93de97074131bc,2024-08-05T12:41:45.957000 @@ -258069,16 +258088,16 @@ CVE-2024-42368,0,0,de4f48ab04f32dd7f3db383df19cc416867f89e8ecae60c2fdd0bef001ee0 CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2bea11,2024-08-21T16:01:03.147000 CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000 -CVE-2024-42371,0,1,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000 +CVE-2024-42371,0,0,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000 CVE-2024-42373,0,0,295f57d389a740d58ca7f1197ba4847ae8998d712f5bf5435ce1e4024bfbdcde,2024-08-13T12:58:25.437000 CVE-2024-42374,0,0,fbac271476e1e2a5530eb62b051d58c9133aff05c9b2fa9d3a5620c40d2acb9c,2024-08-13T12:58:25.437000 CVE-2024-42375,0,0,e9725b5004889e50f9a6ac1c59e56febb5ad276cb9a721fc0c08aaaf3ebec84e,2024-08-13T12:58:25.437000 CVE-2024-42376,0,0,c4f07b2c8269cb92583efc852c36ba8aba70348295a5eb2d011adc15b060ded0,2024-08-13T12:58:25.437000 CVE-2024-42377,0,0,4524d9cd87be67a4dc2034064ca6271f613fad79df3daac39c5631e6926975fc,2024-08-13T12:58:25.437000 -CVE-2024-42378,0,1,ed3c29cd04dad91d13a86cdbb0dce43700fdc4ea711c91735e1103cb6c6b554c,2024-09-10T12:09:50.377000 +CVE-2024-42378,0,0,ed3c29cd04dad91d13a86cdbb0dce43700fdc4ea711c91735e1103cb6c6b554c,2024-09-10T12:09:50.377000 CVE-2024-42379,0,0,3df4e462d3527273fa2a98871af6d02d089a425040231b6521435b06449dcc55,2024-08-30T20:15:07.623000 CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000 -CVE-2024-42380,0,1,5abd276ef303a0a04718583183567bd8e789e2a4185f71fabf777d854e3f8a5a,2024-09-10T12:09:50.377000 +CVE-2024-42380,0,0,5abd276ef303a0a04718583183567bd8e789e2a4185f71fabf777d854e3f8a5a,2024-09-10T12:09:50.377000 CVE-2024-42381,0,0,a5fa1277b5fe346d1dd5469d0c93ac780c7d0547ab1d06a7617c27606bb89aa8,2024-08-01T13:59:22.207000 CVE-2024-4239,0,0,cecc2be82896f12bf6cdae75a3b125d58c075d387f3da865cfaf565a2c454897,2024-06-04T19:20:33.163000 CVE-2024-42393,0,0,dccd6d06051b1376b790b00ce1bb00ad00ff605de076bb7cd98815c096883960,2024-08-12T18:22:45.023000 @@ -258097,9 +258116,10 @@ CVE-2024-42412,0,0,7ea410a30890f641de68bc8b7a39cf35396bac17868b4fd498b764e1359ef CVE-2024-42416,0,0,0c0ba6b9334c7e838b8d455f49871ca47f5d5630f34ccb39214f945ba545086b,2024-09-05T21:25:09.273000 CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 -CVE-2024-42424,0,1,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000 -CVE-2024-42425,0,1,382cc8e565d2a98d2548f08ae30eee3ae7aae5384bf46c3c9ad178238f9ed1c4,2024-09-10T12:09:50.377000 -CVE-2024-42427,0,1,797fec3f43dde9bef9764402c828d38ab5282805ee2c08e5a3c6c940ac6a4735,2024-09-10T12:09:50.377000 +CVE-2024-42423,1,1,30b3bf35bc3223d3e12ec4c9ee1f4a008e6825b53850efef1faaa99b0b89cdb5,2024-09-10T15:50:47.237000 +CVE-2024-42424,0,0,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000 +CVE-2024-42425,0,0,382cc8e565d2a98d2548f08ae30eee3ae7aae5384bf46c3c9ad178238f9ed1c4,2024-09-10T12:09:50.377000 +CVE-2024-42427,0,0,797fec3f43dde9bef9764402c828d38ab5282805ee2c08e5a3c6c940ac6a4735,2024-09-10T12:09:50.377000 CVE-2024-4243,0,0,d19512e4db8434daba47c490442c83df13ecbcadaf4fb9c501fe6a2c921256d5,2024-06-04T19:20:33.497000 CVE-2024-42434,0,0,e55ec0343b5bf13510bf079266ea96be4a27a72a2b479971039dc705ceccc43c,2024-09-04T21:35:50.963000 CVE-2024-42435,0,0,cb81ae05b6c53e011856448307845a07a836fbccf1f7098de171ed65bbb54190,2024-09-04T21:36:53.027000 @@ -258152,7 +258172,7 @@ CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377 CVE-2024-42495,0,0,ec6874fdfc9b12ec8ef1020de6e62e8d7226ab1ffee9b169624f6e5854e0042e,2024-09-06T12:08:04.550000 CVE-2024-42497,0,0,262b8d15cef13f44f6c11c9732e86216b599547f262ceb2ec772c87233738fc0,2024-08-23T16:18:28.547000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 -CVE-2024-42500,0,1,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000 +CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000 CVE-2024-4251,0,0,4911c8bef2a1e60ace7e3694403733ed66cd48ed80870211c4240e0e24584389,2024-06-04T19:20:34.297000 CVE-2024-4252,0,0,9237a844d9d9b4c175441eb52c39ce07fc14167f47531df4616e5c1079e2e93b,2024-05-17T02:40:21.053000 CVE-2024-42520,0,0,64dffe6569e4f4099d9df2249ffa95a5cd3b2fdfe3c5c543c43632b62f26d14c,2024-08-13T15:35:16.110000 @@ -258244,7 +258264,7 @@ CVE-2024-42637,0,0,91efd00f3a0c93af0bfc6d360416502bb044589161185dddb1564bcf24f65 CVE-2024-42638,0,0,ed21fbfbf0a099487e1d23be5afcb3890c0ca65bc6a1c9bd504262d4c994aa51,2024-08-19T13:00:23.117000 CVE-2024-42639,0,0,1a5c2259211b7b8d7a3c9ad7a85700d339edaffc744195b682680689ea5c39c4,2024-08-19T18:35:13.310000 CVE-2024-4264,0,0,aceade487dcdf82d5a23a178a070b3c07d4cce69337175854977fa24341a320c,2024-05-20T13:00:34.807000 -CVE-2024-42642,0,1,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000 +CVE-2024-42642,0,0,368dc5dc34a16a5f055bfb8f43121adeaf05034c9b1b73657cc5e8228e1781ec,2024-09-10T13:46:25.733000 CVE-2024-4265,0,0,674cb78ce8c95e07c05495b52772b5d4a079c608362a6e67c2dfb567e6b8517a,2024-05-02T18:00:37.360000 CVE-2024-42657,0,0,7a9e5456dd66d94be3a75e811d67a1de5788317e788930f1ba2e8b5887d23144,2024-08-20T16:13:12.413000 CVE-2024-42658,0,0,54060235edd9bcf5ce68f6b48efde0940a62552fb8b9f2dcc8d06d163b4ded88,2024-08-20T16:12:50.290000 @@ -258282,7 +258302,7 @@ CVE-2024-4275,0,0,c229bc373f94c5248df137d0b0d9ca9d61bf79f845040a419335cc081cba5e CVE-2024-42756,0,0,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af301,2024-08-27T15:35:17.887000 CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 -CVE-2024-42759,0,1,8baf2780645f0b758463151059109a06646f1d6bfa31875159f99096b723a859,2024-09-10T12:09:50.377000 +CVE-2024-42759,0,0,8baf2780645f0b758463151059109a06646f1d6bfa31875159f99096b723a859,2024-09-10T12:09:50.377000 CVE-2024-42761,0,0,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000 CVE-2024-42762,0,0,72ec602fc53ee57aef43714af8d33108807c25cff9ab4122dccfb6373af1e78c,2024-08-23T16:18:28.547000 CVE-2024-42763,0,0,a111402090b60e50fe4bee869a5fbabeff40957f7ec249ab20f07b5214e58d6c,2024-08-23T17:35:06.477000 @@ -258622,16 +258642,16 @@ CVE-2024-43378,0,0,b201eb55fcf5e1b333e5fc1b76defa675188abfea665e05ed68f738cfa202 CVE-2024-43379,0,0,d3e4b3238a29f3c9bcdc737c17326972a39574f3fe6ee0181683ddcdcc0798d3,2024-08-21T12:37:22.800000 CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3585,2024-08-21T12:38:00.247000 CVE-2024-43381,0,0,cc3e0e73c6c6a5ab5687bfa997bff6ae33e38e4614aa8ff20ebd73e189ada3b7,2024-08-19T13:00:23.117000 -CVE-2024-43385,0,1,f44d651a29aed8a2344806b9cc38f842d74cc8c9f1e466f0715c1be293cc4ac4,2024-09-10T12:09:50.377000 -CVE-2024-43386,0,1,91576e0237baa758243bbb240f99fbb47043ee2aeca088ec84fa1c90c5bc94b5,2024-09-10T12:09:50.377000 -CVE-2024-43387,0,1,a4da21130575cf31000ee0520fabd5e6581c9b0f1ed097b7050ada0508069518,2024-09-10T12:09:50.377000 -CVE-2024-43388,0,1,cd8579a0d23003ba7916b304be433d28b78ffd04f4ba2c3fdf5ae23ccf0ab82b,2024-09-10T12:09:50.377000 -CVE-2024-43389,0,1,e5b9041b8b43357fd7d5962c0f0f5e0df9172086ccc704b87c0e14af763db5f7,2024-09-10T12:09:50.377000 +CVE-2024-43385,0,0,f44d651a29aed8a2344806b9cc38f842d74cc8c9f1e466f0715c1be293cc4ac4,2024-09-10T12:09:50.377000 +CVE-2024-43386,0,0,91576e0237baa758243bbb240f99fbb47043ee2aeca088ec84fa1c90c5bc94b5,2024-09-10T12:09:50.377000 +CVE-2024-43387,0,0,a4da21130575cf31000ee0520fabd5e6581c9b0f1ed097b7050ada0508069518,2024-09-10T12:09:50.377000 +CVE-2024-43388,0,0,cd8579a0d23003ba7916b304be433d28b78ffd04f4ba2c3fdf5ae23ccf0ab82b,2024-09-10T12:09:50.377000 +CVE-2024-43389,0,0,e5b9041b8b43357fd7d5962c0f0f5e0df9172086ccc704b87c0e14af763db5f7,2024-09-10T12:09:50.377000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 -CVE-2024-43390,0,1,2918e060d0b1f4999190dc6da30d3c9ecea2dd943dc26f54c3a910cfd1f6bd5c,2024-09-10T12:09:50.377000 -CVE-2024-43391,0,1,c8b82cc732101adab9a24cfc0ac4fb152b73d46d1795ca6deb817a5ae5109788,2024-09-10T12:09:50.377000 -CVE-2024-43392,0,1,328ac81d778f6fc05fb77953922af4c887b8862a212ea694bd8bc0bb666fa060,2024-09-10T12:09:50.377000 -CVE-2024-43393,0,1,21884049d6623ec6e8e353bb47da9fa07d81807b7aff078c759819bdf232e9c9,2024-09-10T12:09:50.377000 +CVE-2024-43390,0,0,2918e060d0b1f4999190dc6da30d3c9ecea2dd943dc26f54c3a910cfd1f6bd5c,2024-09-10T12:09:50.377000 +CVE-2024-43391,0,0,c8b82cc732101adab9a24cfc0ac4fb152b73d46d1795ca6deb817a5ae5109788,2024-09-10T12:09:50.377000 +CVE-2024-43392,0,0,328ac81d778f6fc05fb77953922af4c887b8862a212ea694bd8bc0bb666fa060,2024-09-10T12:09:50.377000 +CVE-2024-43393,0,0,21884049d6623ec6e8e353bb47da9fa07d81807b7aff078c759819bdf232e9c9,2024-09-10T12:09:50.377000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 CVE-2024-43396,0,0,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000 CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000 @@ -258681,7 +258701,7 @@ CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88 CVE-2024-4362,0,0,16bcb3e7fd20cddcf2afd5e423805494786dbf969e82eb67d1ba08cf8ffd4c26,2024-05-22T12:46:53.887000 CVE-2024-4363,0,0,2c7c654c7422e9473b7010560ae2a1c2e3350cf44cdf9b6cc5ffb58dc4446aff,2024-05-15T16:40:19.330000 CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000 -CVE-2024-43647,0,1,ee5840489343f77483691f4446146948d3f18b1595eba8d71ff6f621d4acd601,2024-09-10T12:09:50.377000 +CVE-2024-43647,0,0,ee5840489343f77483691f4446146948d3f18b1595eba8d71ff6f621d4acd601,2024-09-10T12:09:50.377000 CVE-2024-4365,0,0,63c2db9b70aba81bf4acd057c8457c31612ae1811b001c9773701935bfb8f554,2024-05-24T01:15:30.977000 CVE-2024-4366,0,0,bbfa79c99a69a6ab3a1454de708e5610ad18f6066e78d9171ac36b6f6e6eece9,2024-05-24T13:03:05.093000 CVE-2024-4367,0,0,53b2562feb1cef4dfbc75c878e502bbc54b7cf80f87613aa8d663f88e3c74ce6,2024-06-10T17:16:33.380000 @@ -258704,7 +258724,7 @@ CVE-2024-43775,0,0,386009b272e00dd7e320eaa82eec20a93bfce64d4bcdb8a26930d34c6fe0d CVE-2024-43776,0,0,27e4419e8ce01901c27e76cb21d9618c21e34d6a14d012499c61adf6cf980a12,2024-09-04T12:27:40.113000 CVE-2024-4378,0,0,09f9e04bae659373b82712486e7efa4baa3211e21ee904b68f572ef978953753,2024-05-24T01:15:30.977000 CVE-2024-43780,0,0,5217ce0351fcb75bd7982f01c3d436316e02e5a2bb3d0e7b3ad2fd10f4519787,2024-08-23T16:18:28.547000 -CVE-2024-43781,0,1,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000 +CVE-2024-43781,0,0,fe4ff27a41c5a2d11128d539a346b2aa7ff5522b07e03c5290a837b9cf154eca,2024-09-10T12:09:50.377000 CVE-2024-43782,0,0,ad31aa68786bd9fde8b1f273353ec992f123695e96de48dec8565f96d4b67b40,2024-08-23T16:18:28.547000 CVE-2024-43783,0,0,8724094a2b26e7a1ebe936c2fff47341ed92df1d54128430c04a1c17c54e5dea,2024-08-27T18:33:14.247000 CVE-2024-43785,0,0,865f9ddb4537abd892462a2be2c5b215baf0c6c5f01c60dc5f4805d59a23b528,2024-08-23T16:18:28.547000 @@ -258715,8 +258735,11 @@ CVE-2024-43790,0,0,c3cb5748c434505823d489a50a95032a1f25244b73b9e74701de9974c3846 CVE-2024-43791,0,0,18a538447f1bfb3e89861cf1face98eaa416fbdf0215aa1ae07d7c4291ab5da0,2024-08-23T16:18:28.547000 CVE-2024-43792,0,0,b68e8edf32a9774ca7956d98971b6e48a84222a074d5236fa04ca99723a43141,2024-09-03T12:59:02.453000 CVE-2024-43794,0,0,012282e0e09ace65c9817dd3efc52ee0130360e07c8e8e9b08cf3adc91c29f00,2024-08-23T18:46:31.730000 +CVE-2024-43796,1,1,54b96855e5d63cdb349a0290c412f56c2ecc23a826df801184d24d561b0cca75,2024-09-10T15:50:47.237000 CVE-2024-43797,0,0,49c9a973cc996682928c758b2e25b53418f3cc9cde12f87e23b31ad352f6dc89,2024-09-03T12:59:02.453000 CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000 +CVE-2024-43799,1,1,af76c7aa3b94b0b14d5d9e466cc1933152d17327d294917e27272fa9ad0f0a21,2024-09-10T15:50:47.237000 +CVE-2024-43800,1,1,a55f71a3c069e8f0a1159894cb1f54e39f7c3c435d5619036954e0ceff852803,2024-09-10T15:50:47.237000 CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000 CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000 CVE-2024-43803,0,0,0902a32771a2eb3f314cb6530d6efc037bbc19b3186a10ca173150ea252c919c,2024-09-03T19:40:46.783000 @@ -258892,24 +258915,24 @@ CVE-2024-4406,0,0,4d2edf89174eefb11c1e35948c69459d7b4d6dd1a09c10eb7a0704c1561ef9 CVE-2024-44067,0,0,f6acc392be4d580c3750239c741db14e9e0b23cb38f1820ef772266e93e1673a,2024-08-20T20:35:34.497000 CVE-2024-44069,0,0,2eb956dd06d71bb925b0fe816cbe078cd7c5c9a8647e07e8d081256cc543fa9f,2024-08-19T12:59:59.177000 CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd25984e1,2024-08-30T16:19:49.587000 -CVE-2024-44072,0,1,d0bb4365ece5a085a3c8ca1cdec4791fa83a64d3795e8cea725a16d9b95589da,2024-09-10T12:09:50.377000 +CVE-2024-44072,0,0,d0bb4365ece5a085a3c8ca1cdec4791fa83a64d3795e8cea725a16d9b95589da,2024-09-10T12:09:50.377000 CVE-2024-44073,0,0,de55f1c002ffa890fb79df1a9da58802af7cfd53cb9325cc406c6e277fabf47c,2024-09-06T17:35:17.523000 CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 CVE-2024-44082,0,0,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000 CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 -CVE-2024-44085,0,1,d77e1d739ea3d9631b6c624ef452cae05e4a2bcfc53683b35edb96ae4e5d9fa6,2024-09-10T12:09:50.377000 -CVE-2024-44087,0,1,9347ed429cee1548d21348e65950e40f41756fec3dfb3e096ea0331b40b59ec8,2024-09-10T12:09:50.377000 +CVE-2024-44085,0,1,388300037fdfaaf78c002cc7963ec532b366316a773d7512847e1899154e3e1a,2024-09-10T15:35:08.883000 +CVE-2024-44087,0,0,9347ed429cee1548d21348e65950e40f41756fec3dfb3e096ea0331b40b59ec8,2024-09-10T12:09:50.377000 CVE-2024-4409,0,0,ef601ae22761768812ec6eb133885b7a6b08c5417903a944100f49b603e1172f,2024-05-24T13:03:11.993000 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-4411,0,0,9d1b27ccac7555d95c6be5f4488ca4d9772a0570efc26fe6a3f3d131fd0aea06,2024-05-14T16:11:39.510000 -CVE-2024-44112,0,1,46e9052e9d2fbba9fe30caa56d92dbe146fc7379f395caf8a525d2f27da5bf55,2024-09-10T12:09:50.377000 -CVE-2024-44113,0,1,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000 -CVE-2024-44114,0,1,2d147ef193009259efeb48ac87edb8bc62f4b744c0eb7ab2cbb4effe8bd094be,2024-09-10T12:09:50.377000 -CVE-2024-44115,0,1,2a30ea5add688d45659eca100982c864d46c6ddd00dc5e9bc49831df26f18590,2024-09-10T12:09:50.377000 -CVE-2024-44116,0,1,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea479,2024-09-10T12:09:50.377000 -CVE-2024-44117,0,1,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000 -CVE-2024-44120,0,1,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 -CVE-2024-44121,0,1,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 +CVE-2024-44112,0,0,46e9052e9d2fbba9fe30caa56d92dbe146fc7379f395caf8a525d2f27da5bf55,2024-09-10T12:09:50.377000 +CVE-2024-44113,0,0,74d2cd3604829033f201ba9d0769b1dcbd2b028e1d8a51bacee7bb51b45ebac7,2024-09-10T12:09:50.377000 +CVE-2024-44114,0,0,2d147ef193009259efeb48ac87edb8bc62f4b744c0eb7ab2cbb4effe8bd094be,2024-09-10T12:09:50.377000 +CVE-2024-44115,0,0,2a30ea5add688d45659eca100982c864d46c6ddd00dc5e9bc49831df26f18590,2024-09-10T12:09:50.377000 +CVE-2024-44116,0,0,e864e012d0e5d96cbfc054f4369e58e067ed8cb636bcf383d653a5b759dea479,2024-09-10T12:09:50.377000 +CVE-2024-44117,0,0,f5e51fd4c1c072e4ebc183a03cfbd5abdf4c1e3554f96913f31f5eae6bad0fb1,2024-09-10T12:09:50.377000 +CVE-2024-44120,0,0,e512bb8c5b42763893890ed03b7785da148b231d68bd53abc475cbbb6b528a5f,2024-09-10T12:09:50.377000 +CVE-2024-44121,0,0,bad946f7ab72ac1b9d199f1a920dd1390631dbfc9489b17da06c05da204a16aa,2024-09-10T12:09:50.377000 CVE-2024-4413,0,0,63e6df043fde5eb9cf937a1f1c34414009dec10f116b4c7a5421dbd8a403038d,2024-05-14T16:11:39.510000 CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 CVE-2024-4418,0,0,da6c1eb4513de715971e2c985312b5242ea57c97376ea448b71f18893daf3366,2024-07-23T22:15:09.183000 @@ -258952,8 +258975,8 @@ CVE-2024-44401,0,0,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f4 CVE-2024-44402,0,0,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000 CVE-2024-44408,0,0,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000 CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000 -CVE-2024-44410,0,1,201e88b026e378d6fc8b1fccdb78fb3f81e6248f12dce27cfb4004fa242ea532,2024-09-10T12:09:50.377000 -CVE-2024-44411,0,1,95b64110e9e1d6b0a907a7fb23d3550629c5144750234617716051c6b057d9b4,2024-09-10T12:09:50.377000 +CVE-2024-44410,0,1,b43c60f7b585f1c4941676b71868fc93c33619415ada9dd18008c87df35d105a,2024-09-10T15:35:10.157000 +CVE-2024-44411,0,1,598fa2c90c1fcb2e76dc9bbaf4d1053ce6ab00db76daa7f3174af16794b4965c,2024-09-10T14:35:06.690000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000 CVE-2024-4444,0,0,b8ab3a280e1fea7a38298a9a71737680ed9a07734ba58de04ed034a8b48f0be8,2024-05-14T16:11:39.510000 @@ -259000,8 +259023,8 @@ CVE-2024-44716,0,0,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db5 CVE-2024-44717,0,0,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 CVE-2024-44720,0,0,053a90257f8d5ecb229ff9b7c992f5d05fdabdf5c3f4e28e0c0e65b8ca217662,2024-09-09T18:30:12.050000 CVE-2024-44721,0,0,8cdb8797de36b06745d362c014a0e65a6e0bd3802d52013f788bbe7711e2d3cf,2024-09-09T18:35:10.070000 -CVE-2024-44724,0,1,8275388c9a55c7b39cc91e96ee195961c5f04dd9487a0f8921294249f06340df,2024-09-10T12:09:50.377000 -CVE-2024-44725,0,1,a55d2d013099f06bab136286a0540186f6f582fe646bcd5f9a3d4c9c9074736c,2024-09-10T12:09:50.377000 +CVE-2024-44724,0,0,8275388c9a55c7b39cc91e96ee195961c5f04dd9487a0f8921294249f06340df,2024-09-10T12:09:50.377000 +CVE-2024-44725,0,0,a55d2d013099f06bab136286a0540186f6f582fe646bcd5f9a3d4c9c9074736c,2024-09-10T12:09:50.377000 CVE-2024-44727,0,0,519c6edd63986291fddd28777499b5bf49fa3688edaaf8c8b5736fac2c095d2c,2024-09-06T13:15:09.567000 CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a2540eb,2024-09-06T13:23:23.743000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 @@ -259043,11 +259066,12 @@ CVE-2024-44849,0,0,ce27bdf59af5d49dc0ddbfb4869cd4791b14d41bd57d8cf3964a27ab97b3f CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000 CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000 CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000 +CVE-2024-44867,1,1,a20505dfc27885f821f38717cd4d2214ced8aa552140d6974101cfd40c609232,2024-09-10T15:50:57.713000 CVE-2024-4487,0,0,4ec04e3a5fad37f02884076b1172c7e1dd67ad4c891fc4fe04112b3c8765dc55,2024-05-14T16:11:39.510000 CVE-2024-4488,0,0,1067ee59b8b50187d3b6e6dcedd09634fc158d8d3cf8abb63a1cced20ae50aeb,2024-06-11T18:09:34.110000 CVE-2024-4489,0,0,982cbf89b6458fc8989b334c07bea5cd0f34b9af1a316c2d08ef53a4dd4e8b8f,2024-06-11T18:07:03.573000 CVE-2024-4490,0,0,46d58037d58f18ff9df6b6b94f91d6beb02adec3983ce96102d15aba21f19fde,2024-05-14T16:11:39.510000 -CVE-2024-44902,0,1,82a75dcf039a91bdbacfdb8bdf0f5af729906cf83631d47765bed50a850b52bb,2024-09-10T12:09:50.377000 +CVE-2024-44902,0,0,82a75dcf039a91bdbacfdb8bdf0f5af729906cf83631d47765bed50a850b52bb,2024-09-10T12:09:50.377000 CVE-2024-4491,0,0,fec0fa99feb905362d1059ae18d849f25d02b15efc10c179ce136112d1e08871,2024-06-04T19:20:38.950000 CVE-2024-44913,0,0,332529f8a2f25e9795d6a65fec291670cc1d8fe0aef2e9fae357f99f95186d81,2024-08-30T16:01:54.347000 CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d420b,2024-08-30T16:01:45.013000 @@ -259148,7 +259172,7 @@ CVE-2024-45008,0,0,37dc0718d2dd8ba9fb7eca159ff733be9b954368896d4dc7e665604ee4c36 CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b2205353433a,2024-06-04T19:20:39.640000 CVE-2024-4502,0,0,f1f89a01c722d6ef2e85e855b85895e43fc279ff3a13e0257efd22aaa2b4c544,2024-06-04T19:20:39.747000 CVE-2024-4503,0,0,580a13ae85da881d7284f0e9b163135d237ab58a854d76134955e6cc28d662e6,2024-06-04T19:20:39.843000 -CVE-2024-45032,0,1,9e9832070815f198bd13b47e9ba247da81e362143ea041571debdd67a5f9cbe7,2024-09-10T12:09:50.377000 +CVE-2024-45032,0,0,9e9832070815f198bd13b47e9ba247da81e362143ea041571debdd67a5f9cbe7,2024-09-10T12:09:50.377000 CVE-2024-45034,0,0,6acf56312613a82c5715559f5b4f69be801ce2e626afadd3cfb4d0f3016179e1,2024-09-09T14:35:07.577000 CVE-2024-45036,0,0,b93ba1b942c2a90c7150ffd72c683d09bcb868f6dc285088962d5acc53d2e2e4,2024-08-27T13:01:37.913000 CVE-2024-45037,0,0,0a75dee24a9a0746d4b594073f73eebe38a0d6b0ee92331f507c53bf54c314fe,2024-08-28T12:57:39.090000 @@ -259158,6 +259182,7 @@ CVE-2024-4504,0,0,db7504bed7bbf326ed6569d421c20101dbf56fa9ab20eccbe7468f7c026f34 CVE-2024-45040,0,0,66fa952a980adfe3c28c0b6707b447d68c76ae01c0168cd5a5130d4c4798d20c,2024-09-06T16:46:26.830000 CVE-2024-45041,0,0,4b2522a1114d682e3b617a29f59e1ed0cf6b7c351080d3ffad0297be3ffda9a5,2024-09-09T18:30:12.050000 CVE-2024-45043,0,0,813b7117a1d59d56cbce89ce53b65dfc1ca707523a63233a1be8257ae8cc6c73,2024-08-29T13:25:27.537000 +CVE-2024-45044,1,1,7e0a9df09ffdee678f160ca8ed11e406695ee34aef3ec228081761e188e89963,2024-09-10T15:50:47.237000 CVE-2024-45045,0,0,c746f1c0e6db0596dc093f08d310bbebe72a6c977f5bda8337efa37c3e8dcc04,2024-09-03T15:13:16.580000 CVE-2024-45046,0,0,de3e74d0bfabac0255c06ca581d92948e03ddaa7217a0f0cf71d9507430ac3e4,2024-09-04T17:32:51.960000 CVE-2024-45047,0,0,a1da82ac1f65d14a1be76da83b1926cccb90ae619540a480a3bd67f0a0919428,2024-09-03T12:59:02.453000 @@ -259248,20 +259273,20 @@ CVE-2024-45265,0,0,0bfdc3ea11a3a8b692c725170390e0ed5e5bfa861ba7586668c7c78868fd4 CVE-2024-45269,0,0,930c2dda66909b7393cc3daf8d8e0bcb8066c589d45124dd784354d0c2c32ffd,2024-09-04T11:49:36.950000 CVE-2024-4527,0,0,c7ad79186f39af6c4287cf90f197f2ec298291b738fc5af7e4ddede8b4e9adfb,2024-06-04T19:20:41.810000 CVE-2024-45270,0,0,c7af37af49333c30529c68858eecc171381f5cb95414149d25997e187a81c107,2024-09-04T11:51:30.887000 -CVE-2024-45279,0,1,d1e01ad73c7c0fcb7dd9f385faab2f84a1522d644234e290f3ff403f5eb9a4d9,2024-09-10T12:09:50.377000 +CVE-2024-45279,0,0,d1e01ad73c7c0fcb7dd9f385faab2f84a1522d644234e290f3ff403f5eb9a4d9,2024-09-10T12:09:50.377000 CVE-2024-4528,0,0,7b720d00d965c73e07e6aefd4c36ac932b079840a05c5efc530ca8c4800fb595,2024-06-04T19:20:41.917000 -CVE-2024-45280,0,1,95185fad87ef89782ef20303875d1e67479f6c5b9be0dfe150b0d387302d1c9d,2024-09-10T12:09:50.377000 -CVE-2024-45281,0,1,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91409,2024-09-10T12:09:50.377000 -CVE-2024-45283,0,1,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000 -CVE-2024-45284,0,1,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000 -CVE-2024-45285,0,1,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000 -CVE-2024-45286,0,1,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000 +CVE-2024-45280,0,0,95185fad87ef89782ef20303875d1e67479f6c5b9be0dfe150b0d387302d1c9d,2024-09-10T12:09:50.377000 +CVE-2024-45281,0,0,4f2ade81d2de9a248b89bed024c68ca3f1f270cca613f61913da466a03b91409,2024-09-10T12:09:50.377000 +CVE-2024-45283,0,0,ce8f369ffea2eeffc8857e4ab9cb42ea251415aa793afc61b47185622611c31e,2024-09-10T12:09:50.377000 +CVE-2024-45284,0,0,ca1d56addf4d46503c4bb1131dd4827ad4650a2366176451f90717aebb949b1c,2024-09-10T12:09:50.377000 +CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6f7b,2024-09-10T12:09:50.377000 +CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 CVE-2024-45294,0,0,aea60512b4d24376f133c23c43cdb7817f0d718abc51286f2a286f4cb6d84051,2024-09-06T17:15:16.977000 CVE-2024-45295,0,0,9cbcd7c9c4357757a60245b46b7ad7987cdeaebea00bcdcc3890fa90524c0282,2024-09-06T17:15:17.053000 -CVE-2024-45296,0,1,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000 +CVE-2024-45296,0,0,49181c4036a3982c1d4d8e879ccd14076733bcb79f94fe42ac7b08410afb4b40,2024-09-10T12:09:50.377000 CVE-2024-45299,0,0,954c7c10e3e27d01c74d7dbf2e119ecf2e67338229cd2f4df8e5453ce4a4b5ce,2024-09-06T16:46:26.830000 CVE-2024-4530,0,0,6b78f15ba2a60e96a20ff176cd49d228ee37f0e30a4b3e696092a717f8a23e27,2024-05-28T12:39:28.377000 CVE-2024-45300,0,0,16b87f5c0983c10d96a860a768ea4f018c449876fdebfed42bf2eda57fdf4026,2024-09-06T16:46:26.830000 @@ -259279,6 +259304,7 @@ CVE-2024-45313,0,0,82e38f6d2921c3b3e9a238db6883354f1d86d2d1f780a332f8c54bf5a5667 CVE-2024-45314,0,0,47c1d25a326359dbe89a889c7d5cd18acfac2ad247faa78128dabc37aa838fbc,2024-09-05T12:53:21.110000 CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000 CVE-2024-45321,0,0,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000 +CVE-2024-45323,1,1,bf6d6a90ce60904b71685f4c528b1a89b3acc23eb6b2486df987dee7a750f76a,2024-09-10T15:50:47.237000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 @@ -259292,6 +259318,7 @@ CVE-2024-4539,0,0,55abcbe26e411ca656e6a32a2a4f1ff2caad1b7d092df554c28514564a9256 CVE-2024-45390,0,0,552de217ce6830ba871c9c4444e9d17668f4fb86d0fd26d9bec14a5af46ff6cd,2024-09-04T13:05:36.067000 CVE-2024-45391,0,0,bcd1ff48c049f8020b0367bd01e9571666cfd39f40d6713a29e7f0bf84683f9f,2024-09-04T13:05:36.067000 CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb2c0,2024-09-06T13:24:34.353000 +CVE-2024-45393,1,1,05aaf8d11e914c1e03cfa77d58a9c744953edac87b12c3a50872d950ab5096af,2024-09-10T15:50:47.237000 CVE-2024-45394,0,0,08ec9b4da8385313bfb832f78d8af7837cae624eb03ec46e7ef7986e78008482,2024-09-04T13:05:36.067000 CVE-2024-45395,0,0,e86751a06dbfe92039318153ae3e40334cccb8072cf74037173dfdb8955c4b2b,2024-09-05T12:53:21.110000 CVE-2024-45399,0,0,a1cf7f5ebf189fb42f167aadd6e82f696503abfd38953cb1d8591d5d8cf1b025,2024-09-05T12:53:21.110000 @@ -259301,7 +259328,7 @@ CVE-2024-45401,0,0,00e33d6822b6a5e4f9d2ac4decdcbdc167c9f612991be6b054969245bd488 CVE-2024-45405,0,0,e0983766e4b3d0668ba058c09b44bc2ee123196af9d88b08813ded0853cf5b2e,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,1459ad14d7127012093360f5f159c85f3ceb60f90c63e19182240dfb68b6c8c4,2024-09-09T18:30:12.050000 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 -CVE-2024-45411,0,1,73f9cc9a45fb9019dfacefd1c32caeadc6f839e3ee71584e1458f0e26c536208,2024-09-10T12:09:50.377000 +CVE-2024-45411,0,0,73f9cc9a45fb9019dfacefd1c32caeadc6f839e3ee71584e1458f0e26c536208,2024-09-10T12:09:50.377000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-45429,0,0,b6682f6c5fc95a0ea1e918cc9175ec1c4ba8aa26e7eab550751e1679316bee68,2024-09-05T12:53:21.110000 CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000 @@ -259329,7 +259356,7 @@ CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000 -CVE-2024-45504,0,1,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000 +CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000 CVE-2024-45506,0,0,f825d7097befd0ec70ad07a8a6b4c2f13762a67e5f358f9d2ab15de2e8f395af,2024-09-05T14:39:49.807000 CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c17c4,2024-09-05T17:53:39.760000 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 @@ -259377,7 +259404,7 @@ CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 CVE-2024-4574,0,0,5bc00996fe57104150ae610f292ff224de65f0948423aca3282fe7d917884520,2024-05-14T16:11:39.510000 CVE-2024-4575,0,0,9d22d248e877183fb374174504fab6bfc500414f16c234b88b687abe10cd48be,2024-05-24T01:15:30.977000 -CVE-2024-45751,0,1,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 +CVE-2024-45751,0,0,cc5d68fd09f5f304456a6be90ad821b34bc4a7f1a983b99ed7260cdb2141f184,2024-09-10T12:15:01.857000 CVE-2024-45758,0,0,2ae57583ed5e6b6b71b00c8e123d728a65162c35712be784f078e8924fe4539a,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 @@ -259389,7 +259416,7 @@ CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25c CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000 CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000 CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000 -CVE-2024-45845,0,1,0521979d11ce58e29b1aab7dd0ec07f7d4afe66c22d65a1154395e6d94c9cae9,2024-09-10T12:09:50.377000 +CVE-2024-45845,0,1,4d1151a3b662098d77e53a9c7dae2a157920328f9101b07db6113969fbede812,2024-09-10T14:35:08.550000 CVE-2024-4585,0,0,de8aae2cc9125c3a9e288fcbd9e609876eec68062d1a138bbd8e80f3513a89cb,2024-06-20T20:15:19.110000 CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000 CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000 @@ -259411,7 +259438,7 @@ CVE-2024-4603,0,0,9adeb744a04b6e7c726b04f4a24faa6c0957c052c2ef086f262a131e3ba07c CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000 CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000 -CVE-2024-4607,0,0,004e8eac2b665252b6f4f4efb9e0368d47cb2a0d5c21b51a504d30a58de38b18,2024-08-05T16:35:14.117000 +CVE-2024-4607,0,1,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000 CVE-2024-4608,0,0,6b948b515db267f779f431dbe386ca01ccd7f50a9fc569455bb84149dca96357,2024-07-24T17:59:54.607000 CVE-2024-4609,0,0,b6f3fd3db9085553e8d026a562774e21d6dc7bb2eb7a9a6cfeb43138546783c0,2024-05-17T18:36:31.297000 CVE-2024-4610,0,0,43047990281e26a04055de4ace6574603f0b08f61a7727d9acdec64f6d8d9784,2024-08-14T17:06:24.800000 @@ -260259,7 +260286,7 @@ CVE-2024-5557,0,0,71e19027344115370537e5e9f2ac729a9013865b6ffe7632f9b652113dae47 CVE-2024-5558,0,0,d7061155c6f430b38a1e769635e4eca1c24478e5beedfff7ff120ab1f85e7481,2024-07-25T20:00:25.773000 CVE-2024-5559,0,0,ff51559fb7e7362b104a8f1f28895eef2d8f7eb659f926ae6c1cbfda694d488d,2024-08-23T16:35:30.827000 CVE-2024-5560,0,0,002123ffc16696131d663e9c06724d8fb4501ef3ca4bc4191b4229c106e3346c,2024-07-25T19:59:58.017000 -CVE-2024-5561,0,0,2a408a8b1b7383cf34ad317b3bb3772c464e9faf10606b40e748b173c586e0ca,2024-09-09T13:03:38.303000 +CVE-2024-5561,0,1,82dc9c7a28558b655d3278268f7fefe112c6724d8ad6919886d73aaa7545bf00,2024-09-10T15:35:12.400000 CVE-2024-5564,0,0,582ae8d6e013444879054c957a9f974e1fbdab4bea18417275b8c53698226d12,2024-07-19T16:15:03.193000 CVE-2024-5565,0,0,e1d36fa68b4a73d6b78bd8eb39c3f27f14d8d32dc884b4fdfa0f8545d690e8d1,2024-07-03T02:09:05.567000 CVE-2024-5566,0,0,5233947f09c3c6c0de3bbc1356e893f745531db8e2929187d54352e5877fee4e,2024-07-17T13:34:20.520000 @@ -260682,7 +260709,7 @@ CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000 CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000 CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000 -CVE-2024-6089,0,0,2e36ec68c046c195b7c2f86ee35013ba223063fb476a7c2f6d245a7b85cc69f4,2024-07-16T18:00:02.110000 +CVE-2024-6089,0,1,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000 CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000 CVE-2024-6094,0,0,c88417a3a0b84de6c71136c141990a312384401ffa03a26b016fd58bc4fbac2f,2024-08-01T14:00:11.220000 CVE-2024-6095,0,0,1bbfd7c9b87c44d08a43ff0a5e8179e2c5df6e66e4cde292cf2d451628bbb0a8,2024-07-09T17:41:10.523000 @@ -260751,7 +260778,7 @@ CVE-2024-6169,0,0,5e3e4a526f2a4d49baf3eef5dd269238928a43ddd3f433b5eb67cd54677888 CVE-2024-6170,0,0,ac5157d2a01994f30113ebfad64201af3c260777b3c9d326a82653d700efeb69,2024-07-12T14:20:01.013000 CVE-2024-6171,0,0,cc3c7e2efac98c0e3bae2d0863061f06de152fc95e444a2b0790f9bcdb93cdc1,2024-07-12T14:40:02.843000 CVE-2024-6172,0,0,772bb913ed7f683b9ada9dc0ecd54a374149383f55e758d624c0fb5be0b0bf4c,2024-07-03T18:00:01.770000 -CVE-2024-6173,0,1,e994d2565d1caebfbe48ca69861e0db03951e6613035bc78b94f870b7fa82cdf,2024-09-10T12:09:50.377000 +CVE-2024-6173,0,0,e994d2565d1caebfbe48ca69861e0db03951e6613035bc78b94f870b7fa82cdf,2024-09-10T12:09:50.377000 CVE-2024-6175,0,0,eb9360cbb2782c1dffbbe4cdc22c0383ba7fa24583969fa1007fff7e487bb251,2024-07-18T12:28:43.707000 CVE-2024-6176,0,0,1a872b8ffa43aa03ad69b3aab7b5781342b0397e6bd6a578bab967fc8754b3a9,2024-06-20T12:43:25.663000 CVE-2024-6177,0,0,e51904c80961d41608903dd9ecba1a38d9527008f51a121ebd3747e18a611aea,2024-06-20T15:17:06.493000 @@ -260842,7 +260869,7 @@ CVE-2024-6278,0,0,44e714c26cb355fc7151b5bc59b1bd0ad888f3163c616812254e232f41e362 CVE-2024-6279,0,0,13e2bebdf8f75f5bcea80028fb949946ceaffa8ad5d5cab73b12b8ae8b57c011,2024-09-09T17:20:45.137000 CVE-2024-6280,0,0,53e9097fb099dd3ec6185a9b8b59575874e3b050c48e208cc0f20896ca10b944,2024-09-06T16:52:22.133000 CVE-2024-6281,0,0,709a859f49498e3e71bff09d88107556f15663d7c1ae6811fce3a162e288bb4f,2024-07-22T13:00:53.287000 -CVE-2024-6282,1,1,e63d579703999c77ebc032cc57684d3fcd89800626957e2a1def1b249c923535,2024-09-10T12:15:02.137000 +CVE-2024-6282,0,1,5d0734f86b334725aba4e30a40c35d71595563528b9a1d4e0924687701e81732,2024-09-10T15:50:57.713000 CVE-2024-6283,0,0,84796e0660e5beb3ad885e74e117108f941d8d6090497e3b6867080b852b92df,2024-06-28T13:37:44.763000 CVE-2024-6284,0,0,73ccbe59cd13df171bbc79ab6b910254c728a7cb44133bad73b07b9d4dc26d5e,2024-07-05T12:55:51.367000 CVE-2024-6285,0,0,4aa94975a6bb5a18c805d5376b856037574bf8fee823086f9b7bc28590de93c1,2024-06-26T14:24:38.113000 @@ -260898,7 +260925,7 @@ CVE-2024-6338,0,0,8956384d5cc966970e625ecbde4127bb4f84d940fa059b7aaed0155a833fd9 CVE-2024-6339,0,0,900c18b99c3b938f801abc6ad5fe5a877c8e068ea7f11186df65574c46246a21,2024-08-21T12:30:33.697000 CVE-2024-6340,0,0,fd12f25a45d92fefbb8c0ec47428250f4f56bb9c686a12a52e54d86e24fec10a,2024-07-03T18:27:40.903000 CVE-2024-6341,0,0,528f4fdde1526d72477e90a767b2f2316b168f65b64effeddb9446d8a5cdcaf5,2024-07-02T18:15:03.900000 -CVE-2024-6342,0,1,fc4f36196431f464caa5a00be2d63e1b0b442bd3ad06196175f1330a8fdfe779,2024-09-10T12:09:50.377000 +CVE-2024-6342,0,0,fc4f36196431f464caa5a00be2d63e1b0b442bd3ad06196175f1330a8fdfe779,2024-09-10T12:09:50.377000 CVE-2024-6343,0,0,38ac9303003845967860125853ac4494a8fe1ecd1fc8d7c1fa719ce9a13c5dc8,2024-09-05T14:35:34.780000 CVE-2024-6344,0,0,ddc89c494afe0b7b80a518e0bed96070c096d29b8a0f403bdd242f60ce193de2,2024-06-27T00:15:13.360000 CVE-2024-6345,0,0,fc166d5e44485020c9b016f580b4f1c78befbdae01a9e6ec8b7e6b8d01a2e1ea,2024-07-15T13:00:34.853000 @@ -261020,12 +261047,12 @@ CVE-2024-6499,0,0,692791d166e405b753065debb373657f70139bba5a26e85530dc737d8a19a2 CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000 CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 CVE-2024-6502,0,0,4fc5956c8379dc1c951c1db7eac0edb9110d7a11b3cf96933cf800d394cd47c7,2024-08-23T16:18:28.547000 -CVE-2024-6504,0,1,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe32472b,2024-09-10T13:53:28.387000 +CVE-2024-6504,0,0,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe32472b,2024-09-10T13:53:28.387000 CVE-2024-6505,0,0,b8708084cd092b6ca88acb18ad5e80f748f8e2829ec040b8958bfe3c1fee2cd6,2024-07-08T15:41:17.883000 CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48d6,2024-07-05T12:55:51.367000 CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08dcb,2024-08-21T12:30:33.697000 -CVE-2024-6509,0,1,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000 +CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000 @@ -261088,7 +261115,7 @@ CVE-2024-6588,0,0,67672e854c20766f2e15151fa1e111ec8310b7083a57f535c99159d2ce6e5a CVE-2024-6589,0,0,786a762dda95a3db4c9cdc907a3a2b97d61313e4f2473ece396d13a201bdbeba,2024-08-26T16:21:36.530000 CVE-2024-6591,0,0,ba434f770e77a561bd09877a3c29228f51c9818a995d0175b55ef4d80494af35,2024-07-29T14:12:08.783000 CVE-2024-6595,0,0,1592dd03cd1b2c459ee5de6a924fab7f4c8bad5124f72f8b639c71537346952d,2024-08-30T14:15:17.063000 -CVE-2024-6596,0,1,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000 +CVE-2024-6596,0,0,fbc52d4ad7cc3809cd1ad61f11ddbbe24543620b93977b9bbe0dc2fc14b26149,2024-09-10T12:09:50.377000 CVE-2024-6598,0,0,fb802128b1cfc176540749693b684b4374936099ab1c7948c1ec819266291908,2024-07-09T18:19:14.047000 CVE-2024-6599,0,0,6a69a16a0a8781527f95db9310983c42c357e28a72f780fd79d80c9654364b86,2024-07-18T12:28:43.707000 CVE-2024-6600,0,0,8a7bdd7b6969fa6cd69a1854f6f2130a9698184b9485e28b1c9cbb32470416d8,2024-07-16T18:15:08.737000 @@ -261235,9 +261262,9 @@ CVE-2024-6791,0,0,faa35dfb0f99d60a9ec7e01f64fb4fbd258b21c722ac3f7c1361230fa3f28b CVE-2024-6792,0,0,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000 CVE-2024-6793,0,0,c8a4a674c56a10e5c81707581c99cad157e4f6fe1de25e07f6d12654839c8bd5,2024-07-24T12:55:13.223000 CVE-2024-6794,0,0,8d77d86d33801c3c5b2b30a4dcdc140fae6ce1a1801e3f754981cc410b96001c,2024-07-24T12:55:13.223000 -CVE-2024-6795,0,1,f47b6a5a33bcbbbefc22c1495b7a18cf0d4e93e05801eb8c6785077f1394a3a6,2024-09-10T12:09:50.377000 -CVE-2024-6796,0,1,6d5ec96f1c80635bc76860b3b93074afa788c7b69ce902c24d7ed7c2c91e9fc9,2024-09-10T12:09:50.377000 -CVE-2024-6799,0,0,4139a727efc5bbba878823dd77da7ecbccc0d31113ed4001d69cc00c0e6e86e7,2024-07-19T13:01:44.567000 +CVE-2024-6795,0,0,f47b6a5a33bcbbbefc22c1495b7a18cf0d4e93e05801eb8c6785077f1394a3a6,2024-09-10T12:09:50.377000 +CVE-2024-6796,0,0,6d5ec96f1c80635bc76860b3b93074afa788c7b69ce902c24d7ed7c2c91e9fc9,2024-09-10T12:09:50.377000 +CVE-2024-6799,0,1,39536c19a9ca2d6262efda14a231fbf09108e28ad2b189e8ce4347991001df6e,2024-09-10T15:05:48.583000 CVE-2024-6800,0,0,a15298e35d6052e73a8ba7e320d06f1ae120c932f1a3656ad087f1be4be328b2,2024-08-22T15:15:17.127000 CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 CVE-2024-6802,0,0,41c45597ef2d2991d0ff5de1c94d34d596167540846175036f3a8eca13168f84,2024-08-26T05:15:05.980000 @@ -261275,7 +261302,7 @@ CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9b CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 CVE-2024-6873,0,0,8e5db8bfa0491746f29814d1d8249a1850325cbcdbd09b52dbf90709e95d212c,2024-08-01T16:45:25.400000 -CVE-2024-6874,0,0,dbf80741a5dbaf69dfea3d6102d0d56a1052d5bac2fe6cc0bc24819c43cddd92,2024-08-01T14:00:45.683000 +CVE-2024-6874,0,1,805a0b27cbdf811d96209b292e2d5909e967f9d3161226db1f6fe45d6b995555,2024-09-10T15:27:04.190000 CVE-2024-6879,0,0,6dd99f7574923c6a0220f28a1253b4ac8ff29b09a2650b86b7b021e79b9e4f08,2024-08-28T15:35:24.120000 CVE-2024-6881,0,0,9eb1bb1325feedc0a442bcf6c20b4ef8c1194f18829a36ce47ae950cf638d18d,2024-08-27T11:15:04.740000 CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1ba,2024-08-21T12:30:33.697000 @@ -261320,7 +261347,7 @@ CVE-2024-6924,0,0,bbcacf88af2b0ae00d8670943e9b5c33e17b616aec8da8351ae30fc54a8541 CVE-2024-6925,0,0,c5dcb5a15a3e00b708a97d3592e5640214567c9793f94ecb10d48bf9bb5011a2,2024-09-09T21:35:16.723000 CVE-2024-6926,0,0,8f7a980eaebe48aff3a265873ac088d8aab7ac9e61e313ad47eb901f8ccee0e3,2024-09-04T15:35:26.253000 CVE-2024-6927,0,0,e148b46f63346622a06f6186d016b89227da86b491e3aa4a6ce8be2d756e1768,2024-08-29T20:37:07.310000 -CVE-2024-6928,0,0,a5255803d07f7d516ba4dc802630104a14644cf49be36035f898fd3df018ae82,2024-09-09T13:03:38.303000 +CVE-2024-6928,0,1,04e0edb45267f653103b1b4b8ed00c7e0e3fce07f9c3ed23eb9bfbde1bd8f41d,2024-09-10T14:35:09.507000 CVE-2024-6929,0,0,be8ff54e71c3dae7aaaebdfc2eb64ab807c47924b1857c6816d9c69c8ca6063c,2024-09-05T12:53:21.110000 CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000 CVE-2024-6932,0,0,67a8aa74150c82de9338c7f5e13237de6a0b3fc058478249ab687a9bbea18d6e,2024-07-22T13:00:31.330000 @@ -261367,7 +261394,7 @@ CVE-2024-6974,0,0,87e35dfa7758fb3e456f51ae7c2c1005342757b141d54c95c0eb015bf95a4e CVE-2024-6975,0,0,d63385a625ec15f0611b849f606ef80820f5aa79d2e921c6e99e1d59f30cf02e,2024-08-27T15:40:05.223000 CVE-2024-6977,0,0,dced37193034395cbd70a15c25ae6f2fd108fd86d3d88b19be8a8af0292bdfe7,2024-08-27T15:41:15.443000 CVE-2024-6978,0,0,37cb13cf871d0be71d7cccfe060430953b559d3b1fa288f5a4e9f8855fa3ca36,2024-08-27T16:17:54.077000 -CVE-2024-6979,0,1,c462ab441dc6fef278b8d322b06d9bbe90e009e07f8beeb96cea48ccdc45139d,2024-09-10T12:09:50.377000 +CVE-2024-6979,0,0,c462ab441dc6fef278b8d322b06d9bbe90e009e07f8beeb96cea48ccdc45139d,2024-09-10T12:09:50.377000 CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc7610,2024-07-31T12:57:02.300000 CVE-2024-6984,0,0,b8a735678309db6c41dda49955522d6536b87529616b3c230cb8ef59ce9a0d3f,2024-07-29T16:21:52.517000 CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000 @@ -261543,7 +261570,7 @@ CVE-2024-7255,0,0,a4eb887a2aa91b61ced64af6faa636cef124d2fd1032af5abcd1e986918698 CVE-2024-7256,0,0,28c6c5405ca0661376f4706f7e75647b14826bc648847c0c2ef29d4ee5bafea0,2024-08-03T18:35:04.003000 CVE-2024-7257,0,0,e6ef266df52e25692b132cfb6522d79defb5eb3e548daae54be1d69b0c3ab16e,2024-08-05T12:41:45.957000 CVE-2024-7258,0,0,7daa83813c091cf4943890cfcc79fb77dbec053060dc3ee1861fb34d4faa0557,2024-08-23T16:18:28.547000 -CVE-2024-7260,0,1,1e1f80636ac6402e8411c199d72bd976b167602aa1c6106249bcb3a6ff6e15f7,2024-09-10T12:09:50.377000 +CVE-2024-7260,0,0,1e1f80636ac6402e8411c199d72bd976b167602aa1c6106249bcb3a6ff6e15f7,2024-09-10T12:09:50.377000 CVE-2024-7261,0,0,88fefc15b9eab7b2e919bd0caea05a9adad8b1510053f0adb03b22cb218cc2eb,2024-09-03T12:59:02.453000 CVE-2024-7262,0,0,95b3d95a32b25a2634e7e0faa3f1f6b57a404f18277315b6dddbf2c940c189df,2024-09-05T13:30:33.680000 CVE-2024-7263,0,0,9d6df8d57145d860b9f285c4defefe5eae42f914cf87b79ed3fa24860767bd90,2024-08-22T06:15:04.510000 @@ -261589,7 +261616,7 @@ CVE-2024-7311,0,0,b37b59792dd58cee524c8ffe58ffad74a44a459beeecd4500b7db56eb7cdda CVE-2024-7313,0,0,d7b0f37e48710e5f5a7b78ed26ce477c46ecddb143fdd8dc8ca6d6152120ce70,2024-08-26T18:35:13.207000 CVE-2024-7314,0,0,c82905b3df334ceeb097c6861ab91c83e5d51eabc55ac571993838582b95803d,2024-08-05T12:41:45.957000 CVE-2024-7317,0,0,d290990c88ffba5acfc4fa1e36f444dec67bc90a1513331480ff821c55d2a98f,2024-08-06T16:30:24.547000 -CVE-2024-7318,0,1,f09874cd7aabccf109b6b616f964ca583d92ddef6e5184a27f7c244dd00dffcb,2024-09-10T12:09:50.377000 +CVE-2024-7318,0,0,f09874cd7aabccf109b6b616f964ca583d92ddef6e5184a27f7c244dd00dffcb,2024-09-10T12:09:50.377000 CVE-2024-7319,0,0,0bffe027bd25e9cd17fbce9beb09f62a0038f1a01ac652e5cacc1f14534c5492,2024-08-05T12:41:45.957000 CVE-2024-7320,0,0,a6345ced50bd1b25dc54bd951c2133e1d51c039a215f4119dbfe976f4ac4ed65,2024-08-12T16:47:36.887000 CVE-2024-7321,0,0,42cb7d687a3ea14a5f795d2e8dc1d36894e3cc4a44b6104596b7ddb427645e4e,2024-08-12T16:49:01.887000 @@ -261611,7 +261638,7 @@ CVE-2024-7337,0,0,bb4e29754f24508ee03646d09f02a9e9792b2bdc0b40ad3f742f7daf359e30 CVE-2024-7338,0,0,40f9236687cb1fba08bae47e5bce5fdf8596baa7faf10b9e6c7a335576e73829,2024-08-09T14:51:45.677000 CVE-2024-7339,0,0,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a941603,2024-08-23T16:53:31.643000 CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000 -CVE-2024-7341,0,1,05cbaf0bea6662cb6b38e82de68edc6d0cc65bbb67b89252d235d55beeeb630d,2024-09-10T12:09:50.377000 +CVE-2024-7341,0,0,05cbaf0bea6662cb6b38e82de68edc6d0cc65bbb67b89252d235d55beeeb630d,2024-09-10T12:09:50.377000 CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000 CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac1800,2024-09-05T14:11:00.493000 @@ -261810,7 +261837,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 -CVE-2024-7618,0,1,a6149ec34b2a8c7be413bc36f1943fe9aebcb6fe380868fee0becf4e0c41b606,2024-09-10T12:09:50.377000 +CVE-2024-7618,0,0,a6149ec34b2a8c7be413bc36f1943fe9aebcb6fe380868fee0becf4e0c41b606,2024-09-10T12:09:50.377000 CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000 CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000 CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000 @@ -261841,7 +261868,7 @@ CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000 CVE-2024-7652,0,0,c7f694e385002b920efe17a183ba7538023c7cf88dd53a372f2912343dfa2405,2024-09-09T13:03:38.303000 CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000 -CVE-2024-7655,0,1,f298cc9a9afea680a6796cf910ff4a570db8418f9a3558eeaf2eff77bb4e3b44,2024-09-10T12:09:50.377000 +CVE-2024-7655,0,0,f298cc9a9afea680a6796cf910ff4a570db8418f9a3558eeaf2eff77bb4e3b44,2024-09-10T12:09:50.377000 CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000 CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000 CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 @@ -261875,8 +261902,8 @@ CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b4 CVE-2024-7693,0,0,8f49e917567dbf3d83b8fab0c0f87defce06a4391222113e25ab3be3d08b6e06,2024-09-06T16:51:35.647000 CVE-2024-7694,0,0,915a620e49de11e538187b87ae1859b4dd8b81a9c117898d10d07c783b69fb2e,2024-09-06T17:24:42.573000 CVE-2024-7697,0,0,56fc87c2b950fc0d4b7d08c76bcec1377c688ea98c921a8e581bb6c082412bb3,2024-09-06T18:04:28.030000 -CVE-2024-7698,0,1,f3712135d1df79d7e27fa4c4c6104096ee019b8d2b0cd61845488f2835ff9eeb,2024-09-10T12:09:50.377000 -CVE-2024-7699,0,1,72b06587f38ad074e1e172a76007dca55e0aae951fcc370c220f50ce7ab480fe,2024-09-10T12:09:50.377000 +CVE-2024-7698,0,0,f3712135d1df79d7e27fa4c4c6104096ee019b8d2b0cd61845488f2835ff9eeb,2024-09-10T12:09:50.377000 +CVE-2024-7699,0,0,72b06587f38ad074e1e172a76007dca55e0aae951fcc370c220f50ce7ab480fe,2024-09-10T12:09:50.377000 CVE-2024-7700,0,0,3e081f65a743f7c2243d16cda14609415c7128fbdf01790b4350a9589b48c796,2024-08-12T18:57:17.383000 CVE-2024-7702,0,0,35104b2d835bcff771d3508b754ac4f00b960fb6fd0cdfa84ab47a794def21ca,2024-08-26T18:15:46.870000 CVE-2024-7703,0,0,4fed134c1a88e3f28368f1aeb0423ea22cd742b65dcb7d77a318829e8e6bb6ba,2024-08-19T12:59:59.177000 @@ -261899,7 +261926,7 @@ CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000 CVE-2024-7732,0,0,d07658c10ed57e2a3eecd9b14e76e8eed0b7a7133550030a1f5039eb59d98d22,2024-08-14T13:00:37.107000 CVE-2024-7733,0,0,d6f0b33872e43d23ba993c9827febac1a615268a96a44f431f426f7460340dba,2024-08-14T02:07:05.410000 -CVE-2024-7734,0,1,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000 +CVE-2024-7734,0,0,ecf2761e7c92c768ea860282a3ce0e06a2c71cea4892b743b02acfaa994cd50a,2024-09-10T12:09:50.377000 CVE-2024-7738,0,0,9abbf70090d4bac2436939ae1d7e5b66071c9e95d911875233a210759cede2ef,2024-08-14T02:07:05.410000 CVE-2024-7739,0,0,48d24e6c734bdd0aabede58961a2ddba8bd9566478ef049fa21ee7be6d7677d2,2024-08-14T02:07:05.410000 CVE-2024-7740,0,0,b6b97e22b2a1c91ed733b5ea0db90c7ca386835aea8a2536d78b137aa899a052,2024-08-21T19:06:30.707000 @@ -261917,13 +261944,13 @@ CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470 CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000 CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000 CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000 -CVE-2024-7770,0,1,050ca25dc9f9b4d1ecb0313871198cecedaeb8fddc305a81bf31aa56f8757cc5,2024-09-10T12:09:50.377000 +CVE-2024-7770,0,0,050ca25dc9f9b4d1ecb0313871198cecedaeb8fddc305a81bf31aa56f8757cc5,2024-09-10T12:09:50.377000 CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000 CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000 CVE-2024-7778,0,0,3bccf24c2d6c26e9b97b53b6049aaebd5856252add9958ab8944d96a94251b86,2024-08-22T12:48:02.790000 CVE-2024-7780,0,0,45e331e41470c18e0d898be4bc1931dca39faf6b7f4d412a460044104575abbc,2024-08-26T18:19:59.907000 CVE-2024-7782,0,0,9772cfc0cffb104f900f553126e5bb2a4b326e29588ceccc59352666287dfd99,2024-08-26T18:21:12.203000 -CVE-2024-7784,0,1,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000 +CVE-2024-7784,0,0,a1673633f8befe483b8c481cae0c04073b4df8acf7cf90d7ad7fd806da35778c,2024-09-10T12:09:50.377000 CVE-2024-7786,0,0,bc9bd7c5c069bb8c59f5ac773821571e1c9df29939aac0b9b15b34e792ea7a51,2024-09-04T15:35:26.560000 CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000 CVE-2024-7791,0,0,7416656b44e86a668ddf90bfa89c01f36bde25a07c507963ab58656b2d115a3d,2024-08-27T13:01:37.913000 @@ -261979,7 +262006,7 @@ CVE-2024-7884,0,0,d8621415c0cf625afb3ac55046a75308d0baca8fd0aad75f2a11bb7d29e7d0 CVE-2024-7885,0,0,8ccead187965a5f1c2abb39b48c133d9f576a21859dc9731309caf892f9de5e4,2024-09-09T23:15:10.350000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 -CVE-2024-7891,0,1,b35e39542ebc28a16519078ca6c1d7a0075a682efbdea597aee8b4a4f1fa51d3,2024-09-10T12:09:50.377000 +CVE-2024-7891,0,0,b35e39542ebc28a16519078ca6c1d7a0075a682efbdea597aee8b4a4f1fa51d3,2024-09-10T12:09:50.377000 CVE-2024-7895,0,0,dcdb1275a611703d85517bf5428cb1020917dec1da8e46a89dfea7f9bd6d1daa,2024-08-29T13:25:27.537000 CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000 CVE-2024-7897,0,0,e1e6bea210133c6b9b950b4aecbbc6a33480bc30160d48b4fd9fe9919d3739ab,2024-08-19T17:15:11.650000 @@ -262036,7 +262063,7 @@ CVE-2024-7948,0,0,10e56bd82889acf527e731295a76df26abf6e1bd128042058528282707ce87 CVE-2024-7949,0,0,64b957370c21ddcba0bc925ad861d01e09364475441bf650c2c5e65485084163,2024-08-21T19:15:13.600000 CVE-2024-7950,0,0,b51a61cdc7833f69fe0a174cb3081029b1669ec8306ef6c1fd438a91efe05d06,2024-09-04T13:05:36.067000 CVE-2024-7954,0,0,3e94915bcd6201b8731c3a5ae345a341f2edda6301e38b26d28e234b0fc15d65,2024-08-23T18:46:31.730000 -CVE-2024-7955,0,1,067d7635f43b59aa4959e5e7d7972a2d69be698ea50d1d8f52601c6f98ab5325,2024-09-10T12:09:50.377000 +CVE-2024-7955,0,1,b6d58093d52dbc1693883781c79b3abb54211ad50ad9e0127c4cb8b72bd51a3e,2024-09-10T15:35:13.013000 CVE-2024-7958,0,0,483ea949f242fd0880547068782264d397026329e525a14dcbacca7c22e7bcec,2024-08-19T20:15:08.907000 CVE-2024-7964,0,0,c58a832be87177a31dd0ab059ea0a6d25f3e2935f7b0bca0ed2607ff4388d425,2024-08-27T13:35:00.823000 CVE-2024-7965,0,0,52e904505bf2918dc7213f0c0cee1465ad2565b3645c991ed95474f3cc956ec6,2024-08-29T01:00:00.997000 @@ -262184,14 +262211,14 @@ CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb CVE-2024-8231,0,0,19b769716e3fff898a72bf0ee7d68779b61ab99af63bed31a0498759613ebd4e,2024-08-28T12:57:27.610000 CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000 CVE-2024-8235,0,0,7072b68d002bcf4f9595f61b4137bd3d5b31c93ce76df9863ff0a1c3da8ed948,2024-09-03T12:59:02.453000 -CVE-2024-8241,0,1,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000 +CVE-2024-8241,0,0,35ebd2ab4c68ddc81effc80c2cf2eb8cf12caf111e7ab884d603a2c6bde8e766,2024-09-10T12:09:50.377000 CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000 CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000 CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000 CVE-2024-8255,0,0,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000 -CVE-2024-8258,0,1,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000 +CVE-2024-8258,0,0,f89f58eb5f0b3759dea8f0dae08eaa2a66704ca0d9d3594730a9f2f38b881d1e,2024-09-10T12:09:50.377000 CVE-2024-8260,0,0,812d2a62f9a14f293d2814006504d857c705848c99804aae9066abfa5d1408ba,2024-09-03T12:59:02.453000 -CVE-2024-8268,0,1,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000 +CVE-2024-8268,0,0,ceeeab380c4c185371d3b97780ec883236427fb28d279219c56301bfbb794609,2024-09-10T12:09:50.377000 CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000 CVE-2024-8276,0,0,33cf21b53b41316bc2e568f752afa4e96bbe73b4ee966f9832ffdb8137ffcc10,2024-09-03T12:59:02.453000 CVE-2024-8285,0,0,44d06284adb5d71c65e8f3277866d5d546f57dcd495152060c7216923cd6bd07,2024-09-03T12:59:02.453000 @@ -262238,7 +262265,7 @@ CVE-2024-8365,0,0,81c889787151e95f50edc31d86d0d8800a4aaa4de596dc2a7252c4cbdeb954 CVE-2024-8366,0,0,be663b51eff047ef5324516e3dc05e341a7647978df6a6f91fe297f3f5c5eb50,2024-09-04T11:26:49.020000 CVE-2024-8367,0,0,5172ded1dd5d5dccb77f0059a7c6495922e642ce8e52859a1f0a60d7fb927bb9,2024-09-03T12:59:02.453000 CVE-2024-8368,0,0,e041f44a528823075791907fb829fe4e23ee08e4bad517d1712c799858033925,2024-09-03T12:59:02.453000 -CVE-2024-8369,1,1,fd11748b0eee004dded2be2f88f9213c205339f11ab8f3ede86318ba467c0a0b,2024-09-10T12:15:02.463000 +CVE-2024-8369,0,1,c05b727b928dc2b947f92e6722013eb3f5815c13f08e62aa4470bee7eb812e25,2024-09-10T15:50:57.713000 CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a09,2024-09-03T14:15:17.787000 CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000 CVE-2024-8372,0,0,824598be017ed03f49e00dc10d01119221625b308bd2ce07fc53c22aed41c811,2024-09-09T18:30:12.050000 @@ -262273,6 +262300,7 @@ CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e4 CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000 CVE-2024-8428,0,0,32f99662d2ff0a82eac2c387b5879cdce3b74766786e4d561b16e1b245df448a,2024-09-06T16:46:26.830000 CVE-2024-8439,0,0,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 +CVE-2024-8443,1,1,617cd4f466ab33fd47ad3a169ac6e58b744cbb396f21cd616989d6daccbaefe1,2024-09-10T15:50:57.713000 CVE-2024-8445,0,0,27d6183cbf221ef18e3639e3533cc8ca212a51b0f7239a93c253eea652cb910f,2024-09-05T17:44:56.007000 CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000 CVE-2024-8461,0,0,3a6140152ccac3c7afb990181dca0d64f3ce128b6b2641b9dac80f5a038f3edb,2024-09-05T17:45:07.877000 @@ -262288,48 +262316,49 @@ CVE-2024-8470,0,0,bea6b0b968688b42b5644ab4cec20c893536d252388507a633ee5ebbe07507 CVE-2024-8471,0,0,d4cac4daadf018326a13905f788e8fc27e503497a3cff6ab0ea980773a6f76cb,2024-09-06T11:44:22.510000 CVE-2024-8472,0,0,a896e0fd54ff62d16feed47be0f08dd27e23a8a4def269ca8073766b75918cef,2024-09-06T11:44:34.543000 CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c00,2024-09-06T11:44:45.017000 -CVE-2024-8478,0,1,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000 +CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000 CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000 CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 CVE-2024-8517,0,0,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000 CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000 -CVE-2024-8543,0,1,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000 -CVE-2024-8554,0,1,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000 -CVE-2024-8555,0,1,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000 -CVE-2024-8557,0,0,d956d0b1de890824833231cfe4294c7751ca4754efdbac52614ee252b9d18dba,2024-09-09T13:03:38.303000 -CVE-2024-8558,0,0,4aac7527eeee42b5c5d8109666e56a4ed70772a8dcf12a0ff2f911a207d46df2,2024-09-09T13:03:38.303000 -CVE-2024-8559,0,0,3e9e0b104fc272c9644d68797f459b21c97a601223d1ffa5bd43c8da7cff83ff,2024-09-09T13:03:38.303000 -CVE-2024-8560,0,0,af722b5f84acc1bc41034eee850b6876462283a40ee43492eb83ce54a6962ded,2024-09-09T13:03:38.303000 -CVE-2024-8561,0,0,dc0fd4abf312f4f9cb64addd3f0d934be26835bf369f0d67ce68cf77fb19e719,2024-09-09T13:03:38.303000 -CVE-2024-8562,0,0,c4b8a0551a23e8172e9c73be2fa79f014a3db9d35691867f99c285ac799ddcf6,2024-09-09T13:03:38.303000 -CVE-2024-8563,0,0,f84ba3aea109085e7c774fb3cc47d7f74c0436fb36077f5024069d632bac0414,2024-09-09T13:03:38.303000 -CVE-2024-8564,0,0,7ed38f8c2382c767dadd62fc96c63167ce6c0648a66a6803aecc8343fb96a53e,2024-09-09T13:03:38.303000 -CVE-2024-8565,0,0,77a9cfeae04e7a95530eb68846baa2e068240bb8d58178c7065615768603505f,2024-09-09T13:03:38.303000 -CVE-2024-8566,0,0,1b6f79a49a600ea051d35bc3795bca3b2323a53fadb6399aa2adc97f8077cfe9,2024-09-09T13:03:38.303000 -CVE-2024-8567,0,0,6dd655de57216fece56db58ede9697b1a42006a95d5f8c6fa5d99c8bbf16ace4,2024-09-09T13:03:38.303000 +CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000 +CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000 +CVE-2024-8555,0,0,0c0685cb1cca90ba97dbbe7724af46b71d0ab057cb41b6cc62e81df56a2985b7,2024-09-10T13:53:11.847000 +CVE-2024-8557,0,1,86ab04a42076aa0fe9f792cba1f27d54b98becfc358809b664a63ce528fde776,2024-09-10T14:19:36.280000 +CVE-2024-8558,0,1,cd5317422ee57a143fa549693a5ddb5c3640390382b2d955ce9be00f839794f7,2024-09-10T15:50:24.143000 +CVE-2024-8559,0,1,570817955f95cc0d2249977f6f5e834ee4444c1bdc403ac954ebc9064d75bfbb,2024-09-10T15:31:32.443000 +CVE-2024-8560,0,1,c57fff8c9843a2ee08ebb0b3f21e0b893a75fc78bbbeb30ab9ca5fb292349bae,2024-09-10T15:32:39.927000 +CVE-2024-8561,0,1,50e7c90fb0f67cf76a1d7d8b120d47e3caf47b73fa527bafc64fa4101919d772,2024-09-10T15:35:01.837000 +CVE-2024-8562,0,1,4dad038bafef5062b95bd42a0668ee2ae213ac8b43c3f5dd213a25e0a1c67edd,2024-09-10T15:36:34.703000 +CVE-2024-8563,0,1,031de96982528dfcf24e623c2f7c7383d0e770c6ac7d9b827f3eeb61b721c6d4,2024-09-10T15:37:48.183000 +CVE-2024-8564,0,1,2112c36914e39f842fdc3749656e81cb1e01d81d9daf6872738042abc963e73e,2024-09-10T15:38:42.570000 +CVE-2024-8565,0,1,923e87f30584d77b1eb045cc17fb206bfc48a80ad2f8f1ccf84c8acb9bd2c037,2024-09-10T15:40:31.103000 +CVE-2024-8566,0,1,b697d2f2d8dab369399702d62c565693e4b82d2b91e05adb154f01cb1c8382ab,2024-09-10T15:42:03.630000 +CVE-2024-8567,0,1,49659b49a666f0018bb5744af39b0142ede6c7f436b35449bf81fb3596426b7c,2024-09-10T15:44:31.283000 CVE-2024-8568,0,0,4021a3f0e72a6d171048f0a7b13a93327102ce9af57868999c56debd16b33d55,2024-09-09T13:03:38.303000 -CVE-2024-8569,0,0,825765fab86e7246b7c8f1866c045e3d8eb383d3482602655f505175cad6dae8,2024-09-09T13:03:38.303000 +CVE-2024-8569,0,1,aaed184af7e4134cfe1a8ea6b899c2f66a4c7610f73679d8a682587becf0ed8f,2024-09-10T15:45:24.237000 CVE-2024-8570,0,0,a35ad2ed8f4e40daba99661193190c020bbec00950eacb9abfa9a2b177a3196f,2024-09-09T13:03:38.303000 CVE-2024-8571,0,0,bc72f3f150d06377644ebf4c0afa9d59046664e5cf502a539ace8bb639b609c4,2024-09-09T13:03:38.303000 CVE-2024-8572,0,0,65c0182e0b6b9126e2a9480fb9dc08e73b2cfe03993460c6fe0066e5e3a46c29,2024-09-09T13:03:38.303000 -CVE-2024-8573,0,1,e2248f2e9fabf9390d946aa934f8785dd212725150f7676501e18fb9191a46dd,2024-09-10T12:08:12.567000 +CVE-2024-8573,0,0,e2248f2e9fabf9390d946aa934f8785dd212725150f7676501e18fb9191a46dd,2024-09-10T12:08:12.567000 CVE-2024-8574,0,0,19894d99d3070776fb1a44f17a54df633ea25e6bfa91923d40be07d8e4a21b2e,2024-09-09T18:47:10.577000 CVE-2024-8575,0,0,1a894f380aae23a0c95d0f445bdf8ed48f5f6c32fa54c136a25ec7a57fd27b16,2024-09-09T18:47:45.917000 CVE-2024-8576,0,0,1783676f924976381fafc0f96422ed382f270401d25c92fb033e06383df4a7f7,2024-09-09T18:59:57.423000 CVE-2024-8577,0,0,96f1be189725676d2f3233dc01a21ddbf35a2a75bf7f74c80a804039b234d5e2,2024-09-09T18:51:32.377000 CVE-2024-8578,0,0,72b1c5b8b0cbaa0c9c8584a9a193238855c2f41d4aec8b5a15264448a8ca7c65,2024-09-09T18:46:00.300000 -CVE-2024-8579,0,0,5e850f0b011b9943620ead0d3063b902196cd66b4d55fb09d083b2d2656f9dc7,2024-09-09T13:03:38.303000 -CVE-2024-8580,0,0,71fb7b71ee4e11efeceacb1480052da188f0c5c4d3e8d999f7cbbc85ef79e3d2,2024-09-09T13:03:38.303000 -CVE-2024-8582,0,0,bf290c531eb532cb798b8923302db1861844d084d859b0eda7658f732f801dd8,2024-09-09T13:03:38.303000 -CVE-2024-8583,0,0,db5ff814fab4f35b327671aeddc5fb77478e1503097a9d5855c11bc2b8fab58b,2024-09-09T13:03:38.303000 +CVE-2024-8579,0,1,5ca39278224613960d2995fc71f5451de91cb55696583bb2c29af9edc66fba31,2024-09-10T15:47:10.393000 +CVE-2024-8580,0,1,f51aa5c8e3665529b80cf204d693b0b0f66df0f643575c721707f6f32dd401a5,2024-09-10T15:47:47.397000 +CVE-2024-8582,0,1,929f6a4eccde08c2101d65daf5f8492ec1f09acd5b572ce0e385ece7e31d5365,2024-09-10T15:48:30.537000 +CVE-2024-8583,0,1,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a570641936171,2024-09-10T15:49:29.103000 CVE-2024-8584,0,0,7c7ad2063aa233a836e9a59682cb05dfcb95a707aa850cd9ec5b817e03f5e162,2024-09-09T13:03:38.303000 CVE-2024-8585,0,0,9988d1ca177f24ec925e5066ed58d9d8a162814f82b8247fbc323ff8f14711cf,2024-09-09T13:03:38.303000 CVE-2024-8586,0,0,d2fff35b7bace3dc5314f28642480fa5fad7af57500e2b190be70f1f2b91fb56,2024-09-09T13:03:38.303000 CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000 CVE-2024-8604,0,0,03dd9ea4b720aacc0e1e1cce008473e1a786aeb7eaa9fc848b1a9d53cc790e1f,2024-09-09T18:30:12.050000 CVE-2024-8605,0,0,05de9fb886966e208a1d4ea135c5ccec7205233c650e87f0027c612a99575815,2024-09-09T18:30:12.050000 -CVE-2024-8610,0,1,473e0782947d4bb5808f93b8ea2243b42a4e82997b690a69a9a95368e1eef9c1,2024-09-10T12:09:50.377000 -CVE-2024-8611,0,1,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000 -CVE-2024-8645,0,1,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 +CVE-2024-8610,0,0,473e0782947d4bb5808f93b8ea2243b42a4e82997b690a69a9a95368e1eef9c1,2024-09-10T12:09:50.377000 +CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000 +CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 +CVE-2024-8654,1,1,57cef793a15e4fff1f6a81b90040ccd0e88e34303bf4e34610423e89cb1b0d25,2024-09-10T15:50:57.713000