diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json index e8e152fbcbf..eb34bd28e25 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22647.json @@ -2,13 +2,13 @@ "id": "CVE-2023-22647", "sourceIdentifier": "meissner@suse.de", "published": "2023-06-01T13:15:10.467", - "lastModified": "2023-10-05T16:28:13.250", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T09:15:03.133", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local\n cluster, resulting in the secret being deleted, but their read-level \npermissions to the secret being preserved. When this operation was \nfollowed-up by other specially crafted commands, it could result in the \nuser gaining access to tokens belonging to service accounts in the local cluster.\n\n\nThis issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4.\n\n" + "value": "An Improper Privilege Management vulnerability in SUSE Rancher allowed standard users to leverage their existing permissions to manipulate Kubernetes secrets in the local\n cluster, resulting in the secret being deleted, but their read-level \npermissions to the secret being preserved. When this operation was \nfollowed-up by other specially crafted commands, it could result in the \nuser gaining access to tokens belonging to service accounts in the local cluster.\n\n\nThis issue affects Rancher: from >= 2.6.0 before < 2.6.13, from >= 2.7.0 before < 2.7.4." } ], "metrics": { @@ -57,22 +57,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "meissner@suse.de", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-267" } ] }, { - "source": "meissner@suse.de", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-269" + "value": "NVD-CWE-Other" } ] } diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json index 3110582a958..9db2c7bfa9c 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22648.json @@ -2,13 +2,13 @@ "id": "CVE-2023-22648", "sourceIdentifier": "meissner@suse.de", "published": "2023-06-01T13:15:10.553", - "lastModified": "2023-10-05T16:27:57.587", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-09T09:15:04.260", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A Improper Privilege Management vulnerability in SUSE Rancher causes permission changes in Azure AD not to be reflected to users \nwhile they are logged in the Rancher UI. This would cause the users to \nretain their previous permissions in Rancher, even if they change groups\n on Azure AD, for example, to a lower privileged group, or are removed \nfrom a group, thus retaining their access to Rancher instead of losing \nit.\nThis issue affects Rancher: from >= 2.6.7 before < 2.6.13, from >= 2.7.0 before < 2.7.4.\n\n" + "value": "A Improper Privilege Management vulnerability in SUSE Rancher causes permission changes in Azure AD not to be reflected to users \nwhile they are logged in the Rancher UI. This would cause the users to \nretain their previous permissions in Rancher, even if they change groups\n on Azure AD, for example, to a lower privileged group, or are removed \nfrom a group, thus retaining their access to Rancher instead of losing \nit.\nThis issue affects Rancher: from >= 2.6.7 before < 2.6.13, from >= 2.7.0 before < 2.7.4." } ], "metrics": { @@ -57,22 +57,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "meissner@suse.de", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-271" } ] }, { - "source": "meissner@suse.de", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-269" + "value": "NVD-CWE-Other" } ] } diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json new file mode 100644 index 00000000000..9a303061510 --- /dev/null +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20787.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20787", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-10-09T09:15:05.000", + "lastModified": "2024-10-09T09:15:05.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.0.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-52.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json new file mode 100644 index 00000000000..82daa11a4c4 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45146.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45146", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-10-09T09:15:05.693", + "lastModified": "2024-10-09T09:15:05.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dimension versions 4.0.3 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/dimension/apsb24-74.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json new file mode 100644 index 00000000000..06f75de74be --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45150.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45150", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-10-09T09:15:06.210", + "lastModified": "2024-10-09T09:15:06.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dimension versions 4.0.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/dimension/apsb24-74.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json index e4504ac7639..09fbef146bf 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6654.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6654", "sourceIdentifier": "security@eset.com", "published": "2024-09-27T09:15:03.937", - "lastModified": "2024-09-30T12:46:20.237", + "lastModified": "2024-10-09T09:15:06.713", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -75,7 +75,7 @@ ], "references": [ { - "url": "https://support.eset.com/en/ca8725-local-privilege-escalation-vulnerability-in-eset-products-for-macos-fixed", + "url": "https://support.eset.com/en/ca8725-denial-of-service-vulnerability-in-eset-products-for-macos-fixed", "source": "security@eset.com" } ] diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9451.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9451.json new file mode 100644 index 00000000000..47b1497e725 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9451.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-9451", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-10-09T08:15:05.160", + "lastModified": "2024-10-09T08:15:05.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Embed PDF Viewer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'height' and 'width' parameters in all versions up to, and including, 2.4.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/embed-pdf-viewer/trunk/embed-pdf-viewer.php#L144", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/embed-pdf-viewer/trunk/embed-pdf-viewer.php#L258", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3164573/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/embed-pdf-viewer/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b616e275-855d-461e-8fcb-c96098e41dfd?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index edba43d806e..19e162e7f25 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-09T08:00:20.541320+00:00 +2024-10-09T10:00:21.377174+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-09T07:15:09.833000+00:00 +2024-10-09T09:15:06.713000+00:00 ``` ### Last Data Feed Release @@ -33,33 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265060 +265064 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `4` -- [CVE-2023-36325](CVE-2023/CVE-2023-363xx/CVE-2023-36325.json) (`2024-10-09T06:15:11.303`) -- [CVE-2023-37154](CVE-2023/CVE-2023-371xx/CVE-2023-37154.json) (`2024-10-09T06:15:12.943`) -- [CVE-2023-45359](CVE-2023/CVE-2023-453xx/CVE-2023-45359.json) (`2024-10-09T06:15:13.097`) -- [CVE-2023-45361](CVE-2023/CVE-2023-453xx/CVE-2023-45361.json) (`2024-10-09T06:15:13.203`) -- [CVE-2023-45872](CVE-2023/CVE-2023-458xx/CVE-2023-45872.json) (`2024-10-09T06:15:13.323`) -- [CVE-2023-46586](CVE-2023/CVE-2023-465xx/CVE-2023-46586.json) (`2024-10-09T06:15:13.447`) -- [CVE-2024-39436](CVE-2024/CVE-2024-394xx/CVE-2024-39436.json) (`2024-10-09T07:15:06.550`) -- [CVE-2024-39437](CVE-2024/CVE-2024-394xx/CVE-2024-39437.json) (`2024-10-09T07:15:08.313`) -- [CVE-2024-39438](CVE-2024/CVE-2024-394xx/CVE-2024-39438.json) (`2024-10-09T07:15:08.687`) -- [CVE-2024-39439](CVE-2024/CVE-2024-394xx/CVE-2024-39439.json) (`2024-10-09T07:15:08.940`) -- [CVE-2024-39440](CVE-2024/CVE-2024-394xx/CVE-2024-39440.json) (`2024-10-09T07:15:09.217`) -- [CVE-2024-39586](CVE-2024/CVE-2024-395xx/CVE-2024-39586.json) (`2024-10-09T07:15:09.473`) -- [CVE-2024-5968](CVE-2024/CVE-2024-59xx/CVE-2024-5968.json) (`2024-10-09T06:15:13.563`) -- [CVE-2024-9449](CVE-2024/CVE-2024-94xx/CVE-2024-9449.json) (`2024-10-09T07:15:09.833`) +- [CVE-2024-20787](CVE-2024/CVE-2024-207xx/CVE-2024-20787.json) (`2024-10-09T09:15:05.000`) +- [CVE-2024-45146](CVE-2024/CVE-2024-451xx/CVE-2024-45146.json) (`2024-10-09T09:15:05.693`) +- [CVE-2024-45150](CVE-2024/CVE-2024-451xx/CVE-2024-45150.json) (`2024-10-09T09:15:06.210`) +- [CVE-2024-9451](CVE-2024/CVE-2024-94xx/CVE-2024-9451.json) (`2024-10-09T08:15:05.160`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `3` +- [CVE-2023-22647](CVE-2023/CVE-2023-226xx/CVE-2023-22647.json) (`2024-10-09T09:15:03.133`) +- [CVE-2023-22648](CVE-2023/CVE-2023-226xx/CVE-2023-22648.json) (`2024-10-09T09:15:04.260`) +- [CVE-2024-6654](CVE-2024/CVE-2024-66xx/CVE-2024-6654.json) (`2024-10-09T09:15:06.713`) ## Download and Usage diff --git a/_state.csv b/_state.csv index bbe7531af4e..2ae4de104ce 100644 --- a/_state.csv +++ b/_state.csv @@ -216824,8 +216824,8 @@ CVE-2023-22642,0,0,defffa7af3331d9c7c15abe5d4b3862be6522fc8885c2a8dec349a1ff10af CVE-2023-22643,0,0,0a5291009977bdb914af9600d8c3f87950ec6768617925fd41156911df12a77c,2023-02-14T23:29:13.810000 CVE-2023-22644,0,0,316cac556a1b90f64a419f1c61cb0053c64c87f12aed95600466795d4dcc1338,2023-09-25T16:28:03.617000 CVE-2023-22645,0,0,98c54d8f7492de84ea534bda447d0a2e6c33352ecae4e300edd6bdf72922ced2,2023-04-29T02:15:41.093000 -CVE-2023-22647,0,0,1c79573859bb5974aec7320241345184b33045dbdeca08377dc5efc21bc7b23e,2023-10-05T16:28:13.250000 -CVE-2023-22648,0,0,f83a92d5974ece9d262ef186e6a20589f06287e97fda0b1d0e2630bab0e6614c,2023-10-05T16:27:57.587000 +CVE-2023-22647,0,1,0681a89ef45e77cb88370b6be3b7fa1bc36fb3f322132affe5240d43f6147e4b,2024-10-09T09:15:03.133000 +CVE-2023-22648,0,1,efcbdf59a79cc8b674d3df58e9203094276b2160da909666a01d8f83b10e10b0,2024-10-09T09:15:04.260000 CVE-2023-2265,0,0,6f6b69921089c30ff5335917053cb9d5a1a7f59a21a953d6d1041152fa7874ac,2023-12-06T00:35:41.900000 CVE-2023-22651,0,0,6d0f20aeda01e69ecd80dc8867cf7c9b361c7ee144fe7c3ff65cbb9e3210ad1c,2023-05-10T18:08:49.957000 CVE-2023-22652,0,0,b96b1da985da20364c0e2e7f35e5ae49a780ad08eb5a89d6ab26c66053650903,2023-09-13T03:15:07.693000 @@ -227285,7 +227285,7 @@ CVE-2023-36317,0,0,c079cfb22cefab3f68143c585133ce4a69cf059be109844f051d6b5cfe343 CVE-2023-36319,0,0,4f2f9b43de4f619c1ecd79d747be40d5cfa224891e28131a7aa2b697e390ee2c,2023-09-21T13:20:09.453000 CVE-2023-3632,0,0,c0b2e40cbda3f2ee6107fd6d29665ee1a2dc274485d787cec90bc7cd79e0d9ec,2023-08-16T08:15:41.550000 CVE-2023-36321,0,0,3a757d1927b56aa55826750e72e53ed68bd81a53376818344594d48da7b7b82d,2024-08-01T13:44:06.490000 -CVE-2023-36325,1,1,26805ae4e49d080824a665a699cf47af838a4d6c7b1b0d4738480f9a968f0b13,2024-10-09T06:15:11.303000 +CVE-2023-36325,0,0,26805ae4e49d080824a665a699cf47af838a4d6c7b1b0d4738480f9a968f0b13,2024-10-09T06:15:11.303000 CVE-2023-36326,0,0,ded9eb90a8ff10548777c4348acf8633173a5fdf3caf961f9c4181c6b713fc5e,2023-09-06T00:04:24.377000 CVE-2023-36327,0,0,7eeaf1acc33373866f4ef20f13e035096e985e7a884ec7a542b5579b42a728cc,2023-09-06T00:05:15.863000 CVE-2023-36328,0,0,2bcddcad90867d8da646da5264dfa03e8941e4a150d5759638d15ecb3a68202e,2024-03-07T17:46:02.277000 @@ -227916,7 +227916,7 @@ CVE-2023-37150,0,0,d05a1b0d875f1cfb8b8d9baa69f7e4346989eabceeace7d843178ad656fb1 CVE-2023-37151,0,0,bf6cf332b567d32eaeddc623f5bf07af51d14964109f0e2dfbc5db2d182aa204,2023-11-07T04:16:52.113000 CVE-2023-37152,0,0,ca65ebed26c8101f159b0151dd7fe9e9ce43a5c3219a1e852d7fdfcb325ca20e,2024-08-02T17:16:30.650000 CVE-2023-37153,0,0,e122d0bcc21e8639e43c4bbd1c9b0bf614aae545f65b9ad3f17a6efcd01c6868,2023-08-02T15:15:10.610000 -CVE-2023-37154,1,1,cdefbe8b6c081002c1819805da4f2ab8cdd83e8168cc0f4411ab3b6d2f1ac38d,2024-10-09T06:15:12.943000 +CVE-2023-37154,0,0,cdefbe8b6c081002c1819805da4f2ab8cdd83e8168cc0f4411ab3b6d2f1ac38d,2024-10-09T06:15:12.943000 CVE-2023-3716,0,0,d0f060c388db946191575a3899e743906999df63f1f15865bc69aad089789ee5,2023-08-10T03:51:39.830000 CVE-2023-37164,0,0,d248be9d35f9c17bada918addf9d6a2fca4a0b9702928afff3b86ead659d9f15,2023-07-31T17:00:03.897000 CVE-2023-37165,0,0,3e398869f80e6f16e25a43e3872dd9d5deaede02c385be5baa88b538c80bdf72,2023-07-31T18:22:59.597000 @@ -234022,10 +234022,10 @@ CVE-2023-45355,0,0,b59e8a5c262fc336755665d3f82901992de366c3cd37580ce157b1da22017 CVE-2023-45356,0,0,a62df74c374cf7bacfa1e71cb2f8f490477edf6944efd6c2b790f8110ba45b0d,2023-10-12T18:35:22.260000 CVE-2023-45357,0,0,b61bb0f6d334abf3f7461d24dfe821b0ca5f9b0dea69f41511f89389f2f4b422,2023-10-24T19:56:37.377000 CVE-2023-45358,0,0,7f96189ec3a479246b13a2926c14e3d2144a7c985302246d9c9c0ec1db4dda0d,2023-10-24T19:19:29.867000 -CVE-2023-45359,1,1,68cbe8d71009222eebc2dca31b035afd809ba5785f08aa4449dbc9b9cd2d5ce6,2024-10-09T06:15:13.097000 +CVE-2023-45359,0,0,68cbe8d71009222eebc2dca31b035afd809ba5785f08aa4449dbc9b9cd2d5ce6,2024-10-09T06:15:13.097000 CVE-2023-4536,0,0,69a4fb02e12f51562a4ed02a5feba11f17c9156d60c929fae4f1f4d1a0fcd5b0,2024-01-23T19:38:31.160000 CVE-2023-45360,0,0,51f5be670f4820f6554440e90df143b044bbe2fdeab52ce50a1d833e1bcd2b47,2024-07-03T01:41:52.177000 -CVE-2023-45361,1,1,f80770fd2b40d6c18407ac8830a7efaf80da27acd64c8627d96f5bcad02127ca,2024-10-09T06:15:13.203000 +CVE-2023-45361,0,0,f80770fd2b40d6c18407ac8830a7efaf80da27acd64c8627d96f5bcad02127ca,2024-10-09T06:15:13.203000 CVE-2023-45362,0,0,6a324f41b6301bc393e4e53b7fe2d3c213070e5c36f11f2203dcccfc20038a9d,2024-06-10T17:16:14.220000 CVE-2023-45363,0,0,728e401caf5de0b2421c163c08fdae2d4e4266b24ff5473d3ccbff70b3694240,2023-11-28T13:15:07.313000 CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb28b,2023-10-12T16:03:43.650000 @@ -234373,7 +234373,7 @@ CVE-2023-45868,0,0,df1b586624033c287b172839b213cbc8ec979ba18d71fde3b01da0f77fe96 CVE-2023-45869,0,0,ae0033b8875e66831bd0fa49aa37f059d0cc638339d10a85f589d8c5031628cb,2023-11-14T17:40:53.637000 CVE-2023-4587,0,0,2d9161b0ba4b4b9f51444521be9ee96176e07c56f44d6bd3c1d677910159fe30,2024-08-02T08:15:22.973000 CVE-2023-45871,0,0,cf2c19d8d9a1ab8bca7df10be3896fb36b75b63207dd8eecbb49b88c6aec0739,2024-08-27T19:35:21.703000 -CVE-2023-45872,1,1,52b4cbdd20e6c6108754c68484eee0be31ee049b031a05adb9e290bb7b38d918,2024-10-09T06:15:13.323000 +CVE-2023-45872,0,0,52b4cbdd20e6c6108754c68484eee0be31ee049b031a05adb9e290bb7b38d918,2024-10-09T06:15:13.323000 CVE-2023-45873,0,0,a568e54c26b58817453d7ca833079f4de460e9bdaf499179488e9f031ae443eb,2024-02-29T13:49:47.277000 CVE-2023-45874,0,0,15b94d1156a65969baf5a063838eca4cde85c5739f0df1171f246a13f786bc4d,2024-02-29T13:49:47.277000 CVE-2023-45875,0,0,038bbc1a2170768a377d8f1365d66fe112fd5a90d392e5c1931cf0dbd0bf9463,2024-09-04T16:35:03.760000 @@ -234899,7 +234899,7 @@ CVE-2023-46581,0,0,ddbe9f76840b22f517942a1f34726a719d3e36386b213c605802508e5583c CVE-2023-46582,0,0,0894f8ba201a6b65eace2e6bd10d8ff5cca6b5c7fb29301efb138b31a43d6fbc,2023-11-20T20:35:04.477000 CVE-2023-46583,0,0,969c355d7cfec10c8a1f9b16324cc93d129ae26776b599d85f02e6163d12b61d,2023-11-03T17:39:21.597000 CVE-2023-46584,0,0,d277677c561a6e9506409f2c4808eaaedaa00cb068832fa603cd3e156430cbdd,2023-11-03T17:46:20.620000 -CVE-2023-46586,1,1,47e8368923bb2ebc393f660b550b477167a3506bbb708fdc4d1ae5e9694831ab,2024-10-09T06:15:13.447000 +CVE-2023-46586,0,0,47e8368923bb2ebc393f660b550b477167a3506bbb708fdc4d1ae5e9694831ab,2024-10-09T06:15:13.447000 CVE-2023-46587,0,0,7c66d76999c5f4a7223ba40fb9aee5bec7036799264d9bd6a20cfabf7a6dedd7,2023-11-07T15:09:23.127000 CVE-2023-46589,0,0,bd780c2dad93b0e2d205a58b4dbad854e66abc28d93ba51e26c0cbc208e26540,2024-07-12T16:11:18.710000 CVE-2023-4659,0,0,734dc6182932d6aedbbb6f226cde06492d58ea9196ddbf2e6087df9402266726,2023-10-04T17:01:28.217000 @@ -243560,6 +243560,7 @@ CVE-2024-20782,0,0,591198da9de59648b78059d67fcba2ae1e63c8a4ae642e9b553df4f8e697e CVE-2024-20783,0,0,ef4c6477d397b423923703c7f26adf752529466272be0c0857be9467ab24edc8,2024-08-02T20:17:12.873000 CVE-2024-20784,0,0,c6884bc627ed39cae939efd566f5b968239c6eaef242b82fbe3791e77cdfc6fc,2024-06-14T19:30:15.503000 CVE-2024-20785,0,0,2013df6eaaf2d2be10850161c767601a113a3dcbc6d19bf74fca25fa02ef32fb,2024-08-02T20:17:44.283000 +CVE-2024-20787,1,1,5ef36d22b394e964f675917df17f3cb817954d74d1660e1c20e2f82ba1977afb,2024-10-09T09:15:05 CVE-2024-20789,0,0,2be0d33fe7f6a2ca915ce1bc566125c1928c2c16133fd8fdef1172ad2e465f0a,2024-08-19T18:59:05.617000 CVE-2024-2079,0,0,f10772ba31d142dba517b938901fc1b75b6b0e63ac1ac474e47c5b00d72243ad,2024-03-14T12:52:16.723000 CVE-2024-20790,0,0,3934bc21914c68bc7f6c87d335433310d3f22ed71eccb1f27568a92329715bb0,2024-08-19T18:58:42.660000 @@ -256955,12 +256956,12 @@ CVE-2024-39432,0,0,c5344327ea4e29569cde1ea8e7912a1f59909bf9a7631cccf2f5bb521ee73 CVE-2024-39433,0,0,b0007cb93af88c45dc6df70760e2e177a4763bcaa8d7c7eac293b0ba1aabdc2d,2024-09-30T18:14:45.443000 CVE-2024-39434,0,0,6fa311444443904695893d64c5957ccb50003fad05bc243c95fa5540678b4129,2024-09-30T18:14:03.557000 CVE-2024-39435,0,0,c1323c169e57e336d6df9d30a55825a6eb9bb6be1621f01964c9727171d73763,2024-09-30T18:13:33.387000 -CVE-2024-39436,1,1,19e4c9b13b51730120b45bf57788808c284eea9b5ba1a0fde87196641cd8ca0d,2024-10-09T07:15:06.550000 -CVE-2024-39437,1,1,8d4b732070d6eab3cfe9ea124b1989e29d56ffacbbead770786cd192fb9d0321,2024-10-09T07:15:08.313000 -CVE-2024-39438,1,1,e350a50fc54c09bf7980cca9c7fa497176076ae322a498308946e0859d20f2ef,2024-10-09T07:15:08.687000 -CVE-2024-39439,1,1,507815ec59354e56f63cafddeb0ee98060f66d456cbd868d703ff232c9e77d9f,2024-10-09T07:15:08.940000 +CVE-2024-39436,0,0,19e4c9b13b51730120b45bf57788808c284eea9b5ba1a0fde87196641cd8ca0d,2024-10-09T07:15:06.550000 +CVE-2024-39437,0,0,8d4b732070d6eab3cfe9ea124b1989e29d56ffacbbead770786cd192fb9d0321,2024-10-09T07:15:08.313000 +CVE-2024-39438,0,0,e350a50fc54c09bf7980cca9c7fa497176076ae322a498308946e0859d20f2ef,2024-10-09T07:15:08.687000 +CVE-2024-39439,0,0,507815ec59354e56f63cafddeb0ee98060f66d456cbd868d703ff232c9e77d9f,2024-10-09T07:15:08.940000 CVE-2024-3944,0,0,0349dfe65519a62a84d722d8f6089c2204a2e4ad01321ea2bf2f048acc939172,2024-10-04T13:19:51.383000 -CVE-2024-39440,1,1,8f25321e297d08f87f8907a961a1aff4f0ab8a676c0307c6d1b132b4e606a6ef,2024-10-09T07:15:09.217000 +CVE-2024-39440,0,0,8f25321e297d08f87f8907a961a1aff4f0ab8a676c0307c6d1b132b4e606a6ef,2024-10-09T07:15:09.217000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000 CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc18e,2024-06-27T12:47:19.847000 @@ -257088,7 +257089,7 @@ CVE-2024-39582,0,0,6ec9b04450f9c5ce2a1563682764e2f7b34da0f9eb482017ce73088ac186f CVE-2024-39583,0,0,ac1320c69e7204d43ee10370ec071062ec88b9a1106bd39584f09ed060befd2b,2024-09-16T15:42:06.347000 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-39585,0,0,b162f39d96cc79baeee026e4bc649d0b5cf545dfb2bc7af993a786e27782c34f,2024-09-17T02:15:49.397000 -CVE-2024-39586,1,1,b1221986db4f2bf4752492e18b8aab10f4e640353c8a873e7f300ee53eff74ae,2024-10-09T07:15:09.473000 +CVE-2024-39586,0,0,b1221986db4f2bf4752492e18b8aab10f4e640353c8a873e7f300ee53eff74ae,2024-10-09T07:15:09.473000 CVE-2024-39589,0,0,87ea0a38612b14f1acbb61bd8a80c1616893c20e2d92c8b04a7963505253759b,2024-09-26T21:36:12.887000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 CVE-2024-39590,0,0,bd4d3aa82dbb5eb68f8bb048ad417554290f42943d5b38b21877158c391f9e01,2024-09-26T21:02:14.630000 @@ -260307,7 +260308,9 @@ CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186 CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000 CVE-2024-4513,0,0,6c3f318b0d8a8c538c1f3920692d132bd9a92a5cfece17f174b91ed826f80818,2024-06-04T19:20:40.633000 CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c36,2024-06-04T19:20:40.733000 +CVE-2024-45146,1,1,2a5b5a0d648806ca5e54b8bd1a0a8e9a0eaa835e972130f7015e02de53d4b2a8,2024-10-09T09:15:05.693000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 +CVE-2024-45150,1,1,bd12df0ca2dd5e008526d6f546a4cd15e1f7b87d2c471afa5048e25665848888,2024-10-09T09:15:06.210000 CVE-2024-45153,0,0,05c40a71199e1cd60b35af18f76fa03a1f83ce46a62e3e8f4fcd3f2716448b1e,2024-10-07T17:47:48.410000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 @@ -262569,7 +262572,7 @@ CVE-2024-5964,0,0,d6f5f38a4c6449f04f742ee04a5db3f604bc83ddff32647d9051bd1d156e71 CVE-2024-5965,0,0,9678cf2eb18ba50e506ac9918028ddeb3c443af1b219027dc9d98541cb82736a,2024-06-24T20:00:37.057000 CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339d5,2024-06-24T20:00:23.970000 CVE-2024-5967,0,0,2abd808298732cc4b1964c14eae7561fd71fe2ea4a15e03466adc54a1382b0dd,2024-09-09T19:15:13.920000 -CVE-2024-5968,1,1,a043adbd10e52333c94721bc3ca50b6dc16309dd080600c0494d1504f4baca57,2024-10-09T06:15:13.563000 +CVE-2024-5968,0,0,a043adbd10e52333c94721bc3ca50b6dc16309dd080600c0494d1504f4baca57,2024-10-09T06:15:13.563000 CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca37a,2024-07-29T14:12:08.783000 CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 CVE-2024-5971,0,0,b240fc2a76fc52f8e8a86abd78dd833d601e288ed9a23c68d806cff359ade316,2024-09-19T20:15:07.113000 @@ -263161,7 +263164,7 @@ CVE-2024-6650,0,0,06d380480b3184a2b1dceb59084b40d2dcd977ecfc30eac16df686ef247b89 CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555ee,2024-08-06T16:30:24.547000 CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 -CVE-2024-6654,0,0,54a7043c0137494f800eea52170122f73e1c0412c839f31743781981feb6fdda,2024-09-30T12:46:20.237000 +CVE-2024-6654,0,1,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000 CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 CVE-2024-6658,0,0,7f941e970e0ddd88d17ac95cf96717b7dab27bb1b6ec72400c0fd64e8c2d71b4,2024-09-23T20:15:05.560000 @@ -265011,7 +265014,8 @@ CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40c CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 CVE-2024-9445,0,0,0c93ce7f42df628ab9963b0c4991253722d7526551714beaaf6a06be3b0d53b0,2024-10-04T13:50:43.727000 -CVE-2024-9449,1,1,a97c6d10c8b04c0b2ba9306e37a8440eda5112028d07f60f30bea1d9431c3f84,2024-10-09T07:15:09.833000 +CVE-2024-9449,0,0,a97c6d10c8b04c0b2ba9306e37a8440eda5112028d07f60f30bea1d9431c3f84,2024-10-09T07:15:09.833000 +CVE-2024-9451,1,1,61aa4f71fe0ab792c97d101a7739a4f3bc5141915892cc9a79adc1735531429e,2024-10-09T08:15:05.160000 CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 CVE-2024-9481,0,0,d47799c935f3894a1eb77a57851e2857614dcde60b18ca54bd2e7df5819c5f83,2024-10-04T13:50:43.727000