Auto-Update: 2024-09-16T14:00:25.327862+00:00

This commit is contained in:
cad-safe-bot 2024-09-16 14:03:26 +00:00
parent c83cd6fcbc
commit e5c06e9737
56 changed files with 2124 additions and 595 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-2127",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-20T15:15:11.183",
"lastModified": "2024-04-22T16:15:12.070",
"lastModified": "2024-09-16T13:15:04.270",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -213,39 +213,6 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00015.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5477",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.samba.org/samba/security/CVE-2022-2127.html",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3347",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-20T15:15:11.940",
"lastModified": "2024-07-03T01:41:00.823",
"lastModified": "2024-09-16T13:15:05.877",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -173,25 +173,6 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"source": "secalert@redhat.com"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"source": "secalert@redhat.com"
},
{
"url": "https://www.debian.org/security/2023/dsa-5477",
"source": "secalert@redhat.com"
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-3347.html",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34966",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-20T15:15:11.333",
"lastModified": "2024-06-25T17:15:10.097",
"lastModified": "2024-09-16T13:15:04.757",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -211,34 +211,6 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5477",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-34966",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34967",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-20T15:15:11.410",
"lastModified": "2024-01-30T16:15:46.067",
"lastModified": "2024-09-16T13:15:04.940",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -206,34 +206,6 @@
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5477",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-34967.html",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34968",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-20T15:15:11.540",
"lastModified": "2024-01-30T16:15:46.210",
"lastModified": "2024-09-16T13:15:05.127",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -202,34 +202,6 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BPCSGND7LO467AJGR5DYBGZLTCGTOBCC/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OT74M42E6C36W7PQVY3OS4ZM7DVYB64Z/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20230731-0010/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5477",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.samba.org/samba/security/CVE-2023-34968.html",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3576",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-10-04T19:15:10.340",
"lastModified": "2024-03-11T13:15:52.550",
"lastModified": "2024-09-16T13:15:06.033",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -143,10 +143,6 @@
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38200",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-07-24T16:15:12.067",
"lastModified": "2023-12-28T15:40:32.947",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:05.323",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -187,13 +187,6 @@
"tags": [
"Patch"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIZZB5NHNCS5D2AEH3ZAO6OQC72IK7WS/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38201",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-25T17:15:08.530",
"lastModified": "2024-01-12T22:01:19.793",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:05.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -196,14 +196,6 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZIZZB5NHNCS5D2AEH3ZAO6OQC72IK7WS/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-38559",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-01T17:15:09.890",
"lastModified": "2024-03-08T18:19:03.450",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:05.667",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -198,27 +198,6 @@
"Mailing List",
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00006.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GBV6BTUREXM6DB3OGHGLMWGAZ3I45TXE/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QH7ERAYSSXEYDWWY7LOV7CA5MIDZN3Z6/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3899",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-23T11:15:07.573",
"lastModified": "2023-11-09T20:11:15.350",
"lastModified": "2024-09-16T13:15:06.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -473,14 +473,6 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FJHKSBBZRDFOBNDU35FUKMYQIQYT6UJQ/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZDIHGNLS3TZVX7X2F735OKI4KXPY4AH6/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-4147",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-08-07T14:15:11.633",
"lastModified": "2024-08-26T16:08:14.227",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:07.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -279,35 +279,6 @@
"Patch"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20231020-0006/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5480",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.debian.org/security/2023/dsa-5492",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.spinics.net/lists/stable/msg671573.html",
"source": "secalert@redhat.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-42756",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-09-28T14:15:21.037",
"lastModified": "2024-04-30T14:15:09.243",
"lastModified": "2024-09-16T13:15:06.640",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -177,35 +177,6 @@
"Third Party Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GISYSL3F6WIEVGHJGLC2MFNTUXHPTKQH/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GPMICQ2HVZO5UAM5KPXHAZKA2U3ZDOO6/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V5PDNWPKAP3WL5RQZ4RIDS6MG32OHH5R/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://seclists.org/oss-sec/2023/q3/242",
"source": "secalert@redhat.com",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46146",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-19T12:15:10.930",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:40:24.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themify:ultra:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.3.6",
"matchCriteriaId": "141F4483-FACB-445C-885E-91D406DBA04E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/themify-ultra/wordpress-themify-ultra-theme-7-3-3-multiple-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46148",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-19T12:15:11.160",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:39:49.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themify:ultra:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.3.5",
"matchCriteriaId": "9C37E24E-6178-4E43-A004-A5952BBDB9C6"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/themify-ultra/wordpress-themify-ultra-theme-7-3-3-authenticated-arbitrary-settings-change-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48759",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-19T11:15:50.407",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:25:15.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:crocoblock:jetelements:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.13.1",
"matchCriteriaId": "F812AA67-076B-4911-A045-75ED88BAB1DE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-unauthenticated-arbitrary-attachment-download-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48760",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-19T11:15:50.647",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:26:13.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:crocoblock:jetelements:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.13.1",
"matchCriteriaId": "F812AA67-076B-4911-A045-75ED88BAB1DE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-unauthenticated-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48761",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-06-19T11:15:50.877",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:27:20.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:crocoblock:jetelements:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.6.13.1",
"matchCriteriaId": "F812AA67-076B-4911-A045-75ED88BAB1DE"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/jet-elements/wordpress-jetelements-for-elementor-plugin-2-6-13-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-5981",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-11-28T12:15:07.040",
"lastModified": "2024-07-08T18:15:04.087",
"lastModified": "2024-09-16T13:15:07.813",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -139,10 +139,6 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/19/3",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0155",
"source": "secalert@redhat.com"
@ -193,14 +189,6 @@
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0553",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-16T12:15:45.557",
"lastModified": "2024-07-08T18:15:06.153",
"lastModified": "2024-09-16T13:15:08.327",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -135,14 +135,6 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/19/3",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0533",
"source": "secalert@redhat.com"
@ -195,28 +187,12 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/02/msg00010.html",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240202-0011/",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0567",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-01-16T14:15:48.527",
"lastModified": "2024-07-08T18:15:06.703",
"lastModified": "2024-09-16T13:15:08.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -151,14 +151,6 @@
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/01/19/3",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:0533",
"source": "secalert@redhat.com",
@ -207,35 +199,12 @@
"Vendor Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/",
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
"source": "secalert@redhat.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240202-0011/",
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-22399",
"sourceIdentifier": "security@apache.org",
"published": "2024-09-16T12:15:02.530",
"lastModified": "2024-09-16T12:15:02.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Deserialization of Untrusted Data vulnerability in Apache Seata.\u00a0\n\nWhen developers disable authentication on the Seata-Server and do not use the Seata client SDK dependencies, they may construct uncontrolled serialized malicious requests by directly sending bytecode based on the Seata private protocol.\n\nThis issue affects Apache Seata: 2.0.0, from 1.0.0 through 1.8.0.\n\nUsers are recommended to upgrade to version 2.1.0/1.8.1, which fixes the issue."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/91nzzlxyj4nmks85gbzwkkjtbmnmlkc4",
"source": "security@apache.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34134",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:20.107",
"lastModified": "2024-08-15T16:47:51.770",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T12:15:02.657",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -38,11 +38,11 @@
"impactScore": 3.6
},
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -50,12 +50,12 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.1,
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37288",
"sourceIdentifier": "bressers@elastic.co",
"published": "2024-09-09T09:15:02.183",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:29:06.023",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "bressers@elastic.co",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "bressers@elastic.co",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:elastic:kibana:8.15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BD3AFCD5-A56A-4B69-9A50-B952E48C8747"
}
]
}
]
}
],
"references": [
{
"url": "https://discuss.elastic.co/t/kibana-8-15-1-security-update-esa-2024-27-esa-2024-28/366119",
"source": "bressers@elastic.co"
"source": "bressers@elastic.co",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38640",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2024-09-06T17:15:16.443",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T12:27:22.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
@ -73,10 +95,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:download_station:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8.0",
"versionEndExcluding": "5.8.6.283",
"matchCriteriaId": "ED78DBEB-F1D8-45F9-95E7-11F293EAFE17"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-35",
"source": "security@qnapsecurity.com.tw"
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38641",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2024-09-06T17:15:16.550",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T12:35:23.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -77,10 +99,170 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2348:build_20230325:*:*:*:*:*:*",
"matchCriteriaId": "39382CBA-EA68-426A-AC07-A9A26E722CAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2399:build_20230515:*:*:*:*:*:*",
"matchCriteriaId": "BCB37C08-1DF7-4AF4-9BB1-C562E5643B5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2418:build_20230603:*:*:*:*:*:*",
"matchCriteriaId": "8368130C-F26D-41FE-8D78-B103A23B5327"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2444:build_20230629:*:*:*:*:*:*",
"matchCriteriaId": "3E0EE181-78AF-4C3C-90A4-C69A2DE6E176"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.0.2466:build_20230721:*:*:*:*:*:*",
"matchCriteriaId": "56E3AE06-78DA-4844-ADC1-09A35F1C5B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.1.2491:build_20230815:*:*:*:*:*:*",
"matchCriteriaId": "D2AA7A32-0DA8-4417-A23E-C4F563BC7819"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.2.2533:build_20230926:*:*:*:*:*:*",
"matchCriteriaId": "80E7C17C-ED6D-439D-A1F3-1870A3ADA926"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.3.2578:build_20231110:*:*:*:*:*:*",
"matchCriteriaId": "636C2D9C-C837-4FAC-B79D-1CA7A7C1FF3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.4.2596:build_20231128:*:*:*:*:*:*",
"matchCriteriaId": "866B455B-0266-4990-920B-A06756ED5A61"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.5.2645:build_20240116:*:*:*:*:*:*",
"matchCriteriaId": "B3B5C4C5-5EE2-4E6F-927E-1D52A04895BB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.5.2679:build_20240219:*:*:*:*:*:*",
"matchCriteriaId": "543E17BB-B552-4B65-B028-BE9A47E6F34B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.6.2722:build_20240402:*:*:*:*:*:*",
"matchCriteriaId": "EEDC247A-96D9-4140-AA72-52E4EEDC2121"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:5.1.7.2770:build_20240520:*:*:*:*:*:*",
"matchCriteriaId": "DDEF21B3-275E-446B-A6C4-FD30A567B600"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2409:build_20230525:*:*:*:*:*:*",
"matchCriteriaId": "6CA398A8-EBDF-4D41-B15E-7B763F885021"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2424:build_20230609:*:*:*:*:*:*",
"matchCriteriaId": "F63A5ED2-ECC2-49A0-BFA9-548E35ACD6C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2453:build_20230708:*:*:*:*:*:*",
"matchCriteriaId": "53387FAC-7BE0-47D7-99BF-2B1F03C17CC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.0.2466:build_20230721:*:*:*:*:*:*",
"matchCriteriaId": "D4226394-0023-4CD2-BB89-77251BF92FF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.1.2488:build_20230812:*:*:*:*:*:*",
"matchCriteriaId": "646257F7-D4A4-43B0-91F2-7850338B3CA1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.2.2534:build_20230927:*:*:*:*:*:*",
"matchCriteriaId": "88825AE1-B006-4F7F-BD90-D4B1CF1251A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.3.2578:build_20231110:*:*:*:*:*:*",
"matchCriteriaId": "3F471666-4919-4770-956E-ACE4C55D29DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.4.2596:build_20231128:*:*:*:*:*:*",
"matchCriteriaId": "9573F671-D49E-438A-B72C-DFC390A79093"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2647:build_20240118:*:*:*:*:*:*",
"matchCriteriaId": "75E7938F-943F-428D-974D-42E790829F88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.5.2680:build_20240220:*:*:*:*:*:*",
"matchCriteriaId": "12F5732D-C95F-45D1-968C-C2269DFDF6D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.6.2734:build_20240414:*:*:*:*:*:*",
"matchCriteriaId": "94734596-A56A-4128-A39A-7E22FBD17835"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2770:build_20240520:*:*:*:*:*:*",
"matchCriteriaId": "ACF87C5E-9508-4BA9-9218-3CBD8A8439A4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2788:build_20240607:*:*:*:*:*:*",
"matchCriteriaId": "67E8977A-2363-4855-B284-6EBF8FB485A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:h5.1.7.2794:build_20240613:*:*:*:*:*:*",
"matchCriteriaId": "3A268686-341F-4E13-8CE6-493DE7E9CF70"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-33",
"source": "security@qnapsecurity.com.tw"
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38642",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2024-09-06T17:15:16.677",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T12:33:13.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -73,10 +95,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:qumagie:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5F8F394D-D921-423A-8BD0-05CCA47E6065"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-34",
"source": "security@qnapsecurity.com.tw"
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39379",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-31T13:15:10.253",
"lastModified": "2024-09-11T15:52:47.053",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T12:15:02.870",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to arbitrary file system read access. An attacker could exploit this vulnerability to read contents from a location in memory past the buffer boundary, potentially leading to sensitive information disclosure. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
"value": "Acrobat for Edge versions 126.0.2592.81 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
@ -36,26 +56,6 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39384",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-09-13T09:15:06.620",
"lastModified": "2024-09-13T14:06:04.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:01:07.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.6.9",
"matchCriteriaId": "431578AF-FF5D-4E2D-8458-C67FF84ABE3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6",
"matchCriteriaId": "62DB0CFE-BCDF-4B1D-B77A-361297F15408"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-39385",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-09-13T09:15:07.470",
"lastModified": "2024-09-13T14:06:04.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:12:45.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.6.9",
"matchCriteriaId": "431578AF-FF5D-4E2D-8458-C67FF84ABE3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.6",
"matchCriteriaId": "62DB0CFE-BCDF-4B1D-B77A-361297F15408"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-58.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39406",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:26.243",
"lastModified": "2024-08-14T14:43:58.617",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T12:15:03.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. An admin attacker could exploit this vulnerability to gain access to files and directories that are outside the restricted directory. Exploitation of this issue does not require user interaction and scope is changed."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39408",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:26.703",
"lastModified": "2024-08-14T14:42:31.313",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:09.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changeson behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39409",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:26.937",
"lastModified": "2024-08-14T14:42:10.687",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:09.387",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39410",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:27.177",
"lastModified": "2024-08-14T14:41:36.527",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:09.557",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor unauthorised actions on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue requires user interaction."
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could allow an attacker to bypass security features and perform minor integrity changes on behalf of a user. The vulnerability could be exploited by tricking a victim into clicking a link or loading a page that submits a malicious request. Exploitation of this issue does not require user interaction."
},
{
"lang": "es",
@ -18,8 +18,28 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
@ -36,26 +56,6 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39412",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T12:15:27.650",
"lastModified": "2024-08-14T14:45:35.393",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:09.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and disclose minor information. Exploitation of this issue does not require user interaction."
"value": "Adobe Commerce versions 2.4.7-p1, 2.4.6-p6, 2.4.5-p8, 2.4.4-p9 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and perform a minor integrity change. Exploitation of this issue does not require user interaction."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39420",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-08-14T15:15:24.960",
"lastModified": "2024-09-13T09:15:08.297",
"lastModified": "2024-09-16T13:15:09.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -18,7 +18,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -38,23 +38,23 @@
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseScore": 7.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-40478",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-08-12T13:38:28.820",
"lastModified": "2024-08-12T13:41:36.517",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:46:40.287",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) Almacenado en \"/admin/afeedback.php\" en Kashipara Online Exam System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de los campos de par\u00e1metros \"rname\" y \"email\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jayesh:online_exam_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2CABE8E7-7159-40FF-9FF7-6608FB08D0D5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/takekaramey/CVE_Writeup/blob/main/Kashipara/Online%20Exam%20System%20v1.0/Stored%20XSS.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.kashipara.com/project/php/3/online-exam-php-project-source-code-download",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41839",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-23T12:15:10.520",
"lastModified": "2024-09-12T15:58:11.690",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:10.250",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,19 @@
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.3,
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-41857",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-09-13T09:15:09.350",
"lastModified": "2024-09-13T14:06:04.777",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:18:35.007",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "psirt@adobe.com",
"type": "Secondary",
@ -51,10 +71,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "27.9.6",
"matchCriteriaId": "AC06E482-90FA-4037-B2A4-1CF07B59003C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "28.0",
"versionEndExcluding": "28.7.1",
"matchCriteriaId": "6A51C972-D913-48BA-ADC2-95A051DFB5DB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-66.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41867",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-09-13T09:15:10.620",
"lastModified": "2024-09-13T17:27:00.437",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-16T13:15:10.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "After Effects versions 23.6.6, 24.5 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to arbitrary file system write operations. An attacker could leverage this vulnerability to modify or corrupt files, potentially leading to a compromise of system integrity. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
"value": "After Effects versions 23.6.6, 24.5 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
@ -61,22 +61,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
"value": "CWE-125"
}
]
},
{
"source": "psirt@adobe.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
"value": "CWE-787"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42122",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:04.430",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:49:27.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,74 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Agregar verificaci\u00f3n de puntero NULL para kzalloc [Por qu\u00e9 y c\u00f3mo] Verifique el puntero de retorno de kzalloc antes de usarlo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "EDD11F94-D8F3-477D-931C-7806D6E5D6D3"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/062edd612fcd300f0f79a36fca5b8b6a5e2fce70",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8e65a1b7118acf6af96449e1e66b7adbc9396912",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42131",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:05.130",
"lastModified": "2024-08-19T05:15:06.990",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:52:37.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,188 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: evitar desbordamientos en la l\u00f3gica de limitaci\u00f3n sucia La l\u00f3gica de limitaci\u00f3n sucia se entremezcla con suposiciones de que los l\u00edmites sucios en unidades PAGE_SIZE caben en 32 bits (de modo que varias multiplicaciones caben en 64 bits) . Si los l\u00edmites terminan siendo mayores, tendremos desbordamientos, posibles divisiones entre 0, etc. Solucione estos problemas nunca permitiendo l\u00edmites sucios tan grandes, ya que de todos modos tienen un valor pr\u00e1ctico dudoso. Para las interfaces dirty_bytes/dirty_background_bytes podemos simplemente negarnos a establecer l\u00edmites tan grandes. Para dirty_ratio / dirty_background_ratio no es tan simple ya que el l\u00edmite sucio se calcula a partir de la cantidad de memoria disponible que puede cambiar debido a la conexi\u00f3n en caliente de la memoria, etc. Entonces, al convertir l\u00edmites sucios de proporciones a n\u00fameros de p\u00e1ginas, simplemente no permitimos el el resultado excede UINT_MAX. Este es un problema que se puede activar solo desde la ra\u00edz y que ocurre cuando el operador establece l\u00edmites sucios en >16 TB."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.320",
"matchCriteriaId": "0B4EF915-550B-45E5-B2CA-648FEACD60FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.282",
"matchCriteriaId": "A8961D98-9ACF-4188-BA88-44038B14BC28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.222",
"matchCriteriaId": "00696AC5-EE29-437F-97F9-C4D66608B327"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.163",
"matchCriteriaId": "A97DEB09-4927-40F8-B5C6-F5BD5EAE0CFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.98",
"matchCriteriaId": "E09E92A5-27EF-40E4-926A-B1CDC8270551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
"matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2b2d2b8766db028bd827af34075f221ae9e9efff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/385d838df280eba6c8680f9777bfa0d0bfe7e8b2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4d3817b64eda07491bdd86a234629fe0764fb42a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7a49389771ae7666f4dc3426e2a4594bf23ae290",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8e0b5e7f2895eccef5c2a0018b589266f90c4805",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a25e8536184516b55ef89ab91dd2eea429de28d2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/bd16a7ee339aef3ee4c90cb23902afb6af379ea0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c83ed422c24f0d4b264f89291d4fabe285f80dbc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-42136",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-07-30T08:15:05.507",
"lastModified": "2024-07-30T13:32:45.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:54:41.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cdrom: reorganice la verificaci\u00f3n de last_media_change para evitar un desbordamiento involuntario. Al ejecutar syzkaller con el sanitizador de ajuste de enteros firmado recientemente reintroducido, nos encontramos con este s\u00edmbolo: [366.015950] UBSAN: desbordamiento de enteros firmados en .. /drivers/cdrom/cdrom.c:2361:33 [ 366.021089] -9223372036854775808 - 346321 no se puede representar en el tipo '__s64' (tambi\u00e9n conocido como 'long long') [ 366.025894] El programa syz-executor.4 est\u00e1 utilizando un ioctl SCSI obsoleto, convi\u00e9rtalo a SG_IO [366.027502] CPU: 5 PID: 28472 Comm: syz-executor.7 Not tainted 6.8.0-rc2-00035-gb3ef86b5a957 #1 [366.027512] Nombre de hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996) , BIOS 1.16.3-debian-1.16.3-2 01/04/2014 [ 366.027518] Seguimiento de llamadas: [ 366.027523] [ 366.027533] dump_stack_lvl+0x93/0xd0 [ 366.027899] 1b0 [366.038787] ata1 .00: \u00bfmulti_count 32 no v\u00e1lido se ignora [366.043924] cdrom_ioctl+0x2c3f/0x2d10 [366.063932]? __pm_runtime_resume+0xe6/0x130 [ 366.071923] sr_block_ioctl+0x15d/0x1d0 [ 366.074624] ? __pfx_sr_block_ioctl+0x10/0x10 [ 366.077642] blkdev_ioctl+0x419/0x500 [ 366.080231] ? __pfx_blkdev_ioctl+0x10/0x10 ... Hist\u00f3ricamente, el sanitizador de desbordamiento de enteros con signo no funcionaba en el kernel debido a su interacci\u00f3n con `-fwrapv` pero desde entonces esto se ha cambiado [1] en la versi\u00f3n m\u00e1s reciente de Clang. Se volvi\u00f3 a habilitar en el kernel con el compromiso 557f8c582a9ba8ab (\"ubsan: reintroducir el sanitizadorde desbordamiento firmado\"). Reorganicemos la verificaci\u00f3n para no realizar ninguna aritm\u00e9tica y as\u00ed no activar el sanitizador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.98",
"matchCriteriaId": "59AC0B46-8C0D-4C0B-9705-C8CFF0DCAD00"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.39",
"matchCriteriaId": "29E894E4-668F-4DB0-81F7-4FB5F698E970"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.9.9",
"matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0c97527e916054acc4a46ffb02842988acb2e92b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3ee21e14c8c329168a0b66bab00ecd18f5d0dee3",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/e809bc112712da8f7e15822674c6562da6cdf24c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/efb905aeb44b0e99c0e6b07865b1885ae0471ebf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-44798",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-13T16:15:04.387",
"lastModified": "2024-09-13T18:35:16.920",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:19:38.393",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "phpgurukul Bus Pass Management System 1.0 is vulnerable to Cross-site scripting (XSS) in /admin/pass-bwdates-reports-details.php via fromdate and todate parameters."
},
{
"lang": "es",
"value": "phpgurukul Bus Pass Management System 1.0 es vulnerable a Cross-site Scripting (XSS) en /admin/pass-bwdates-reports-details.php a trav\u00e9s de los par\u00e1metros fromdate y todate."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:bus_pass_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAFC9-E1B6-49F0-8B4B-B1FC5BD25245"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/shouvikdutta1998/Bus_management",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44996",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-04T20:15:08.413",
"lastModified": "2024-09-05T12:53:21.110",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T12:21:47.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,104 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: vsock: corregir llamadas recursivas ->recvmsg Despu\u00e9s de que se ha a\u00f1adido un socket vsock a un sockmap BPF, su prot->recvmsg se ha reemplazado por vsock_bpf_recvmsg(). Por lo tanto, podr\u00eda ocurrir la siguiente recursi\u00f3n: vsock_bpf_recvmsg() -> __vsock_recvmsg() -> vsock_connectible_recvmsg() -> prot->recvmsg() -> vsock_bpf_recvmsg() de nuevo Necesitamos solucionarlo llamando al ->recvmsg() original sin ninguna l\u00f3gica sockmap BPF en __vsock_recvmsg()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-674"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4",
"versionEndExcluding": "6.6.48",
"matchCriteriaId": "EFA932A8-AACF-430D-AFBC-9A93F0749D68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.7",
"matchCriteriaId": "D2AFDFD1-D95A-4EB7-843B-5E7659518B67"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/69139d2919dd4aa9a553c8245e7c63e82613e3fc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/921f1acf0c3cf6b1260ab57a8a6e8b3d5f3023d5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b4ee8cf1acc5018ed1369150d7bb3e0d0f79e135",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45203",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-09T07:15:17.030",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:27:19.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,73 @@
"value": "La autorizaci\u00f3n incorrecta en el controlador para el problema del esquema de URL personalizado en la aplicaci\u00f3n \"@cosme\" para versiones de Android anteriores a la 5.69.0 y la aplicaci\u00f3n \"@cosme\" para versiones de iOS anteriores a la 6.74.0 permite que un atacante haga que un usuario acceda a un sitio web arbitrario a trav\u00e9s de la aplicaci\u00f3n vulnerable. Como resultado, el usuario puede convertirse en v\u00edctima de un ataque de phishing."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:istyle:\\@cosme:*:*:*:*:*:android:*:*",
"versionEndExcluding": "5.69.0",
"matchCriteriaId": "64988621-16CC-45BE-BF48-D049D9A823A7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:istyle:\\@cosme:*:*:*:*:*:iphone_os:*:*",
"versionEndIncluding": "6.74.0",
"matchCriteriaId": "41C989A5-87CA-46AF-89A8-A41AA1926CF9"
}
]
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN81570776/",
"source": "vultures@jpcert.or.jp"
"source": "vultures@jpcert.or.jp",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46424",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T13:15:10.760",
"lastModified": "2024-09-16T13:15:10.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the UploadCustomModule function, which allows attackers to cause a Denial of Service (DoS) via the File parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/UploadCustomModule.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46451",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T13:15:10.847",
"lastModified": "2024-09-16T13:15:10.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "TOTOLINK AC1200 T8 v4.1.5cu.861_B20230220 has a buffer overflow vulnerability in the setWiFiAclRules function via the desc parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/offshore0315/loT-vulnerable/blob/main/TOTOLINK/AC1200%20T8/setWiFiAclRules.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46937",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-16T13:15:10.917",
"lastModified": "2024-09-16T13:15:10.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper access control (IDOR) vulnerability in the /api-selfportal/get-info-token-properties endpoint in MFASOFT Secure Authentication Server (SAS) 1.8.x through 1.9.x before 1.9.040924 allows remote attackers gain access to user tokens without authentication. The is a brute-force attack on the serial parameter by number identifier: GA00001, GA00002, GA00003, etc."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/WI1D-41/IDOR-in-MFASOFT-Secure-Authentication-Server",
"source": "cve@mitre.org"
},
{
"url": "https://mfasoft.ru",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5988",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-06-25T16:15:24.937",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T12:07:20.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -73,10 +105,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1.0",
"versionEndExcluding": "11.1.8",
"matchCriteriaId": "2BC59B57-F8F5-4979-826B-EAA0A8456B2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.2.0",
"versionEndExcluding": "11.2.9",
"matchCriteriaId": "79481998-C98B-4486-A2DC-C4DE324DCA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.0.7",
"matchCriteriaId": "BFD553E2-EB04-4D97-AD70-2175933E3DCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndExcluding": "12.1.8",
"matchCriteriaId": "FC5BBCD2-0C47-4B48-81DD-D56D5677BFA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0.0",
"versionEndExcluding": "13.0.5",
"matchCriteriaId": "7EEDB253-45FB-4722-994A-E0EF00C7F405"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndExcluding": "13.1.3",
"matchCriteriaId": "F2FB9C58-1AAF-46CB-BBB5-909223EE5572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.2.0",
"versionEndExcluding": "13.2.2",
"matchCriteriaId": "BB3AA59A-9CA4-4CD0-981C-B974A94BAC30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1.0",
"versionEndExcluding": "11.1.8",
"matchCriteriaId": "33A7D7B2-945B-48AD-AD65-C1DDD52811DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.2.0",
"versionEndExcluding": "11.2.9",
"matchCriteriaId": "808EDF9D-E721-4513-8AC9-A7B86163F0AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.0.7",
"matchCriteriaId": "9D00E4B0-2B55-460B-B394-BE0E379144FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndExcluding": "12.1.8",
"matchCriteriaId": "9D2E6604-AED5-4099-B2EB-E33F15095C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0.0",
"versionEndExcluding": "13.0.5",
"matchCriteriaId": "7229242B-0780-4E55-9088-7FCA82C24FE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndExcluding": "13.1.3",
"matchCriteriaId": "BA376CA1-C47D-45C2-B906-8CCCDF5B83D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.2.0",
"versionEndExcluding": "13.2.2",
"matchCriteriaId": "12658E67-3F63-451F-95AC-3191F2043014"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1677.html",
"source": "PSIRT@rockwellautomation.com"
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5989",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-06-25T16:15:25.363",
"lastModified": "2024-06-25T18:50:42.040",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T12:08:03.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "CRITICAL"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
@ -73,10 +105,123 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1.0",
"versionEndExcluding": "11.1.8",
"matchCriteriaId": "2BC59B57-F8F5-4979-826B-EAA0A8456B2A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.2.0",
"versionEndExcluding": "11.2.9",
"matchCriteriaId": "79481998-C98B-4486-A2DC-C4DE324DCA10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.0.7",
"matchCriteriaId": "BFD553E2-EB04-4D97-AD70-2175933E3DCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndExcluding": "12.1.8",
"matchCriteriaId": "FC5BBCD2-0C47-4B48-81DD-D56D5677BFA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0.0",
"versionEndExcluding": "13.0.5",
"matchCriteriaId": "7EEDB253-45FB-4722-994A-E0EF00C7F405"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndExcluding": "13.1.3",
"matchCriteriaId": "F2FB9C58-1AAF-46CB-BBB5-909223EE5572"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinmanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.2.0",
"versionEndExcluding": "13.2.2",
"matchCriteriaId": "BB3AA59A-9CA4-4CD0-981C-B974A94BAC30"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.1.0",
"versionEndExcluding": "11.1.8",
"matchCriteriaId": "33A7D7B2-945B-48AD-AD65-C1DDD52811DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "11.2.0",
"versionEndExcluding": "11.2.9",
"matchCriteriaId": "808EDF9D-E721-4513-8AC9-A7B86163F0AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0.0",
"versionEndExcluding": "12.0.7",
"matchCriteriaId": "9D00E4B0-2B55-460B-B394-BE0E379144FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.1.0",
"versionEndExcluding": "12.1.8",
"matchCriteriaId": "9D2E6604-AED5-4099-B2EB-E33F15095C6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0.0",
"versionEndExcluding": "13.0.5",
"matchCriteriaId": "7229242B-0780-4E55-9088-7FCA82C24FE0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.1.0",
"versionEndExcluding": "13.1.3",
"matchCriteriaId": "BA376CA1-C47D-45C2-B906-8CCCDF5B83D5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:thinserver:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.2.0",
"versionEndExcluding": "13.2.2",
"matchCriteriaId": "12658E67-3F63-451F-95AC-3191F2043014"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1677.html",
"source": "PSIRT@rockwellautomation.com"
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6083",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-06-18T00:15:09.853",
"lastModified": "2024-06-20T12:44:01.637",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:21:53.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -110,7 +130,7 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -118,24 +138,63 @@
"value": "CWE-434"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpvibe:phpvibe:11.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "332B3456-DFCB-4BA1-AD73-28A248B65DE3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/WeikFu/PHPVibe-vulnerability-description/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.268824",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.268824",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.353552",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8190",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2024-09-10T21:15:14.697",
"lastModified": "2024-09-14T01:00:01.107",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:44:18.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-09-13",
"cisaActionDue": "2024-10-04",
@ -21,6 +21,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -44,6 +64,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
@ -55,10 +85,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:cloud_services_appliance:4.6:-:*:*:*:*:*:*",
"matchCriteriaId": "3B63CA83-3DB3-4670-878E-17A54586B25E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivanti:cloud_services_appliance:4.6:patch_518:*:*:*:*:*:*",
"matchCriteriaId": "61C0BF44-691D-4811-BE9E-FB9B6CC856B9"
}
]
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Service-Appliance-CSA-CVE-2024-8190",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8568",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-08T03:15:01.833",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:22:31.087",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:project_team:tmall_demo:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2024-09-01",
"matchCriteriaId": "87BC4AE1-C113-4DE4-A229-5F56DE2F39E0"
}
]
}
]
}
],
"references": [
{
"url": "https://gitee.com/A0kooo/cve_article/blob/master/Mini-Tmall/Tmall_demo%20OrderController.java%20SQL%20Injection.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.276798",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.276798",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.401010",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8586",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-09-09T03:15:10.270",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-09-16T13:28:03.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:uniong:webitr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2_1_0_28",
"matchCriteriaId": "D8F452E2-AACA-47E5-8E50-6B53535C9E6F"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8044-65b84-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8043-cc323-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-16T12:00:17.413980+00:00
2024-09-16T14:00:25.327862+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-16T11:58:38.363000+00:00
2024-09-16T13:54:41.923000+00:00
```
### Last Data Feed Release
@ -33,29 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
262924
262928
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `4`
- [CVE-2024-46970](CVE-2024/CVE-2024-469xx/CVE-2024-46970.json) (`2024-09-16T11:15:13.540`)
- [CVE-2024-22399](CVE-2024/CVE-2024-223xx/CVE-2024-22399.json) (`2024-09-16T12:15:02.530`)
- [CVE-2024-46424](CVE-2024/CVE-2024-464xx/CVE-2024-46424.json) (`2024-09-16T13:15:10.760`)
- [CVE-2024-46451](CVE-2024/CVE-2024-464xx/CVE-2024-46451.json) (`2024-09-16T13:15:10.847`)
- [CVE-2024-46937](CVE-2024/CVE-2024-469xx/CVE-2024-46937.json) (`2024-09-16T13:15:10.917`)
### CVEs modified in the last Commit
Recently modified CVEs: `9`
Recently modified CVEs: `50`
- [CVE-2023-3773](CVE-2023/CVE-2023-37xx/CVE-2023-3773.json) (`2024-09-16T11:15:12.553`)
- [CVE-2023-4273](CVE-2023/CVE-2023-42xx/CVE-2023-4273.json) (`2024-09-16T11:15:13.117`)
- [CVE-2024-34121](CVE-2024/CVE-2024-341xx/CVE-2024-34121.json) (`2024-09-16T11:55:00.837`)
- [CVE-2024-39377](CVE-2024/CVE-2024-393xx/CVE-2024-39377.json) (`2024-09-16T10:30:03.333`)
- [CVE-2024-41870](CVE-2024/CVE-2024-418xx/CVE-2024-41870.json) (`2024-09-16T10:32:09.480`)
- [CVE-2024-41871](CVE-2024/CVE-2024-418xx/CVE-2024-41871.json) (`2024-09-16T10:36:14.100`)
- [CVE-2024-41872](CVE-2024/CVE-2024-418xx/CVE-2024-41872.json) (`2024-09-16T11:16:26.797`)
- [CVE-2024-41873](CVE-2024/CVE-2024-418xx/CVE-2024-41873.json) (`2024-09-16T11:39:40.703`)
- [CVE-2024-5990](CVE-2024/CVE-2024-59xx/CVE-2024-5990.json) (`2024-09-16T11:58:38.363`)
- [CVE-2024-39379](CVE-2024/CVE-2024-393xx/CVE-2024-39379.json) (`2024-09-16T12:15:02.870`)
- [CVE-2024-39384](CVE-2024/CVE-2024-393xx/CVE-2024-39384.json) (`2024-09-16T13:01:07.037`)
- [CVE-2024-39385](CVE-2024/CVE-2024-393xx/CVE-2024-39385.json) (`2024-09-16T13:12:45.600`)
- [CVE-2024-39406](CVE-2024/CVE-2024-394xx/CVE-2024-39406.json) (`2024-09-16T12:15:03.080`)
- [CVE-2024-39408](CVE-2024/CVE-2024-394xx/CVE-2024-39408.json) (`2024-09-16T13:15:09.133`)
- [CVE-2024-39409](CVE-2024/CVE-2024-394xx/CVE-2024-39409.json) (`2024-09-16T13:15:09.387`)
- [CVE-2024-39410](CVE-2024/CVE-2024-394xx/CVE-2024-39410.json) (`2024-09-16T13:15:09.557`)
- [CVE-2024-39412](CVE-2024/CVE-2024-394xx/CVE-2024-39412.json) (`2024-09-16T13:15:09.840`)
- [CVE-2024-39420](CVE-2024/CVE-2024-394xx/CVE-2024-39420.json) (`2024-09-16T13:15:09.977`)
- [CVE-2024-40478](CVE-2024/CVE-2024-404xx/CVE-2024-40478.json) (`2024-09-16T13:46:40.287`)
- [CVE-2024-41839](CVE-2024/CVE-2024-418xx/CVE-2024-41839.json) (`2024-09-16T13:15:10.250`)
- [CVE-2024-41857](CVE-2024/CVE-2024-418xx/CVE-2024-41857.json) (`2024-09-16T13:18:35.007`)
- [CVE-2024-41867](CVE-2024/CVE-2024-418xx/CVE-2024-41867.json) (`2024-09-16T13:15:10.550`)
- [CVE-2024-42122](CVE-2024/CVE-2024-421xx/CVE-2024-42122.json) (`2024-09-16T13:49:27.837`)
- [CVE-2024-42131](CVE-2024/CVE-2024-421xx/CVE-2024-42131.json) (`2024-09-16T13:52:37.707`)
- [CVE-2024-42136](CVE-2024/CVE-2024-421xx/CVE-2024-42136.json) (`2024-09-16T13:54:41.923`)
- [CVE-2024-44798](CVE-2024/CVE-2024-447xx/CVE-2024-44798.json) (`2024-09-16T13:19:38.393`)
- [CVE-2024-44996](CVE-2024/CVE-2024-449xx/CVE-2024-44996.json) (`2024-09-16T12:21:47.370`)
- [CVE-2024-45203](CVE-2024/CVE-2024-452xx/CVE-2024-45203.json) (`2024-09-16T13:27:19.190`)
- [CVE-2024-5988](CVE-2024/CVE-2024-59xx/CVE-2024-5988.json) (`2024-09-16T12:07:20.767`)
- [CVE-2024-5989](CVE-2024/CVE-2024-59xx/CVE-2024-5989.json) (`2024-09-16T12:08:03.447`)
- [CVE-2024-6083](CVE-2024/CVE-2024-60xx/CVE-2024-6083.json) (`2024-09-16T13:21:53.467`)
- [CVE-2024-8190](CVE-2024/CVE-2024-81xx/CVE-2024-8190.json) (`2024-09-16T13:44:18.173`)
- [CVE-2024-8568](CVE-2024/CVE-2024-85xx/CVE-2024-8568.json) (`2024-09-16T13:22:31.087`)
- [CVE-2024-8586](CVE-2024/CVE-2024-85xx/CVE-2024-8586.json) (`2024-09-16T13:28:03.400`)
## Download and Usage

View File

@ -190541,7 +190541,7 @@ CVE-2022-21266,0,0,753151acd4774ecb48373a9775e6cd3188dfba7b4be399de2484e866292e0
CVE-2022-21267,0,0,9a4554da67b7e98459acb9300c3817d2633f958f2bf511036540b29d1a4838b9,2022-01-22T02:04:10.347000
CVE-2022-21268,0,0,521b01ddc811aeb81da6614510a0bd929b3f9a1ca85ee8f6a6c978ddefc27158,2022-01-22T02:05:25.687000
CVE-2022-21269,0,0,44b218cc300f1a70b300145a21bb8694436cb02c37fb20df76d42e367241127e,2022-01-22T02:14:42.817000
CVE-2022-2127,0,0,05422719ec6c54901ce416331b80463d9b67204e7510ddd7f1a1e47911019d52,2024-04-22T16:15:12.070000
CVE-2022-2127,0,1,d6f122f203ea87f4aef2e6871124f51b79136b087c850c25eb7338176be6479f,2024-09-16T13:15:04.270000
CVE-2022-21270,0,0,59f7cb516f5a4f8922a533972a7a7c04b3ac3f4267fc5cc109b6b2479b70dda2,2023-11-07T03:43:29.010000
CVE-2022-21271,0,0,e749498bc779955d1d3d2b42cce5a5b1c48d79b78fac6c729259bdd454cd52fe,2022-10-27T22:56:16.353000
CVE-2022-21272,0,0,3432b060d982111113a0081e1a2569f2030400de3c6b1998a80cdb5708295961,2022-01-22T02:23:38.097000
@ -225329,7 +225329,7 @@ CVE-2023-33461,0,0,0de3f4305f427b4ff32b903080fb5c836a3af93f2489c41c6aae59dfd6589
CVE-2023-33466,0,0,25da7ec5f821757081edf53c63649e6eda046cc60994bb8cbca9396d6ade9066,2023-09-12T11:15:07.650000
CVE-2023-33468,0,0,44c774863a2d55e63b1845bf55de3fe4506ca7c2a56eeb4bf92cb746976655cf,2023-08-16T18:03:44.977000
CVE-2023-33469,0,0,9dfbe3344d4b40c67ae0a1b0ae4fa865b29407207caaece6d4bed88b6c198b8f,2023-08-17T01:40:13.813000
CVE-2023-3347,0,0,a723926bed15f7839c499a6cc8847a6e0b8aed6868ff9adee3647f2061979db2,2024-07-03T01:41:00.823000
CVE-2023-3347,0,1,3fd9151d476078e653a42d2b9a1d6a14241e18d5cb22f2096b264fc568cc0686,2024-09-16T13:15:05.877000
CVE-2023-33472,0,0,a88e714c00c91b119d1197c1ae4473f07845779cdc1bb465822d892cbf9eac1b,2024-01-22T19:21:10.370000
CVE-2023-33476,0,0,4a297145be72f944481cc47e9f376d2cf456cf13a342260740e97ecbfcefc9c3,2023-11-25T11:15:16.937000
CVE-2023-33477,0,0,6db6ebce2662ad326ee213faec74c36ba5dbdc9868890686df97f67004511859,2023-06-13T19:14:00.687000
@ -226360,9 +226360,9 @@ CVE-2023-34960,0,0,50e7d34151989bc2fed6942340c0c6a8ed7b748fca80f7c8954924d89a9b8
CVE-2023-34961,0,0,cf78e1d661f4da7ec294f5ad1e878e2af45e46103cdbcabf68badfe02c1502a8,2023-06-15T18:57:30.313000
CVE-2023-34962,0,0,af634868fa0054f2b7c45c13462d01abdaf327d9c48e86310a5f366a8816cef4,2023-06-15T18:59:24.027000
CVE-2023-34965,0,0,d85b9c37e2f9457d4eb477b5a252039dfcd7c6ab7df67904bd6c23d6018002fa,2023-06-23T18:14:58.423000
CVE-2023-34966,0,0,e340fae4f3c6b2f7d541eece46066fadd3c86c08c5a6e32d59a07b8ae9ee070e,2024-06-25T17:15:10.097000
CVE-2023-34967,0,0,495ff8fa0530efa9fdea5444748aa8ee7fda46b1865dffd32204dc3df8b524ce,2024-01-30T16:15:46.067000
CVE-2023-34968,0,0,39d941b2def00bd208001be422f07929c150aaa23fe627dd4f991afc7ea93092,2024-01-30T16:15:46.210000
CVE-2023-34966,0,1,e75a448d8c9fbf6c3347ce32800fe0287eb15d0c2764bf0acdf69025b4f72033,2024-09-16T13:15:04.757000
CVE-2023-34967,0,1,20789ddbd16a5c66b434fe47b18c7a83f5f97a7fa1510768acd3053a2dc98058,2024-09-16T13:15:04.940000
CVE-2023-34968,0,1,8abd1ee45940772a2d510b51e6176f151b97123623b47480c095875ee099852f,2024-09-16T13:15:05.127000
CVE-2023-34969,0,0,20f3b57435e16371f80459f3c182a2bb410744533b482b94d4ff3198fb3f72ab,2023-12-27T16:36:58.353000
CVE-2023-3497,0,0,4d047266b8d04b5eb358e7cea115fd0dab7c7524efcd458770d1e7272757dc4b,2023-07-29T01:15:09.270000
CVE-2023-34970,0,0,0cf20f552104745cd280f12f0fd3bfe8bacaaf04a1a90475f6f521b43ad00ab6,2023-10-05T16:59:07.947000
@ -226827,7 +226827,7 @@ CVE-2023-35755,0,0,e1f17c748909f4d01d764fd7885f04db141c0fcf4a2980f003d3efccef1d8
CVE-2023-35756,0,0,4f68e862c118fc2cbc87ac3f51430f658fe10075e742a61844b05bd60a924e3e,2024-05-03T12:50:12.213000
CVE-2023-35757,0,0,0e8463fc2c81bc4580cb4e502ef99de97d681981a85a135f7fe4d04c1930a4c6,2024-05-08T13:15:00.690000
CVE-2023-35759,0,0,fa203c42b6b48021e6e150911dd3b26101ac7cf6f6ca08d43fe51256742e16fe,2024-02-05T17:15:08.490000
CVE-2023-3576,0,0,e713ea197368bfaaee0f3686fd7e87b968c5521acb4c8ed564a31d1215fbbc27,2024-03-11T13:15:52.550000
CVE-2023-3576,0,1,267e9ee7d065cd5eddbc2f91d5bcdedfb06936864c6b93500e7620103f7bf36f,2024-09-16T13:15:06.033000
CVE-2023-35762,0,0,381848968217a298c613610e76a7efe58c3e68544c5fddd3446e0f5c4456f0d3,2023-11-29T20:52:44.790000
CVE-2023-35763,0,0,a1dde759b107bbb45fb117f852bced52176d7c1f1847cf500e4e2553b06e017b,2023-11-07T04:15:57.230000
CVE-2023-35764,0,0,4273457863900c89f2f64f75a391c06d862e4dd907c30b5ae17770d0f4c54015,2024-08-12T21:35:01.167000
@ -228343,7 +228343,7 @@ CVE-2023-37721,0,0,ac62f8c1cf5f20a6e8a673c7402a2e07bb57b70ab96a77594240d6df32602
CVE-2023-37722,0,0,a247f480ec0383595814379d507cbdc8a13cd9015af391982683a3fc742c702c,2023-07-21T14:26:45.147000
CVE-2023-37723,0,0,1c7d85c6eb52078fdf15795a8f85dfb579af0bae35630ec20861bfc0ed75d37f,2023-07-21T14:26:54.460000
CVE-2023-37728,0,0,df19612c60ecc75fbf5c3e64ccbff867f8bc36dc8b0c599f914eba09fae7dbb6,2023-11-07T04:17:01.543000
CVE-2023-3773,0,1,11d3b2cecab5857e3d45e6f673315a4de4698ee1391ca64a5385b4462e0f6dbf,2024-09-16T11:15:12.553000
CVE-2023-3773,0,0,11d3b2cecab5857e3d45e6f673315a4de4698ee1391ca64a5385b4462e0f6dbf,2024-09-16T11:15:12.553000
CVE-2023-37732,0,0,18690bbd0f89c1e947931dd2910257c9bba69f42c70050ab3fda22f63381ce39,2023-08-02T00:39:04.113000
CVE-2023-37733,0,0,e8ceedae410227aca6e76228ee82909725cbd4cbaaa63c0bfa541bec989ff65d,2023-07-26T21:05:38.297000
CVE-2023-37734,0,0,21e0e5059ce8e7972e9057bc21c041f1cc4302c31104916324de291e6fea166b,2023-11-07T04:17:02.450000
@ -228745,8 +228745,8 @@ CVE-2023-38197,0,0,93e9b21d96cef7b071fa0630850b9280527ecfc7665ffdaf5c1a114441ea2
CVE-2023-38198,0,0,ef85054fa8438ac052ba4f57fa357877b346d9da7c1f0a600daa0dbd6e8d65a0,2023-07-25T14:30:35.337000
CVE-2023-38199,0,0,de8ccef5dc614aba2379b7e9c3a48813e945a782bdba9395d21885285c35e7bf,2023-09-05T04:15:09.017000
CVE-2023-3820,0,0,50a7cdeb81a8ee17bfc09e7fd0923a7a55a57c37361f22e37bdf60ce60965064,2023-07-26T21:27:15.650000
CVE-2023-38200,0,0,29e0a324c31f8f4b612066f7c72991167ecc9c5d3d5755e89c1c27ad28c97394,2023-12-28T15:40:32.947000
CVE-2023-38201,0,0,dc2da4ffb541886d0e5faf9fb4f8785479cce69868a9d2fb93d9a082cea0c0a8,2024-01-12T22:01:19.793000
CVE-2023-38200,0,1,a1a48a8357049f6c308d1c79204c5214153214eeaf6dc6efdd29c2fcf9e2c08e,2024-09-16T13:15:05.323000
CVE-2023-38201,0,1,c929e20502e10588d518086e5c155a2b49164e6cc15c831bec1c45db06883015,2024-09-16T13:15:05.490000
CVE-2023-38203,0,0,b74b23ca3de9b9e3c7fbaec82dca0baf7c3b28a210109e3f8f7f3f68094d621c,2024-01-09T02:00:01.953000
CVE-2023-38204,0,0,1b9057188dc96038578312ac4a2f54877c38eefabf94e2f1a26a83795739f145,2023-09-19T02:02:14.353000
CVE-2023-38205,0,0,186ff5ebb8104f34170642ad74e77a081bb898ced8c47a0e3d92d16ef71e456d,2023-09-19T17:27:19.593000
@ -229091,7 +229091,7 @@ CVE-2023-38555,0,0,5b74747fe3727ccf961aab652679ef490622540e87fb7b472b076670dbe2d
CVE-2023-38556,0,0,85fa50566d5acf7641189355376a40d5864d78c82226360b990675aa12d2ad6a,2023-08-07T19:24:44.253000
CVE-2023-38557,0,0,410e81bb58e4789d07210170f7473db90e4a56e817e8d747b0cc6f31df1024dc,2023-09-21T16:12:01.620000
CVE-2023-38558,0,0,41531cacb1de233098d32b79fd9efecebdba07a9595f0a633638e81ec8b2ca7b,2023-09-20T14:03:07.620000
CVE-2023-38559,0,0,21c61acd83dcaf120fe100f40e7726cb28d8db7ceb16904aa01483f39cca9770,2024-03-08T18:19:03.450000
CVE-2023-38559,0,1,f4de074d6255bba1adaf1a2af72abedea97811f23e11ff71de6632665bc659e7,2024-09-16T13:15:05.667000
CVE-2023-3856,0,0,31b604aceaf14703f21a8b47a664ff4f650adc31c83b4a1251209c844c970874,2024-05-17T02:27:54.067000
CVE-2023-38560,0,0,247e24b5ab5349d123f13aa4bc5ee89bef8684469506b9c7e635be9f6283daaa,2023-11-07T04:17:21.293000
CVE-2023-38561,0,0,c8e08cb46ebd1aa35ebd189dc0663df0fa88b7acddaf3601d5cae603037f46b4,2024-02-14T15:01:46.050000
@ -229422,7 +229422,7 @@ CVE-2023-38976,0,0,7b4f7f60ffa8b42cadee7781bac6b79d99dd0e5e9b8ce8797caf39e7d40fa
CVE-2023-3898,0,0,6cb64d638c498ae1066713b7c771ca086f38841a510c9b464ec96021b75707d3,2023-08-10T17:50:03.287000
CVE-2023-38988,0,0,6860d49e6f63057c1ac1d67ba4ffb1ee7d300f99992cd187515bad60fa9550da,2023-08-03T18:54:14.513000
CVE-2023-38989,0,0,ec9c3da43c933c24858a3ac341778f223e6ab4c72987571b94d0138cb0deea19,2023-08-04T03:51:49.137000
CVE-2023-3899,0,0,d167c3d9ec337708e0c04082836091f945ad51905338b57a6cf3c907f18aa194,2023-11-09T20:11:15.350000
CVE-2023-3899,0,1,a976c1d3d7813d7f4be239e73f5f3c10c08f195015181e1b2884f72649e85770,2024-09-16T13:15:06.240000
CVE-2023-38990,0,0,e9c43d19db4bb487825afac8d3fe0a213c0a61444534f94592b6955bfb54a034,2023-08-05T03:54:40.437000
CVE-2023-38991,0,0,863a43b6a5a25d59c8375b383640cc261e064acc28ce236760da1e5107fb6f53,2023-08-08T18:58:00.460000
CVE-2023-38992,0,0,6a3338539e7bb7c15c7dc0e243b9b9ad7e9e9c5472b9d9b59e02ea092d4f9f17,2023-08-03T18:10:52.757000
@ -231369,7 +231369,7 @@ CVE-2023-41450,0,0,34d50a65b46e799820f380c8a0e0b7ea91ac8eb9b3ec1fb417d85b9b739c2
CVE-2023-41451,0,0,90a7738d9d319653b5eb91b78821fef606e037dccb36b1d85cb749b0a4edcd94,2023-09-28T21:43:38.937000
CVE-2023-41452,0,0,57ee026df418130fe209cd4c34958e75209c07072ad93096c43ecd3dbd91bd1e,2023-09-28T21:47:51.073000
CVE-2023-41453,0,0,08c0354bc9a3fdb9b55b526114c6d2b65111c4bfb1e4e57c061e580b2e7f8bcf,2023-09-28T19:15:34.223000
CVE-2023-4147,0,0,baad1dd57a6b003a09a2e0a4ff1e6d223d5e0936ceada312b0089a53c1067e63,2024-08-26T16:08:14.227000
CVE-2023-4147,0,1,ab9be32ec451567f1a9025dabc55268497f1ae4f2457d9204a4ae67975128be2,2024-09-16T13:15:07.240000
CVE-2023-41474,0,0,146129e61eba6ce72d529040280fdedb09627804965a1d99c28fc1496cb617a1,2024-01-31T18:54:51.777000
CVE-2023-4148,0,0,a2d62bbfdd9e06123bf616c73cae78de0ae54604969c45bdb7cf00245b0d44c8,2023-11-07T04:22:11.273000
CVE-2023-41484,0,0,0bd96297a07db1f2ef23283f5bfcf20ef37bfa8a237e63f6e51d087958784217,2023-09-22T02:09:42.600000
@ -232257,7 +232257,7 @@ CVE-2023-42726,0,0,5400106d68f743ce25ee26579289489720c943c324a75b46befa193a73520
CVE-2023-42727,0,0,ab8e8227006c1b368e3ca30f850c4fa4412825e0319a433878e4399002a8b38b,2023-12-07T15:39:34.083000
CVE-2023-42728,0,0,b86d7cd0058e50b546cf99f1b145c4c8b8365993780c9ee4876291843b1ce492,2023-12-07T15:16:18.897000
CVE-2023-42729,0,0,8b5f8f9fe677ca4d365445da6fde305c44cd89fac63cbc9dc1f3037ac128fde9,2023-12-07T15:15:45.540000
CVE-2023-4273,0,1,e57bb452f1da98da9600ec695461196db1798f3d7522b1a5ebb476faea4a775c,2024-09-16T11:15:13.117000
CVE-2023-4273,0,0,e57bb452f1da98da9600ec695461196db1798f3d7522b1a5ebb476faea4a775c,2024-09-16T11:15:13.117000
CVE-2023-42730,0,0,53b59c4010ca0c2aec56539899333c944bf38fca0403e820c52ab00f8571fe98,2023-12-07T16:23:34.477000
CVE-2023-42731,0,0,7577bde2338cd0d7495feacd0027ee841f212a53c0f510e121b396ccf8c48045,2023-12-07T16:24:55.660000
CVE-2023-42732,0,0,2916855eea2c4ae27fa34c910e5eff7c2eb9df4160c411e12a2ed9b83067c971,2023-12-07T16:30:26.580000
@ -232286,7 +232286,7 @@ CVE-2023-42752,0,0,22977535c377988fcec2e0db6fce559af749489e4cbaf81f8d598df1eb50f
CVE-2023-42753,0,0,fdef6b4e6e00e576a776ced60bff1da73f2c1de9e8ff8543d560d2d931c65aa4,2024-09-13T19:15:15.143000
CVE-2023-42754,0,0,51c5dfa0ab73784fd921f92fed3626ee318007c3c8ffe63efcedede944c4226d,2024-09-13T19:15:15.473000
CVE-2023-42755,0,0,4e1d57d99583b1633ac52105d5aa05edba3a9b9a435f3b1f32232d72ee520c1f,2024-09-13T19:15:15.620000
CVE-2023-42756,0,0,dd1ce197ba594592a598e5c7806e6f4d6bbb5965288c463442a957df39cf6849,2024-04-30T14:15:09.243000
CVE-2023-42756,0,1,8bca0547c5c71329ae74fc216494c3b935babffb1d80b31f0201b320d98bb2d8,2024-09-16T13:15:06.640000
CVE-2023-42757,0,0,53f895ca4b2413554de30c5001e6737fc08818e69f276382dbe276da25387997,2024-07-03T01:41:30.683000
CVE-2023-4276,0,0,c946dcf653c02d28c8b48cb5d585a9c55257de192fa39f2f1cadf751f6862f19,2023-11-07T04:22:23.843000
CVE-2023-42765,0,0,d3d64a39ab45304ea904af85d89b92f9adbba47d39160e37d7185ccf8cd78275,2024-02-12T16:44:16.617000
@ -234504,9 +234504,9 @@ CVE-2023-46142,0,0,3fb6a0861e35fc09ecd0298ad20e5d7a8d5b6455fb61a2037ae1846cac22d
CVE-2023-46143,0,0,e3bc6bf1bb4c8c0f9d3ac70e1c134375256c14ec8394d0b3c4d1d049a67021ad,2023-12-21T17:15:46.577000
CVE-2023-46144,0,0,3282ce1c9478d9758af9f76cb4e41d53fa70db52bbadc33760bdc9a464fbec5b,2023-12-21T17:16:11.880000
CVE-2023-46145,0,0,349c8808057410d251a89302413901d028ae7fdfdc2fab73cab5d33fd808c463,2024-05-17T18:36:05.263000
CVE-2023-46146,0,0,a754f238dd6b19f00d8bff844daa2de4287573180a3a236876681817a308b5e5,2024-06-20T12:44:01.637000
CVE-2023-46146,0,1,674968e0b09709c1de659f46455142d49d86eaca8817754c044e40c734f63cb6,2024-09-16T13:40:24.777000
CVE-2023-46147,0,0,adf1b90240c365239e0d74bb3859de2075d45bd2082f60acc86fc39dec609816,2023-12-28T20:04:49.337000
CVE-2023-46148,0,0,b30f6d39d5c382bf17d17b260236449902803f164251e84cb6fe2371a7917d5e,2024-06-20T12:44:01.637000
CVE-2023-46148,0,1,9bf3fcd47bcc8018a9c1f7948a87dfd5462370201ec373c9040cedb944d2662a,2024-09-16T13:39:49.807000
CVE-2023-46149,0,0,3ea8aa587373a4370ffe6a17a9695029b950cdc772eec5fb15d692937fc545e0,2023-12-28T13:44:32.593000
CVE-2023-4615,0,0,cce88ca43c3bf2e90c110ee0ceced76eb1449f266f6f989c5a673e12188ed957,2023-09-08T14:14:45.633000
CVE-2023-46150,0,0,24b6cfa0fa017814cee898808d57e55bfb0b56cc0b4b2034380458dbb8bb6a4f,2023-11-01T17:34:25.380000
@ -236461,10 +236461,10 @@ CVE-2023-48754,0,0,614d4cdc37c0b2375a29c7af81051a6cf9c3b28389871956e1843d10badfd
CVE-2023-48755,0,0,3d71fe9f3b24d529c3f220cad4414c1068434aa0e77e34817a1fe25e9c541812,2023-12-20T21:09:32.063000
CVE-2023-48756,0,0,7f27ff81a11a1aaf081b2a2c709c5cbdcc34a02567bbee61c06ca3c945b74c19,2023-12-18T19:06:14.257000
CVE-2023-48757,0,0,56fdb394c3235b720057647cf37ac09e9261e0b0ae801569247138671fc1be1a,2024-05-17T18:36:05.263000
CVE-2023-48759,0,0,052489aa53eb822e2d216817c16596efd0d701ef5cd6cee13e9db743c3fe68b6,2024-06-20T12:44:01.637000
CVE-2023-48759,0,1,3f80e547d08e681a92bc3f658b9714a5b770ba9224e1a519cf7c51401af5e48b,2024-09-16T13:25:15.550000
CVE-2023-4876,0,0,3b97a842654f5bd1e35e919b3186c1e81e22f9937052ea4ff82c3765d820ed69,2023-09-13T13:36:42.887000
CVE-2023-48760,0,0,f9f29363e7eb88748fe8df3e2bc33e19accf1fa8b98e8172c26c3eb6a5ce3fa6,2024-06-20T12:44:01.637000
CVE-2023-48761,0,0,f70e2396b61bac65c4b5f961f2c0fd678c6cfdd032657298cf2873141813513f,2024-06-20T12:44:01.637000
CVE-2023-48760,0,1,1d8579ae05e2232ddb597b5a6e7a051b4b4cafee4b030a2a5eb4605dcf0c2c51,2024-09-16T13:26:13.570000
CVE-2023-48761,0,1,91316ae0fb08b49a0b2551ee5295fe5c18df501e28e951bb5347525b8eecba40,2024-09-16T13:27:20.777000
CVE-2023-48762,0,0,c556b68fe8ab2310589e48858d1e8c8ec3e860850db88920bebbae9829320811,2023-12-20T04:17:13.577000
CVE-2023-48763,0,0,2eaa6ccefeda47c42af21fd2245b4a8ea60aedac1d3dbd4a3e87235ba6050cd3,2024-04-24T17:16:50.397000
CVE-2023-48764,0,0,32c7260fd7d6515dfdec515e45e192898c95929a26d209476885b4530c8ee324,2023-12-28T17:25:33.493000
@ -240046,7 +240046,7 @@ CVE-2023-5977,0,0,4f2206e2eaf1f5fb6eec8067344b53abbfad8cfe8403df3537e0415740cec3
CVE-2023-5978,0,0,f408ac44ee354621216f90f423d38c2c659d3ea5a53c9d5f9e74f1e2e716c95e,2023-12-14T10:15:08.727000
CVE-2023-5979,0,0,276fad04b5259c4f4586562a88d13821aa63af57a15977d1125f945b1ccbf798,2023-12-08T14:20:45.807000
CVE-2023-5980,0,0,f09a305b17ba2313c538eefe0561ffa620cbee16eb9b5c9d3913b696e4720b5c,2024-01-02T20:45:48.277000
CVE-2023-5981,0,0,9754c3be0f9b841f0eae2c6ef7420f1191720adafd7aa07d69d0340c4afe31e0,2024-07-08T18:15:04.087000
CVE-2023-5981,0,1,78e33f4b8c0edd8ae7e7187ce3119e6fbd1037fb3854ef36ea36b61355633853,2024-09-16T13:15:07.813000
CVE-2023-5982,0,0,cb35b7bddfe50fe1b299befc567ac19093e5db6dc3f3cc21a409dbf8cd0e5a17,2023-11-15T15:37:28.153000
CVE-2023-5983,0,0,3924fb95341be31a1540cdf30f4f9eae80393248ee37ded1be30e0ec60782b22,2024-08-26T14:15:07.593000
CVE-2023-5984,0,0,60e45e796d62f3504f0a18b0567334ea0b7891c7f3d75b9a2af98a59c227b140,2023-12-14T05:15:14
@ -241635,7 +241635,7 @@ CVE-2024-0549,0,0,1393f5b8cdc9e327fa6862e01e6396727ca7a0ac5b934bf16bb8c3e769c529
CVE-2024-0550,0,0,abc3547a7838ac73f19a1ebe9a4aa732476b85bf08336b5b46a7a52c09f46cf3,2024-02-28T14:06:45.783000
CVE-2024-0551,0,0,3bcd8ed6668581b560d620774527cfe0f50a7507d208b9889bb8c1c79dda71a1,2024-02-27T14:19:41.650000
CVE-2024-0552,0,0,71e8fa37268dd5cfa7c962f598a1d1195c1e35bb353493449feb13346a0b6d6e,2024-01-23T19:34:05.483000
CVE-2024-0553,0,0,77cc1919bac3ab72d4b09a5ba845b3b7c758ed93d081004d36da5498e3a4b9e8,2024-07-08T18:15:06.153000
CVE-2024-0553,0,1,f5aaab005c6250bd9169db9bffc1b34f92e8a0059e5e79538fe2daa4eac29ff7,2024-09-16T13:15:08.327000
CVE-2024-0554,0,0,be16417315b7a311600e94ec0549779d6adfd1584a8e8952a259fb4e0980804f,2024-01-23T19:37:17.313000
CVE-2024-0555,0,0,c8aacb2fdd19da501c6c82ff909d2c5a12900f2d0093adb7af16737ce17fb806,2024-01-23T19:57:48.237000
CVE-2024-0556,0,0,3fa34f60dae8364b706de7dc9e47c9ebf00f13a031fee30b193fa3a78664a286,2024-01-23T19:44:47.387000
@ -241649,7 +241649,7 @@ CVE-2024-0563,0,0,9ec355fcf8c2bfde63e8cd3b32f6b09899d66d999623867d4585cdbccddf2e
CVE-2024-0564,0,0,9f4cf532f2df225cad861ce2ec08ab9ceb4e29633d51c64f31796eb4bcd7e01c,2024-02-08T16:36:48.837000
CVE-2024-0565,0,0,ca58e43bc8d960bbfb34d32be78694d44cad238c92c5ee98dbd6b9bf2c483600,2024-09-14T00:15:15.387000
CVE-2024-0566,0,0,170da13f521bcbc97fa1d9a0d35b966ca3768bc35f96776689c0b15c2a399254,2024-02-12T17:31:21.670000
CVE-2024-0567,0,0,8e48d7a4986aecfa9745b4a32dc9d6e05a5c520ef84f668ab71d6ffe5ab7ff5c,2024-07-08T18:15:06.703000
CVE-2024-0567,0,1,2f4df701f3416c48266db1bb8a27d322f4c7f91f5c54f623275f8e06a0796629,2024-09-16T13:15:08.680000
CVE-2024-0568,0,0,33eac886ba5b69f80ae385e0dcdb88a2caf2e7add15dda3f9f1cb918faf651d0,2024-02-14T18:04:50.373000
CVE-2024-0569,0,0,a95accd00cf0ee074f6751dcd8e432a7e91c717e436d391ea5221ea3ce82042e,2024-06-18T13:21:16.393000
CVE-2024-0570,0,0,5b3b3864dfe61724c9374954c01de1e56a444e4219e92c2a04dbcce5169d914d,2024-06-18T13:21:42.383000
@ -244748,6 +244748,7 @@ CVE-2024-22395,0,0,0d29784f93066fed6298e77c63a9a7ba15d287ad4907fe05e0ebf699a961f
CVE-2024-22396,0,0,a5f00b94b83832b467db4300982cd3b6b686890c80cea01a13cc610352a5b12f,2024-07-03T01:47:17.270000
CVE-2024-22397,0,0,a22476279a0935a827e77ac005c3f79785c215cd6755d834d6f6f936f670c7bd,2024-03-14T12:52:09.877000
CVE-2024-22398,0,0,ba44b0d25e7b758fa53c63cdc26c43f1429982b9cc2c5eed3635a95b6d6d99db,2024-08-08T22:35:01.020000
CVE-2024-22399,1,1,93fce0d6a8e6effca30c0f1f2a075f2ea2cf4196e07062785200a5a05c825ea7,2024-09-16T12:15:02.530000
CVE-2024-22400,0,0,a82e5833eed07db4e1d5b948553237fd45742883181539baca74084d8a75ef26,2024-01-26T20:55:37.543000
CVE-2024-22401,0,0,d5240a6aa4666ee81a03ffa69aad185ad0ebf9697996427b5aa87a5ad00f95f1,2024-01-26T14:42:35.147000
CVE-2024-22402,0,0,86847dbd3139546d75935634479a7b84727e69a7a4ecf53533475274b18a3d48,2024-01-26T14:11:30.677000
@ -252923,7 +252924,7 @@ CVE-2024-34118,0,0,def1ef4f0d237934e763e168f4db1b4c3563826c7ed8bb71e24ecd9d8e332
CVE-2024-34119,0,0,b18bee7f46141710c36322baeea2f2f79cc2cfb9042e189f93a16a755c8d108c,2024-06-14T20:03:08.293000
CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c198,2024-05-29T13:02:09.280000
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
CVE-2024-34121,0,1,220da874534eda8c169c4a74cb0f772415521c8587102b4cac8aee70173073d0,2024-09-16T11:55:00.837000
CVE-2024-34121,0,0,220da874534eda8c169c4a74cb0f772415521c8587102b4cac8aee70173073d0,2024-09-16T11:55:00.837000
CVE-2024-34122,0,0,1f1afdb8bcd7920872d40bc049791e258094ad813a8f738f73973f16e8f185df,2024-07-02T17:44:45.700000
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000
@ -252935,7 +252936,7 @@ CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf73
CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000
CVE-2024-34130,0,0,29b15cda4f7383fc7738011069e5f5981ecee8f8ebe6f1acd48c5ae17439fbe8,2024-08-07T15:15:55.287000
CVE-2024-34133,0,0,1d0cb4674576130d312c8e4227b24a269014ebdd373db1a448b4c534b54b4ab3,2024-08-15T16:48:11.847000
CVE-2024-34134,0,0,cc85043e22ac4e783334c2aa3c3ef9455dd6c53f65584692f5ad92d2a6a73af2,2024-08-15T16:47:51.770000
CVE-2024-34134,0,1,c00e14ff09a1a532234a22030df39434e186d5f6f93a662354b78a0c0f900c7a,2024-09-16T12:15:02.657000
CVE-2024-34135,0,0,d677722ae5b9b5415d9ec8d0b13b26302b2ca55ae3189dba56599a49d49f7bbe,2024-08-15T16:47:32.560000
CVE-2024-34136,0,0,6e1f4b7666847fc28ff3a6dfc546463d7583d6608cabb72e416825ad66567975,2024-08-15T16:42:26.677000
CVE-2024-34137,0,0,df06b600a47c44c9e7b304361dc32b85bdc1c4709323c9b327f9ff904d3d89b9,2024-08-15T16:42:15.847000
@ -255125,7 +255126,7 @@ CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddf
CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000
CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000
CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000
CVE-2024-37288,0,0,701438bf3e876863ab8d14a84c5212af597e532c0122bc200a49c82a712de609,2024-09-09T13:03:38.303000
CVE-2024-37288,0,1,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000
CVE-2024-37289,0,0,2976747a57097020fbcd1f162347209565208622cbfbb8b77b0b7237b06e86b8,2024-07-03T02:04:12.080000
CVE-2024-3729,0,0,3415ccd7b93278c163a46fc8f742b8dd4fa5f770790b8aa49be2a2c1ba3b0c85,2024-05-02T18:00:37.360000
CVE-2024-37293,0,0,b38c9bef2ce8854b8f0a9c288c7acec55e60fa5af9100539279c24f2cbecf35c,2024-08-16T16:11:53.287000
@ -256110,9 +256111,9 @@ CVE-2024-38635,0,0,82c05d5461024536a7eca544742658a15aca67670d5473d3ab28fcdf85287
CVE-2024-38636,0,0,39fe2743512ad3bce5f80041cae8719a346f16bdf419751542e29e8318105523,2024-06-21T11:22:01.687000
CVE-2024-38637,0,0,73dfe838ab3a4a3bdef26c72205f7e2908e62b38c42443b0d3887f952bc61af5,2024-07-15T07:15:14.093000
CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c40c,2024-08-12T17:35:09.733000
CVE-2024-38640,0,0,c4ef7addb9f3c39e8de07ef7e2e0a1b66a7f8447f6d5cadc60e1e78ce48d2aec,2024-09-09T13:03:38.303000
CVE-2024-38641,0,0,616d87a02823e379f25d6175068bccbf4fb841543b5f77c5f07ba2d73ccbf5f3,2024-09-09T13:03:38.303000
CVE-2024-38642,0,0,365231ea306e59897242fcd3e6bee34bf7b356a7c2e9441e835721d6b579b6b0,2024-09-09T13:03:38.303000
CVE-2024-38640,0,1,f894436174ccc1cc2e08bbc67fcba0414dc6b13ebdf107dda01c02078b396724,2024-09-16T12:27:22.747000
CVE-2024-38641,0,1,8a7b88c9ff752db6c85379c2610078ab5ea82aa0cd968ba97ac893cb265a7390,2024-09-16T12:35:23.713000
CVE-2024-38642,0,1,f8d0ecee472de6a33388f4e82db0802ffe48c291af3b4f5b7db26d6f668db8b3,2024-09-16T12:33:13.277000
CVE-2024-3865,0,0,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000
CVE-2024-38650,0,0,e891d7d85d4336a7a5f2f3e8d37d84cd0e110d202a93897593f57a29fc51a95c,2024-09-09T14:35:02.103000
CVE-2024-38651,0,0,47715d6cb9c5ed15acd60ba1960b4a6147a111543bd71aaba5ad096adf7a37d8,2024-09-09T17:35:02.663000
@ -256485,16 +256486,16 @@ CVE-2024-39373,0,0,4d8c0982e7cdb1147cca590a3a2ae7c9ffdce8617464f62ef5a2a6f5e5074
CVE-2024-39374,0,0,ad17efc6aa67e7b26f65d3189d2658b2488a44464309406f364c5bd8e73d4193,2024-06-27T17:11:52.390000
CVE-2024-39375,0,0,63cd2388720af3df4268f688ad707fe003b641c7c19fcda0eb4bc47c67645098,2024-06-27T17:11:52.390000
CVE-2024-39376,0,0,c5700ded29923bb8323d7f97de6c0ff12124e48d1fd05b5e64b815253ca12a53,2024-06-27T17:11:52.390000
CVE-2024-39377,0,1,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000
CVE-2024-39377,0,0,d4093cc8449ac626af4e28129374a68e222c3073f7317d50d080ec3d09ca6cf2,2024-09-16T10:30:03.333000
CVE-2024-39378,0,0,3b61d992513510d880f3841406cf286a1cca8ad174b6153ccc78fa173926cd3a,2024-09-11T16:26:11.920000
CVE-2024-39379,0,0,254a12bd73909f0be093719c5b38b4eaf337f7e58beca38b827a09c853e5a892,2024-09-11T15:52:47.053000
CVE-2024-39379,0,1,65a229a7fb72dfe0e8ba40eff3f97a8fa1b1131d67038b157cf08f97d8d0be43,2024-09-16T12:15:02.870000
CVE-2024-3938,0,0,9f6aecdfa53fe6eb1c4aca56683969fdb193b03c1b9229add1400e00af205f88,2024-08-13T14:09:14.087000
CVE-2024-39380,0,0,1910572fe42c7147873be8861011fe1658b3f4e08e9e17ecea7358ec80d109ff,2024-09-13T16:55:04.930000
CVE-2024-39381,0,0,c446a0a3cf348c0d4a05fe80309ddc5c180ba4a1c6f9ab0dd7c079d8ea253d78,2024-09-13T16:54:39.217000
CVE-2024-39382,0,0,57bb6f41c6b41dc159da36294ebbfbc63b1c8a8affc6c123c8c58660d2dd02ed,2024-09-13T16:54:20.397000
CVE-2024-39383,0,0,b6e4f5fe53d1ceea626b9028f302c2f5678be6f17f3d7aec3036ac534781eb21,2024-08-20T19:26:34.947000
CVE-2024-39384,0,0,79de383033ea4c00d643aa3fd03acc3149bd29b984e4061b88dfc796f6f105e4,2024-09-13T14:06:04.777000
CVE-2024-39385,0,0,425cb7786da387dae561bfbfcf8aa40c4adc5322e012f383fcc7df4b001561c2,2024-09-13T14:06:04.777000
CVE-2024-39384,0,1,126aaf90b35785ffe9d5053a21f7e6ace1cdd40b8114bcfd84638ff5759b9423,2024-09-16T13:01:07.037000
CVE-2024-39385,0,1,39ef5ae4eac69cb9c2fc0d6a7fa2ae80b0d018bd3aaa2cde0bee65aa023a5db9,2024-09-16T13:12:45.600000
CVE-2024-39386,0,0,b798786f71e8e8f0735f5ce39eeb2c50d842aae88e8a43200f637f6dd2b6b086,2024-08-19T18:53:49.387000
CVE-2024-39387,0,0,89b66bc618bdec29880956f86ab320532050f7e569b27da862dd99b48956ab03,2024-08-19T18:53:28.930000
CVE-2024-39388,0,0,8d23a39b2d5c7f24e6d2ce074d1291f49a0b80796f8d0f1605cbbd1187360b13,2024-08-19T16:23:28.353000
@ -256517,14 +256518,14 @@ CVE-2024-39402,0,0,8f9792ca39ac0f5735d2d339471513a0d0066ed8186936bed3b6cb6fc80ab
CVE-2024-39403,0,0,07e4d8e2e8e77f045e47a14368527780bd5cf232eacf57cf163f25b08d6cbab6,2024-08-14T14:45:31.187000
CVE-2024-39404,0,0,0a57924699a1991f76f1f50910f14cbebc966dfeaddc9ac00c410fa553a973bd,2024-08-14T14:44:35.470000
CVE-2024-39405,0,0,eca7af29b059ce089e741bc6a4c7a853c086cfad9296c28a6d43dd725f7e44bb,2024-08-14T14:44:17.217000
CVE-2024-39406,0,0,c2da45b618d21bc0614955b3705d2a2e70c973412cc2ce181ce9b808a721e810,2024-08-14T14:43:58.617000
CVE-2024-39406,0,1,25d04b0f853cf383417a927f1df57bb53469f9bc9deb7d3dea31cd7c4b9bef49,2024-09-16T12:15:03.080000
CVE-2024-39407,0,0,a04cbb78d44437ccd0b191c3d3b80ebe08944fb4ba6ecee4b56aa111da23fcee,2024-08-14T14:42:50.467000
CVE-2024-39408,0,0,5c655a53d14bbe9c2face14c81071a8ce2990c5928fcbcbe0ce28af902aef32d,2024-08-14T14:42:31.313000
CVE-2024-39409,0,0,a57451b3b50464a3ac4f18f380f7aaa18e3d7bb9de921c95b59349cc8ac45f76,2024-08-14T14:42:10.687000
CVE-2024-39408,0,1,78ac02ebc7a31d73c30bb0b0fdb3565c4c03fb335f3337c1996a68797a39d9bb,2024-09-16T13:15:09.133000
CVE-2024-39409,0,1,c94c20a181dda97d1ec8c605dd5d9d484beb306fe41b366d7c33da38095ea491,2024-09-16T13:15:09.387000
CVE-2024-3941,0,0,35d6089b62c06226c8a1fbb42f6b4f7549cfd9ebea65fdddb79305777fa7b160,2024-05-14T16:11:39.510000
CVE-2024-39410,0,0,6777f15fb5fccbb406ad43c313bafcaa9e88f44e59ed0882a921fbc567856dbe,2024-08-14T14:41:36.527000
CVE-2024-39410,0,1,80d8ff5a50f6536ea45b9c6d8909a33772be394437655373822bc6801ca5774a,2024-09-16T13:15:09.557000
CVE-2024-39411,0,0,1272b538409151f4f62bcba24a09806ce4b7e124f6e1ad5512b378725548cd2c,2024-08-14T14:40:55.510000
CVE-2024-39412,0,0,d06dfbaac9279386c5900dfd5be1d77e38a9088677fe9ca9a805d062593a2a4f,2024-08-14T14:45:35.393000
CVE-2024-39412,0,1,2d8f844692ee592a9c89a505d8cfc64b3d2eefd95e162394536ffc1d73e487cd,2024-09-16T13:15:09.840000
CVE-2024-39413,0,0,4a894151c2ac93955d773bf053f53d0a6272124b1d199025eed7c821185013ca,2024-08-14T14:39:39.737000
CVE-2024-39414,0,0,a4bb8c6b936f8f3de2a8e0d95754370d5eb00e62f1de95bf54a93c835f112913,2024-08-14T14:39:26.427000
CVE-2024-39415,0,0,894bb113716af642843f4f18ce95fb8548231a5b76d859c1eef366fbd2f5e3ce,2024-08-14T14:34:26.620000
@ -256533,7 +256534,7 @@ CVE-2024-39417,0,0,0219fe7231643f85bd1a095fa4e5b3701dd95a7c34961f2e44e04d860e06e
CVE-2024-39418,0,0,820594d43ba6e648c74185b3a3f3884cde9c1939f1e21dddbdc9b976f0550b97,2024-08-14T14:32:59.893000
CVE-2024-39419,0,0,91ffb997b311a697ccfc1be20f20cf74e921e2bccb596cd4c51ef6ce14f52e39,2024-08-14T14:25:31.337000
CVE-2024-3942,0,0,b71832d6733f7f5db02eb3f159a58495ac978b495e9bfda57b6845f95312f30a,2024-05-02T18:00:37.360000
CVE-2024-39420,0,0,5ce70dc4f0ef4fa603a073bf6b5cc4fa9ad5bd15c02b670fc31294b1f926bad8,2024-09-13T09:15:08.297000
CVE-2024-39420,0,1,8a25c10f0043ed9ed91c80d0ca709c9afad136cf979fa98089f62d0910fe0ed1,2024-09-16T13:15:09.977000
CVE-2024-39422,0,0,5735bb4ff902bfe6b8a2987e99f52b473438750762eed69fca82d27ac307a139,2024-08-15T17:25:54.750000
CVE-2024-39423,0,0,8c72be80e3c85b684216aef96277fce75a9c2e2c566be73887f1212d11fae6b3,2024-08-15T17:25:41.800000
CVE-2024-39424,0,0,243efb9cc10bea0f29adc08971658a5e72c18bfec9a9b14b5a01df0b19c33e3f,2024-08-15T17:25:25.787000
@ -257035,7 +257036,7 @@ CVE-2024-40474,0,0,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829
CVE-2024-40475,0,0,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000
CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000
CVE-2024-40477,0,0,6cb0cc10c37b24482c4bb193827b5d7d3a2113c4464b073473336af2956aa387,2024-08-13T01:13:46.877000
CVE-2024-40478,0,0,2684adf1a5a4dba5423bd04a16b03753b6bc02f74f72b365898fbf6dfc69e6a3,2024-08-12T13:41:36.517000
CVE-2024-40478,0,1,54a453f97c6355966feebeaf1afb013583b5f0faef22df3e230ba2cd8c227fd7,2024-09-16T13:46:40.287000
CVE-2024-40479,0,0,c5bec1df57db16e609d1623e6517bb40c5b937de6b2390aae79ad47c0b80430a,2024-08-13T01:13:47.860000
CVE-2024-40480,0,0,e7a951452f0ffeb9495f3973bc193ff807eb0f9c1dd8fd2ead8c62923fcd7549,2024-08-21T21:35:08.270000
CVE-2024-40481,0,0,4827ebaf038f9227afaa10ae59d01fa6610f2bcdbbe677b5840a09b2a19855a4,2024-08-15T13:58:16.033000
@ -257827,7 +257828,7 @@ CVE-2024-41833,0,0,85fc1d4f81094922dce51fd479c7b435396bc7c4f95057b5b31db4afd23d3
CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb8d6,2024-08-15T17:13:25.090000
CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000
CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000
CVE-2024-41839,0,0,5ef460cfd4cab1da61d6ea06c2a0157d7dd82f5004a20224cb3c7be32bb81d0c,2024-09-12T15:58:11.690000
CVE-2024-41839,0,1,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000
CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000
CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000
CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000
@ -257845,7 +257846,7 @@ CVE-2024-41852,0,0,b9853968fe67e2c5233e8ca2738b3048de51d482a522c2258b22dc0aff703
CVE-2024-41853,0,0,d0e1d87efca688bf44c8dd7769e57548e5c5327e51e643a477df14e3576a000e,2024-08-19T18:42:21.327000
CVE-2024-41854,0,0,08cc90ea0adadfa96a276aa03d11f4fc06ec99cae9172cd871fbd7355b111a09,2024-08-19T18:43:34.970000
CVE-2024-41856,0,0,3ada3c844b80f59e9ae3d36b6d9ea2fc582aae7cd70642ad9bb38d1ef0f68cd7,2024-09-13T09:15:08.907000
CVE-2024-41857,0,0,50f055e4d322cca7cfcdc03163d34be18b0ce9dbd4f99daaba587938d81ba13c,2024-09-13T14:06:04.777000
CVE-2024-41857,0,1,18eb26e544512ac7a85d3a84aabcc5c6bdc719da2402fd3705a1c91e30e01499,2024-09-16T13:18:35.007000
CVE-2024-41858,0,0,fc4155e173605a091bf114883179b8d0604e870052e7a0c7c1f11f2b340c3a75,2024-08-14T13:00:37.107000
CVE-2024-41859,0,0,53bf4aeb143d9af2209be69a1a50fd4315b77e19bdf2dd5873464dd453800711,2024-09-13T16:53:51.707000
CVE-2024-4186,0,0,c07cd0df6ca0a9d2dc3c3ba29e1f05004c0a2ac49601b699a13f07e112f9c5ca,2024-05-07T13:39:32.710000
@ -257856,14 +257857,14 @@ CVE-2024-41863,0,0,5218352b95081c6795db623527af60036ab1b1d152dab66fc1f92aa7277f6
CVE-2024-41864,0,0,59e830b96a597bc93dcda9cbef385e1fdf95773045c5f29bc0bb9381e7cb3adf,2024-08-14T18:20:36.710000
CVE-2024-41865,0,0,f8ad10055028d3dfea657c3bbd8eb5b04fbd0fb8a1dcfeb71cfad07c3751149a,2024-08-19T18:44:04.163000
CVE-2024-41866,0,0,b06a8427315afa6008377ed5627aeeeb7bf41e3428063742d7f1fa0c27e9a784,2024-08-19T18:44:22.577000
CVE-2024-41867,0,0,f66ef4670fa55fe5c88354a43f0c4bac51e4738062289411b59c2f57cb9b1528,2024-09-13T17:27:00.437000
CVE-2024-41867,0,1,0b44a5cfeee3dcc50283505e9313394317205be34bd484508e6768cab06aa764,2024-09-16T13:15:10.550000
CVE-2024-41868,0,0,9ed35570b699495dabec3e139e5a3960675f66b313ebafc76293b6d08d7965ae,2024-09-11T16:26:11.920000
CVE-2024-41869,0,0,2f407549a1d394a9da8aa6ea98d54c4d268ef6c6e721f436fdcf391b141a4e5a,2024-09-13T14:06:04.777000
CVE-2024-4187,0,0,59e73639acf686e0c0fe315911f8a7728baeee66452eb3299dce70437688c22e,2024-08-15T14:45:27.797000
CVE-2024-41870,0,1,9b01b7c9f042396dbf79af8b93d8f9ed4d9baaa67ad3cdd01d33224e4d103bd0,2024-09-16T10:32:09.480000
CVE-2024-41871,0,1,7361edfbeb22d7d7bfa64e2688ed95b91ddb91f2fd10757bd1ecd4129da42acc,2024-09-16T10:36:14.100000
CVE-2024-41872,0,1,77099e47a59b44ad290d9682c16a32daf086e620d05bcdd0df2711e12d10f852,2024-09-16T11:16:26.797000
CVE-2024-41873,0,1,797c0bdca82ee40430bea16521a62514c45c70fc9a1070a7b9e0bce9bba32d6f,2024-09-16T11:39:40.703000
CVE-2024-41870,0,0,9b01b7c9f042396dbf79af8b93d8f9ed4d9baaa67ad3cdd01d33224e4d103bd0,2024-09-16T10:32:09.480000
CVE-2024-41871,0,0,7361edfbeb22d7d7bfa64e2688ed95b91ddb91f2fd10757bd1ecd4129da42acc,2024-09-16T10:36:14.100000
CVE-2024-41872,0,0,77099e47a59b44ad290d9682c16a32daf086e620d05bcdd0df2711e12d10f852,2024-09-16T11:16:26.797000
CVE-2024-41873,0,0,797c0bdca82ee40430bea16521a62514c45c70fc9a1070a7b9e0bce9bba32d6f,2024-09-16T11:39:40.703000
CVE-2024-41874,0,0,7360dfce3507425046ff4011455f7487f7517d5dd77ae435f5a0fd61261fb9e1,2024-09-13T16:57:52.437000
CVE-2024-41875,0,0,57025102705afb3f64ed9ca037e457d95a3751eb418da98d63205817feaa131c,2024-08-27T14:45:28.927000
CVE-2024-41876,0,0,2e90360efc316da37d37f6761f555864c070f8e4b10b19f1a9af1a905273c5a3,2024-08-27T14:45:40.377000
@ -258052,7 +258053,7 @@ CVE-2024-42119,0,0,3b09a70cb81c3688ecf4ef2c0b41ada572909d540512a1efd4ff9fade8603
CVE-2024-4212,0,0,5766e7a6d4fbc74d070c835b010281385271ca336cbd1f30b8212e7da6caf8b5,2024-07-24T20:24:31.537000
CVE-2024-42120,0,0,692318adb3e3bc8ee3327c58f85ce2f0a478d2c89b683bc854fcb9227f9c337f,2024-07-30T13:32:45.943000
CVE-2024-42121,0,0,c5e25bbf3c91bf25bcaa878ff72039e7afac3b1d4b647d19649fd2a0460d64a7,2024-07-30T13:32:45.943000
CVE-2024-42122,0,0,07636c6d018c43330638e040c69e6c928d01b67ef1109981b11b4f603ab119b9,2024-07-30T13:32:45.943000
CVE-2024-42122,0,1,f1aff74be0c8f2add47447c4fc3e19fab36b7330d7c3102774809c41ed96d349,2024-09-16T13:49:27.837000
CVE-2024-42123,0,0,b9b512a4ac6ec22c9bc1d525d88b6db6a1f01966b278ee4c7ad03b69a5e85a9c,2024-08-23T14:13:05.580000
CVE-2024-42124,0,0,fac73a1c1853cbd61b92ef3a19f9f7f6792c7fb13275a38cdccfee119802151b,2024-07-30T13:32:45.943000
CVE-2024-42125,0,0,623dede6e7a867ee2a4793db37771abbdecba1b4f67d59179866a3aa7e89529c,2024-07-30T13:32:45.943000
@ -258062,12 +258063,12 @@ CVE-2024-42128,0,0,b8155b78412ff52ea13f2f9c045e69435a1427918f79cc2d9ffa4f93326cb
CVE-2024-42129,0,0,46d5c1746954fb4a02665ba978862f55732f5e2a31e0452c7452c5970d864bc8,2024-07-30T13:32:45.943000
CVE-2024-4213,0,0,4af0c7bd943d1e93f39eb470b6c791f96149e0a985dfe97529e29ee085d7cdf1,2024-05-14T16:11:39.510000
CVE-2024-42130,0,0,c0bf8d6705687d288b22cfe1365e7dce03a7394108689b183e481d0372b856b1,2024-07-30T13:32:45.943000
CVE-2024-42131,0,0,01e3726ef1b21b8b7d22eb92e75ca9e3ebe0d946e89880751112b47c2546aec8,2024-08-19T05:15:06.990000
CVE-2024-42131,0,1,1fc726640575e0811e1b3c041d4cb29883ebb3d10c99e884209ec11d92467b7b,2024-09-16T13:52:37.707000
CVE-2024-42132,0,0,2f4d4ac80a7ca69cb3eacfe6d114a16e8e41ad14f4a3bea559c41eac32d31205,2024-07-30T13:32:45.943000
CVE-2024-42133,0,0,774a28cde62878f7ee006cd2f913f8ca89836e6fe0716586b68a30db7f392c96,2024-07-30T13:32:45.943000
CVE-2024-42134,0,0,b964a563fe31ebeed4bd473713e48eeb088a769f2eb83d9ee50ca797235dadc8,2024-07-30T13:32:45.943000
CVE-2024-42135,0,0,95535ff1104be73e170d22a3b1160f93b97e02e7d284b345a7500b690d2a22b4,2024-07-30T13:32:45.943000
CVE-2024-42136,0,0,490319a19d52e68dfbc14d6cd4c94243577e7db594ab1c07d087e7f01f243dfe,2024-07-30T13:32:45.943000
CVE-2024-42136,0,1,f68874d27ec595bdafb89782162fb7e74f20ba1d0a36e1946b5c43cc39f8ab55,2024-09-16T13:54:41.923000
CVE-2024-42137,0,0,3c90bc025787395b043ed09b34a54ce76c5d6cccd91ce31c0b66777180d70155,2024-07-30T13:32:45.943000
CVE-2024-42138,0,0,66bd3f3c0b6409d31b381c30c4907ff7a898b21b08eef89ddd720c05b185a24c,2024-07-30T13:32:45.943000
CVE-2024-42139,0,0,3bd10747b9eb55753638e6583d2c7f6f99447a69b235be4a494e06bae42b0e90,2024-07-30T13:32:45.943000
@ -259283,7 +259284,7 @@ CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239
CVE-2024-44795,0,0,2459dd83721718e1502976fd61ac15b289981ba6005e92e7c41d33d2e6b740f8,2024-09-05T18:26:41.490000
CVE-2024-44796,0,0,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d3eb,2024-09-06T23:35:04.340000
CVE-2024-44797,0,0,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000
CVE-2024-44798,0,0,daeca766d0d39cbca86ef2c14287a406cb8774d27ebcaf0d8177010b915f67dd,2024-09-13T18:35:16.920000
CVE-2024-44798,0,1,52c8ec12ad71f918e4568fe73d09fd21beb43d7a2334844f4fb68f12913c2757,2024-09-16T13:19:38.393000
CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000
CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000
CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000
@ -259399,7 +259400,7 @@ CVE-2024-44992,0,0,97ef2dd55e50d283d25cb375a53b1b9e4ced48005c60f251c68cb5bcbe063
CVE-2024-44993,0,0,83c20e8055b5f920fb8768cd48edd51dee49d28189ff000654e3b9aceca5b744,2024-09-06T16:28:49.180000
CVE-2024-44994,0,0,077657e93a1c5153a567e0a622109d3f9d5a912137e3785d416b4a628cffcce8,2024-09-05T12:53:21.110000
CVE-2024-44995,0,0,197459857248206995b34d4054170be94eac94a6c36641a79619b26d39e0858c,2024-09-15T18:15:34.540000
CVE-2024-44996,0,0,07d1c2049feb8c8cdddcc77bbee2292d52cbb73558d4653632cabd30f6011a65,2024-09-05T12:53:21.110000
CVE-2024-44996,0,1,e18967c4ab698ef45683375a8ae0d2c16fa28828098e111c232677530888b1a3,2024-09-16T12:21:47.370000
CVE-2024-44997,0,0,e3f86ed864785c36fda99f43974c4da9bece309546ba3123a45070f74f032602,2024-09-06T16:28:25.183000
CVE-2024-44998,0,0,40b25cb37bb885401e69911af67b231d0343f60d965743732a0c70cf3b146611,2024-09-06T16:28:16
CVE-2024-44999,0,0,e380bf728dfa26ece10d7874c8b05bc3764e80af89ddf0e41877fbdc49e455a1,2024-09-06T16:27:51.890000
@ -259525,7 +259526,7 @@ CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96
CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000
CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000
CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000
CVE-2024-45203,0,0,109f51a011fa1642da43dbaccac6517b52cbe9844a1fb856b301f3307c30db96,2024-09-09T13:03:38.303000
CVE-2024-45203,0,1,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000
CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000
CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000
CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000
@ -259803,9 +259804,11 @@ CVE-2024-4639,0,0,94440a0f589feefd6793182562f7b7ad1826370c3af8edc8bb387cc054e890
CVE-2024-4640,0,0,ede9dd193cee950797dd9845264350c5c8b26092d45c659f033f0e3467a4741b,2024-06-25T12:24:17.873000
CVE-2024-4641,0,0,26f5ee90dac1a00dab85ac22bc0a097907866fe1e7f2d9d37bb83633d14c8f26,2024-06-25T12:24:17.873000
CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000
CVE-2024-46424,1,1,907ef71c5244e7673fae5edc0d546987dcfb708da5efe075f853d18a45970811,2024-09-16T13:15:10.760000
CVE-2024-4643,0,0,e0d3f81442e9e4f0746a278d66a7c607383f7f5939cd80bfd5eea7a68cf6b0a2,2024-08-02T12:59:43.990000
CVE-2024-4644,0,0,d1e68c64f589f5437d8d9c3d73ea2c78a66dff558140ffcb6e63a6c5713f6378,2024-06-04T19:20:44.287000
CVE-2024-4645,0,0,168f1477081561f078c10d8fc1cf3cc1223bff538993570e41562bd0f1dfcc62,2024-05-29T20:15:13.240000
CVE-2024-46451,1,1,69fcf155081fec84c2cb791f98ea5b6a7a26f93aa2823ae554f1daf912c3b8d1,2024-09-16T13:15:10.847000
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000
@ -259890,6 +259893,7 @@ CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257
CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000
CVE-2024-46918,0,0,c81638d5ca63c19490f644512349dd49baf06add9619db431c68631e601d23e2,2024-09-15T20:15:02.390000
CVE-2024-4693,0,0,e3d9266511ed640ea0a2750bbbe8d9b8b25eda5f77b693324e75ee95f4a7a307,2024-05-14T16:11:39.510000
CVE-2024-46937,1,1,f786d5e6cfd5a802574fdc6689e931ed489fd73bd9627aef4e1a74ed889f1ecb,2024-09-16T13:15:10.917000
CVE-2024-46938,0,0,a5c9e90ab7d92d7718c097193345a29e65c16e9e9d7ee02386aee1371e9ab85a,2024-09-15T22:15:09.830000
CVE-2024-46942,0,0,6b93d00b6dfeb694fcbe84011b71090f470c3492de64daa71f84a4174e08c3a6,2024-09-15T23:15:11.033000
CVE-2024-46943,0,0,6c5e76688d51eaeb0396635653b39855a3726df8877ff6ebb136df51868058d7,2024-09-15T23:15:11.100000
@ -259897,7 +259901,7 @@ CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f9
CVE-2024-46958,0,0,5bb8b70f9a3b2dac1a28577291e993242e94ab2fc386c8a78850212ad85cb736,2024-09-16T02:15:01.803000
CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000
CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000
CVE-2024-46970,1,1,2a93e963cca84374e55ab3a313f44cb6c17fec19660891300ea157f8ba006f3c,2024-09-16T11:15:13.540000
CVE-2024-46970,0,0,2a93e963cca84374e55ab3a313f44cb6c17fec19660891300ea157f8ba006f3c,2024-09-16T11:15:13.540000
CVE-2024-4698,0,0,9dba1ffb097faf0537551ac7612916f547965c7b253baf1637388ba1ee83ae86,2024-05-20T13:00:34.807000
CVE-2024-4699,0,0,094a3293d1ad6c00b8f42deb1643b829befd633ab0dcef49a183da331debaad7,2024-08-06T19:15:57.580000
CVE-2024-4700,0,0,fa1a582bbd6e4a675ead2d89728236d2ca7c92c15fe998cffa14cb24a4febb9d,2024-05-21T12:37:59.687000
@ -261022,9 +261026,9 @@ CVE-2024-5983,0,0,e453627058811c95a94483155fc84de41a398cc957b204d5491729f060f018
CVE-2024-5984,0,0,89f42ffe1afdcb4773f46da639d99adec4fd2f40289999f555344358fcd06ab2,2024-07-24T02:37:30.717000
CVE-2024-5985,0,0,4b7f0c13c1d049ea5b2816f8e8132ec8aee9a2fb74d5d00bf96c05e553a08b22,2024-07-24T02:34:43.900000
CVE-2024-5987,0,0,80b95041335e9c6c0cba79b97b2237a77b412b6b9e4ce7d678d97adc1c3af521,2024-08-29T13:25:27.537000
CVE-2024-5988,0,0,61330fc134e62899e1bd151b38c42dacd0ac5fd49bf276cd259a0ec9156efc6d,2024-06-25T18:50:42.040000
CVE-2024-5989,0,0,4f6916da6dadcee98f1ed324cce1026f703428fc4be42544dff05ec628ea7ab9,2024-06-25T18:50:42.040000
CVE-2024-5990,0,1,74b820888dc43d4b3514a3bc2da36badf33f6d5fcb5914b2d81537c9a36b892f,2024-09-16T11:58:38.363000
CVE-2024-5988,0,1,7d5e21f2246cb887caea04ab5932ae9084dbb2197bf94e4f89acc00a5f33cee9,2024-09-16T12:07:20.767000
CVE-2024-5989,0,1,dfd3cc5d0cecb773f338d5d550b90f0da986feaa9901700c9172dabb85cfbdc0,2024-09-16T12:08:03.447000
CVE-2024-5990,0,0,74b820888dc43d4b3514a3bc2da36badf33f6d5fcb5914b2d81537c9a36b892f,2024-09-16T11:58:38.363000
CVE-2024-5991,0,0,fe91480125318e1887501309371643eaea8c60c621bd042cca787c9779dab434,2024-09-06T22:51:41.470000
CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000
CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000
@ -261104,7 +261108,7 @@ CVE-2024-6078,0,0,a48aa92a89b3d2f828f8a341ad2ce6a914a21f3587846f530cf16dc8ed30ed
CVE-2024-6079,0,0,a625435aeb66a78a45b154461c249f77137a161767aad8b8e49464f09120384a,2024-08-14T02:07:05.410000
CVE-2024-6080,0,0,2ad08bb329dff2f5ca525640c8314d702413aec2eadc0af776454094a000e617,2024-08-06T07:15:46.460000
CVE-2024-6082,0,0,013046d87182f03b6cbc3b5958c2d5ce3b9ca55b4984041383e50b43bd3564b5,2024-09-13T18:29:30.637000
CVE-2024-6083,0,0,f2e58ae7634ac284d92da64e0d5cf2fef17119bd56b0d8f986a960d57e2ccd76,2024-06-20T12:44:01.637000
CVE-2024-6083,0,1,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5c9,2024-09-16T13:21:53.467000
CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000
CVE-2024-6086,0,0,47215fd632ba621ffeef67af3acb9b5d4df100629d5a1e80c438d45f990f6540,2024-06-27T19:25:12.067000
@ -262643,7 +262647,7 @@ CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf56
CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000
CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000
CVE-2024-8188,0,0,bf948f939efb55d2700c81c8fb5cefa3fc31038462bfeb7ac3e161719faca6b2,2024-08-26T20:15:08.760000
CVE-2024-8190,0,0,1b4f3d19d28f8ddd235c291a51cbbe5f007508b829e341c23a7d4e7337c2875c,2024-09-14T01:00:01.107000
CVE-2024-8190,0,1,b93c21c7e68b63ff1a05425b35ca8850e4059906d4d0de60465090c0528ebe7c,2024-09-16T13:44:18.173000
CVE-2024-8191,0,0,af2edabb2340196237a0a5f2ba571c0c8b12c14869cbef7778e55b204fc2e4fe,2024-09-12T21:50:39.507000
CVE-2024-8193,0,0,2f2a75e240e354e8f0e14f5f9d5e6a02eb535e669399224b9d10e7e4f72f0d51,2024-08-30T15:52:33.747000
CVE-2024-8194,0,0,0e377807b4cb936d43f2e66a722c2d573026df321eb087fd34789423400e78c7,2024-08-30T16:34:53.210000
@ -262828,7 +262832,7 @@ CVE-2024-8564,0,0,2112c36914e39f842fdc3749656e81cb1e01d81d9daf6872738042abc963e7
CVE-2024-8565,0,0,923e87f30584d77b1eb045cc17fb206bfc48a80ad2f8f1ccf84c8acb9bd2c037,2024-09-10T15:40:31.103000
CVE-2024-8566,0,0,b697d2f2d8dab369399702d62c565693e4b82d2b91e05adb154f01cb1c8382ab,2024-09-10T15:42:03.630000
CVE-2024-8567,0,0,49659b49a666f0018bb5744af39b0142ede6c7f436b35449bf81fb3596426b7c,2024-09-10T15:44:31.283000
CVE-2024-8568,0,0,7f519e237841b4a30a8e4620ee604c17282a68089d0fba94c8e6be9a97cc3ef8,2024-09-09T13:03:38.303000
CVE-2024-8568,0,1,b74d62474c16c5c803159e182361ae52db782b717cfac5a6615da66c435f9a25,2024-09-16T13:22:31.087000
CVE-2024-8569,0,0,aaed184af7e4134cfe1a8ea6b899c2f66a4c7610f73679d8a682587becf0ed8f,2024-09-10T15:45:24.237000
CVE-2024-8570,0,0,bc68640c6c75a567a3dc53e9637ef970c70443205716d3966201c32a94304c8e,2024-09-11T16:07:35.400000
CVE-2024-8571,0,0,5cce23306b6ec0516f16b428475d85317f6d2cd8394be676570b33092f0a1f8e,2024-09-11T16:05:34.220000
@ -262845,7 +262849,7 @@ CVE-2024-8582,0,0,929f6a4eccde08c2101d65daf5f8492ec1f09acd5b572ce0e385ece7e31d53
CVE-2024-8583,0,0,1afec7fcc1c6ffb2f3d78350dc0e6e06f846d7be3a9c3c1e504a570641936171,2024-09-10T15:49:29.103000
CVE-2024-8584,0,0,f2bfb960200b98001a53756524046d766d8acbe67d6e46dee6e73d41f4473ab7,2024-09-13T10:15:17.263000
CVE-2024-8585,0,0,e17d232ed4a4084d03c537d4bccfc260c2e2f4d1c4cbcfdf334e4783c2ee46f9,2024-09-11T15:53:35.693000
CVE-2024-8586,0,0,ea96f63ac75acb4f2bd0b58c4c06a252405d0d0a14b2f462dd867d5036d1da95,2024-09-09T13:03:38.303000
CVE-2024-8586,0,1,23468ff8a51a574afa4ccf040ef08b97cdacf6166e19d71118517f5f68bba004,2024-09-16T13:28:03.400000
CVE-2024-8601,0,0,7acc310f49af8e0e61a818aa0442f44a6d68bdb260bd22310620d7d1eda33555,2024-09-09T13:03:38.303000
CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99bf,2024-09-10T19:14:57.017000
CVE-2024-8605,0,0,2abdfde3fad91633012e2fbc4796f8bda82aa939ecbbf9c2890b650d01ffd42b,2024-09-13T15:31:52.140000

Can't render this file because it is too large.