Auto-Update: 2024-09-28T23:55:17.196918+00:00

This commit is contained in:
cad-safe-bot 2024-09-28 23:58:16 +00:00
parent fb30d2c5d5
commit e808d0e7b8
39 changed files with 509 additions and 201 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-31403",
"sourceIdentifier": "cna@sap.com",
"published": "2023-11-14T01:15:07.413",
"lastModified": "2023-11-20T19:51:15.823",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:02.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.\n\n"
"value": "SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability."
},
{
"lang": "es",
@ -61,7 +61,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
@ -71,12 +71,12 @@
]
},
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-863"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-32114",
"sourceIdentifier": "cna@sap.com",
"published": "2023-06-13T03:15:09.393",
"lastModified": "2023-06-16T18:40:36.677",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:02.783",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver (Change and Transport System) - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an authenticated user with admin privileges to maliciously run a benchmark program repeatedly in intent to slowdown or make the server unavailable which may lead to a limited impact on Availability with No impact on Confidentiality and Integrity of the application.\n\n"
"value": "SAP NetWeaver (Change and Transport System) - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an authenticated user with admin privileges to maliciously run a benchmark program repeatedly in intent to slowdown or make the server unavailable which may lead to a limited impact on Availability with No impact on Confidentiality and Integrity of the application."
}
],
"metrics": {
@ -58,11 +58,11 @@
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-33990",
"sourceIdentifier": "cna@sap.com",
"published": "2023-07-11T03:15:09.657",
"lastModified": "2023-07-19T12:57:09.040",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:02.930",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP SQL Anywhere\u00a0- version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted.\n\n"
"value": "SAP SQL Anywhere\u00a0- version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted."
}
],
"metrics": {
@ -60,6 +60,10 @@
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-277"
},
{
"lang": "en",
"value": "CWE-732"

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-35870",
"sourceIdentifier": "cna@sap.com",
"published": "2023-07-11T03:15:09.800",
"lastModified": "2023-07-19T13:35:31.873",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.063",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.\n\n"
"value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable."
}
],
"metrics": {
@ -57,22 +57,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
"value": "CWE-732"
}
]
},
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "NVD-CWE-Other"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-35874",
"sourceIdentifier": "cna@sap.com",
"published": "2023-07-11T03:15:10.050",
"lastModified": "2023-07-19T17:13:20.070",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.187",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability.\n\n"
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability."
}
],
"metrics": {
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-287"
"value": "CWE-306"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-36919",
"sourceIdentifier": "cna@sap.com",
"published": "2023-07-11T03:15:10.237",
"lastModified": "2023-07-18T18:17:10.787",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.313",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure.\n\n"
"value": "In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure."
}
],
"metrics": {
@ -57,22 +57,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-116"
"value": "CWE-213"
}
]
},
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-644"
"value": "CWE-116"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-37483",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:17.313",
"lastModified": "2023-08-09T18:21:52.827",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP PowerDesigner - version 16.7, has improper access control which might allow an unauthenticated attacker to run arbitrary queries against the back-end database via Proxy.\n\n"
"value": "SAP PowerDesigner - version 16.7, has improper access control which might allow an unauthenticated attacker to run arbitrary queries against the back-end database via Proxy."
}
],
"metrics": {
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-306"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-37486",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:17.907",
"lastModified": "2023-08-15T15:15:07.713",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.550",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions\u00a0SAP Commerce\u00a0(OCC API) - versions HY_COM 2105, HY_COM 2205, COM_CLOUD 2211, endpoints allow an attacker to access information which would otherwise be restricted. On successful exploitation there could be a high impact on confidentiality with no impact on integrity and availability of the application.\n\n"
"value": "Under certain conditions\u00a0SAP Commerce\u00a0(OCC API) - versions HY_COM 2105, HY_COM 2205, COM_CLOUD 2211, endpoints allow an attacker to access information which would otherwise be restricted. On successful exploitation there could be a high impact on confidentiality with no impact on integrity and availability of the application."
}
],
"metrics": {
@ -57,22 +57,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-524"
}
]
},
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-37487",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.247",
"lastModified": "2023-08-09T18:21:30.300",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.670",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledge perform certain operation to access unintended data over the network which could lead to high impact on confidentiality with no impact on integrity and availability of the application\n\n"
"value": "SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledge perform certain operation to access unintended data over the network which could lead to high impact on confidentiality with no impact on integrity and availability of the application"
}
],
"metrics": {
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-497"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-37491",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.840",
"lastModified": "2023-08-09T18:20:38.800",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.\n\n"
"value": "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable."
}
],
"metrics": {
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-285"
"value": "CWE-863"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-37492",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:18.993",
"lastModified": "2023-08-09T18:20:16.060",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:03.890",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack.\n\n"
"value": "SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack."
}
],
"metrics": {
@ -72,7 +72,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "CWE-863"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-39436",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:19.150",
"lastModified": "2023-08-09T18:19:29.723",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:04.010",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Supplier Relationship Management -versions 600, 602, 603, 604, 605, 606, 616, 617, allows an unauthorized attacker to discover information relating to\u00a0SRM within Vendor Master Data for Business Partners replication functionality.This information could be used to allow the attacker to specialize their attacks against\u00a0SRM.\n\n"
"value": "SAP Supplier Relationship Management -versions 600, 602, 603, 604, 605, 606, 616, 617, allows an unauthorized attacker to discover information relating to\u00a0SRM within Vendor Master Data for Business Partners replication functionality.This information could be used to allow the attacker to specialize their attacks against\u00a0SRM."
}
],
"metrics": {
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-306"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-39438",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-15T17:15:12.627",
"lastModified": "2023-08-22T17:32:59.287",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:04.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.\n"
"value": "A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses."
},
{
"lang": "es",
@ -61,7 +61,7 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
@ -71,20 +71,12 @@
]
},
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-424"
},
{
"lang": "en",
"value": "CWE-862"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-39439",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:19.793",
"lastModified": "2023-08-15T15:28:19.137",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:04.243",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase.\n\n"
"value": "SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase."
}
],
"metrics": {
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-1390"
"value": "CWE-258"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-39440",
"sourceIdentifier": "cna@sap.com",
"published": "2023-08-08T01:15:20.100",
"lastModified": "2023-08-09T18:22:07.123",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:04.350",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In SAP BusinessObjects Business Intelligence - version 420, If a user logs in to a particular program, under certain specific conditions memory might not be cleared up properly, due to which attacker might be able to get access to user credentials. For a successful attack, the attacker needs to have local access to the system. There is no impact on availability and integrity.\n\n"
"value": "In SAP BusinessObjects Business Intelligence - version 420, If a user logs in to a particular program, under certain specific conditions memory might not be cleared up properly, due to which attacker might be able to get access to user credentials. For a successful attack, the attacker needs to have local access to the system. There is no impact on availability and integrity."
}
],
"metrics": {
@ -62,7 +62,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-312"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-40309",
"sourceIdentifier": "cna@sap.com",
"published": "2023-09-12T03:15:12.073",
"lastModified": "2023-09-15T17:05:27.130",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:04.460",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired,\u00a0an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.\n\n"
"value": "SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired,\u00a0an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "CWE-863"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-40622",
"sourceIdentifier": "cna@sap.com",
"published": "2023-09-12T03:15:12.813",
"lastModified": "2023-09-13T14:45:47.617",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T22:15:04.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability.\n\n"
"value": "SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-42475",
"sourceIdentifier": "cna@sap.com",
"published": "2023-10-10T02:15:11.020",
"lastModified": "2023-10-11T19:14:53.293",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T23:15:11.563",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality.\n\n"
"value": "The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-209"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-42481",
"sourceIdentifier": "cna@sap.com",
"published": "2023-12-12T01:15:11.023",
"lastModified": "2023-12-13T23:54:39.960",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T23:15:11.717",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In SAP Commerce Cloud - versions HY_COM 1905, HY_COM 2005, HY_COM2105, HY_COM 2011, HY_COM 2205, COM_CLOUD 2211, a locked B2B user can misuse the forgotten password functionality to un-block his user account again and re-gain access if SAP Commerce Cloud - Composable Storefront is used as storefront, due to weak access controls in place. This leads to a considerable impact on confidentiality and integrity.\n\n"
"value": "In SAP Commerce Cloud - versions HY_COM 1905, HY_COM 2005, HY_COM2105, HY_COM 2011, HY_COM 2205, COM_CLOUD 2211, a locked B2B user can misuse the forgotten password functionality to un-block his user account again and re-gain access if SAP Commerce Cloud - Composable Storefront is used as storefront, due to weak access controls in place. This leads to a considerable impact on confidentiality and integrity."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-284"
"value": "CWE-640"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45038",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2024-09-06T17:15:12.300",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-28T23:51:34.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@ -41,7 +61,7 @@
},
"weaknesses": [
{
"source": "security@qnapsecurity.com.tw",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -49,12 +69,44 @@
"value": "CWE-287"
}
]
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:music_station:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.4.0",
"matchCriteriaId": "327BDB3C-02C9-4D9F-AF8B-0F1EAAD062BF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-25",
"source": "security@qnapsecurity.com.tw"
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47563",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2024-09-06T17:15:12.513",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-28T23:47:40.683",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@ -55,10 +75,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.8.2",
"matchCriteriaId": "2552122C-93E4-471B-A5BE-D3B931836217"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-24",
"source": "security@qnapsecurity.com.tw"
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-49578",
"sourceIdentifier": "cna@sap.com",
"published": "2023-12-12T02:15:07.283",
"lastModified": "2023-12-15T14:32:38.473",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T23:15:11.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity\u00a0 of the application.\n\n"
"value": "SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity\u00a0 of the application."
},
{
"lang": "es",
@ -61,22 +61,22 @@
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-732"
}
]
},
{
"source": "cna@sap.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-49580",
"sourceIdentifier": "cna@sap.com",
"published": "2023-12-12T02:15:07.493",
"lastModified": "2023-12-19T14:50:39.843",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T23:15:11.977",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP GUI for Windows\u00a0and\u00a0SAP GUI for Java - versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability, e.g. also increasing the response times of the AS ABAP.\n\n"
"value": "SAP GUI for Windows\u00a0and\u00a0SAP GUI for Java - versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability, e.g. also increasing the response times of the AS ABAP."
},
{
"lang": "es",
@ -76,7 +76,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-49583",
"sourceIdentifier": "cna@sap.com",
"published": "2023-12-12T02:15:07.920",
"lastModified": "2024-01-09T02:15:45.140",
"lastModified": "2024-09-28T23:15:12.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Node.js] @sap/xssec - versions < 3.6.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Node.js] @sap/xssec - versions < 3.6.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-749"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50360",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2024-09-06T17:15:12.710",
"lastModified": "2024-09-09T13:03:38.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-09-28T23:44:50.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.8.2",
"matchCriteriaId": "2552122C-93E4-471B-A5BE-D3B931836217"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-24-24",
"source": "security@qnapsecurity.com.tw"
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-50422",
"sourceIdentifier": "cna@sap.com",
"published": "2023-12-12T02:15:08.587",
"lastModified": "2024-01-09T02:15:45.420",
"lastModified": "2024-09-28T23:15:12.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Java] cloud-security-services-integration-library) -\u00a0versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Java] cloud-security-services-integration-library) -\u00a0versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-749"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-50423",
"sourceIdentifier": "cna@sap.com",
"published": "2023-12-12T02:15:08.797",
"lastModified": "2023-12-15T16:53:22.867",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T23:15:12.360",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Python]\u00a0sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Python]\u00a0sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-749"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-50424",
"sourceIdentifier": "cna@sap.com",
"published": "2023-12-12T03:15:07.100",
"lastModified": "2023-12-15T16:53:04.417",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T23:15:12.477",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n"
"value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-749"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-21736",
"sourceIdentifier": "cna@sap.com",
"published": "2024-01-09T02:15:45.593",
"lastModified": "2024-01-19T17:30:01.407",
"vulnStatus": "Analyzed",
"lastModified": "2024-09-28T23:15:12.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application.\n\n"
"value": "SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application."
},
{
"lang": "es",
@ -66,7 +66,7 @@
"description": [
{
"lang": "en",
"value": "CWE-285"
"value": "CWE-863"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-24740",
"sourceIdentifier": "cna@sap.com",
"published": "2024-02-13T03:15:08.987",
"lastModified": "2024-02-13T14:01:40.577",
"lastModified": "2024-09-28T23:15:12.777",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions,\u00a0allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.\n\n"
"value": "SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions,\u00a0allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-25644",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:49.567",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-09-28T23:15:12.907",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n"
"value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-25645",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:49.780",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-09-28T23:15:13.020",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.\n\n"
"value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-25646",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:48.343",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-09-28T23:15:13.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n"
"value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-28163",
"sourceIdentifier": "cna@sap.com",
"published": "2024-03-12T01:15:50.390",
"lastModified": "2024-03-12T12:40:13.500",
"lastModified": "2024-09-28T23:15:13.217",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n"
"value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application."
},
{
"lang": "es",
@ -42,11 +42,11 @@
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
"value": "CWE-732"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-30218",
"sourceIdentifier": "cna@sap.com",
"published": "2024-04-09T01:15:50.570",
"lastModified": "2024-04-09T12:48:04.090",
"lastModified": "2024-09-28T23:15:13.313",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n"
"value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability."
},
{
"lang": "es",
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "CWE-605"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33004",
"sourceIdentifier": "cna@sap.com",
"published": "2024-05-14T16:17:13.957",
"lastModified": "2024-07-03T01:57:23.963",
"lastModified": "2024-09-28T23:15:13.420",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -40,9 +40,19 @@
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-524"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"type": "Primary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-9318",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-09-28T23:15:13.530",
"lastModified": "2024-09-28T23:15:13.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in SourceCodester Advocate Office Management System 1.0. Affected by this issue is some unknown functionality of the file /control/activate.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20activate.php%20error-based%20SQL%20Injection%20Vulnerability.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.278822",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.278822",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.412749",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-09-28T22:00:17.441432+00:00
2024-09-28T23:55:17.196918+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-09-28T21:15:10.783000+00:00
2024-09-28T23:51:34.580000+00:00
```
### Last Data Feed Release
@ -33,21 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
264098
264099
```
### CVEs added in the last Commit
Recently added CVEs: `2`
Recently added CVEs: `1`
- [CVE-2024-9316](CVE-2024/CVE-2024-93xx/CVE-2024-9316.json) (`2024-09-28T20:15:02.280`)
- [CVE-2024-9317](CVE-2024/CVE-2024-93xx/CVE-2024-9317.json) (`2024-09-28T21:15:10.783`)
- [CVE-2024-9318](CVE-2024/CVE-2024-93xx/CVE-2024-9318.json) (`2024-09-28T23:15:13.530`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `36`
- [CVE-2023-39436](CVE-2023/CVE-2023-394xx/CVE-2023-39436.json) (`2024-09-28T22:15:04.010`)
- [CVE-2023-39438](CVE-2023/CVE-2023-394xx/CVE-2023-39438.json) (`2024-09-28T22:15:04.123`)
- [CVE-2023-39439](CVE-2023/CVE-2023-394xx/CVE-2023-39439.json) (`2024-09-28T22:15:04.243`)
- [CVE-2023-39440](CVE-2023/CVE-2023-394xx/CVE-2023-39440.json) (`2024-09-28T22:15:04.350`)
- [CVE-2023-40309](CVE-2023/CVE-2023-403xx/CVE-2023-40309.json) (`2024-09-28T22:15:04.460`)
- [CVE-2023-40622](CVE-2023/CVE-2023-406xx/CVE-2023-40622.json) (`2024-09-28T22:15:04.610`)
- [CVE-2023-42475](CVE-2023/CVE-2023-424xx/CVE-2023-42475.json) (`2024-09-28T23:15:11.563`)
- [CVE-2023-42481](CVE-2023/CVE-2023-424xx/CVE-2023-42481.json) (`2024-09-28T23:15:11.717`)
- [CVE-2023-45038](CVE-2023/CVE-2023-450xx/CVE-2023-45038.json) (`2024-09-28T23:51:34.580`)
- [CVE-2023-47563](CVE-2023/CVE-2023-475xx/CVE-2023-47563.json) (`2024-09-28T23:47:40.683`)
- [CVE-2023-49578](CVE-2023/CVE-2023-495xx/CVE-2023-49578.json) (`2024-09-28T23:15:11.840`)
- [CVE-2023-49580](CVE-2023/CVE-2023-495xx/CVE-2023-49580.json) (`2024-09-28T23:15:11.977`)
- [CVE-2023-49583](CVE-2023/CVE-2023-495xx/CVE-2023-49583.json) (`2024-09-28T23:15:12.090`)
- [CVE-2023-50360](CVE-2023/CVE-2023-503xx/CVE-2023-50360.json) (`2024-09-28T23:44:50.720`)
- [CVE-2023-50422](CVE-2023/CVE-2023-504xx/CVE-2023-50422.json) (`2024-09-28T23:15:12.223`)
- [CVE-2023-50423](CVE-2023/CVE-2023-504xx/CVE-2023-50423.json) (`2024-09-28T23:15:12.360`)
- [CVE-2023-50424](CVE-2023/CVE-2023-504xx/CVE-2023-50424.json) (`2024-09-28T23:15:12.477`)
- [CVE-2024-21736](CVE-2024/CVE-2024-217xx/CVE-2024-21736.json) (`2024-09-28T23:15:12.587`)
- [CVE-2024-24740](CVE-2024/CVE-2024-247xx/CVE-2024-24740.json) (`2024-09-28T23:15:12.777`)
- [CVE-2024-25644](CVE-2024/CVE-2024-256xx/CVE-2024-25644.json) (`2024-09-28T23:15:12.907`)
- [CVE-2024-25645](CVE-2024/CVE-2024-256xx/CVE-2024-25645.json) (`2024-09-28T23:15:13.020`)
- [CVE-2024-25646](CVE-2024/CVE-2024-256xx/CVE-2024-25646.json) (`2024-09-28T23:15:13.110`)
- [CVE-2024-28163](CVE-2024/CVE-2024-281xx/CVE-2024-28163.json) (`2024-09-28T23:15:13.217`)
- [CVE-2024-30218](CVE-2024/CVE-2024-302xx/CVE-2024-30218.json) (`2024-09-28T23:15:13.313`)
- [CVE-2024-33004](CVE-2024/CVE-2024-330xx/CVE-2024-33004.json) (`2024-09-28T23:15:13.420`)
## Download and Usage

View File

@ -223701,7 +223701,7 @@ CVE-2023-31366,0,0,44bbd1f8a094e73a70261f57615c2508c43003e09aed16040afe9f888e90f
CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000
CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000
CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000
CVE-2023-31403,0,0,d79da3cdab0bc95b4261a818ecab1aa68802fe2ed7e8c31fd9175361f432cd44,2023-11-20T19:51:15.823000
CVE-2023-31403,0,1,5fdd8bee99db50a48168c6cf910fe676e9bca4f466ec47070ce8e0157b59b65a,2024-09-28T22:15:02.433000
CVE-2023-31404,0,0,4a57aeaae211f48ce93cca38338dda9b5c9de161ecf2fe3caf1604ea95d230f7,2023-05-15T17:32:45.030000
CVE-2023-31405,0,0,969cd152ec35e0bebe41113c42f762a1777df1496f01a3cb659d6f147453713f,2023-07-18T18:10:38.967000
CVE-2023-31406,0,0,e6ef06b8d0d2e12fab5898067ddc6638d3129aa25756a52b02fc1cb7d45fb214,2023-05-15T17:32:21.943000
@ -224166,7 +224166,7 @@ CVE-2023-32110,0,0,403939799f39a8ac61e8ea50435741a1b2f2651a1763f256a2753cbe37e9f
CVE-2023-32111,0,0,f01715a3b0bc44a49da48dae37cd3b11e8b9bbed4cc01c89601fc7ba0af4538f,2023-05-15T17:28:48.667000
CVE-2023-32112,0,0,500b473b63c35570e3a0b2dddf442bb4d1a3b8848e942367827f5ea7c50177f7,2023-05-15T17:23:48.290000
CVE-2023-32113,0,0,52ed52d4859a67df002f37ed2aaa4d39ce83f116cf5e2d1969e6d90a53829143,2024-03-19T19:48:16.700000
CVE-2023-32114,0,0,347b9f098c826e77e0ce34a5223cf89c4c2a99f74a9dfe723c619778f1b0bda0,2023-06-16T18:40:36.677000
CVE-2023-32114,0,1,0a15609fb2b5b2d1029997b518de3da87d0e3877573815c744943e8e6b63156e,2024-09-28T22:15:02.783000
CVE-2023-32115,0,0,c3c14f9a6502f271a5b9eb6d48d16bfe36993e42edd597f057b0ecc72ddd5ac5,2023-06-26T13:55:12.110000
CVE-2023-32116,0,0,73b448578f57f99fb38509be1d12572fd9f535b4b34b69d6021322aeae71459e,2023-10-30T16:27:32.430000
CVE-2023-32118,0,0,3a328632555ce7f7c1a25df14024a651316fcd182b26f56fd5747ddd62122166,2023-06-16T03:56:42.987000
@ -225738,7 +225738,7 @@ CVE-2023-33987,0,0,730078fa5315ef4dca20cb30b6fea8294c9b2bb4cc35700a073ffc2a0bfb0
CVE-2023-33988,0,0,5a9c91cc07fd432683ee76f164187371e9c7aa3ffdcf54a0baec998fbca758a9,2023-07-18T18:28:55.847000
CVE-2023-33989,0,0,78a4bfda446152fc81c2aa547105a75bfab9012ec91d4d20afe82139fa563c61,2023-07-19T12:53:57.597000
CVE-2023-3399,0,0,0f6f58d3cae0530810a7d8d7418ee7eb45cc2a247394b7c4ad89aefa7f49c8d5,2023-11-14T18:01:40.643000
CVE-2023-33990,0,0,925b0628e0eeaceb8b87231c989b96f5c904a2815856c1ac4cf31755f81f9f28,2023-07-19T12:57:09.040000
CVE-2023-33990,0,1,429bb9aafe8096479694a62b3f04dad25a8f4d047c435d55613482a4888c9b4c,2024-09-28T22:15:02.930000
CVE-2023-33991,0,0,2c38f74b06b22d20412aca2a54d271209ee9b7d6cb3b275f1c6d85b506b373a3,2023-06-20T16:48:54.673000
CVE-2023-33992,0,0,e0e448a5babd6ef7f5670d3b16701e514ec5e975dff13cd9e1ce223ebcd25efd,2023-07-19T13:24:24.817000
CVE-2023-33993,0,0,3a1592208fe1bf22f9ee2f9110ed0966e9b504175fab9be2c10572f072b5c0b1,2023-08-15T15:09:12.373000
@ -226960,11 +226960,11 @@ CVE-2023-35863,0,0,cbb3608b436941ca40fc8a80428d35db8eb42f5a5a45f413b4802ea90385c
CVE-2023-35866,0,0,6d8702e252316d86b52dcc46d4f25a5da1013c148d3f195460a689452152e596,2024-08-02T17:15:48.717000
CVE-2023-35867,0,0,5db923c7d14791cdd1ab7e9dc94705e30f35cb5d599aa351441dea1555738b42,2023-12-22T20:13:40.507000
CVE-2023-3587,0,0,858fbdf3b83a95a9d9fa2568a9b573917ded232ef7c8c9c0bf0b541a05fd78c3,2023-07-27T19:40:35.700000
CVE-2023-35870,0,0,2127cfe6f687ec9c9413ff129fa6ec0edc6fb0c654c6b0f9c0c780e2fd7d2ecc,2023-07-19T13:35:31.873000
CVE-2023-35870,0,1,921e90eae30dd3932800aee7eba5ddcdccc6ee0964eb09f08d3c88f882a4bf08,2024-09-28T22:15:03.063000
CVE-2023-35871,0,0,d43b3a693b7dc87781f1504dfdc1a0512dc65f88011ecf68fc3feb58581429a6,2023-08-14T14:15:10.587000
CVE-2023-35872,0,0,46efe0a1a61cc48f94c5ffc8323d3526b2f917771157bbd207c0cd13135b8af4,2023-07-19T13:36:59.200000
CVE-2023-35873,0,0,9be398fb5a578d66a8e050b22d237fc4e7262e6c90661c5198282761d7edf667,2023-07-19T15:27:53.343000
CVE-2023-35874,0,0,f65431a0123b9df030788721d69d8bd466646c2fa9b613690a495994b497c061,2023-07-19T17:13:20.070000
CVE-2023-35874,0,1,07d063e56172d4b330873c6a8a0017004b0e9740e74348b8a3a1bf876d0e0de9,2024-09-28T22:15:03.187000
CVE-2023-35876,0,0,d18e0ce61960cccc57bf475a075bb7f424cb1062b297d3699e467aff78c0d9c5,2023-12-28T20:17:35.997000
CVE-2023-35877,0,0,0ed125dbba11615c742d210b81261f0b496018687670d00a2fbc4ade0656a38a,2023-11-16T18:14:43.550000
CVE-2023-35878,0,0,31806b46808d48e1b06bdfff9d6a9d20e621aec43eefb38af128b522c0380e3f,2023-06-27T15:16:31.900000
@ -227818,7 +227818,7 @@ CVE-2023-36915,0,0,5d656d6742cd64232d331d79f144c5195083cbe66f00399e182bec51b9ac8
CVE-2023-36916,0,0,67ac9d41aeea12b3c5abede45e587aaa746d1890bd1ab96299049df166b76c59,2024-04-09T21:15:11.227000
CVE-2023-36917,0,0,63f41b496cca09ca13149b06a529715ca5422dd2b4ca4c74715fb23e43003f71,2023-07-18T17:01:51.703000
CVE-2023-36918,0,0,ce15c2b3b21fc1790596c0ac8f2a6a976b4bc5b08101d2f149737c42c78576b2,2023-07-18T18:18:05.993000
CVE-2023-36919,0,0,e7c8e3207a0198ed48239ab72cc3149687de3ea6b69edfd45837858bf4c8e836,2023-07-18T18:17:10.787000
CVE-2023-36919,0,1,1076e2832e8aa0b910bf4b7db5a2747930ccd90a83d98859980dca73d8d75e3d,2024-09-28T22:15:03.313000
CVE-2023-3692,0,0,d64ea2c78b76086a94b1a5c632af5e2d6ded6ee02b85b4c9f53744c42a27def5,2023-07-27T19:56:48.617000
CVE-2023-36920,0,0,c6aa92f8fc7d3cbbad5f554b81599e99635f832f01ebef5100e7043fe53fad1d,2023-11-08T00:16:23.700000
CVE-2023-36921,0,0,d14eb8e094eb26ebc2c221be24a1c18cdad698ab0655f977ead62c9cc244468d,2023-07-18T16:58:01.603000
@ -228212,16 +228212,16 @@ CVE-2023-37479,0,0,65e698aeeec2de06015ebeeea50f3d8c2a3426ce2bf10b2923c6560b563e0
CVE-2023-3748,0,0,fbda536dd4dc031ecda3b4a3649fdc6e53178f4339fdaffc9ef3ebd42ff82bf3,2023-11-07T04:19:28.013000
CVE-2023-37480,0,0,652a3a23bafd305f9c2b7d3d1b87d3da5a01c6872bd5490c2366de4adbf638c6,2023-07-27T19:47:29.237000
CVE-2023-37481,0,0,db4abe35e141784e06fa4f3deb2743fed370d0e6ce2c608fe66c51d91bc9a2ec,2023-07-27T19:48:07.587000
CVE-2023-37483,0,0,6ddffa99077bae0c842b3cd031f05a68a5c733d4f8db7a21318ba0bf3c2abb41,2023-08-09T18:21:52.827000
CVE-2023-37483,0,1,a06c307876460fd1997034979cd734b50178b62883eec0ec2aad9e9fe3eb8226,2024-09-28T22:15:03.433000
CVE-2023-37484,0,0,760f55faa8c391cf557574d8b28bc1659926eabce351e2c7fb22d1954e7103de,2024-09-26T19:15:06.213000
CVE-2023-37486,0,0,f6f5a77c2d0e52e0428914b15fd4265bdf16387c1cd190276d0f97f4c62a3254,2023-08-15T15:15:07.713000
CVE-2023-37487,0,0,f76a2fd9614b732196506a47e0abbc2c3db3bd3d9201a0a6ea97da1fbd42691b,2023-08-09T18:21:30.300000
CVE-2023-37486,0,1,687c614f5ca4a79aa3d21e7b0746a1427771024c9b5a884c3831416a73c97e9a,2024-09-28T22:15:03.550000
CVE-2023-37487,0,1,dd465ff25b94ede3032e958cf77df90cbd7c58a152279b54e8b633ded141b6e2,2024-09-28T22:15:03.670000
CVE-2023-37488,0,0,a032fbb6b6fb8d9ec7eaea4394794969b13cf8fc31e6b77ab71c16c0ca58d597,2023-08-15T14:54:40.297000
CVE-2023-37489,0,0,1d24e14d654cea189a394fecb9c8bb7c050b6c0ec5ed17426a45133d2723e5bc,2023-09-14T02:07:38.067000
CVE-2023-3749,0,0,79575f437c00db11c5bc0408c98a9b194331bfe98dd13f13102bfbfdb447b240,2023-08-09T15:39:05.463000
CVE-2023-37490,0,0,d0afa82f8e1f60484edfa4ee4b02e342b7b84361f9859d350cae937d83586605,2023-08-09T18:21:14.410000
CVE-2023-37491,0,0,cfc8810b41ae428e73649bc07462f6781a20054f51ecafe52270a98e7724ecd1,2023-08-09T18:20:38.800000
CVE-2023-37492,0,0,bf4b459e0762189030ee469dc517203428f0488fe80b15c9ae25433ac18156b2,2023-08-09T18:20:16.060000
CVE-2023-37491,0,1,f4f9aec1cccee79a8f65d739ee1fae55691219898360f98989170d7ce3b63272,2024-09-28T22:15:03.780000
CVE-2023-37492,0,1,3201cae8021ed446e9e72842e5aed642bb38567a5b6d5d69dfeabfe2209387af,2024-09-28T22:15:03.890000
CVE-2023-37495,0,0,88b1b51fbc2aad530bec1f2499429397c80ed14af053e3ad0aaa2da2a3d61382,2024-02-29T13:49:47.277000
CVE-2023-37496,0,0,b3f6cf2213edd1b1c9a2df0a7e4e60f95ea00f20eade28d20d75195eb4a8af8d,2023-08-04T16:25:04.313000
CVE-2023-37497,0,0,a16a802dd163d689a9d35dd104f0934c7f0cb9de2213c75db89f75dc9c196288,2023-08-08T14:49:09.140000
@ -229827,12 +229827,12 @@ CVE-2023-39432,0,0,c2c5e4411d42152860b85e65fde776a03bb884049f8dd2a1bf7f1c7dfe4b0
CVE-2023-39433,0,0,f891132ba414524367ca6e5b3376c4fd3194df781c7ccd69c825a121a915823e,2024-05-17T18:36:05.263000
CVE-2023-39434,0,0,bc693e7754388058b19485a72219b0597d4d79b71ecc558e086fe03a669881fc,2024-01-31T15:15:09.663000
CVE-2023-39435,0,0,2cde1591acdec05b9dded1c5b5ca1d20ab1200f3c8779b480c0f389d969c7be2,2024-08-02T18:16:11.260000
CVE-2023-39436,0,0,107d83a698fc68171a413751026b5ba7898f39b2306fe2e180d902538a5279d0,2023-08-09T18:19:29.723000
CVE-2023-39436,0,1,91dbd45fc6d7cbbfca5793894245e11bf171465babb030aa24b814b96ad3465e,2024-09-28T22:15:04.010000
CVE-2023-39437,0,0,b841f4255101e124b17ae23b02cf5d1b090638a4fc3910c94f13b97ddb25767c,2023-08-09T18:19:10.230000
CVE-2023-39438,0,0,65ceb1aac39048f0a3b0a9ed829593cfcea3d6c50c1e229c7605d6ec094188a4,2023-08-22T17:32:59.287000
CVE-2023-39439,0,0,bf27882533b579af51afa70e227ee0cc4b300d19ed14becb29c2020767ae37ec,2023-08-15T15:28:19.137000
CVE-2023-39438,0,1,8b59466a23cd4d7d7241f64763cc91bae48570db99077a0b129f81adc6171fcc,2024-09-28T22:15:04.123000
CVE-2023-39439,0,1,34ef72977e4842aee96fb324aa892becfcd70f8ea4692a0db324f554980ef8a4,2024-09-28T22:15:04.243000
CVE-2023-3944,0,0,df00d3557db6753bd6b2ad3c7f11ec86b8aa42d5dfb831d8b5f3e11df12ce829,2024-05-17T02:27:57.947000
CVE-2023-39440,0,0,a1c9bf185968998e16532bd3fd85b1812cb101c4339be6a4ed481795b760b43c,2023-08-09T18:22:07.123000
CVE-2023-39440,0,1,6a2f84855caa69d956f5aa7ff3d81683e8055e06632176c19aacf42c40cf5311,2024-09-28T22:15:04.350000
CVE-2023-39441,0,0,1524af4c21eae8180b90656f56e4a47c0f827b489d48bce7311f67eaeb7fc6cb,2023-08-29T15:48:57.633000
CVE-2023-39443,0,0,1a26c9a28c096baa05119ad2798651f43ab2b06c68ce772bef1bd6a634d5fb42,2024-04-09T21:15:15.770000
CVE-2023-39444,0,0,8b67b0a3f75b53fd0b4a8e0d327154f6629b9f5e5973540fb30aa61cc1ab9e84,2024-04-09T21:15:15.873000
@ -230478,7 +230478,7 @@ CVE-2023-40305,0,0,a709c79a40741227f412ea5137931cdb24c45c1293363bcf092e9d35a151d
CVE-2023-40306,0,0,bd6bf8b0706e3eb9376e2fdb97bbf36506c5582490b9ed214eb2d3c01e19bf67,2023-09-13T00:38:01.823000
CVE-2023-40307,0,0,ddcb42995f545b3dbd573d42be7cd65a62e5d161097fa3407e331e12871a2c1c,2023-10-02T17:49:25.247000
CVE-2023-40308,0,0,98c43c86dcb343e085b8745a6568623d24b202c96e4353c1ce375574045aa4e5,2024-09-26T19:15:06.487000
CVE-2023-40309,0,0,3158cd3d1c7afa39b9a5ea30dd125b54cd6bb09a46144632cf1f66ef4d734c63,2023-09-15T17:05:27.130000
CVE-2023-40309,0,1,1b0bc6771b82c947113ef68944a1650f468aef63818b03d82f35201b0306ca2c,2024-09-28T22:15:04.460000
CVE-2023-40310,0,0,aafae91f872ed8196d989ce6f92724af64aa9c420d18d46f56352ee69e0632df,2023-10-11T19:10:10.253000
CVE-2023-40311,0,0,97ab1d90ac0eabc8fe9eefc1eb35bce10058e81ca86a8abc18ac988d8880435a,2023-08-23T17:04:28.627000
CVE-2023-40312,0,0,acc8e0b15b4384682b1bc786a01efe9878d67c6d102843423d8c8719fa2528cf,2023-08-23T16:58:38.697000
@ -230770,7 +230770,7 @@ CVE-2023-40617,0,0,3a460a0fe7b821688e96669bfca02ae7badd6e98fed7bf3e4d4aef8e02c15
CVE-2023-40618,0,0,b22f1e470705cb01d295026df0efcfb6a0941d66f006698c10d413e612027e8a,2023-09-26T14:09:16.680000
CVE-2023-40619,0,0,f1489f101809c6a30e839362b8151d60789a86328685856374a0c0ad5eacef3e,2023-11-03T11:15:08.183000
CVE-2023-40621,0,0,03427c02c9886665707f46cfbc8e9c6c323eed2cb28445fd2559ec4dbb9a0abd,2023-09-13T14:46:22.113000
CVE-2023-40622,0,0,b2e9290062f0b2384da64e95a8103714a30d28c2fae4e5bd7f8dd33b7bd72e91,2023-09-13T14:45:47.617000
CVE-2023-40622,0,1,f4743d29cb785e0e3a8d8e81eda60ec8ac35200da2c21645734f661d2a256cd2,2024-09-28T22:15:04.610000
CVE-2023-40623,0,0,5ee5e0592116f6d4636a97205259d6bf210e0a97114ba463eaa2c70bbcfc42a1,2023-09-13T14:45:19.633000
CVE-2023-40624,0,0,747cb3d54257bb2c6b03c46b6a0b19e07ee27d544e5eeb8ae834154eb4c91df8,2023-09-15T16:24:06.913000
CVE-2023-40625,0,0,f9655b86ad188075706103365b8f2083509d75f1e65a1d7efba6dfc1f629e08d,2023-09-13T14:59:43.357000
@ -232086,14 +232086,14 @@ CVE-2023-42471,0,0,3d47fcf90090571e29593e83e592637a2983aee4c755b0502ea61f6a8ff0f
CVE-2023-42472,0,0,d4b6e31aad9009b5c9e01ff4d5ef8ee885211dca89fab65e12e85f27feca21c4,2023-09-13T15:01:22.793000
CVE-2023-42473,0,0,3dc315884c13bf461401454525346c0be60bd374f097b946976815a94631c8ed,2023-10-11T19:10:40.223000
CVE-2023-42474,0,0,481ae6b0e8f41d4d61d692a5cd2060771c556db8f6828058322fe13af59a07a2,2023-10-11T19:14:12.600000
CVE-2023-42475,0,0,c663c83ade1f09b59456913c44e927bada30d46f7e905ad0bea997b37405208e,2023-10-11T19:14:53.293000
CVE-2023-42475,0,1,c1b0ee1eba3e5fb512186b0dc30efe85ed7379b2a5ac26055cf44270cbad052b,2024-09-28T23:15:11.563000
CVE-2023-42476,0,0,3b3dd9807a0f4ed6ce2468f7a4ed8fe4e9ea19bf3c6d0591c051ac24ff0ad738,2023-12-14T00:07:10.443000
CVE-2023-42477,0,0,fec4e6b685afd7509507459ccf95b2de9653675dc5d035947dec6f17dda7c351,2023-10-16T18:14:29.393000
CVE-2023-42478,0,0,c4c7f09ad08c692378f0a61d49fca19f206097275d23bd3ca18b775839aec945,2023-12-13T23:23:46.593000
CVE-2023-42479,0,0,f0b1e6ab673626b705998f4f2380ee9d6acf6b1d897467ec67c33bbfa23aabf0,2023-12-15T14:49:29.267000
CVE-2023-4248,0,0,938b672c9f5bfea09c245c341d3b357ab47d1817c22604b02cdc3f59b07bf2f0,2024-01-17T00:00:16.260000
CVE-2023-42480,0,0,b4c996dc097786af55fa5d04a9ac4df88342c244f821e059bb278dc9d11beef4,2023-11-20T19:59:14.070000
CVE-2023-42481,0,0,b58b94638fccc46f1140f776c6206097494ba9d23b4e21c2a2062076d51216d3,2023-12-13T23:54:39.960000
CVE-2023-42481,0,1,24868d5de151eec6717fda4925ac65c6552a60bcbde5db803be9c2861b2ed7f3,2024-09-28T23:15:11.717000
CVE-2023-42482,0,0,9c5cada0b75438fb7635b87fbd7757cce171c67bbc4934b1768b3b34aa22b31c,2023-09-23T03:33:36.887000
CVE-2023-42483,0,0,884b55162d96c6c79bd2f0068448c5d90c631bb990c572d1d302d6389b80e217,2023-12-15T19:13:42.503000
CVE-2023-42486,0,0,033e47c7d5f41ab68591c7c5f1ab98fccccaf7fc715f16f8625db94f13953ee8,2023-09-28T17:50:46.877000
@ -233743,7 +233743,7 @@ CVE-2023-4503,0,0,9a35d49a48b71f7276fb8172166d6d1aecccabc3aade6184e25e8c96138a6a
CVE-2023-45035,0,0,48123901d1326f450c18d3b0ccad106d9e148b3033fe2b672e89055fc85cad07,2024-02-08T03:48:56.403000
CVE-2023-45036,0,0,5b3e2bf8b11caa6b50968173d283a1eec4ca6a58ec51bfb3f0740601e12c6547,2024-02-06T20:18:45.043000
CVE-2023-45037,0,0,d9bef7c23ea9eb8863eec401793407eae857058b6098d8a56b377750f03a7bed,2024-02-06T20:18:34.557000
CVE-2023-45038,0,0,20fef31377818e2b437a887eb4f5a6cebd8f7a1ac1e8a406b25c4aaf5eb1496a,2024-09-09T13:03:38.303000
CVE-2023-45038,0,1,067d3daf830335f4445bbcc95af30c7b0b231a5ec96e22c57e090e46928a561f,2024-09-28T23:51:34.580000
CVE-2023-45039,0,0,e8930afda8d133bbe65ee717cfe9224bd9cb5c74f33c400953a957a39946a6d1,2024-01-10T16:59:35.883000
CVE-2023-4504,0,0,48b788a38cbf3794838d5825f4a3d5b50fb58219a94aae40cd43de2ab240310f,2023-11-09T20:58:00.163000
CVE-2023-45040,0,0,4264dd7f7c1bfe78bdbabea796f0de0efca1ab106d71d9c726cef2ae7b66f8b6,2024-01-10T16:57:27.477000
@ -235586,7 +235586,7 @@ CVE-2023-4756,0,0,60c65032e5b93776fef6f38ba2fedf37023289c4f2a24ceb78bc3b2f406a9e
CVE-2023-47560,0,0,5ac28e7e9a66106b736371a34b3097e66ad1cda34200867e184b83d8e20d363c,2024-01-11T14:07:09.593000
CVE-2023-47561,0,0,8c6823c8294618b7f2c78f304596bd27d313bc780b9a248a6002fe2f9ebd6d0f,2024-02-07T17:51:35.570000
CVE-2023-47562,0,0,eed5fa12d7eedb3933e2c8a9aa4171d8041e9fcfcc221d3d86745eee17563b9c,2024-02-07T17:50:38.510000
CVE-2023-47563,0,0,39305aeade9593fe001a9b2fa8779e8df536095891c00baf05da0a2a366851ac,2024-09-09T13:03:38.303000
CVE-2023-47563,0,1,a18ec77086e0b85a091c4b2d33d65478f0d4b9cad261c6a0c8d5816eb317a727,2024-09-28T23:47:40.683000
CVE-2023-47564,0,0,34d735757dd301c9641e82718c2dd925495c3b8fb8af8ff042788502c1634ad5,2024-02-09T19:33:26.900000
CVE-2023-47565,0,0,282333723d94196bbefe55ff568702e2610a6820a9456aa9fe6ac73919207aea,2023-12-22T02:00:01.337000
CVE-2023-47566,0,0,26a4a10ebe40b2b5bf6badce33dd8f30d8b09a56a91b1061398ee28499d68a36,2024-02-06T20:18:26.263000
@ -237054,12 +237054,12 @@ CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb
CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000
CVE-2023-49575,0,0,ac9ff4377f1f3563c349897d2a2875f9aff8e7a6d6bd9465a4e338b042bba3c4,2024-05-24T18:09:20.027000
CVE-2023-49577,0,0,337a8413375455feea032808d84500f8744a9a8b52d72a926a4fb84eb6b7aad8,2023-12-19T14:50:18.817000
CVE-2023-49578,0,0,554376a4a5e89af7792fb2e3caaee83c155712344a4b55572197b12bfc2f727a,2023-12-15T14:32:38.473000
CVE-2023-49578,0,1,1167f5734b8f433be63e1ed4f7be6d7f7a0ce424c44e3fe6e46dc74ec52fce97,2024-09-28T23:15:11.840000
CVE-2023-4958,0,0,b9fc19622ba6df397f2314bb1498399d57a97d8d3d77e1be35cc528df3591ff4,2024-05-03T16:15:11.227000
CVE-2023-49580,0,0,815954f9407b74402abcfb36fe3f08f951a3ae3d064781c18823d1ab5df6702f,2023-12-19T14:50:39.843000
CVE-2023-49580,0,1,1fe00926918ee94ed5d0f65be26556c618ba07b3209d13ab98392975d7829a67,2024-09-28T23:15:11.977000
CVE-2023-49581,0,0,c752d9c8b49d3a50b30e010fb1e627be8921c15cd9f5ebf74ca53588cf11cd1e,2024-01-16T14:15:48.123000
CVE-2023-49582,0,0,254586a5bd35da117db3a87fcbf0665709da9c852d76af64aed9d2b7bc82d1ec,2024-08-27T16:04:58.657000
CVE-2023-49583,0,0,2bbc4069f5dd786f8918873219f212a951808fc3c08912cfca16a05ba9ea4494,2024-01-09T02:15:45.140000
CVE-2023-49583,0,1,17a566852cc5bd1ad30f2730f7b7805c66d84960c5d6f97f747b6a073ca3776f,2024-09-28T23:15:12.090000
CVE-2023-49584,0,0,12b0484dfd67af5cdba226de40078067413392935bfd8575322e5980ac90dd4f,2023-12-15T14:26:47.663000
CVE-2023-49587,0,0,b72e8cc0e0b1f24503bc21b9e5a03faa03723a19fc8b810902b73346efe7215f,2023-12-14T15:41:25.777000
CVE-2023-49588,0,0,da1e9f5316d05f0feeebf32eba644409b9293543014b6e46be9637d63d764393,2024-02-14T18:15:46.310000
@ -237592,7 +237592,7 @@ CVE-2023-50357,0,0,c49fba6a6b8ae43153115bdc180d0a50fda6badb9bd287f826717a708c649
CVE-2023-50358,0,0,affeae249fec946895d3bef4063e720c758024b3343a9b8cb10accf20047afe3,2024-02-15T06:15:45.960000
CVE-2023-50359,0,0,017df15c1e36b7a4da9c2a548d3a19bcce6cc2270ecdf18aa860e29b8b47570d,2024-02-06T20:18:14.547000
CVE-2023-5036,0,0,142ff7c8f9f78ca5371b9c6802e1971802347d9f04e927ee76b2acbd83ef8ec5,2023-09-19T13:18:54.193000
CVE-2023-50360,0,0,19cb0c6712f1a903163d12dd49d9d935fcb1d184a64fe55d7987afb650b9501c,2024-09-09T13:03:38.303000
CVE-2023-50360,0,1,27634f79a715ec48d12d4c3552f14cf2df45a967ec21f459defca999b97ed253,2024-09-28T23:44:50.720000
CVE-2023-50361,0,0,188b58f48ae349f3b9eaaccb10078a3e7a1f81ce543b15434a0caf573d93d149,2024-09-11T13:25:10.873000
CVE-2023-50362,0,0,31a964a4db386c4376a063900f0da816b2224f83fc7dcc60de4592c35a7b4c69,2024-09-11T13:26:57.707000
CVE-2023-50363,0,0,a3e5f8527cf755f8b94f6ecd1f1ebe83c8a25ee2cb0536cd8287e4c1acfd8207,2024-09-11T13:30:17.090000
@ -237619,9 +237619,9 @@ CVE-2023-50387,0,0,570d9f4f035f72cf75b6fb2ec7a865d346eadbb37e839bf469ab56bd506c2
CVE-2023-50395,0,0,0e94ac3a53ddd522dfa1daba7864a823ebeef0121cec6b5f6750eb619a73d637,2024-02-13T20:35:06.703000
CVE-2023-5041,0,0,edfc474d6f8955b06b6b129c14854ffb36763d854b8ade07d6bf9f3581fc855e,2024-01-24T19:20:29.410000
CVE-2023-5042,0,0,17be57ec49e4200dc6b7de1783f7771b7237e91348201a865d65f3f8ff47b98d,2023-09-25T13:25:16.230000
CVE-2023-50422,0,0,624c27edd4b3bfc029c7f12e197c32b34c1906754e2ad8d27cfb2937fe4099a8,2024-01-09T02:15:45.420000
CVE-2023-50423,0,0,ed806015b67283c87858c17058bafbfd7ccbd554290762a1244fb3d2e8610e1e,2023-12-15T16:53:22.867000
CVE-2023-50424,0,0,0f517a9e1d3d830ab081f35615260440ec2df7800af1240f860d01ea4fe4fc7c,2023-12-15T16:53:04.417000
CVE-2023-50422,0,1,2e74a3fef27ae16d3512ba178b2cd1f8610f89b13a942b920a7dd95c102fa33c,2024-09-28T23:15:12.223000
CVE-2023-50423,0,1,2150b034245e11b7172ea5c3d421807e644ba644bc75de8c2a84617f8a025ff4,2024-09-28T23:15:12.360000
CVE-2023-50424,0,1,8c5083bac1ff92e08b481a632dbb35f753fe85f3cc8cb2fe6559ea5bb3362c14,2024-09-28T23:15:12.477000
CVE-2023-50428,0,0,24e245a5620aa9efed1739f31f330f49d3b1e7340a02a534f07d622180c9ee2a,2024-08-02T23:15:27.933000
CVE-2023-50429,0,0,cf7c3990876d34813be7786260b9d58e3f0ef74bfa3057d97d875c61dd198c94,2023-12-14T14:33:52.857000
CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000
@ -244299,7 +244299,7 @@ CVE-2024-21732,0,0,5b8477386d174238a16ab6890c874c5b9a2e295383724c8992520c310a411
CVE-2024-21733,0,0,5c1944b5f993b5404fdb05bb0e77d12a8bf708110b872f1231cf5e420e715391,2024-02-16T13:15:10.190000
CVE-2024-21734,0,0,885365a84c85d383ea10609ce715ea65d1a8ab1acecb51a21fedb1fc4873fc73,2024-01-12T16:34:40.870000
CVE-2024-21735,0,0,64afeafd3ca5ebe95ef19b8cb0b1a221cb3831f7e736f22e7bca2463c0261a93,2024-01-30T22:15:53.150000
CVE-2024-21736,0,0,794296433b0b6c553cd106f1bd31a638f539e91ea6f82e61204a43660acdc041,2024-01-19T17:30:01.407000
CVE-2024-21736,0,1,54442fb9b042c5f4e212c801d8862949178fa83601b4c5ba313c1abbb63c3c64,2024-09-28T23:15:12.587000
CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000
CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000
CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000
@ -246242,7 +246242,7 @@ CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6
CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000
CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000
CVE-2024-2474,0,0,e295561a11995d9c40e939a773b47208b6445581a981c9a04645753adc140ddf,2024-03-20T13:00:16.367000
CVE-2024-24740,0,0,055e621299fb8cfa25051c1c9b5b6e90ccf0de6c197861466b8c657e95fd4986,2024-02-13T14:01:40.577000
CVE-2024-24740,0,1,5a0025656e10ede9df3e0999b52fcdfd5a23388b4b1c6503aed4b2448caac40f,2024-09-28T23:15:12.777000
CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000
CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000
CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000
@ -246894,9 +246894,9 @@ CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef
CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000
CVE-2024-25642,0,0,62b98db44a08196f7b7012c39faaf86e5ea68b1167c724b1b57391d731cd46b5,2024-06-10T17:16:21.947000
CVE-2024-25643,0,0,531b402e512e75c4384caa610ae811e75e61e13fefc89fff8eb67c6e4dee7cdd,2024-02-13T14:01:07.747000
CVE-2024-25644,0,0,3219e2e709e527015a48516ae6dfaf602d72b63a8b92f510428759964fa2ea48,2024-03-12T12:40:13.500000
CVE-2024-25645,0,0,5e73536a8c6d34e4b421ffd125622fb4637ca2ae5f29dc9f1d9e4ca68f957637,2024-03-12T12:40:13.500000
CVE-2024-25646,0,0,f96a3838d7373a7e4c4d8dbfc1fa5fddee970ebb06619f04a6a27f836ef12886,2024-04-09T12:48:04.090000
CVE-2024-25644,0,1,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000
CVE-2024-25645,0,1,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000
CVE-2024-25646,0,1,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000
CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000
CVE-2024-25649,0,0,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000
CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000
@ -248952,7 +248952,7 @@ CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16
CVE-2024-28160,0,0,241bfdb3674a34e6849fc0ad74b8b7e2c84a649745fec71e6a1d767d5a523265,2024-05-01T18:15:17.143000
CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000
CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000
CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000
CVE-2024-28163,0,1,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000
CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000
CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000
CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000
@ -250282,7 +250282,7 @@ CVE-2024-30214,0,0,cf5accb9e4a3278486a75d6623c8c03abb4ef1fc50fe46650d28f97df932b
CVE-2024-30215,0,0,3576a060ab4a3509fa025a4a09e391456b98e8a3ff1f9ef6a6adfedd520e279a,2024-04-09T12:48:04.090000
CVE-2024-30216,0,0,317fbed0703b9e56e6e6659964629ef86247b3618fd61971d8544005edb73b9f,2024-04-09T12:48:04.090000
CVE-2024-30217,0,0,dc7c143bac3a66c1917b4b2e1e571544199576af15f1c229990a317af3df58ab,2024-04-09T12:48:04.090000
CVE-2024-30218,0,0,8a69e19ff6d45dba2fc3fe9cbec76c5157ffdbe210f0a0375f9b6ca12b157aa5,2024-04-09T12:48:04.090000
CVE-2024-30218,0,1,5f669f8b672f21460455ea72a76ee594e61362d8a5948a66529555605773b70d,2024-09-28T23:15:13.313000
CVE-2024-30219,0,0,58a0ce96139e860887241ec214de08a83f6a295a69c273470160597230c476b7,2024-08-02T02:15:21.560000
CVE-2024-3022,0,0,5e468669a1bf6780e691c70abcdca6d29e576f4158c740ba44cf88cd33320476,2024-04-04T12:48:41.700000
CVE-2024-30220,0,0,cdf9eb92198fd5f7ed28a64003f236fba45aaa8db3640801c81262851b43cc57,2024-08-02T02:15:21.620000
@ -252392,7 +252392,7 @@ CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528
CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000
CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000
CVE-2024-33003,0,0,f92d99f5ef6ac0dd2fa77c8e3e4a82297fdecac133b0dd0df2ea5b03733ef6c0,2024-09-16T16:22:07.617000
CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000
CVE-2024-33004,0,1,b4d4e30a06e9114efbe213bcb0a187e38c5d8d0f9c07694c65f258c76ba852d6,2024-09-28T23:15:13.420000
CVE-2024-33005,0,0,b6e8581506b98b3d048c876ef09153cc5329e2b3c294dcc9c0512597d7564067,2024-09-12T14:39:03.480000
CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000
CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000
@ -264095,5 +264095,6 @@ CVE-2024-9299,0,0,799e3f49439baf2432b26834e94671a2c07ca8bcc110298b74e6fbc73a1e52
CVE-2024-9300,0,0,4aee81e48dbe8631e425ca1253bf1fefcd0e37e8736692eb326116d6964fe2c0,2024-09-28T15:15:14.263000
CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000
CVE-2024-9315,0,0,1aaf0b25bc5db159a5983cc16616c1ec4eda1359782a55e5468dbd7b3fd618c0,2024-09-28T19:15:12.353000
CVE-2024-9316,1,1,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000
CVE-2024-9317,1,1,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000
CVE-2024-9316,0,0,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000
CVE-2024-9317,0,0,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000
CVE-2024-9318,1,1,359284304f599d5b46dabbdd36eaf80d2e0ebae0fa4900079642b914d1c2b0ed,2024-09-28T23:15:13.530000

Can't render this file because it is too large.