diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31403.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31403.json index 3dbe8febb80..7be4f81253e 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31403.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31403.json @@ -2,13 +2,13 @@ "id": "CVE-2023-31403", "sourceIdentifier": "cna@sap.com", "published": "2023-11-14T01:15:07.413", - "lastModified": "2023-11-20T19:51:15.823", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:02.433", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability.\n\n" + "value": "SAP Business One installation - version 10.0, does not perform proper authentication and authorization checks for SMB shared folder. As a result, any malicious user can read and write to the SMB shared folder. Additionally, the files in the folder can be executed or be used by the installation process leading to considerable impact on confidentiality, integrity and availability." }, { "lang": "es", @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "cna@sap.com", "type": "Primary", "description": [ { @@ -71,12 +71,12 @@ ] }, { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-863" } ] } diff --git a/CVE-2023/CVE-2023-321xx/CVE-2023-32114.json b/CVE-2023/CVE-2023-321xx/CVE-2023-32114.json index 948ccd76972..618ebc1875f 100644 --- a/CVE-2023/CVE-2023-321xx/CVE-2023-32114.json +++ b/CVE-2023/CVE-2023-321xx/CVE-2023-32114.json @@ -2,13 +2,13 @@ "id": "CVE-2023-32114", "sourceIdentifier": "cna@sap.com", "published": "2023-06-13T03:15:09.393", - "lastModified": "2023-06-16T18:40:36.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:02.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP NetWeaver (Change and Transport System) - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an authenticated user with admin privileges to maliciously run a benchmark program repeatedly in intent to slowdown or make the server unavailable which may lead to a limited impact on Availability with No impact on Confidentiality and Integrity of the application.\n\n" + "value": "SAP NetWeaver (Change and Transport System) - versions 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, allows an authenticated user with admin privileges to maliciously run a benchmark program repeatedly in intent to slowdown or make the server unavailable which may lead to a limited impact on Availability with No impact on Confidentiality and Integrity of the application." } ], "metrics": { @@ -58,11 +58,11 @@ "weaknesses": [ { "source": "cna@sap.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-732" } ] } diff --git a/CVE-2023/CVE-2023-339xx/CVE-2023-33990.json b/CVE-2023/CVE-2023-339xx/CVE-2023-33990.json index 08c638636d6..5bf72fc1174 100644 --- a/CVE-2023/CVE-2023-339xx/CVE-2023-33990.json +++ b/CVE-2023/CVE-2023-339xx/CVE-2023-33990.json @@ -2,13 +2,13 @@ "id": "CVE-2023-33990", "sourceIdentifier": "cna@sap.com", "published": "2023-07-11T03:15:09.657", - "lastModified": "2023-07-19T12:57:09.040", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:02.930", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP SQL Anywhere\u00a0- version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted.\n\n" + "value": "SAP SQL Anywhere\u00a0- version 17.0, allows an attacker to prevent legitimate users from accessing the service by crashing the service. An attacker with low privileged account and access to the local system can write into the shared memory objects. This can be leveraged by an attacker to perform a Denial of Service. Further, an attacker might be able to modify sensitive data in shared memory objects.This issue only affects SAP SQL Anywhere on Windows. Other platforms are not impacted." } ], "metrics": { @@ -60,6 +60,10 @@ "source": "cna@sap.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-277" + }, { "lang": "en", "value": "CWE-732" diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35870.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35870.json index 2451d3db4e0..61b65995592 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35870.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35870.json @@ -2,13 +2,13 @@ "id": "CVE-2023-35870", "sourceIdentifier": "cna@sap.com", "published": "2023-07-11T03:15:09.800", - "lastModified": "2023-07-19T13:35:31.873", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.063", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable.\n\n" + "value": "When creating a journal entry template in SAP S/4HANA (Manage Journal Entry Template) - versions S4CORE 104, 105, 106, 107, an attacker could intercept the save request and change the template, leading to an impact on confidentiality and integrity of the resource. Furthermore, a standard template could be deleted, hence making the resource temporarily unavailable." } ], "metrics": { @@ -57,22 +57,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "cna@sap.com", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-Other" + "value": "CWE-732" } ] }, { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-284" + "value": "NVD-CWE-Other" } ] } diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35874.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35874.json index dc51b1039b8..6d9c4966860 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35874.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35874.json @@ -2,13 +2,13 @@ "id": "CVE-2023-35874", "sourceIdentifier": "cna@sap.com", "published": "2023-07-11T03:15:10.050", - "lastModified": "2023-07-19T17:13:20.070", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.187", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability.\n\n" + "value": "SAP NetWeaver Application Server ABAP and ABAP Platform - version KRNL64NUC, 7.22, KRNL64NUC 7.22EXT, KRNL64UC 7.22, KRNL64UC 7.22EXT, KRNL64UC 7.53, KERNEL 7.22, KERNEL, 7.53, KERNEL 7.77, KERNEL 7.81, KERNEL 7.85, KERNEL 7.89, KERNEL 7.54, KERNEL 7.92, KERNEL 7.93, under some conditions, performs improper authentication checks for functionalities that require user identity. An attacker can perform malicious actions over the network, extending the scope of impact, causing a limited impact on confidentiality, integrity and availability." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-287" + "value": "CWE-306" } ] } diff --git a/CVE-2023/CVE-2023-369xx/CVE-2023-36919.json b/CVE-2023/CVE-2023-369xx/CVE-2023-36919.json index ea967e56349..0b4cb08d266 100644 --- a/CVE-2023/CVE-2023-369xx/CVE-2023-36919.json +++ b/CVE-2023/CVE-2023-369xx/CVE-2023-36919.json @@ -2,13 +2,13 @@ "id": "CVE-2023-36919", "sourceIdentifier": "cna@sap.com", "published": "2023-07-11T03:15:10.237", - "lastModified": "2023-07-18T18:17:10.787", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.313", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure.\n\n" + "value": "In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure." } ], "metrics": { @@ -57,22 +57,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "cna@sap.com", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-116" + "value": "CWE-213" } ] }, { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-644" + "value": "CWE-116" } ] } diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37483.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37483.json index 84b35903843..63e69c3b697 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37483.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37483.json @@ -2,13 +2,13 @@ "id": "CVE-2023-37483", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:17.313", - "lastModified": "2023-08-09T18:21:52.827", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.433", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP PowerDesigner - version 16.7, has improper access control which might allow an unauthenticated attacker to run arbitrary queries against the back-end database via Proxy.\n\n" + "value": "SAP PowerDesigner - version 16.7, has improper access control which might allow an unauthenticated attacker to run arbitrary queries against the back-end database via Proxy." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-306" } ] } diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37486.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37486.json index a12d5bbdce9..870588f5e30 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37486.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37486.json @@ -2,13 +2,13 @@ "id": "CVE-2023-37486", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:17.907", - "lastModified": "2023-08-15T15:15:07.713", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.550", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Under certain conditions\u00a0SAP Commerce\u00a0(OCC API) - versions HY_COM 2105, HY_COM 2205, COM_CLOUD 2211, endpoints allow an attacker to access information which would otherwise be restricted. On successful exploitation there could be a high impact on confidentiality with no impact on integrity and availability of the application.\n\n" + "value": "Under certain conditions\u00a0SAP Commerce\u00a0(OCC API) - versions HY_COM 2105, HY_COM 2205, COM_CLOUD 2211, endpoints allow an attacker to access information which would otherwise be restricted. On successful exploitation there could be a high impact on confidentiality with no impact on integrity and availability of the application." } ], "metrics": { @@ -57,22 +57,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "cna@sap.com", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-524" } ] }, { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-200" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37487.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37487.json index bcfda793e54..7c25e2aed0c 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37487.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37487.json @@ -2,13 +2,13 @@ "id": "CVE-2023-37487", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:18.247", - "lastModified": "2023-08-09T18:21:30.300", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.670", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledge perform certain operation to access unintended data over the network which could lead to high impact on confidentiality with no impact on integrity and availability of the application\n\n" + "value": "SAP Business One (Service Layer) - version 10.0, allows an authenticated attacker with deep knowledge perform certain operation to access unintended data over the network which could lead to high impact on confidentiality with no impact on integrity and availability of the application" } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-497" } ] } diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37491.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37491.json index 238b8935e6d..b0d88afd04a 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37491.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37491.json @@ -2,13 +2,13 @@ "id": "CVE-2023-37491", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:18.840", - "lastModified": "2023-08-09T18:20:38.800", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.780", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable.\n\n" + "value": "The ACL (Access\u00a0Control\u00a0List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-285" + "value": "CWE-863" } ] } diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37492.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37492.json index f9c63ccde0f..5192625df07 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37492.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37492.json @@ -2,13 +2,13 @@ "id": "CVE-2023-37492", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:18.993", - "lastModified": "2023-08-09T18:20:16.060", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:03.890", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack.\n\n" + "value": "SAP NetWeaver Application Server ABAP and ABAP Platform - versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 793, SAP_BASIS 804, does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. This could allow an attacker to read sensitive information which can be used in a subsequent serious attack." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-863" } ] } diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39436.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39436.json index 4acfa9f5b57..1ee91db1ae0 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39436.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39436.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39436", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:19.150", - "lastModified": "2023-08-09T18:19:29.723", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:04.010", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP Supplier Relationship Management -versions 600, 602, 603, 604, 605, 606, 616, 617, allows an unauthorized attacker to discover information relating to\u00a0SRM within Vendor Master Data for Business Partners replication functionality.This information could be used to allow the attacker to specialize their attacks against\u00a0SRM.\n\n" + "value": "SAP Supplier Relationship Management -versions 600, 602, 603, 604, 605, 606, 616, 617, allows an unauthorized attacker to discover information relating to\u00a0SRM within Vendor Master Data for Business Partners replication functionality.This information could be used to allow the attacker to specialize their attacks against\u00a0SRM." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-306" } ] } diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json index 43188f60dfb..9cb9e217492 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39438.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39438", "sourceIdentifier": "cna@sap.com", "published": "2023-08-15T17:15:12.627", - "lastModified": "2023-08-22T17:32:59.287", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:04.123", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses.\n" + "value": "A missing authorization check allows an arbitrary authenticated user to perform certain operations through the API of CLA-assistant by executing specific additional steps. This allows an arbitrary authenticated user to read CLA information including information of the persons who signed them as well as custom fields the CLA requester had configured. In addition, an arbitrary authenticated user can update or delete the CLA-configuration for repositories or organizations using CLA-assistant. The stored access tokens for GitHub are not affected, as these are redacted from the API-responses." }, { "lang": "es", @@ -61,7 +61,7 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "cna@sap.com", "type": "Primary", "description": [ { @@ -71,20 +71,12 @@ ] }, { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ - { - "lang": "en", - "value": "CWE-424" - }, { "lang": "en", "value": "CWE-862" - }, - { - "lang": "en", - "value": "CWE-863" } ] } diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39439.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39439.json index ad0eb15d92d..2665a64170b 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39439.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39439.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39439", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:19.793", - "lastModified": "2023-08-15T15:28:19.137", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:04.243", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase.\n\n" + "value": "SAP Commerce Cloud may accept an empty passphrase for user ID and passphrase authentication, allowing users to log into the system without a passphrase." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-1390" + "value": "CWE-258" } ] } diff --git a/CVE-2023/CVE-2023-394xx/CVE-2023-39440.json b/CVE-2023/CVE-2023-394xx/CVE-2023-39440.json index 576204134a4..b1504caf8bf 100644 --- a/CVE-2023/CVE-2023-394xx/CVE-2023-39440.json +++ b/CVE-2023/CVE-2023-394xx/CVE-2023-39440.json @@ -2,13 +2,13 @@ "id": "CVE-2023-39440", "sourceIdentifier": "cna@sap.com", "published": "2023-08-08T01:15:20.100", - "lastModified": "2023-08-09T18:22:07.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:04.350", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In SAP BusinessObjects Business Intelligence - version 420, If a user logs in to a particular program, under certain specific conditions memory might not be cleared up properly, due to which attacker might be able to get access to user credentials. For a successful attack, the attacker needs to have local access to the system. There is no impact on availability and integrity.\n\n" + "value": "In SAP BusinessObjects Business Intelligence - version 420, If a user logs in to a particular program, under certain specific conditions memory might not be cleared up properly, due to which attacker might be able to get access to user credentials. For a successful attack, the attacker needs to have local access to the system. There is no impact on availability and integrity." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-312" } ] } diff --git a/CVE-2023/CVE-2023-403xx/CVE-2023-40309.json b/CVE-2023/CVE-2023-403xx/CVE-2023-40309.json index 728ab4e8a6b..a1ef8fdfa69 100644 --- a/CVE-2023/CVE-2023-403xx/CVE-2023-40309.json +++ b/CVE-2023/CVE-2023-403xx/CVE-2023-40309.json @@ -2,13 +2,13 @@ "id": "CVE-2023-40309", "sourceIdentifier": "cna@sap.com", "published": "2023-09-12T03:15:12.073", - "lastModified": "2023-09-15T17:05:27.130", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:04.460", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired,\u00a0an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data.\n\n" + "value": "SAP CommonCryptoLib does not perform necessary authentication checks, which may result in missing or wrong authorization checks for an authenticated user, resulting in escalation of privileges. Depending on the application and the level of privileges acquired,\u00a0an attacker could abuse functionality restricted to a particular user group as well as read, modify or delete restricted data." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-862" + "value": "CWE-863" } ] } diff --git a/CVE-2023/CVE-2023-406xx/CVE-2023-40622.json b/CVE-2023/CVE-2023-406xx/CVE-2023-40622.json index d888a906958..664d4c7baa1 100644 --- a/CVE-2023/CVE-2023-406xx/CVE-2023-40622.json +++ b/CVE-2023/CVE-2023-406xx/CVE-2023-40622.json @@ -2,13 +2,13 @@ "id": "CVE-2023-40622", "sourceIdentifier": "cna@sap.com", "published": "2023-09-12T03:15:12.813", - "lastModified": "2023-09-13T14:45:47.617", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T22:15:04.610", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability.\n\n" + "value": "SAP BusinessObjects Business Intelligence Platform (Promotion Management) - versions 420, 430, under certain condition allows an authenticated attacker to view sensitive information which is otherwise restricted. On successful exploitation, the attacker can completely compromise the application causing high impact on confidentiality, integrity, and availability." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-732" } ] } diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42475.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42475.json index ad83950dc6a..2a2a95ae5bc 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42475.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42475.json @@ -2,13 +2,13 @@ "id": "CVE-2023-42475", "sourceIdentifier": "cna@sap.com", "published": "2023-10-10T02:15:11.020", - "lastModified": "2023-10-11T19:14:53.293", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T23:15:11.563", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality.\n\n" + "value": "The Statutory Reporting application has a vulnerable file storage location, potentially enabling low privileged attacker to read server files with minimal impact on confidentiality." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-209" } ] } diff --git a/CVE-2023/CVE-2023-424xx/CVE-2023-42481.json b/CVE-2023/CVE-2023-424xx/CVE-2023-42481.json index 54aa809f9da..fd215eccccd 100644 --- a/CVE-2023/CVE-2023-424xx/CVE-2023-42481.json +++ b/CVE-2023/CVE-2023-424xx/CVE-2023-42481.json @@ -2,13 +2,13 @@ "id": "CVE-2023-42481", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T01:15:11.023", - "lastModified": "2023-12-13T23:54:39.960", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T23:15:11.717", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In SAP Commerce Cloud - versions HY_COM 1905, HY_COM 2005, HY_COM2105, HY_COM 2011, HY_COM 2205, COM_CLOUD 2211, a locked B2B user can misuse the forgotten password functionality to un-block his user account again and re-gain access if SAP Commerce Cloud - Composable Storefront is used as storefront, due to weak access controls in place. This leads to a considerable impact on confidentiality and integrity.\n\n" + "value": "In SAP Commerce Cloud - versions HY_COM 1905, HY_COM 2005, HY_COM2105, HY_COM 2011, HY_COM 2205, COM_CLOUD 2211, a locked B2B user can misuse the forgotten password functionality to un-block his user account again and re-gain access if SAP Commerce Cloud - Composable Storefront is used as storefront, due to weak access controls in place. This leads to a considerable impact on confidentiality and integrity." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-640" } ] } diff --git a/CVE-2023/CVE-2023-450xx/CVE-2023-45038.json b/CVE-2023/CVE-2023-450xx/CVE-2023-45038.json index 30c6c9945d8..3bbf218aad9 100644 --- a/CVE-2023/CVE-2023-450xx/CVE-2023-45038.json +++ b/CVE-2023/CVE-2023-450xx/CVE-2023-45038.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45038", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2024-09-06T17:15:12.300", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-28T23:51:34.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -41,7 +61,7 @@ }, "weaknesses": [ { - "source": "security@qnapsecurity.com.tw", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -49,12 +69,44 @@ "value": "CWE-287" } ] + }, + { + "source": "security@qnapsecurity.com.tw", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qnap:music_station:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.4.0", + "matchCriteriaId": "327BDB3C-02C9-4D9F-AF8B-0F1EAAD062BF" + } + ] + } + ] } ], "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-25", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47563.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47563.json index 4ef649f7c5d..e8c9e9d0e9d 100644 --- a/CVE-2023/CVE-2023-475xx/CVE-2023-47563.json +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47563.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47563", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2024-09-06T17:15:12.513", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-28T23:47:40.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -55,10 +75,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.8.2", + "matchCriteriaId": "2552122C-93E4-471B-A5BE-D3B931836217" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-24", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49578.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49578.json index 04362c1f809..d49b794fd44 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49578.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49578.json @@ -2,13 +2,13 @@ "id": "CVE-2023-49578", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:07.283", - "lastModified": "2023-12-15T14:32:38.473", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T23:15:11.840", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity\u00a0 of the application.\n\n" + "value": "SAP Cloud Connector - version 2.0, allows an authenticated user with low privilege to perform Denial of service attack from adjacent UI by sending a malicious request which leads to low impact on the availability and no impact on confidentiality or Integrity\u00a0 of the application." }, { "lang": "es", @@ -61,22 +61,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "cna@sap.com", "type": "Primary", "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-732" } ] }, { - "source": "cna@sap.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-400" + "value": "NVD-CWE-noinfo" } ] } diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49580.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49580.json index 02587cf7fd9..a0cafa15473 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49580.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49580.json @@ -2,13 +2,13 @@ "id": "CVE-2023-49580", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:07.493", - "lastModified": "2023-12-19T14:50:39.843", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T23:15:11.977", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP GUI for Windows\u00a0and\u00a0SAP GUI for Java - versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability, e.g. also increasing the response times of the AS ABAP.\n\n" + "value": "SAP GUI for Windows\u00a0and\u00a0SAP GUI for Java - versions SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, allow an unauthenticated attacker to access information which would otherwise be restricted and confidential. In addition, this vulnerability allows the unauthenticated attacker to create Layout configurations of the ABAP List Viewer and with this causing a mild impact on integrity and availability, e.g. also increasing the response times of the AS ABAP." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-732" } ] } diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json index 95e4fdadd90..b0f2851dc38 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49583.json @@ -2,13 +2,13 @@ "id": "CVE-2023-49583", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:07.920", - "lastModified": "2024-01-09T02:15:45.140", + "lastModified": "2024-09-28T23:15:12.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Node.js] @sap/xssec - versions < 3.6.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n" + "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Node.js] @sap/xssec - versions < 3.6.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-749" } ] } diff --git a/CVE-2023/CVE-2023-503xx/CVE-2023-50360.json b/CVE-2023/CVE-2023-503xx/CVE-2023-50360.json index f160432fc08..303fdaef5fc 100644 --- a/CVE-2023/CVE-2023-503xx/CVE-2023-50360.json +++ b/CVE-2023/CVE-2023-503xx/CVE-2023-50360.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50360", "sourceIdentifier": "security@qnapsecurity.com.tw", "published": "2024-09-06T17:15:12.710", - "lastModified": "2024-09-09T13:03:38.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-28T23:44:50.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@qnapsecurity.com.tw", "type": "Secondary", @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qnap:video_station:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.8.2", + "matchCriteriaId": "2552122C-93E4-471B-A5BE-D3B931836217" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.qnap.com/en/security-advisory/qsa-24-24", - "source": "security@qnapsecurity.com.tw" + "source": "security@qnapsecurity.com.tw", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json index e59da5721cd..a4ea13c0852 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50422.json @@ -2,13 +2,13 @@ "id": "CVE-2023-50422", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:08.587", - "lastModified": "2024-01-09T02:15:45.420", + "lastModified": "2024-09-28T23:15:12.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Java] cloud-security-services-integration-library) -\u00a0versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n" + "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Java] cloud-security-services-integration-library) -\u00a0versions below 2.17.0 and versions from 3.0.0 to before 3.3.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-749" } ] } diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json index e4fe1c95821..df40da15da1 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50423.json @@ -2,13 +2,13 @@ "id": "CVE-2023-50423", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T02:15:08.797", - "lastModified": "2023-12-15T16:53:22.867", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T23:15:12.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Python]\u00a0sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n" + "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Python]\u00a0sap-xssec) - versions < 4.1.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-749" } ] } diff --git a/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json b/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json index 50e639595c2..2d8a158d6d4 100644 --- a/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json +++ b/CVE-2023/CVE-2023-504xx/CVE-2023-50424.json @@ -2,13 +2,13 @@ "id": "CVE-2023-50424", "sourceIdentifier": "cna@sap.com", "published": "2023-12-12T03:15:07.100", - "lastModified": "2023-12-15T16:53:04.417", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T23:15:12.477", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.\n\n" + "value": "SAP\u00a0BTP\u00a0Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-749" } ] } diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21736.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21736.json index dddc9993919..55243477f75 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21736.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21736.json @@ -2,13 +2,13 @@ "id": "CVE-2024-21736", "sourceIdentifier": "cna@sap.com", "published": "2024-01-09T02:15:45.593", - "lastModified": "2024-01-19T17:30:01.407", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-28T23:15:12.587", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application.\n\n" + "value": "SAP S/4HANA Finance for (Advanced Payment Management) - versions SAPSCORE 128, S4CORE 107, does not perform necessary authorization checks. A function import could be triggered allowing the attacker to create in-house bank accounts leading to low impact on the confidentiality of the application." }, { "lang": "es", @@ -66,7 +66,7 @@ "description": [ { "lang": "en", - "value": "CWE-285" + "value": "CWE-863" } ] } diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json index d624af47abc..7432f951d62 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24740.json @@ -2,13 +2,13 @@ "id": "CVE-2024-24740", "sourceIdentifier": "cna@sap.com", "published": "2024-02-13T03:15:08.987", - "lastModified": "2024-02-13T14:01:40.577", + "lastModified": "2024-09-28T23:15:12.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions,\u00a0allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application.\n\n" + "value": "SAP NetWeaver Application Server (ABAP) - versions KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, KERNEL 7.85, KERNEL 7.89, KERNEL 7.93, KERNEL 7.94, KRNL64UC 7.53, under certain conditions,\u00a0allows an attacker to access information which could otherwise be restricted with low impact on confidentiality of the application." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-732" } ] } diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json index df011b9cdc6..77bacca5b60 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25644.json @@ -2,13 +2,13 @@ "id": "CVE-2024-25644", "sourceIdentifier": "cna@sap.com", "published": "2024-03-12T01:15:49.567", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-09-28T23:15:12.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n" + "value": "Under certain conditions SAP NetWeaver\u00a0WSRM\u00a0- version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-732" } ] } diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25645.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25645.json index bddeb836a7a..e02204689a7 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25645.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25645.json @@ -2,13 +2,13 @@ "id": "CVE-2024-25645", "sourceIdentifier": "cna@sap.com", "published": "2024-03-12T01:15:49.780", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-09-28T23:15:13.020", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application.\n\n" + "value": "Under certain condition\u00a0SAP\u00a0NetWeaver (Enterprise Portal) - version 7.50\u00a0allows an attacker to access information which would otherwise be restricted causing low impact on confidentiality of the application and with no impact on Integrity and Availability of the application." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-732" } ] } diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json index 9c2d5eb4bbc..c244535e0ff 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25646.json @@ -2,13 +2,13 @@ "id": "CVE-2024-25646", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:48.343", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-09-28T23:15:13.110", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application.\n\n" + "value": "Due to improper validation,\u00a0SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-732" } ] } diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28163.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28163.json index 214b2f4cd5f..a0fe5ed91f5 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28163.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28163.json @@ -2,13 +2,13 @@ "id": "CVE-2024-28163", "sourceIdentifier": "cna@sap.com", "published": "2024-03-12T01:15:50.390", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-09-28T23:15:13.217", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.\n\n" + "value": "Under certain conditions, Support Web Pages of SAP NetWeaver Process Integration\u00a0(PI) - versions 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application." }, { "lang": "es", @@ -42,11 +42,11 @@ "weaknesses": [ { "source": "cna@sap.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-200" + "value": "CWE-732" } ] } diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json index 3074f068987..f31eb6509d5 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30218.json @@ -2,13 +2,13 @@ "id": "CVE-2024-30218", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:50.570", - "lastModified": "2024-04-09T12:48:04.090", + "lastModified": "2024-09-28T23:15:13.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability.\n\n" + "value": "The ABAP Application Server of SAP NetWeaver as well as ABAP Platform\u00a0allows an attacker to prevent legitimate users from accessing a service, either by crashing or flooding the service. This leads to a considerable impact on availability." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-605" } ] } diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json index 9fba230a819..a3d320e4cf7 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33004.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33004", "sourceIdentifier": "cna@sap.com", "published": "2024-05-14T16:17:13.957", - "lastModified": "2024-07-03T01:57:23.963", + "lastModified": "2024-09-28T23:15:13.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -40,9 +40,19 @@ ] }, "weaknesses": [ + { + "source": "cna@sap.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-524" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9318.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9318.json new file mode 100644 index 00000000000..f2d8a976834 --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9318.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9318", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-28T23:15:13.530", + "lastModified": "2024-09-28T23:15:13.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in SourceCodester Advocate Office Management System 1.0. Affected by this issue is some unknown functionality of the file /control/activate.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/para-paradise/webray.com.cn/blob/main/Advocate%20office%20management%20system/Advocate%20office%20management%20system%20activate.php%20error-based%20SQL%20Injection%20Vulnerability.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278822", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278822", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.412749", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 9ecc1049380..af1e8a813c6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-28T22:00:17.441432+00:00 +2024-09-28T23:55:17.196918+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-28T21:15:10.783000+00:00 +2024-09-28T23:51:34.580000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264098 +264099 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `1` -- [CVE-2024-9316](CVE-2024/CVE-2024-93xx/CVE-2024-9316.json) (`2024-09-28T20:15:02.280`) -- [CVE-2024-9317](CVE-2024/CVE-2024-93xx/CVE-2024-9317.json) (`2024-09-28T21:15:10.783`) +- [CVE-2024-9318](CVE-2024/CVE-2024-93xx/CVE-2024-9318.json) (`2024-09-28T23:15:13.530`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `36` +- [CVE-2023-39436](CVE-2023/CVE-2023-394xx/CVE-2023-39436.json) (`2024-09-28T22:15:04.010`) +- [CVE-2023-39438](CVE-2023/CVE-2023-394xx/CVE-2023-39438.json) (`2024-09-28T22:15:04.123`) +- [CVE-2023-39439](CVE-2023/CVE-2023-394xx/CVE-2023-39439.json) (`2024-09-28T22:15:04.243`) +- [CVE-2023-39440](CVE-2023/CVE-2023-394xx/CVE-2023-39440.json) (`2024-09-28T22:15:04.350`) +- [CVE-2023-40309](CVE-2023/CVE-2023-403xx/CVE-2023-40309.json) (`2024-09-28T22:15:04.460`) +- [CVE-2023-40622](CVE-2023/CVE-2023-406xx/CVE-2023-40622.json) (`2024-09-28T22:15:04.610`) +- [CVE-2023-42475](CVE-2023/CVE-2023-424xx/CVE-2023-42475.json) (`2024-09-28T23:15:11.563`) +- [CVE-2023-42481](CVE-2023/CVE-2023-424xx/CVE-2023-42481.json) (`2024-09-28T23:15:11.717`) +- [CVE-2023-45038](CVE-2023/CVE-2023-450xx/CVE-2023-45038.json) (`2024-09-28T23:51:34.580`) +- [CVE-2023-47563](CVE-2023/CVE-2023-475xx/CVE-2023-47563.json) (`2024-09-28T23:47:40.683`) +- [CVE-2023-49578](CVE-2023/CVE-2023-495xx/CVE-2023-49578.json) (`2024-09-28T23:15:11.840`) +- [CVE-2023-49580](CVE-2023/CVE-2023-495xx/CVE-2023-49580.json) (`2024-09-28T23:15:11.977`) +- [CVE-2023-49583](CVE-2023/CVE-2023-495xx/CVE-2023-49583.json) (`2024-09-28T23:15:12.090`) +- [CVE-2023-50360](CVE-2023/CVE-2023-503xx/CVE-2023-50360.json) (`2024-09-28T23:44:50.720`) +- [CVE-2023-50422](CVE-2023/CVE-2023-504xx/CVE-2023-50422.json) (`2024-09-28T23:15:12.223`) +- [CVE-2023-50423](CVE-2023/CVE-2023-504xx/CVE-2023-50423.json) (`2024-09-28T23:15:12.360`) +- [CVE-2023-50424](CVE-2023/CVE-2023-504xx/CVE-2023-50424.json) (`2024-09-28T23:15:12.477`) +- [CVE-2024-21736](CVE-2024/CVE-2024-217xx/CVE-2024-21736.json) (`2024-09-28T23:15:12.587`) +- [CVE-2024-24740](CVE-2024/CVE-2024-247xx/CVE-2024-24740.json) (`2024-09-28T23:15:12.777`) +- [CVE-2024-25644](CVE-2024/CVE-2024-256xx/CVE-2024-25644.json) (`2024-09-28T23:15:12.907`) +- [CVE-2024-25645](CVE-2024/CVE-2024-256xx/CVE-2024-25645.json) (`2024-09-28T23:15:13.020`) +- [CVE-2024-25646](CVE-2024/CVE-2024-256xx/CVE-2024-25646.json) (`2024-09-28T23:15:13.110`) +- [CVE-2024-28163](CVE-2024/CVE-2024-281xx/CVE-2024-28163.json) (`2024-09-28T23:15:13.217`) +- [CVE-2024-30218](CVE-2024/CVE-2024-302xx/CVE-2024-30218.json) (`2024-09-28T23:15:13.313`) +- [CVE-2024-33004](CVE-2024/CVE-2024-330xx/CVE-2024-33004.json) (`2024-09-28T23:15:13.420`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cd45fe671c4..af2020d645b 100644 --- a/_state.csv +++ b/_state.csv @@ -223701,7 +223701,7 @@ CVE-2023-31366,0,0,44bbd1f8a094e73a70261f57615c2508c43003e09aed16040afe9f888e90f CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000 CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000 CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000 -CVE-2023-31403,0,0,d79da3cdab0bc95b4261a818ecab1aa68802fe2ed7e8c31fd9175361f432cd44,2023-11-20T19:51:15.823000 +CVE-2023-31403,0,1,5fdd8bee99db50a48168c6cf910fe676e9bca4f466ec47070ce8e0157b59b65a,2024-09-28T22:15:02.433000 CVE-2023-31404,0,0,4a57aeaae211f48ce93cca38338dda9b5c9de161ecf2fe3caf1604ea95d230f7,2023-05-15T17:32:45.030000 CVE-2023-31405,0,0,969cd152ec35e0bebe41113c42f762a1777df1496f01a3cb659d6f147453713f,2023-07-18T18:10:38.967000 CVE-2023-31406,0,0,e6ef06b8d0d2e12fab5898067ddc6638d3129aa25756a52b02fc1cb7d45fb214,2023-05-15T17:32:21.943000 @@ -224166,7 +224166,7 @@ CVE-2023-32110,0,0,403939799f39a8ac61e8ea50435741a1b2f2651a1763f256a2753cbe37e9f CVE-2023-32111,0,0,f01715a3b0bc44a49da48dae37cd3b11e8b9bbed4cc01c89601fc7ba0af4538f,2023-05-15T17:28:48.667000 CVE-2023-32112,0,0,500b473b63c35570e3a0b2dddf442bb4d1a3b8848e942367827f5ea7c50177f7,2023-05-15T17:23:48.290000 CVE-2023-32113,0,0,52ed52d4859a67df002f37ed2aaa4d39ce83f116cf5e2d1969e6d90a53829143,2024-03-19T19:48:16.700000 -CVE-2023-32114,0,0,347b9f098c826e77e0ce34a5223cf89c4c2a99f74a9dfe723c619778f1b0bda0,2023-06-16T18:40:36.677000 +CVE-2023-32114,0,1,0a15609fb2b5b2d1029997b518de3da87d0e3877573815c744943e8e6b63156e,2024-09-28T22:15:02.783000 CVE-2023-32115,0,0,c3c14f9a6502f271a5b9eb6d48d16bfe36993e42edd597f057b0ecc72ddd5ac5,2023-06-26T13:55:12.110000 CVE-2023-32116,0,0,73b448578f57f99fb38509be1d12572fd9f535b4b34b69d6021322aeae71459e,2023-10-30T16:27:32.430000 CVE-2023-32118,0,0,3a328632555ce7f7c1a25df14024a651316fcd182b26f56fd5747ddd62122166,2023-06-16T03:56:42.987000 @@ -225738,7 +225738,7 @@ CVE-2023-33987,0,0,730078fa5315ef4dca20cb30b6fea8294c9b2bb4cc35700a073ffc2a0bfb0 CVE-2023-33988,0,0,5a9c91cc07fd432683ee76f164187371e9c7aa3ffdcf54a0baec998fbca758a9,2023-07-18T18:28:55.847000 CVE-2023-33989,0,0,78a4bfda446152fc81c2aa547105a75bfab9012ec91d4d20afe82139fa563c61,2023-07-19T12:53:57.597000 CVE-2023-3399,0,0,0f6f58d3cae0530810a7d8d7418ee7eb45cc2a247394b7c4ad89aefa7f49c8d5,2023-11-14T18:01:40.643000 -CVE-2023-33990,0,0,925b0628e0eeaceb8b87231c989b96f5c904a2815856c1ac4cf31755f81f9f28,2023-07-19T12:57:09.040000 +CVE-2023-33990,0,1,429bb9aafe8096479694a62b3f04dad25a8f4d047c435d55613482a4888c9b4c,2024-09-28T22:15:02.930000 CVE-2023-33991,0,0,2c38f74b06b22d20412aca2a54d271209ee9b7d6cb3b275f1c6d85b506b373a3,2023-06-20T16:48:54.673000 CVE-2023-33992,0,0,e0e448a5babd6ef7f5670d3b16701e514ec5e975dff13cd9e1ce223ebcd25efd,2023-07-19T13:24:24.817000 CVE-2023-33993,0,0,3a1592208fe1bf22f9ee2f9110ed0966e9b504175fab9be2c10572f072b5c0b1,2023-08-15T15:09:12.373000 @@ -226960,11 +226960,11 @@ CVE-2023-35863,0,0,cbb3608b436941ca40fc8a80428d35db8eb42f5a5a45f413b4802ea90385c CVE-2023-35866,0,0,6d8702e252316d86b52dcc46d4f25a5da1013c148d3f195460a689452152e596,2024-08-02T17:15:48.717000 CVE-2023-35867,0,0,5db923c7d14791cdd1ab7e9dc94705e30f35cb5d599aa351441dea1555738b42,2023-12-22T20:13:40.507000 CVE-2023-3587,0,0,858fbdf3b83a95a9d9fa2568a9b573917ded232ef7c8c9c0bf0b541a05fd78c3,2023-07-27T19:40:35.700000 -CVE-2023-35870,0,0,2127cfe6f687ec9c9413ff129fa6ec0edc6fb0c654c6b0f9c0c780e2fd7d2ecc,2023-07-19T13:35:31.873000 +CVE-2023-35870,0,1,921e90eae30dd3932800aee7eba5ddcdccc6ee0964eb09f08d3c88f882a4bf08,2024-09-28T22:15:03.063000 CVE-2023-35871,0,0,d43b3a693b7dc87781f1504dfdc1a0512dc65f88011ecf68fc3feb58581429a6,2023-08-14T14:15:10.587000 CVE-2023-35872,0,0,46efe0a1a61cc48f94c5ffc8323d3526b2f917771157bbd207c0cd13135b8af4,2023-07-19T13:36:59.200000 CVE-2023-35873,0,0,9be398fb5a578d66a8e050b22d237fc4e7262e6c90661c5198282761d7edf667,2023-07-19T15:27:53.343000 -CVE-2023-35874,0,0,f65431a0123b9df030788721d69d8bd466646c2fa9b613690a495994b497c061,2023-07-19T17:13:20.070000 +CVE-2023-35874,0,1,07d063e56172d4b330873c6a8a0017004b0e9740e74348b8a3a1bf876d0e0de9,2024-09-28T22:15:03.187000 CVE-2023-35876,0,0,d18e0ce61960cccc57bf475a075bb7f424cb1062b297d3699e467aff78c0d9c5,2023-12-28T20:17:35.997000 CVE-2023-35877,0,0,0ed125dbba11615c742d210b81261f0b496018687670d00a2fbc4ade0656a38a,2023-11-16T18:14:43.550000 CVE-2023-35878,0,0,31806b46808d48e1b06bdfff9d6a9d20e621aec43eefb38af128b522c0380e3f,2023-06-27T15:16:31.900000 @@ -227818,7 +227818,7 @@ CVE-2023-36915,0,0,5d656d6742cd64232d331d79f144c5195083cbe66f00399e182bec51b9ac8 CVE-2023-36916,0,0,67ac9d41aeea12b3c5abede45e587aaa746d1890bd1ab96299049df166b76c59,2024-04-09T21:15:11.227000 CVE-2023-36917,0,0,63f41b496cca09ca13149b06a529715ca5422dd2b4ca4c74715fb23e43003f71,2023-07-18T17:01:51.703000 CVE-2023-36918,0,0,ce15c2b3b21fc1790596c0ac8f2a6a976b4bc5b08101d2f149737c42c78576b2,2023-07-18T18:18:05.993000 -CVE-2023-36919,0,0,e7c8e3207a0198ed48239ab72cc3149687de3ea6b69edfd45837858bf4c8e836,2023-07-18T18:17:10.787000 +CVE-2023-36919,0,1,1076e2832e8aa0b910bf4b7db5a2747930ccd90a83d98859980dca73d8d75e3d,2024-09-28T22:15:03.313000 CVE-2023-3692,0,0,d64ea2c78b76086a94b1a5c632af5e2d6ded6ee02b85b4c9f53744c42a27def5,2023-07-27T19:56:48.617000 CVE-2023-36920,0,0,c6aa92f8fc7d3cbbad5f554b81599e99635f832f01ebef5100e7043fe53fad1d,2023-11-08T00:16:23.700000 CVE-2023-36921,0,0,d14eb8e094eb26ebc2c221be24a1c18cdad698ab0655f977ead62c9cc244468d,2023-07-18T16:58:01.603000 @@ -228212,16 +228212,16 @@ CVE-2023-37479,0,0,65e698aeeec2de06015ebeeea50f3d8c2a3426ce2bf10b2923c6560b563e0 CVE-2023-3748,0,0,fbda536dd4dc031ecda3b4a3649fdc6e53178f4339fdaffc9ef3ebd42ff82bf3,2023-11-07T04:19:28.013000 CVE-2023-37480,0,0,652a3a23bafd305f9c2b7d3d1b87d3da5a01c6872bd5490c2366de4adbf638c6,2023-07-27T19:47:29.237000 CVE-2023-37481,0,0,db4abe35e141784e06fa4f3deb2743fed370d0e6ce2c608fe66c51d91bc9a2ec,2023-07-27T19:48:07.587000 -CVE-2023-37483,0,0,6ddffa99077bae0c842b3cd031f05a68a5c733d4f8db7a21318ba0bf3c2abb41,2023-08-09T18:21:52.827000 +CVE-2023-37483,0,1,a06c307876460fd1997034979cd734b50178b62883eec0ec2aad9e9fe3eb8226,2024-09-28T22:15:03.433000 CVE-2023-37484,0,0,760f55faa8c391cf557574d8b28bc1659926eabce351e2c7fb22d1954e7103de,2024-09-26T19:15:06.213000 -CVE-2023-37486,0,0,f6f5a77c2d0e52e0428914b15fd4265bdf16387c1cd190276d0f97f4c62a3254,2023-08-15T15:15:07.713000 -CVE-2023-37487,0,0,f76a2fd9614b732196506a47e0abbc2c3db3bd3d9201a0a6ea97da1fbd42691b,2023-08-09T18:21:30.300000 +CVE-2023-37486,0,1,687c614f5ca4a79aa3d21e7b0746a1427771024c9b5a884c3831416a73c97e9a,2024-09-28T22:15:03.550000 +CVE-2023-37487,0,1,dd465ff25b94ede3032e958cf77df90cbd7c58a152279b54e8b633ded141b6e2,2024-09-28T22:15:03.670000 CVE-2023-37488,0,0,a032fbb6b6fb8d9ec7eaea4394794969b13cf8fc31e6b77ab71c16c0ca58d597,2023-08-15T14:54:40.297000 CVE-2023-37489,0,0,1d24e14d654cea189a394fecb9c8bb7c050b6c0ec5ed17426a45133d2723e5bc,2023-09-14T02:07:38.067000 CVE-2023-3749,0,0,79575f437c00db11c5bc0408c98a9b194331bfe98dd13f13102bfbfdb447b240,2023-08-09T15:39:05.463000 CVE-2023-37490,0,0,d0afa82f8e1f60484edfa4ee4b02e342b7b84361f9859d350cae937d83586605,2023-08-09T18:21:14.410000 -CVE-2023-37491,0,0,cfc8810b41ae428e73649bc07462f6781a20054f51ecafe52270a98e7724ecd1,2023-08-09T18:20:38.800000 -CVE-2023-37492,0,0,bf4b459e0762189030ee469dc517203428f0488fe80b15c9ae25433ac18156b2,2023-08-09T18:20:16.060000 +CVE-2023-37491,0,1,f4f9aec1cccee79a8f65d739ee1fae55691219898360f98989170d7ce3b63272,2024-09-28T22:15:03.780000 +CVE-2023-37492,0,1,3201cae8021ed446e9e72842e5aed642bb38567a5b6d5d69dfeabfe2209387af,2024-09-28T22:15:03.890000 CVE-2023-37495,0,0,88b1b51fbc2aad530bec1f2499429397c80ed14af053e3ad0aaa2da2a3d61382,2024-02-29T13:49:47.277000 CVE-2023-37496,0,0,b3f6cf2213edd1b1c9a2df0a7e4e60f95ea00f20eade28d20d75195eb4a8af8d,2023-08-04T16:25:04.313000 CVE-2023-37497,0,0,a16a802dd163d689a9d35dd104f0934c7f0cb9de2213c75db89f75dc9c196288,2023-08-08T14:49:09.140000 @@ -229827,12 +229827,12 @@ CVE-2023-39432,0,0,c2c5e4411d42152860b85e65fde776a03bb884049f8dd2a1bf7f1c7dfe4b0 CVE-2023-39433,0,0,f891132ba414524367ca6e5b3376c4fd3194df781c7ccd69c825a121a915823e,2024-05-17T18:36:05.263000 CVE-2023-39434,0,0,bc693e7754388058b19485a72219b0597d4d79b71ecc558e086fe03a669881fc,2024-01-31T15:15:09.663000 CVE-2023-39435,0,0,2cde1591acdec05b9dded1c5b5ca1d20ab1200f3c8779b480c0f389d969c7be2,2024-08-02T18:16:11.260000 -CVE-2023-39436,0,0,107d83a698fc68171a413751026b5ba7898f39b2306fe2e180d902538a5279d0,2023-08-09T18:19:29.723000 +CVE-2023-39436,0,1,91dbd45fc6d7cbbfca5793894245e11bf171465babb030aa24b814b96ad3465e,2024-09-28T22:15:04.010000 CVE-2023-39437,0,0,b841f4255101e124b17ae23b02cf5d1b090638a4fc3910c94f13b97ddb25767c,2023-08-09T18:19:10.230000 -CVE-2023-39438,0,0,65ceb1aac39048f0a3b0a9ed829593cfcea3d6c50c1e229c7605d6ec094188a4,2023-08-22T17:32:59.287000 -CVE-2023-39439,0,0,bf27882533b579af51afa70e227ee0cc4b300d19ed14becb29c2020767ae37ec,2023-08-15T15:28:19.137000 +CVE-2023-39438,0,1,8b59466a23cd4d7d7241f64763cc91bae48570db99077a0b129f81adc6171fcc,2024-09-28T22:15:04.123000 +CVE-2023-39439,0,1,34ef72977e4842aee96fb324aa892becfcd70f8ea4692a0db324f554980ef8a4,2024-09-28T22:15:04.243000 CVE-2023-3944,0,0,df00d3557db6753bd6b2ad3c7f11ec86b8aa42d5dfb831d8b5f3e11df12ce829,2024-05-17T02:27:57.947000 -CVE-2023-39440,0,0,a1c9bf185968998e16532bd3fd85b1812cb101c4339be6a4ed481795b760b43c,2023-08-09T18:22:07.123000 +CVE-2023-39440,0,1,6a2f84855caa69d956f5aa7ff3d81683e8055e06632176c19aacf42c40cf5311,2024-09-28T22:15:04.350000 CVE-2023-39441,0,0,1524af4c21eae8180b90656f56e4a47c0f827b489d48bce7311f67eaeb7fc6cb,2023-08-29T15:48:57.633000 CVE-2023-39443,0,0,1a26c9a28c096baa05119ad2798651f43ab2b06c68ce772bef1bd6a634d5fb42,2024-04-09T21:15:15.770000 CVE-2023-39444,0,0,8b67b0a3f75b53fd0b4a8e0d327154f6629b9f5e5973540fb30aa61cc1ab9e84,2024-04-09T21:15:15.873000 @@ -230478,7 +230478,7 @@ CVE-2023-40305,0,0,a709c79a40741227f412ea5137931cdb24c45c1293363bcf092e9d35a151d CVE-2023-40306,0,0,bd6bf8b0706e3eb9376e2fdb97bbf36506c5582490b9ed214eb2d3c01e19bf67,2023-09-13T00:38:01.823000 CVE-2023-40307,0,0,ddcb42995f545b3dbd573d42be7cd65a62e5d161097fa3407e331e12871a2c1c,2023-10-02T17:49:25.247000 CVE-2023-40308,0,0,98c43c86dcb343e085b8745a6568623d24b202c96e4353c1ce375574045aa4e5,2024-09-26T19:15:06.487000 -CVE-2023-40309,0,0,3158cd3d1c7afa39b9a5ea30dd125b54cd6bb09a46144632cf1f66ef4d734c63,2023-09-15T17:05:27.130000 +CVE-2023-40309,0,1,1b0bc6771b82c947113ef68944a1650f468aef63818b03d82f35201b0306ca2c,2024-09-28T22:15:04.460000 CVE-2023-40310,0,0,aafae91f872ed8196d989ce6f92724af64aa9c420d18d46f56352ee69e0632df,2023-10-11T19:10:10.253000 CVE-2023-40311,0,0,97ab1d90ac0eabc8fe9eefc1eb35bce10058e81ca86a8abc18ac988d8880435a,2023-08-23T17:04:28.627000 CVE-2023-40312,0,0,acc8e0b15b4384682b1bc786a01efe9878d67c6d102843423d8c8719fa2528cf,2023-08-23T16:58:38.697000 @@ -230770,7 +230770,7 @@ CVE-2023-40617,0,0,3a460a0fe7b821688e96669bfca02ae7badd6e98fed7bf3e4d4aef8e02c15 CVE-2023-40618,0,0,b22f1e470705cb01d295026df0efcfb6a0941d66f006698c10d413e612027e8a,2023-09-26T14:09:16.680000 CVE-2023-40619,0,0,f1489f101809c6a30e839362b8151d60789a86328685856374a0c0ad5eacef3e,2023-11-03T11:15:08.183000 CVE-2023-40621,0,0,03427c02c9886665707f46cfbc8e9c6c323eed2cb28445fd2559ec4dbb9a0abd,2023-09-13T14:46:22.113000 -CVE-2023-40622,0,0,b2e9290062f0b2384da64e95a8103714a30d28c2fae4e5bd7f8dd33b7bd72e91,2023-09-13T14:45:47.617000 +CVE-2023-40622,0,1,f4743d29cb785e0e3a8d8e81eda60ec8ac35200da2c21645734f661d2a256cd2,2024-09-28T22:15:04.610000 CVE-2023-40623,0,0,5ee5e0592116f6d4636a97205259d6bf210e0a97114ba463eaa2c70bbcfc42a1,2023-09-13T14:45:19.633000 CVE-2023-40624,0,0,747cb3d54257bb2c6b03c46b6a0b19e07ee27d544e5eeb8ae834154eb4c91df8,2023-09-15T16:24:06.913000 CVE-2023-40625,0,0,f9655b86ad188075706103365b8f2083509d75f1e65a1d7efba6dfc1f629e08d,2023-09-13T14:59:43.357000 @@ -232086,14 +232086,14 @@ CVE-2023-42471,0,0,3d47fcf90090571e29593e83e592637a2983aee4c755b0502ea61f6a8ff0f CVE-2023-42472,0,0,d4b6e31aad9009b5c9e01ff4d5ef8ee885211dca89fab65e12e85f27feca21c4,2023-09-13T15:01:22.793000 CVE-2023-42473,0,0,3dc315884c13bf461401454525346c0be60bd374f097b946976815a94631c8ed,2023-10-11T19:10:40.223000 CVE-2023-42474,0,0,481ae6b0e8f41d4d61d692a5cd2060771c556db8f6828058322fe13af59a07a2,2023-10-11T19:14:12.600000 -CVE-2023-42475,0,0,c663c83ade1f09b59456913c44e927bada30d46f7e905ad0bea997b37405208e,2023-10-11T19:14:53.293000 +CVE-2023-42475,0,1,c1b0ee1eba3e5fb512186b0dc30efe85ed7379b2a5ac26055cf44270cbad052b,2024-09-28T23:15:11.563000 CVE-2023-42476,0,0,3b3dd9807a0f4ed6ce2468f7a4ed8fe4e9ea19bf3c6d0591c051ac24ff0ad738,2023-12-14T00:07:10.443000 CVE-2023-42477,0,0,fec4e6b685afd7509507459ccf95b2de9653675dc5d035947dec6f17dda7c351,2023-10-16T18:14:29.393000 CVE-2023-42478,0,0,c4c7f09ad08c692378f0a61d49fca19f206097275d23bd3ca18b775839aec945,2023-12-13T23:23:46.593000 CVE-2023-42479,0,0,f0b1e6ab673626b705998f4f2380ee9d6acf6b1d897467ec67c33bbfa23aabf0,2023-12-15T14:49:29.267000 CVE-2023-4248,0,0,938b672c9f5bfea09c245c341d3b357ab47d1817c22604b02cdc3f59b07bf2f0,2024-01-17T00:00:16.260000 CVE-2023-42480,0,0,b4c996dc097786af55fa5d04a9ac4df88342c244f821e059bb278dc9d11beef4,2023-11-20T19:59:14.070000 -CVE-2023-42481,0,0,b58b94638fccc46f1140f776c6206097494ba9d23b4e21c2a2062076d51216d3,2023-12-13T23:54:39.960000 +CVE-2023-42481,0,1,24868d5de151eec6717fda4925ac65c6552a60bcbde5db803be9c2861b2ed7f3,2024-09-28T23:15:11.717000 CVE-2023-42482,0,0,9c5cada0b75438fb7635b87fbd7757cce171c67bbc4934b1768b3b34aa22b31c,2023-09-23T03:33:36.887000 CVE-2023-42483,0,0,884b55162d96c6c79bd2f0068448c5d90c631bb990c572d1d302d6389b80e217,2023-12-15T19:13:42.503000 CVE-2023-42486,0,0,033e47c7d5f41ab68591c7c5f1ab98fccccaf7fc715f16f8625db94f13953ee8,2023-09-28T17:50:46.877000 @@ -233743,7 +233743,7 @@ CVE-2023-4503,0,0,9a35d49a48b71f7276fb8172166d6d1aecccabc3aade6184e25e8c96138a6a CVE-2023-45035,0,0,48123901d1326f450c18d3b0ccad106d9e148b3033fe2b672e89055fc85cad07,2024-02-08T03:48:56.403000 CVE-2023-45036,0,0,5b3e2bf8b11caa6b50968173d283a1eec4ca6a58ec51bfb3f0740601e12c6547,2024-02-06T20:18:45.043000 CVE-2023-45037,0,0,d9bef7c23ea9eb8863eec401793407eae857058b6098d8a56b377750f03a7bed,2024-02-06T20:18:34.557000 -CVE-2023-45038,0,0,20fef31377818e2b437a887eb4f5a6cebd8f7a1ac1e8a406b25c4aaf5eb1496a,2024-09-09T13:03:38.303000 +CVE-2023-45038,0,1,067d3daf830335f4445bbcc95af30c7b0b231a5ec96e22c57e090e46928a561f,2024-09-28T23:51:34.580000 CVE-2023-45039,0,0,e8930afda8d133bbe65ee717cfe9224bd9cb5c74f33c400953a957a39946a6d1,2024-01-10T16:59:35.883000 CVE-2023-4504,0,0,48b788a38cbf3794838d5825f4a3d5b50fb58219a94aae40cd43de2ab240310f,2023-11-09T20:58:00.163000 CVE-2023-45040,0,0,4264dd7f7c1bfe78bdbabea796f0de0efca1ab106d71d9c726cef2ae7b66f8b6,2024-01-10T16:57:27.477000 @@ -235586,7 +235586,7 @@ CVE-2023-4756,0,0,60c65032e5b93776fef6f38ba2fedf37023289c4f2a24ceb78bc3b2f406a9e CVE-2023-47560,0,0,5ac28e7e9a66106b736371a34b3097e66ad1cda34200867e184b83d8e20d363c,2024-01-11T14:07:09.593000 CVE-2023-47561,0,0,8c6823c8294618b7f2c78f304596bd27d313bc780b9a248a6002fe2f9ebd6d0f,2024-02-07T17:51:35.570000 CVE-2023-47562,0,0,eed5fa12d7eedb3933e2c8a9aa4171d8041e9fcfcc221d3d86745eee17563b9c,2024-02-07T17:50:38.510000 -CVE-2023-47563,0,0,39305aeade9593fe001a9b2fa8779e8df536095891c00baf05da0a2a366851ac,2024-09-09T13:03:38.303000 +CVE-2023-47563,0,1,a18ec77086e0b85a091c4b2d33d65478f0d4b9cad261c6a0c8d5816eb317a727,2024-09-28T23:47:40.683000 CVE-2023-47564,0,0,34d735757dd301c9641e82718c2dd925495c3b8fb8af8ff042788502c1634ad5,2024-02-09T19:33:26.900000 CVE-2023-47565,0,0,282333723d94196bbefe55ff568702e2610a6820a9456aa9fe6ac73919207aea,2023-12-22T02:00:01.337000 CVE-2023-47566,0,0,26a4a10ebe40b2b5bf6badce33dd8f30d8b09a56a91b1061398ee28499d68a36,2024-02-06T20:18:26.263000 @@ -237054,12 +237054,12 @@ CVE-2023-49573,0,0,668d26e17886603090861420f97df7110444aa6097038cffa9edd3fe881cb CVE-2023-49574,0,0,cf12ec560e66df2f8e6fe14be56965158911ec99b9b79f08d7d31fadd9d28d5f,2024-05-24T18:09:20.027000 CVE-2023-49575,0,0,ac9ff4377f1f3563c349897d2a2875f9aff8e7a6d6bd9465a4e338b042bba3c4,2024-05-24T18:09:20.027000 CVE-2023-49577,0,0,337a8413375455feea032808d84500f8744a9a8b52d72a926a4fb84eb6b7aad8,2023-12-19T14:50:18.817000 -CVE-2023-49578,0,0,554376a4a5e89af7792fb2e3caaee83c155712344a4b55572197b12bfc2f727a,2023-12-15T14:32:38.473000 +CVE-2023-49578,0,1,1167f5734b8f433be63e1ed4f7be6d7f7a0ce424c44e3fe6e46dc74ec52fce97,2024-09-28T23:15:11.840000 CVE-2023-4958,0,0,b9fc19622ba6df397f2314bb1498399d57a97d8d3d77e1be35cc528df3591ff4,2024-05-03T16:15:11.227000 -CVE-2023-49580,0,0,815954f9407b74402abcfb36fe3f08f951a3ae3d064781c18823d1ab5df6702f,2023-12-19T14:50:39.843000 +CVE-2023-49580,0,1,1fe00926918ee94ed5d0f65be26556c618ba07b3209d13ab98392975d7829a67,2024-09-28T23:15:11.977000 CVE-2023-49581,0,0,c752d9c8b49d3a50b30e010fb1e627be8921c15cd9f5ebf74ca53588cf11cd1e,2024-01-16T14:15:48.123000 CVE-2023-49582,0,0,254586a5bd35da117db3a87fcbf0665709da9c852d76af64aed9d2b7bc82d1ec,2024-08-27T16:04:58.657000 -CVE-2023-49583,0,0,2bbc4069f5dd786f8918873219f212a951808fc3c08912cfca16a05ba9ea4494,2024-01-09T02:15:45.140000 +CVE-2023-49583,0,1,17a566852cc5bd1ad30f2730f7b7805c66d84960c5d6f97f747b6a073ca3776f,2024-09-28T23:15:12.090000 CVE-2023-49584,0,0,12b0484dfd67af5cdba226de40078067413392935bfd8575322e5980ac90dd4f,2023-12-15T14:26:47.663000 CVE-2023-49587,0,0,b72e8cc0e0b1f24503bc21b9e5a03faa03723a19fc8b810902b73346efe7215f,2023-12-14T15:41:25.777000 CVE-2023-49588,0,0,da1e9f5316d05f0feeebf32eba644409b9293543014b6e46be9637d63d764393,2024-02-14T18:15:46.310000 @@ -237592,7 +237592,7 @@ CVE-2023-50357,0,0,c49fba6a6b8ae43153115bdc180d0a50fda6badb9bd287f826717a708c649 CVE-2023-50358,0,0,affeae249fec946895d3bef4063e720c758024b3343a9b8cb10accf20047afe3,2024-02-15T06:15:45.960000 CVE-2023-50359,0,0,017df15c1e36b7a4da9c2a548d3a19bcce6cc2270ecdf18aa860e29b8b47570d,2024-02-06T20:18:14.547000 CVE-2023-5036,0,0,142ff7c8f9f78ca5371b9c6802e1971802347d9f04e927ee76b2acbd83ef8ec5,2023-09-19T13:18:54.193000 -CVE-2023-50360,0,0,19cb0c6712f1a903163d12dd49d9d935fcb1d184a64fe55d7987afb650b9501c,2024-09-09T13:03:38.303000 +CVE-2023-50360,0,1,27634f79a715ec48d12d4c3552f14cf2df45a967ec21f459defca999b97ed253,2024-09-28T23:44:50.720000 CVE-2023-50361,0,0,188b58f48ae349f3b9eaaccb10078a3e7a1f81ce543b15434a0caf573d93d149,2024-09-11T13:25:10.873000 CVE-2023-50362,0,0,31a964a4db386c4376a063900f0da816b2224f83fc7dcc60de4592c35a7b4c69,2024-09-11T13:26:57.707000 CVE-2023-50363,0,0,a3e5f8527cf755f8b94f6ecd1f1ebe83c8a25ee2cb0536cd8287e4c1acfd8207,2024-09-11T13:30:17.090000 @@ -237619,9 +237619,9 @@ CVE-2023-50387,0,0,570d9f4f035f72cf75b6fb2ec7a865d346eadbb37e839bf469ab56bd506c2 CVE-2023-50395,0,0,0e94ac3a53ddd522dfa1daba7864a823ebeef0121cec6b5f6750eb619a73d637,2024-02-13T20:35:06.703000 CVE-2023-5041,0,0,edfc474d6f8955b06b6b129c14854ffb36763d854b8ade07d6bf9f3581fc855e,2024-01-24T19:20:29.410000 CVE-2023-5042,0,0,17be57ec49e4200dc6b7de1783f7771b7237e91348201a865d65f3f8ff47b98d,2023-09-25T13:25:16.230000 -CVE-2023-50422,0,0,624c27edd4b3bfc029c7f12e197c32b34c1906754e2ad8d27cfb2937fe4099a8,2024-01-09T02:15:45.420000 -CVE-2023-50423,0,0,ed806015b67283c87858c17058bafbfd7ccbd554290762a1244fb3d2e8610e1e,2023-12-15T16:53:22.867000 -CVE-2023-50424,0,0,0f517a9e1d3d830ab081f35615260440ec2df7800af1240f860d01ea4fe4fc7c,2023-12-15T16:53:04.417000 +CVE-2023-50422,0,1,2e74a3fef27ae16d3512ba178b2cd1f8610f89b13a942b920a7dd95c102fa33c,2024-09-28T23:15:12.223000 +CVE-2023-50423,0,1,2150b034245e11b7172ea5c3d421807e644ba644bc75de8c2a84617f8a025ff4,2024-09-28T23:15:12.360000 +CVE-2023-50424,0,1,8c5083bac1ff92e08b481a632dbb35f753fe85f3cc8cb2fe6559ea5bb3362c14,2024-09-28T23:15:12.477000 CVE-2023-50428,0,0,24e245a5620aa9efed1739f31f330f49d3b1e7340a02a534f07d622180c9ee2a,2024-08-02T23:15:27.933000 CVE-2023-50429,0,0,cf7c3990876d34813be7786260b9d58e3f0ef74bfa3057d97d875c61dd198c94,2023-12-14T14:33:52.857000 CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000 @@ -244299,7 +244299,7 @@ CVE-2024-21732,0,0,5b8477386d174238a16ab6890c874c5b9a2e295383724c8992520c310a411 CVE-2024-21733,0,0,5c1944b5f993b5404fdb05bb0e77d12a8bf708110b872f1231cf5e420e715391,2024-02-16T13:15:10.190000 CVE-2024-21734,0,0,885365a84c85d383ea10609ce715ea65d1a8ab1acecb51a21fedb1fc4873fc73,2024-01-12T16:34:40.870000 CVE-2024-21735,0,0,64afeafd3ca5ebe95ef19b8cb0b1a221cb3831f7e736f22e7bca2463c0261a93,2024-01-30T22:15:53.150000 -CVE-2024-21736,0,0,794296433b0b6c553cd106f1bd31a638f539e91ea6f82e61204a43660acdc041,2024-01-19T17:30:01.407000 +CVE-2024-21736,0,1,54442fb9b042c5f4e212c801d8862949178fa83601b4c5ba313c1abbb63c3c64,2024-09-28T23:15:12.587000 CVE-2024-21737,0,0,59ff5ff1f6beafb8f0d3418ea62fa9e84b0ab8ac80ddfb91af2e3d93d716a188,2024-01-16T17:45:47.083000 CVE-2024-21738,0,0,ee493f18830fa61778a839e41065e0a164cfc7a69da412e6c6babcc4b17cc105,2024-01-11T22:54:02.190000 CVE-2024-21739,0,0,74c51cc55d726fea23dbc7423ad28b618c0ad3e8f250404a9e572e22bf0444c5,2024-06-26T12:44:29.693000 @@ -246242,7 +246242,7 @@ CVE-2024-2473,0,0,b1c39f683d6b313337fd343b6b650f75d80b2d74ff0a3d50cf1f445968eec6 CVE-2024-24736,0,0,314fd4df2659ae516d75e93823704bd217b531c9ea252f3ea384402e73f605e1,2024-02-02T02:08:23.417000 CVE-2024-24739,0,0,e6ef264a93a50eff13b25a0b1f96966e49da366ebdc1c075ecbe225ac111b0c5,2024-02-13T14:01:40.577000 CVE-2024-2474,0,0,e295561a11995d9c40e939a773b47208b6445581a981c9a04645753adc140ddf,2024-03-20T13:00:16.367000 -CVE-2024-24740,0,0,055e621299fb8cfa25051c1c9b5b6e90ccf0de6c197861466b8c657e95fd4986,2024-02-13T14:01:40.577000 +CVE-2024-24740,0,1,5a0025656e10ede9df3e0999b52fcdfd5a23388b4b1c6503aed4b2448caac40f,2024-09-28T23:15:12.777000 CVE-2024-24741,0,0,055f4a536b488558e042e77fcf1dc4ede8dc674d4e491c7a235734621d72b4a1,2024-02-13T14:01:40.577000 CVE-2024-24742,0,0,87b67dd3de4a42ff5193bf6db8fa126263e616b4bc4dcdea2d08157e23dce2d0,2024-02-13T14:01:40.577000 CVE-2024-24743,0,0,951e24161363ed6730298781326eb91e2e05dd09153b345d01a5eecb04bc8312,2024-02-13T14:01:40.577000 @@ -246894,9 +246894,9 @@ CVE-2024-25640,0,0,3bceb9b54384127c8987d6d0f984f439fa5009d13bcb784ca7a9cb2c455ef CVE-2024-25641,0,0,676a26b1b2c12534fcd8ac5d05e0285f4f22783fa69470781479894a7e859c5d,2024-06-10T17:16:21.837000 CVE-2024-25642,0,0,62b98db44a08196f7b7012c39faaf86e5ea68b1167c724b1b57391d731cd46b5,2024-06-10T17:16:21.947000 CVE-2024-25643,0,0,531b402e512e75c4384caa610ae811e75e61e13fefc89fff8eb67c6e4dee7cdd,2024-02-13T14:01:07.747000 -CVE-2024-25644,0,0,3219e2e709e527015a48516ae6dfaf602d72b63a8b92f510428759964fa2ea48,2024-03-12T12:40:13.500000 -CVE-2024-25645,0,0,5e73536a8c6d34e4b421ffd125622fb4637ca2ae5f29dc9f1d9e4ca68f957637,2024-03-12T12:40:13.500000 -CVE-2024-25646,0,0,f96a3838d7373a7e4c4d8dbfc1fa5fddee970ebb06619f04a6a27f836ef12886,2024-04-09T12:48:04.090000 +CVE-2024-25644,0,1,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000 +CVE-2024-25645,0,1,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000 +CVE-2024-25646,0,1,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000 CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000 CVE-2024-25649,0,0,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000 CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 @@ -248952,7 +248952,7 @@ CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16 CVE-2024-28160,0,0,241bfdb3674a34e6849fc0ad74b8b7e2c84a649745fec71e6a1d767d5a523265,2024-05-01T18:15:17.143000 CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000 CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000 -CVE-2024-28163,0,0,2ab950e2f7c3eb99ef2d44d7cd9af8946dbe397a4a6d73bb020329a22bfd44bc,2024-03-12T12:40:13.500000 +CVE-2024-28163,0,1,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000 CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000 @@ -250282,7 +250282,7 @@ CVE-2024-30214,0,0,cf5accb9e4a3278486a75d6623c8c03abb4ef1fc50fe46650d28f97df932b CVE-2024-30215,0,0,3576a060ab4a3509fa025a4a09e391456b98e8a3ff1f9ef6a6adfedd520e279a,2024-04-09T12:48:04.090000 CVE-2024-30216,0,0,317fbed0703b9e56e6e6659964629ef86247b3618fd61971d8544005edb73b9f,2024-04-09T12:48:04.090000 CVE-2024-30217,0,0,dc7c143bac3a66c1917b4b2e1e571544199576af15f1c229990a317af3df58ab,2024-04-09T12:48:04.090000 -CVE-2024-30218,0,0,8a69e19ff6d45dba2fc3fe9cbec76c5157ffdbe210f0a0375f9b6ca12b157aa5,2024-04-09T12:48:04.090000 +CVE-2024-30218,0,1,5f669f8b672f21460455ea72a76ee594e61362d8a5948a66529555605773b70d,2024-09-28T23:15:13.313000 CVE-2024-30219,0,0,58a0ce96139e860887241ec214de08a83f6a295a69c273470160597230c476b7,2024-08-02T02:15:21.560000 CVE-2024-3022,0,0,5e468669a1bf6780e691c70abcdca6d29e576f4158c740ba44cf88cd33320476,2024-04-04T12:48:41.700000 CVE-2024-30220,0,0,cdf9eb92198fd5f7ed28a64003f236fba45aaa8db3640801c81262851b43cc57,2024-08-02T02:15:21.620000 @@ -252392,7 +252392,7 @@ CVE-2024-33000,0,0,4fa8fb2595c0457675d86cac50d60385335480588f2754c16c92238c89528 CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295629,2024-08-09T19:36:18.637000 CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000 CVE-2024-33003,0,0,f92d99f5ef6ac0dd2fa77c8e3e4a82297fdecac133b0dd0df2ea5b03733ef6c0,2024-09-16T16:22:07.617000 -CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000 +CVE-2024-33004,0,1,b4d4e30a06e9114efbe213bcb0a187e38c5d8d0f9c07694c65f258c76ba852d6,2024-09-28T23:15:13.420000 CVE-2024-33005,0,0,b6e8581506b98b3d048c876ef09153cc5329e2b3c294dcc9c0512597d7564067,2024-09-12T14:39:03.480000 CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000 CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000 @@ -264095,5 +264095,6 @@ CVE-2024-9299,0,0,799e3f49439baf2432b26834e94671a2c07ca8bcc110298b74e6fbc73a1e52 CVE-2024-9300,0,0,4aee81e48dbe8631e425ca1253bf1fefcd0e37e8736692eb326116d6964fe2c0,2024-09-28T15:15:14.263000 CVE-2024-9301,0,0,f7d62ae99cd0d6877c5db63fcb4f2c0f8f043fbb8339f25415912b7f29acecf1,2024-09-27T18:15:06.163000 CVE-2024-9315,0,0,1aaf0b25bc5db159a5983cc16616c1ec4eda1359782a55e5468dbd7b3fd618c0,2024-09-28T19:15:12.353000 -CVE-2024-9316,1,1,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000 -CVE-2024-9317,1,1,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000 +CVE-2024-9316,0,0,885b5aadb6325a477167b023e058998d0e537cb489dccafe50b89208946e54a4,2024-09-28T20:15:02.280000 +CVE-2024-9317,0,0,690e444ec011bf1361fdd2bbc9cdec3497358092c2cc8cdf0f08f746b48adc8b,2024-09-28T21:15:10.783000 +CVE-2024-9318,1,1,359284304f599d5b46dabbdd36eaf80d2e0ebae0fa4900079642b914d1c2b0ed,2024-09-28T23:15:13.530000