From f15b28c3a790af824b6a947ab68e240adc65923a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 30 Sep 2024 20:03:17 +0000 Subject: [PATCH] Auto-Update: 2024-09-30T20:00:16.994670+00:00 --- CVE-2023/CVE-2023-235xx/CVE-2023-23574.json | 16 +- CVE-2023/CVE-2023-25xx/CVE-2023-2567.json | 22 ++- CVE-2023/CVE-2023-62xx/CVE-2023-6222.json | 24 ++- CVE-2024/CVE-2024-288xx/CVE-2024-28809.json | 21 +++ CVE-2024/CVE-2024-288xx/CVE-2024-28810.json | 21 +++ CVE-2024/CVE-2024-288xx/CVE-2024-28811.json | 21 +++ CVE-2024/CVE-2024-288xx/CVE-2024-28812.json | 56 +++++++ CVE-2024/CVE-2024-288xx/CVE-2024-28813.json | 56 +++++++ CVE-2024/CVE-2024-354xx/CVE-2024-35495.json | 21 +++ CVE-2024/CVE-2024-394xx/CVE-2024-39431.json | 140 +++++++++++++++++- CVE-2024/CVE-2024-394xx/CVE-2024-39432.json | 140 +++++++++++++++++- CVE-2024/CVE-2024-394xx/CVE-2024-39433.json | 115 ++++++++++++++- CVE-2024/CVE-2024-394xx/CVE-2024-39434.json | 115 ++++++++++++++- CVE-2024/CVE-2024-394xx/CVE-2024-39435.json | 140 +++++++++++++++++- CVE-2024/CVE-2024-417xx/CVE-2024-41725.json | 88 ++++++++++- CVE-2024/CVE-2024-420xx/CVE-2024-42017.json | 48 ++++++ CVE-2024/CVE-2024-424xx/CVE-2024-42487.json | 75 +++++++++- CVE-2024/CVE-2024-441xx/CVE-2024-44170.json | 95 +++++++++++- CVE-2024/CVE-2024-452xx/CVE-2024-45200.json | 39 ++++- CVE-2024/CVE-2024-458xx/CVE-2024-45861.json | 62 +++++++- CVE-2024/CVE-2024-458xx/CVE-2024-45862.json | 62 +++++++- CVE-2024/CVE-2024-459xx/CVE-2024-45920.json | 39 ++++- CVE-2024/CVE-2024-459xx/CVE-2024-45993.json | 39 ++++- CVE-2024/CVE-2024-462xx/CVE-2024-46280.json | 39 ++++- CVE-2024/CVE-2024-462xx/CVE-2024-46293.json | 39 ++++- CVE-2024/CVE-2024-463xx/CVE-2024-46313.json | 39 ++++- CVE-2024/CVE-2024-464xx/CVE-2024-46475.json | 39 ++++- CVE-2024/CVE-2024-465xx/CVE-2024-46511.json | 56 +++++++ CVE-2024/CVE-2024-465xx/CVE-2024-46540.json | 39 ++++- CVE-2024/CVE-2024-466xx/CVE-2024-46635.json | 21 +++ CVE-2024/CVE-2024-470xx/CVE-2024-47066.json | 63 +++++++- CVE-2024/CVE-2024-473xx/CVE-2024-47315.json | 57 ++++++- CVE-2024/CVE-2024-65xx/CVE-2024-6544.json | 44 +++++- CVE-2024/CVE-2024-67xx/CVE-2024-6786.json | 64 +++++++- CVE-2024/CVE-2024-67xx/CVE-2024-6787.json | 64 +++++++- CVE-2024/CVE-2024-68xx/CVE-2024-6800.json | 100 ++++++++++++- CVE-2024/CVE-2024-72xx/CVE-2024-7207.json | 156 +------------------- CVE-2024/CVE-2024-89xx/CVE-2024-8941.json | 46 +++++- README.md | 73 ++++----- _state.csv | 119 ++++++++------- 40 files changed, 2169 insertions(+), 344 deletions(-) create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28809.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28810.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28811.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28812.json create mode 100644 CVE-2024/CVE-2024-288xx/CVE-2024-28813.json create mode 100644 CVE-2024/CVE-2024-354xx/CVE-2024-35495.json create mode 100644 CVE-2024/CVE-2024-420xx/CVE-2024-42017.json create mode 100644 CVE-2024/CVE-2024-465xx/CVE-2024-46511.json create mode 100644 CVE-2024/CVE-2024-466xx/CVE-2024-46635.json diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json index 8c4faf386ef..ff5a5bd252f 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23574.json @@ -2,8 +2,8 @@ "id": "CVE-2023-23574", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-08-09T09:15:13.767", - "lastModified": "2024-09-20T12:15:03.747", - "vulnStatus": "Modified", + "lastModified": "2024-09-30T19:30:36.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,20 +66,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.9 }, { "source": "prodsec@nozominetworks.com", diff --git a/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json b/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json index ec801b6fa6e..9b7ee6164e6 100644 --- a/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json +++ b/CVE-2023/CVE-2023-25xx/CVE-2023-2567.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2567", "sourceIdentifier": "prodsec@nozominetworks.com", "published": "2023-09-19T11:16:19.333", - "lastModified": "2024-09-20T13:15:07.067", - "vulnStatus": "Modified", + "lastModified": "2024-09-30T19:32:11.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,20 +66,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 6.5, - "baseSeverity": "MEDIUM" + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 3.6 + "impactScore": 5.9 }, { "source": "prodsec@nozominetworks.com", @@ -135,9 +135,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:nozominetworks:cmc:*:*:*:*:*:*:*:*", - "versionStartIncluding": "22.6.0", "versionEndExcluding": "22.6.3", - "matchCriteriaId": "6F56421F-B321-4FF0-BFE4-867649B582BB" + "matchCriteriaId": "830F12B4-1CFA-4641-A14C-F8537C76267E" }, { "vulnerable": true, @@ -149,9 +148,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:nozominetworks:guardian:*:*:*:*:*:*:*:*", - "versionStartIncluding": "22.6.0", "versionEndExcluding": "22.6.3", - "matchCriteriaId": "4B3C9AEC-3A2D-4702-BC84-41595F30430D" + "matchCriteriaId": "C6D52048-C612-4B25-8771-C36C309776F6" }, { "vulnerable": true, diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6222.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6222.json index 2a44440e2af..78b7d265130 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6222.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6222.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6222", "sourceIdentifier": "contact@wpscan.com", "published": "2023-12-18T20:15:08.893", - "lastModified": "2023-12-21T19:28:10.553", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-30T19:35:03.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28809.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28809.json new file mode 100644 index 00000000000..3a3cff4953b --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28809.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-28809", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T18:15:05.633", + "lastModified": "2024-09-30T18:15:05.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Infinera hiT 7300 5.60.50. Cleartext storage of sensitive password in firmware update packages allows attackers to access various appliance services via hardcoded credentials." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28809", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28810.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28810.json new file mode 100644 index 00000000000..1dbfc2095c5 --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28810.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-28810", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T19:15:03.987", + "lastModified": "2024-09-30T19:15:03.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Infinera hiT 7300 5.60.50. Sensitive information inside diagnostic files (exported by the @CT application) allows an attacker to achieve loss of confidentiality by analyzing these files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28810", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28811.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28811.json new file mode 100644 index 00000000000..e9fdbe45ead --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28811.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-28811", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T19:15:04.060", + "lastModified": "2024-09-30T19:15:04.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Infinera hiT 7300 5.60.50. A web application allows a remote privileged attacker to execute applications contained in a specific OS directory via HTTP invocations." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28811", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28812.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28812.json new file mode 100644 index 00000000000..3d0c722f32d --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28812.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-28812", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T19:15:04.130", + "lastModified": "2024-09-30T19:35:03.620", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Infinera hiT 7300 5.60.50. A hidden SSH service (on the local management network interface) with hardcoded credentials allows attackers to access the appliance operating system (with highest privileges) via an SSH connection." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28812", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28813.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28813.json new file mode 100644 index 00000000000..03f42208ab8 --- /dev/null +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28813.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-28813", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T19:15:04.210", + "lastModified": "2024-09-30T19:35:04.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Infinera hiT 7300 5.60.50. Undocumented privileged functions in the @CT management application allow an attacker to activate remote SSH access to the appliance via an unexpected network interface." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.cvcn.gov.it/cvcn/cve/CVE-2024-28813", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35495.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35495.json new file mode 100644 index 00000000000..b612f4f8a8b --- /dev/null +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35495.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-35495", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T18:15:05.713", + "lastModified": "2024-09-30T18:15:05.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Information Disclosure vulnerability in the Telemetry component in TP-Link Kasa KP125M V1.0.0 and Tapo P125M 1.0.0 Build 220930 Rel.143947 allows attackers to observe device state via observing network traffic." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Chapoly1305/tp-link-cve/blob/main/CVE-2024-35495.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json index 0c10a30078c..f6082200784 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39431.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39431", "sourceIdentifier": "security@unisoc.com", "published": "2024-09-27T08:15:02.513", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-30T18:09:30.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,124 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json index a52a7a6f156..57ac05d9298 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39432.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39432", "sourceIdentifier": "security@unisoc.com", "published": "2024-09-27T08:15:03.530", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-30T18:12:04.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,124 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json index 3add57b210c..274bee44704 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39433.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39433", "sourceIdentifier": "security@unisoc.com", "published": "2024-09-27T08:15:03.710", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-30T18:14:45.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,99 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json index 8c39d9d4b28..4c0a3c6ef20 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39434.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39434", "sourceIdentifier": "security@unisoc.com", "published": "2024-09-27T08:15:03.873", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-30T18:14:03.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,99 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json index 3072bf56de6..c38dbb443fb 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39435.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39435", "sourceIdentifier": "security@unisoc.com", "published": "2024-09-27T08:15:04.030", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-30T18:13:33.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "security@unisoc.com", "type": "Secondary", @@ -39,10 +59,124 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE05D06-C798-4217-8858-8C5DC2C94751" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC867249-B767-4802-868D-6D0E356C8294" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25BBD3C5-E87C-4730-970C-19DF855AC3A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE00DFDE-97DD-4D33-B580-73FEF677C71B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F20E00D8-2F00-4FA3-9455-37DC89908D96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905E39DD-7948-40A4-B042-EBB9A9591347" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDC980D6-B797-4AE1-B553-35395AE80D07" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98408A48-561A-49D1-967F-834311742B7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", + "matchCriteriaId": "756E5850-CDC7-46C2-BAFC-1E2A359A2709" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39002ECE-636A-4FEB-9A0B-8127E8AAC844" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3D965CCA-C963-49E4-ACF0-2A9F458AF470" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FFEF06A-E3E0-486F-89CC-D52FF3F26F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49601008-D3FF-47CC-B961-6FDDFC7A0596" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1830802995705610241", - "source": "security@unisoc.com" + "source": "security@unisoc.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json index ca3caddcb6c..a339525077f 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41725.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41725", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-25T01:15:41.833", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T19:55:49.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "ics-cert@hq.dhs.gov", "type": "Secondary", @@ -95,10 +115,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx_console_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.4.2.2.6", + "matchCriteriaId": "6B22E9BA-065D-467A-8F47-3237651EB813" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx_console:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F79E951F-DD35-4BF0-9524-9E10AF1C8C53" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:doverfuelingsolutions:progauge_maglink_lx4_console_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.17.9e", + "matchCriteriaId": "9D5EB61D-2921-437D-A65E-52F8D96A479C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:doverfuelingsolutions:progauge_maglink_lx4_console:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12632651-637F-4200-924A-52D17F947416" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-04", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42017.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42017.json new file mode 100644 index 00000000000..9724f37aabc --- /dev/null +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42017.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2024-42017", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T18:15:05.827", + "lastModified": "2024-09-30T18:15:05.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Atos Eviden iCare 2.7.1 through 2.7.11. The application exposes a web interface locally. In the worst-case scenario, if the application is remotely accessible, it allows an attacker to execute arbitrary commands with system privilege on the endpoint hosting the application, without any authentication." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "references": [ + { + "url": "https://eviden.com", + "source": "cve@mitre.org" + }, + { + "url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/multiple-critical-vulnerabilities-in-icare-psirt-625-tlp-clear-version-0-7-cve-2024-42017/view", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json index 043158e5c8b..ccf9aa8b0d9 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42487", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-15T21:15:16.997", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T18:31:04.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-436" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cilium:cilium:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.15.0", + "versionEndExcluding": "1.15.8", + "matchCriteriaId": "A0C8F90D-07B3-4666-8C22-089A2DA27A03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cilium:cilium:1.16.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DD19FEA3-61F3-4F12-8833-045918EEED05" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cilium/cilium/commit/a3510fe4a92305822aa1a5e08cb6d6c873c8699a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://github.com/cilium/cilium/pull/34109", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch", + "Third Party Advisory" + ] }, { "url": "https://github.com/cilium/cilium/security/advisories/GHSA-qcm3-7879-xcww", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44170.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44170.json index 2f8261827bf..fb425fe031a 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44170.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44170.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44170", "sourceIdentifier": "product-security@apple.com", "published": "2024-09-17T00:15:51.463", - "lastModified": "2024-09-20T12:31:20.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-30T19:48:51.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,102 @@ "value": "Se solucion\u00f3 un problema de privacidad moviendo los datos confidenciales a una ubicaci\u00f3n m\u00e1s segura. Este problema se solucion\u00f3 en iOS 18 y iPadOS 18, watchOS 11 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.0", + "matchCriteriaId": "05C212C2-3E65-47DB-A0AE-417A8178ADC6" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121240", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json index 745da23d217..51cb8517ce9 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45200.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45200", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T08:15:03.760", - "lastModified": "2024-09-30T12:45:57.823", + "lastModified": "2024-09-30T18:35:06.983", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Nintendo Mario Kart 8 Deluxe anterior a la versi\u00f3n 3.0.3, la implementaci\u00f3n del modo multijugador local LAN/LDN permite a un atacante remoto explotar un desbordamiento de b\u00fafer basado en pila tras la deserializaci\u00f3n de la informaci\u00f3n de la sesi\u00f3n a trav\u00e9s de un paquete de respuesta de exploraci\u00f3n mal formado, tambi\u00e9n conocido como KartLANPwn. No es necesario que la v\u00edctima se una a una sesi\u00f3n de juego con un atacante. La v\u00edctima debe abrir el men\u00fa \"Juego inal\u00e1mbrico\" (o \"Juego LAN\") desde la pantalla de t\u00edtulo del juego, y un atacante cercano (LDN) o en la misma red LAN que la v\u00edctima puede enviar un paquete de respuesta manipulado a la consola de la v\u00edctima. Esto permite a un atacante remoto obtener una denegaci\u00f3n de servicio completa en el proceso del juego o, potencialmente, la ejecuci\u00f3n remota de c\u00f3digo en la consola de la v\u00edctima. El problema se debe al uso incorrecto de la biblioteca Nintendo Pia," } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/latte-soft/kartlanpwn", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json index 5b8311fe10d..8c014b756a6 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45861", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-19T16:15:05.103", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T19:25:01.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,10 +95,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:kastle:access_control_system_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-05-01", + "matchCriteriaId": "C4141AA8-8E0D-43CC-A713-CDEB8923B717" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:kastle:access_control_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDA9476F-A596-4904-BABE-B7D78D769CE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-05", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json index 954284863d2..9d815cf7b0e 100644 --- a/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45862.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45862", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-09-19T16:15:05.227", - "lastModified": "2024-09-20T12:30:17.483", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T19:33:30.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,10 +95,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:kastle:access_control_system_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-05-01", + "matchCriteriaId": "C4141AA8-8E0D-43CC-A713-CDEB8923B717" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:kastle:access_control_system:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDA9476F-A596-4904-BABE-B7D78D769CE4" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-263-05", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45920.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45920.json index cf6d3b00ebd..2a25d1c5b21 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45920.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45920.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45920", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T13:15:02.450", - "lastModified": "2024-09-30T13:15:02.450", + "lastModified": "2024-09-30T18:35:07.773", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Stored Cross-Site Scripting (XSS) vulnerability in Solvait 24.4.2 allows remote attackers to inject malicious scripts into the application. This issue arises due to insufficient input validation and sanitization in \"Intrest\" feature." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/ipxsec/10526db2cbfcb899a70dcb8f0ee53a99", diff --git a/CVE-2024/CVE-2024-459xx/CVE-2024-45993.json b/CVE-2024/CVE-2024-459xx/CVE-2024-45993.json index 93184080cfa..0b0e1f40b28 100644 --- a/CVE-2024/CVE-2024-459xx/CVE-2024-45993.json +++ b/CVE-2024/CVE-2024-459xx/CVE-2024-45993.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45993", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T17:15:04.473", - "lastModified": "2024-09-30T17:15:04.473", + "lastModified": "2024-09-30T19:35:05.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Giflib Project v5.2.2 is vulnerable to a heap buffer overflow via gif2rgb." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], "references": [ { "url": "http://giflib.com", diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46280.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46280.json index 25ed13170ad..f3a8ae17c30 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46280.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46280.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46280", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T15:15:06.053", - "lastModified": "2024-09-30T15:15:06.053", + "lastModified": "2024-09-30T18:35:08.543", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "PIX-LINK LV-WR22 RE3002-P1-01_V117.0 is vulnerable to Improper Access Control. The TELNET service is enabled with weak credentials for a root-level account, without the possibility of changing them." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], "references": [ { "url": "https://0xmupa.github.io/pixlink-weak-telnet", diff --git a/CVE-2024/CVE-2024-462xx/CVE-2024-46293.json b/CVE-2024/CVE-2024-462xx/CVE-2024-46293.json index fa9e990efab..eb4555054a1 100644 --- a/CVE-2024/CVE-2024-462xx/CVE-2024-46293.json +++ b/CVE-2024/CVE-2024-462xx/CVE-2024-46293.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46293", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T15:15:06.123", - "lastModified": "2024-09-30T15:15:06.123", + "lastModified": "2024-09-30T19:35:06.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Sourcecodester Online Medicine Ordering System 1.0 is vulnerable to Incorrect Access Control. There is a lack of authorization checks for admin operations. Specifically, an attacker can perform admin-level actions without possessing a valid session token. The application does not verify whether the user is logged in as an admin or even check for a session token at all." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://github.com/bunyamindemir/vulnerability-disclosures/blob/main/omos-authorization-bypass.md", diff --git a/CVE-2024/CVE-2024-463xx/CVE-2024-46313.json b/CVE-2024/CVE-2024-463xx/CVE-2024-46313.json index af90508c5c2..22ce5efda3f 100644 --- a/CVE-2024/CVE-2024-463xx/CVE-2024-46313.json +++ b/CVE-2024/CVE-2024-463xx/CVE-2024-46313.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46313", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T15:15:06.243", - "lastModified": "2024-09-30T15:15:06.243", + "lastModified": "2024-09-30T19:35:07.020", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "TP-Link WR941ND V6 has a stack overflow vulnerability in the ssid parameter in /userRpm/popupSiteSurveyRpm.htm." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TP-LINK/WR-941ND/popupSiteSurveyRpm.md", diff --git a/CVE-2024/CVE-2024-464xx/CVE-2024-46475.json b/CVE-2024/CVE-2024-464xx/CVE-2024-46475.json index 659091067b5..e16210917fd 100644 --- a/CVE-2024/CVE-2024-464xx/CVE-2024-46475.json +++ b/CVE-2024/CVE-2024-464xx/CVE-2024-46475.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46475", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T16:15:09.077", - "lastModified": "2024-09-30T16:15:09.077", + "lastModified": "2024-09-30T18:35:09.327", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A reflected cross-site scripting (XSS) vulnerability on the homepage of Metronic Admin Dashboard Template v2.0 allows attackers to execute arbitrary code in the context of a user's browser via injecting a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://blog.csdn.net/qq_45744104/article/details/141903463", diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46511.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46511.json new file mode 100644 index 00000000000..b6daad4daa4 --- /dev/null +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46511.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-46511", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T18:15:06.067", + "lastModified": "2024-09-30T19:35:07.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LoadZilla LLC LoadLogic v1.4.3 was discovered to contain insecure permissions vulnerability which allows a remote attacker to execute arbitrary code via the LogicLoadEc2DeployLambda and CredsGenFunction function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/zolaer9527/serverless-app/security/advisories/GHSA-3ggq-wrf4-c88v", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json b/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json index 4a057fda3bf..7a1264f338a 100644 --- a/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json +++ b/CVE-2024/CVE-2024-465xx/CVE-2024-46540.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46540", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-30T17:15:04.550", - "lastModified": "2024-09-30T17:15:04.550", + "lastModified": "2024-09-30T18:35:10.127", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A remote code execution (RCE) vulnerability in the component /admin/store.php of Emlog Pro before v2.3.15 allows attackers to use remote file downloads and self-extract fucntions to upload webshells to the target server, thereby obtaining system privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/microvorld/1c1ef9c3390a5d88a5ede9f9424a8bd2", diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46635.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46635.json new file mode 100644 index 00000000000..853fddcf7a0 --- /dev/null +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46635.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46635", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-30T18:15:06.140", + "lastModified": "2024-09-30T18:15:06.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the API endpoint /AccountMaster/GetCurrentUserInfo of INROAD before v202402060 allows attackers to access sensitive information via a crafted payload to the UserNameOrPhoneNumber parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://hithub.notion.site/Sensitive-Information-Disclosure-in-GongZhiDao-System-aaad25d2430f4a638d462194cfa87c8b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json index a1ddf3b7df9..3682daaad76 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47066.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47066", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-23T16:15:06.670", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T18:03:58.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,22 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lobehub:lobe_chat:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.19.3", + "matchCriteriaId": "150BA334-9A55-4C96-9DF7-2B3037724092" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/lobehub/lobe-chat/blob/main/src/app/api/proxy/route.ts", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/lobehub/lobe-chat/commit/e960a23b0c69a5762eb27d776d33dac443058faf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/lobehub/lobe-chat/security/advisories/GHSA-3fc8-2r3f-8wrg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/lobehub/lobe-chat/security/advisories/GHSA-mxhq-xw3g-rphc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47315.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47315.json index fea871478ff..7653c9b374f 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47315.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47315.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47315", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-25T18:15:05.807", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-30T18:06:36.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.16.0", + "matchCriteriaId": "842EB06E-5152-4FAF-B39F-CD7BB2C4DFA1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/give/wordpress-givewp-donation-plugin-and-fundraising-platform-plugin-3-15-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json index 4eec1545054..1739196ccbe 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6544.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6544", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-13T15:15:16.300", - "lastModified": "2024-09-13T16:37:22.997", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T19:12:09.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coffee2code:custom_post_limits:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.4.1", + "matchCriteriaId": "3C5D8452-D6F8-4E47-9A58-4B6419FCDE4A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/custom-post-limits/trunk/tests/bootstrap.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9cf4a11e-ad28-4a93-9278-1d2d113a4859?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json index 0b95a39140c..1eab16c78bd 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6786.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6786", "sourceIdentifier": "psirt@moxa.com", "published": "2024-09-21T05:15:12.397", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T18:31:50.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -84,6 +104,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -95,14 +125,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moxa:mxview_one:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.1", + "matchCriteriaId": "24690651-4F3A-431A-845A-B7CCBD1D24D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05", - "source": "psirt@moxa.com" + "source": "psirt@moxa.com", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series", - "source": "psirt@moxa.com" + "source": "psirt@moxa.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json index 94fd37e093a..452dbbcb6b4 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6787.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6787", "sourceIdentifier": "psirt@moxa.com", "published": "2024-09-21T05:15:12.607", - "lastModified": "2024-09-26T13:32:55.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T18:02:51.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -84,6 +104,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + }, { "source": "psirt@moxa.com", "type": "Secondary", @@ -95,14 +125,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moxa:mxview_one:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.1", + "matchCriteriaId": "24690651-4F3A-431A-845A-B7CCBD1D24D2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-268-05", - "source": "psirt@moxa.com" + "source": "psirt@moxa.com", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-240735-multiple-vulnerabilities-in-mxview-one-and-mxview-one-central-manager-series", - "source": "psirt@moxa.com" + "source": "psirt@moxa.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json index b13bda42a25..935548571f3 100644 --- a/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json +++ b/CVE-2024/CVE-2024-68xx/CVE-2024-6800.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6800", "sourceIdentifier": "product-cna@github.com", "published": "2024-08-20T20:15:09.910", - "lastModified": "2024-08-22T15:15:17.127", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T19:14:50.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + }, { "source": "product-cna@github.com", "type": "Secondary", @@ -73,22 +105,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.10.0", + "versionEndExcluding": "3.10.16", + "matchCriteriaId": "827A09EB-C889-49E4-982D-01B416DEA6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11.0", + "versionEndExcluding": "3.11.14", + "matchCriteriaId": "6ECADA51-1495-4D35-B7C0-6ADED7EDD26D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.12.0", + "versionEndExcluding": "3.12.8", + "matchCriteriaId": "2C305C7E-C6A2-42F2-A910-203B74C71128" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.13.0", + "versionEndExcluding": "3.13.3", + "matchCriteriaId": "3A51D9A9-389E-469F-B17C-F5B7CCEEC498" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.github.com/en/enterprise-server@3.10/admin/release-notes#3.10.16", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.14", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.8", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.3", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json index 0bbd34c8f6c..d29ac1d15e8 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7207.json @@ -2,161 +2,15 @@ "id": "CVE-2024-7207", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T23:15:12.337", - "lastModified": "2024-09-25T17:51:34.800", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-30T19:15:04.540", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A flaw was found in Envoy. It is possible to modify or manipulate headers from external clients when pass-through routes are used for the ingress gateway. This issue could allow a malicious user to forge what is logged by Envoy as a requested path and cause the Envoy proxy to make requests to internal-only services or arbitrary external systems. This is a regression of the fix for CVE-2023-27487." - }, - { - "lang": "es", - "value": "Se encontr\u00f3 una falla en Envoy. Es posible modificar o manipular encabezados de clientes externos cuando se utilizan rutas de paso para la puerta de enlace de entrada. Este problema podr\u00eda permitir que un usuario malintencionado falsifique lo que Envoy registra como ruta solicitada y hacer que el proxy de Envoy realice solicitudes a servicios internos \u00fanicamente o a sistemas externos arbitrarios. Esta es una regresi\u00f3n de la correcci\u00f3n para CVE-2023-27487." + "value": "Rejected reason: Duplicate of CVE-2024-45806." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - }, - { - "source": "secalert@redhat.com", - "type": "Secondary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 8.2, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 3.9, - "impactScore": 4.2 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "NVD-CWE-noinfo" - } - ] - }, - { - "source": "secalert@redhat.com", - "type": "Secondary", - "description": [ - { - "lang": "en", - "value": "CWE-20" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", - "versionEndExcluding": "1.28.7", - "matchCriteriaId": "C5E423BE-4022-47AB-A5D4-B218627517DD" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", - "versionStartIncluding": "1.29.0", - "versionEndExcluding": "1.29.9", - "matchCriteriaId": "E442EF13-A99D-42B9-BC76-AC398C32D132" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", - "versionStartIncluding": "1.30.0", - "versionEndExcluding": "1.30.6", - "matchCriteriaId": "D9685C62-CFE4-43C5-B0C2-1C6722FB4F64" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:envoyproxy:envoy:*:*:*:*:*:*:*:*", - "versionStartIncluding": "1.31.0", - "versionEndExcluding": "1.31.2", - "matchCriteriaId": "C765FFC0-2FF7-4318-A347-2AFCAD0E7C74" - } - ] - } - ] - }, - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:openshift_service_mesh:2.0:*:*:*:*:*:*:*", - "matchCriteriaId": "A76A2BCE-4AAE-46D7-93D6-2EDE0FC83145" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://access.redhat.com/security/cve/CVE-2024-7207", - "source": "secalert@redhat.com", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2300352", - "source": "secalert@redhat.com", - "tags": [ - "Issue Tracking", - "Third Party Advisory" - ] - }, - { - "url": "https://github.com/envoyproxy/envoy/security/advisories/GHSA-ffhv-fvxq-r6mf", - "source": "secalert@redhat.com", - "tags": [ - "Vendor Advisory" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json index 7169b426ac5..0047b731aa2 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8941", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-09-25T01:15:48.287", - "lastModified": "2024-09-26T13:32:02.803", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-30T19:45:43.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:scriptcase:scriptcase:9.4.019:*:*:*:*:*:*:*", + "matchCriteriaId": "FE28A6BC-9B6D-4F25-9828-8D806FA48470" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-scriptcase", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 11b353165d4..4fa934e7f0f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-30T18:00:18.174301+00:00 +2024-09-30T20:00:16.994670+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-30T17:51:48.050000+00:00 +2024-09-30T19:55:49.267000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -264156 +264165 ``` ### CVEs added in the last Commit -Recently added CVEs: `14` +Recently added CVEs: `9` -- [CVE-2024-45993](CVE-2024/CVE-2024-459xx/CVE-2024-45993.json) (`2024-09-30T17:15:04.473`) -- [CVE-2024-46475](CVE-2024/CVE-2024-464xx/CVE-2024-46475.json) (`2024-09-30T16:15:09.077`) -- [CVE-2024-46510](CVE-2024/CVE-2024-465xx/CVE-2024-46510.json) (`2024-09-30T16:15:09.137`) -- [CVE-2024-46540](CVE-2024/CVE-2024-465xx/CVE-2024-46540.json) (`2024-09-30T17:15:04.550`) -- [CVE-2024-46548](CVE-2024/CVE-2024-465xx/CVE-2024-46548.json) (`2024-09-30T17:15:04.620`) -- [CVE-2024-46549](CVE-2024/CVE-2024-465xx/CVE-2024-46549.json) (`2024-09-30T17:15:04.683`) -- [CVE-2024-46869](CVE-2024/CVE-2024-468xx/CVE-2024-46869.json) (`2024-09-30T16:15:09.200`) -- [CVE-2024-47067](CVE-2024/CVE-2024-470xx/CVE-2024-47067.json) (`2024-09-30T16:15:09.267`) -- [CVE-2024-47178](CVE-2024/CVE-2024-471xx/CVE-2024-47178.json) (`2024-09-30T16:15:09.410`) -- [CVE-2024-47530](CVE-2024/CVE-2024-475xx/CVE-2024-47530.json) (`2024-09-30T16:15:09.540`) -- [CVE-2024-47531](CVE-2024/CVE-2024-475xx/CVE-2024-47531.json) (`2024-09-30T16:15:09.750`) -- [CVE-2024-47532](CVE-2024/CVE-2024-475xx/CVE-2024-47532.json) (`2024-09-30T16:15:09.960`) -- [CVE-2024-47536](CVE-2024/CVE-2024-475xx/CVE-2024-47536.json) (`2024-09-30T17:15:04.780`) -- [CVE-2024-9158](CVE-2024/CVE-2024-91xx/CVE-2024-9158.json) (`2024-09-30T17:15:05.407`) +- [CVE-2024-28809](CVE-2024/CVE-2024-288xx/CVE-2024-28809.json) (`2024-09-30T18:15:05.633`) +- [CVE-2024-28810](CVE-2024/CVE-2024-288xx/CVE-2024-28810.json) (`2024-09-30T19:15:03.987`) +- [CVE-2024-28811](CVE-2024/CVE-2024-288xx/CVE-2024-28811.json) (`2024-09-30T19:15:04.060`) +- [CVE-2024-28812](CVE-2024/CVE-2024-288xx/CVE-2024-28812.json) (`2024-09-30T19:15:04.130`) +- [CVE-2024-28813](CVE-2024/CVE-2024-288xx/CVE-2024-28813.json) (`2024-09-30T19:15:04.210`) +- [CVE-2024-35495](CVE-2024/CVE-2024-354xx/CVE-2024-35495.json) (`2024-09-30T18:15:05.713`) +- [CVE-2024-42017](CVE-2024/CVE-2024-420xx/CVE-2024-42017.json) (`2024-09-30T18:15:05.827`) +- [CVE-2024-46511](CVE-2024/CVE-2024-465xx/CVE-2024-46511.json) (`2024-09-30T18:15:06.067`) +- [CVE-2024-46635](CVE-2024/CVE-2024-466xx/CVE-2024-46635.json) (`2024-09-30T18:15:06.140`) ### CVEs modified in the last Commit -Recently modified CVEs: `15` +Recently modified CVEs: `29` -- [CVE-2019-3010](CVE-2019/CVE-2019-30xx/CVE-2019-3010.json) (`2024-09-30T17:35:00.687`) -- [CVE-2020-2555](CVE-2020/CVE-2020-25xx/CVE-2020-2555.json) (`2024-09-30T17:35:01.543`) -- [CVE-2020-27792](CVE-2020/CVE-2020-277xx/CVE-2020-27792.json) (`2024-09-30T16:15:05.607`) -- [CVE-2023-3042](CVE-2023/CVE-2023-30xx/CVE-2023-3042.json) (`2024-09-30T16:15:07.793`) -- [CVE-2024-3164](CVE-2024/CVE-2024-31xx/CVE-2024-3164.json) (`2024-09-30T16:15:08.653`) -- [CVE-2024-3165](CVE-2024/CVE-2024-31xx/CVE-2024-3165.json) (`2024-09-30T16:15:08.847`) -- [CVE-2024-41999](CVE-2024/CVE-2024-419xx/CVE-2024-41999.json) (`2024-09-30T17:35:09.340`) -- [CVE-2024-42861](CVE-2024/CVE-2024-428xx/CVE-2024-42861.json) (`2024-09-30T17:35:11.653`) -- [CVE-2024-43025](CVE-2024/CVE-2024-430xx/CVE-2024-43025.json) (`2024-09-30T17:51:48.050`) -- [CVE-2024-46610](CVE-2024/CVE-2024-466xx/CVE-2024-46610.json) (`2024-09-30T16:30:50.833`) -- [CVE-2024-47068](CVE-2024/CVE-2024-470xx/CVE-2024-47068.json) (`2024-09-30T17:39:45.350`) -- [CVE-2024-7398](CVE-2024/CVE-2024-73xx/CVE-2024-7398.json) (`2024-09-30T16:12:24.337`) -- [CVE-2024-7415](CVE-2024/CVE-2024-74xx/CVE-2024-7415.json) (`2024-09-30T17:46:46.473`) -- [CVE-2024-8942](CVE-2024/CVE-2024-89xx/CVE-2024-8942.json) (`2024-09-30T17:39:28.417`) -- [CVE-2024-9148](CVE-2024/CVE-2024-91xx/CVE-2024-9148.json) (`2024-09-30T17:34:12.760`) +- [CVE-2024-39432](CVE-2024/CVE-2024-394xx/CVE-2024-39432.json) (`2024-09-30T18:12:04.437`) +- [CVE-2024-39433](CVE-2024/CVE-2024-394xx/CVE-2024-39433.json) (`2024-09-30T18:14:45.443`) +- [CVE-2024-39434](CVE-2024/CVE-2024-394xx/CVE-2024-39434.json) (`2024-09-30T18:14:03.557`) +- [CVE-2024-39435](CVE-2024/CVE-2024-394xx/CVE-2024-39435.json) (`2024-09-30T18:13:33.387`) +- [CVE-2024-41725](CVE-2024/CVE-2024-417xx/CVE-2024-41725.json) (`2024-09-30T19:55:49.267`) +- [CVE-2024-42487](CVE-2024/CVE-2024-424xx/CVE-2024-42487.json) (`2024-09-30T18:31:04.757`) +- [CVE-2024-44170](CVE-2024/CVE-2024-441xx/CVE-2024-44170.json) (`2024-09-30T19:48:51.767`) +- [CVE-2024-45200](CVE-2024/CVE-2024-452xx/CVE-2024-45200.json) (`2024-09-30T18:35:06.983`) +- [CVE-2024-45861](CVE-2024/CVE-2024-458xx/CVE-2024-45861.json) (`2024-09-30T19:25:01.957`) +- [CVE-2024-45862](CVE-2024/CVE-2024-458xx/CVE-2024-45862.json) (`2024-09-30T19:33:30.750`) +- [CVE-2024-45920](CVE-2024/CVE-2024-459xx/CVE-2024-45920.json) (`2024-09-30T18:35:07.773`) +- [CVE-2024-45993](CVE-2024/CVE-2024-459xx/CVE-2024-45993.json) (`2024-09-30T19:35:05.410`) +- [CVE-2024-46280](CVE-2024/CVE-2024-462xx/CVE-2024-46280.json) (`2024-09-30T18:35:08.543`) +- [CVE-2024-46293](CVE-2024/CVE-2024-462xx/CVE-2024-46293.json) (`2024-09-30T19:35:06.227`) +- [CVE-2024-46313](CVE-2024/CVE-2024-463xx/CVE-2024-46313.json) (`2024-09-30T19:35:07.020`) +- [CVE-2024-46475](CVE-2024/CVE-2024-464xx/CVE-2024-46475.json) (`2024-09-30T18:35:09.327`) +- [CVE-2024-46540](CVE-2024/CVE-2024-465xx/CVE-2024-46540.json) (`2024-09-30T18:35:10.127`) +- [CVE-2024-47066](CVE-2024/CVE-2024-470xx/CVE-2024-47066.json) (`2024-09-30T18:03:58.750`) +- [CVE-2024-47315](CVE-2024/CVE-2024-473xx/CVE-2024-47315.json) (`2024-09-30T18:06:36.060`) +- [CVE-2024-6544](CVE-2024/CVE-2024-65xx/CVE-2024-6544.json) (`2024-09-30T19:12:09.007`) +- [CVE-2024-6786](CVE-2024/CVE-2024-67xx/CVE-2024-6786.json) (`2024-09-30T18:31:50.473`) +- [CVE-2024-6787](CVE-2024/CVE-2024-67xx/CVE-2024-6787.json) (`2024-09-30T18:02:51.080`) +- [CVE-2024-6800](CVE-2024/CVE-2024-68xx/CVE-2024-6800.json) (`2024-09-30T19:14:50.430`) +- [CVE-2024-7207](CVE-2024/CVE-2024-72xx/CVE-2024-7207.json) (`2024-09-30T19:15:04.540`) +- [CVE-2024-8941](CVE-2024/CVE-2024-89xx/CVE-2024-8941.json) (`2024-09-30T19:45:43.223`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3e9f44bb259..c8a021cc145 100644 --- a/_state.csv +++ b/_state.csv @@ -138850,7 +138850,7 @@ CVE-2019-3004,0,0,2efc7f7d88f5aff516fa57b9566a0d09c25f9cec93e6d5a20fbd6c3e4b7e69 CVE-2019-3005,0,0,5fd2eab716b73f493b782c4947c1f9f5075a8998f20980c68330830c02645397,2021-02-22T14:41:07.527000 CVE-2019-3008,0,0,4a9acb031316e7185b1ecbabc7f0a6b6ad53b785e5f0e71f4ce9ab56458db4bd,2019-10-21T15:20:06.707000 CVE-2019-3009,0,0,4b79fade18b2303017cee0d6f5907b663b8230787a2be51018dd366fb572f2fc,2023-11-07T03:09:46.080000 -CVE-2019-3010,0,1,f934c748e4cf62dc211320fd69490f9ca04563644a0a597c7989fbeab2d654d6,2024-09-30T17:35:00.687000 +CVE-2019-3010,0,0,f934c748e4cf62dc211320fd69490f9ca04563644a0a597c7989fbeab2d654d6,2024-09-30T17:35:00.687000 CVE-2019-3011,0,0,6c3ce7483f4c5da6d34e8f6b398287be5326f52b1289caa022ba543249611bb3,2023-11-07T03:09:46.160000 CVE-2019-3012,0,0,e8dad39d8c9a365595bf46c3c95802f5a2984e0853cb1909aa108af5a330b544,2019-10-21T15:21:29.617000 CVE-2019-3014,0,0,f1f960b6d836340bbdc087c522e457af239e88af8692e227a8fe8e387245ab71,2019-10-21T13:16:25.453000 @@ -154746,7 +154746,7 @@ CVE-2020-25533,0,0,22b0472be3f7a02ec2f0d0ad18465cceb9b38a6dc078a221c80f4709f5177 CVE-2020-25537,0,0,079e520785884b60c6c94552474278f37b9d9064b531f7b9bef0271a3c3726d7,2020-12-04T16:01:49.357000 CVE-2020-25538,0,0,5332fc9b37432e8c9ab81b8f5bce073530a235c7cacfe55a7b93c4c73aae58d4,2021-07-21T11:39:23.747000 CVE-2020-25540,0,0,2ca248b357bd039497f25236f818e4ee81410cbfbcdb2bd5023e29cde2c96a87,2023-12-07T14:22:18.950000 -CVE-2020-2555,0,1,189632ad8d4030ad0b6e6b8a2a7cb71b298da712c22daa36c87688d0cfce8a93,2024-09-30T17:35:01.543000 +CVE-2020-2555,0,0,189632ad8d4030ad0b6e6b8a2a7cb71b298da712c22daa36c87688d0cfce8a93,2024-09-30T17:35:01.543000 CVE-2020-25557,0,0,ba7e6e69e9eb291583fa26ec421902479a3af8435a3ba56dad4071d2f9cf8c8a,2021-07-21T11:39:23.747000 CVE-2020-25559,0,0,4bccb58c8c9c8959436042e779063f9c0f8e5febd5ef5ab5053dd6f27d4d4b14,2020-09-21T15:19:30.877000 CVE-2020-2556,0,0,d33e26f0b2b7738761c45d3cab98c1b1ea0d45fbd62d16082aeb66e6210120ea,2022-10-25T17:57:43.913000 @@ -156377,7 +156377,7 @@ CVE-2020-27789,0,0,b3222c3c02699b580895e7172ebafc73b737a78052c9b1d7d86d99b0e1c0c CVE-2020-2779,0,0,a6b9bdb8767cfb9fd254a404efbad606647d03b561422b0f5d317d036eabba02,2023-11-07T03:21:47.787000 CVE-2020-27790,0,0,26b4234f75017ebcd699f819a73d8ea5a82cbced4ae88811298835090df312ac,2022-08-23T14:55:09.127000 CVE-2020-27791,0,0,bd58b5a63fb12f23763b7a92ad2bfd8f2392941dd2a626792c7548135e9e365d,2023-11-07T03:21:01.037000 -CVE-2020-27792,0,1,9ab0bd33e0042e4db3ae2963393c400dc2a1a04d4478eb0b9eb1ab7adee460c7,2024-09-30T16:15:05.607000 +CVE-2020-27792,0,0,9ab0bd33e0042e4db3ae2963393c400dc2a1a04d4478eb0b9eb1ab7adee460c7,2024-09-30T16:15:05.607000 CVE-2020-27793,0,0,3cac93eceffac8cbf0ef9bed4429b09e9b53d2b190f9dfba86f919c4bbc7abe0,2022-08-22T19:45:18.513000 CVE-2020-27794,0,0,5c474a946f55e0cb87fb2cceb323591c9e9a6de4a53fc44f88ea48390714df5a,2022-08-22T13:47:12.193000 CVE-2020-27795,0,0,3895a30945c1b0fb81bd0eff83b00291cfacaaf6ba5cd6cf8929428857d07488,2022-08-22T17:26:02.317000 @@ -217482,7 +217482,7 @@ CVE-2023-23570,0,0,34f43d73f90c49f764b81e997892fd78dd337c97fb1148b24d8e32f1e47e6 CVE-2023-23571,0,0,4b5d57468b0e0f6068ca1be84d1957d7fa69a135a66e59bb39d39000117da5a4,2023-07-17T14:15:09.677000 CVE-2023-23572,0,0,b46b7512903e7f49f58188b1516e5c59dccee6524ae44e74bf2d1686b17145a6,2023-08-24T13:33:32.147000 CVE-2023-23573,0,0,d839cffdfa00da742eae7d304e41472753b06c66c5d31c59bec83f449da372d5,2023-11-07T04:07:46.417000 -CVE-2023-23574,0,0,b67f66b5b65ad0e62ebcfed6bda90888bacb4029f43603b7f3756c633a76866b,2024-09-20T12:15:03.747000 +CVE-2023-23574,0,1,172f8bf8a087daa7a415ed95235ca91931e64d79ed2f867eb04e242aac262f0c,2024-09-30T19:30:36.950000 CVE-2023-23575,0,0,023ca3e7364edc16a58f52ccb2e6b5d9fc2383841c194afcc25ab1d7eefe38cb,2023-04-18T19:36:02.697000 CVE-2023-23576,0,0,9b16ed66ee4707fb622123e163d2115347cbc9be42696ade7dc9624d77214e54,2024-01-05T19:32:36.870000 CVE-2023-23577,0,0,f94aa6f01f8e228592ebd011e08981a573e21add09f0acea4f77a15299f4b462,2023-11-07T04:07:46.600000 @@ -219189,7 +219189,7 @@ CVE-2023-25666,0,0,9329c20086df1831926a3d2e836ad1ca87c7bb2663c4ea7cdae2a6734ae13 CVE-2023-25667,0,0,7efac3cc2cf288d0d8e0a72f036945bd8b16cbb151e78b88bc2043e1daf07bf8,2023-11-07T04:09:05.913000 CVE-2023-25668,0,0,17439808d191e9d44412ac88f372c453c6a7b56282c541fb77ca790d79d2e1ed,2023-03-31T14:20:18.307000 CVE-2023-25669,0,0,5799ebe4de7eb86bb31a13c40b7ed1678b85cc77d9d0682764a3dc5f4ed2efc7,2023-11-07T04:09:06.053000 -CVE-2023-2567,0,0,1ac6dd29861dbb570da7adf048c6c8e790afe63d2025eedd15e58909c01c9f1c,2024-09-20T13:15:07.067000 +CVE-2023-2567,0,1,4990ecd44a7a10cdf0285c7830f80dbec8922e032cf88c33e7229e857eb80d7b,2024-09-30T19:32:11.580000 CVE-2023-25670,0,0,f9dcbb1f04ff7ba5a0a0fa2adf10e56474b48ef8789523af5d66cd9e89898c31,2023-11-07T04:09:06.160000 CVE-2023-25671,0,0,bfda7816a898010b5e3dbd370222e6fd7e36489c44c161a898b17a01a4e734a7,2023-11-07T04:09:06.280000 CVE-2023-25672,0,0,4c5551dc36d4bc66e02de852d1385936cf6c50fc7a1b7ca7662ba9486274e753,2023-11-07T04:09:06.410000 @@ -222895,7 +222895,7 @@ CVE-2023-30410,0,0,d6c69bd0c391ba3e4623ebea76c65f4f26228366ebdb22e33fb7fa12a3e32 CVE-2023-30414,0,0,b5860ef5c020f75da310efaaa87b88f291679c3f7b9e5d59db95c351386e25aa,2023-05-04T13:58:41.697000 CVE-2023-30415,0,0,cd8a6e49d727913f35e4c659d01452984f1c7015d1e622fcffa3fe23d97cda85,2023-09-29T16:57:27.170000 CVE-2023-30417,0,0,fda2808784442937f2890f9097a471a03c08659895e5b7bea642818137ca6524,2023-05-04T17:36:34.967000 -CVE-2023-3042,0,1,dc4b616bc76ae6488c468910eeec2496080394f835efef55f4005b6835f816b4,2024-09-30T16:15:07.793000 +CVE-2023-3042,0,0,dc4b616bc76ae6488c468910eeec2496080394f835efef55f4005b6835f816b4,2024-09-30T16:15:07.793000 CVE-2023-30428,0,0,1efeec4521c1a839ffce9db519aae5f3b59a6d29b3b62d170ba0843e2efdc83d,2023-07-20T16:41:45.247000 CVE-2023-30429,0,0,27d09dd85c230885df071c5f8e27796ba6483afc1e418cf2b610af918d289e0d,2023-07-20T16:47:49.747000 CVE-2023-3043,0,0,09e537fa053cef06eef2088a7b3b0ae592cdbc3886ebc90ce64b70ac5590af26,2024-01-12T19:18:06.067000 @@ -240318,7 +240318,7 @@ CVE-2023-6218,0,0,d5e8b7968d4c169faacc09c4cf5fda1491f2a21d83bea9885e95d9daa62289 CVE-2023-6219,0,0,2b15674df84308183736b9cfa12df288f70e91ae4df4133494a4fc92e278cad9,2023-12-01T20:57:20.553000 CVE-2023-6220,0,0,f37be182c2d2bacd79c2313a6938ac162b56637d9d95009515483b9bc28872f8,2024-01-17T20:06:17.117000 CVE-2023-6221,0,0,7ab0eba1d1d51aa86532e9fc8953ca9851950475f94c2d1e1fd104249ff251bd,2024-08-02T09:15:33.853000 -CVE-2023-6222,0,0,f961cbb0cad98c188857f6d85828996b67456d20c6f2602ae425d54a57e3f8ec,2023-12-21T19:28:10.553000 +CVE-2023-6222,0,1,10ca719d6241a16d7a4af8b329be1dd72f36fa6eed5abc1684e0c343746dec72,2024-09-30T19:35:03.307000 CVE-2023-6223,0,0,4c9b2542ca6b96527ce1674814817a12c2ec6aea5a47819cd008b4689fedf8b6,2024-01-16T23:57:09.203000 CVE-2023-6225,0,0,0c86f4bab68c98d520a08014c346b76b2f8114c74cf49363651f75a1c6d9db83,2023-12-04T15:10:44.187000 CVE-2023-6226,0,0,1ad7582028a7ede50c5087c41c65f6f45601471c7c6fb9032c7165ecbe8ae9e2,2023-12-04T18:58:04.080000 @@ -249275,7 +249275,12 @@ CVE-2024-2880,0,0,c617aabe27a476530f11dd1aff9d0e70b8bc9314c3647a1cac79a81958f4d9 CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca586f,2024-08-01T13:49:18.607000 CVE-2024-28805,0,0,57ffe0c5396b469d1d6aea3771a149218b95fafbad9b52c6f522fc5113787118,2024-08-01T13:49:19.450000 CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000 +CVE-2024-28809,1,1,ccc34233545b23e357754813e8f630a437ad365b8188c989fc2e40f9630d5b69,2024-09-30T18:15:05.633000 CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000 +CVE-2024-28810,1,1,9231407518416ef5ae949941b3bc271921ac89f9f9cd51bac3c177d689501e23,2024-09-30T19:15:03.987000 +CVE-2024-28811,1,1,9bc658dba52b6664d430eb6e2b56d170971838fbccfd368ec19cbd2184be333a,2024-09-30T19:15:04.060000 +CVE-2024-28812,1,1,ee5aa89b11e12f70e7819416536106fce2cfc893e2987b73362da0544bdc452e,2024-09-30T19:35:03.620000 +CVE-2024-28813,1,1,db3e15ae2a6ac7f890048b08fe1fb750ad791ad1c28bbdf08ac8d6db90a63165,2024-09-30T19:35:04.427000 CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af9c2,2024-08-01T13:49:20.227000 CVE-2024-28816,0,0,75a949219f8a896ffef945213a1610d3de2a2cf64da977b1d4287b567e2864da,2024-09-06T17:35:06.960000 CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000 @@ -251371,10 +251376,10 @@ CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1e CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000 CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000 CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000 -CVE-2024-3164,0,1,0228131b2e264217aeda632549ca753158869120be34b2b79697e3114ab65fbd,2024-09-30T16:15:08.653000 +CVE-2024-3164,0,0,0228131b2e264217aeda632549ca753158869120be34b2b79697e3114ab65fbd,2024-09-30T16:15:08.653000 CVE-2024-31648,0,0,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000 CVE-2024-31649,0,0,8b247291638ecff50896f2aca79dadb1b9c9aa19002fdb0afc961b73616ecbcc,2024-08-01T13:51:03.573000 -CVE-2024-3165,0,1,0646edb30e52b9cd1d5dc09ce07b22c68fadd9067d31e951e14a2e77fb715a7d,2024-09-30T16:15:08.847000 +CVE-2024-3165,0,0,0646edb30e52b9cd1d5dc09ce07b22c68fadd9067d31e951e14a2e77fb715a7d,2024-09-30T16:15:08.847000 CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdace05,2024-08-20T16:35:08.810000 CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000 @@ -253982,6 +253987,7 @@ CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf CVE-2024-3548,0,0,d36c3da57ad232cab63cfe730b939da3d11ca9fb8353135fe3e907f711d131dc,2024-05-15T16:40:19.330000 CVE-2024-3549,0,0,0cde880e41c0c3ba557ce463b1ff0900f3f316d2ed3d6009897a715aae6e97e9,2024-06-11T13:54:12.057000 CVE-2024-35492,0,0,33aecacefd5370fcd53a7eb152d476421944d3120d3115b260ff90b817999987,2024-08-20T16:35:13.950000 +CVE-2024-35495,1,1,2ca389066c0f9d7e4a1a82563f1a7df4d574e1da6bc99733088a07f8f5fb3236,2024-09-30T18:15:05.713000 CVE-2024-3550,0,0,ac5bbd2b6bc618ed8d0d187264280ccbd8a80d9a5319faa69118b498969cb88c,2024-05-02T18:00:37.360000 CVE-2024-35504,0,0,e166404c83da3941ce306fedbcc958803779345d2352a83f02ebf499c8052277,2024-05-30T18:19:11.743000 CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c7707135,2024-05-17T18:36:05.263000 @@ -256772,11 +256778,11 @@ CVE-2024-39428,0,0,5d03789c96f23918b1ab1ea6fa6e056174329d182d27e72cc9dae9827964f CVE-2024-39429,0,0,e5307c82d36950beba8c9942e931fdf6e3ccb2f9d59fae72d11a48dd470f78ba,2024-08-27T17:44:02.903000 CVE-2024-3943,0,0,fecb7894fc8f71bb1eb318ec20be6409020b761b3221fbb9ca597f81fb48f5da,2024-05-30T13:15:41.297000 CVE-2024-39430,0,0,1e2b9ea56442b26f7737a9950103fafe605e5c7a90c854837eacf7ef42d0ec7f,2024-08-27T17:44:25.593000 -CVE-2024-39431,0,0,90a6829637c027c6c1676fb097e9eb7f26788c64ec2a6f6d2976760360f416d1,2024-09-30T12:46:20.237000 -CVE-2024-39432,0,0,aeac819d505f2cb2e82093d66b2236ae0ab8530e69995f15ad476f76487347b9,2024-09-30T12:46:20.237000 -CVE-2024-39433,0,0,d4d782fd1bb786b09c1fa8beabe4863a20cdc54d4d78b91f909ee667c43313ba,2024-09-30T12:46:20.237000 -CVE-2024-39434,0,0,4c0637c717d73c37fad20911bc5e85aa1bb7ff912a103d1b88e4480925f1e80b,2024-09-30T12:46:20.237000 -CVE-2024-39435,0,0,abd59a8c43da780df7186aa14ddc91ec6f181b4a632bf3979773e0a458fc89f8,2024-09-30T12:46:20.237000 +CVE-2024-39431,0,1,2306ba6560b51324446746a18a18f3bc2df93434f1c992624845bb1e5fc9bb1a,2024-09-30T18:09:30.780000 +CVE-2024-39432,0,1,c5344327ea4e29569cde1ea8e7912a1f59909bf9a7631cccf2f5bb521ee73dca,2024-09-30T18:12:04.437000 +CVE-2024-39433,0,1,b0007cb93af88c45dc6df70760e2e177a4763bcaa8d7c7eac293b0ba1aabdc2d,2024-09-30T18:14:45.443000 +CVE-2024-39434,0,1,6fa311444443904695893d64c5957ccb50003fad05bc243c95fa5540678b4129,2024-09-30T18:14:03.557000 +CVE-2024-39435,0,1,c1323c169e57e336d6df9d30a55825a6eb9bb6be1621f01964c9727171d73763,2024-09-30T18:13:33.387000 CVE-2024-3944,0,0,5f019f02cc03a38e43d6ce346d35a78d9422843cd57b5ebc3224417ac95f2368,2024-08-29T13:25:27.537000 CVE-2024-3945,0,0,f529a76504b589632a786b994a7e59172142cd26cd001d628e7f3ff9658da8b1,2024-05-30T13:15:41.297000 CVE-2024-39457,0,0,71348762cda2a65a9fb6ee86fb97ddb6684e341009bf79ffb50846af36c0e45a,2024-08-22T17:33:32.373000 @@ -258062,7 +258068,7 @@ CVE-2024-41720,0,0,2d7bee1f981165f1c9cbab9643ce597269a916a15ed0d381724ec0dadf39a CVE-2024-41721,0,0,a17f2b030998fd99e19cd291400da7030bbfa9d3d97c94e9d58d3ba36f26dd93,2024-09-25T14:35:06.917000 CVE-2024-41722,0,0,f733309575158343ebd0680abc925b6ccf0b2e8a425ec48461fce81378d53712,2024-09-30T12:46:20.237000 CVE-2024-41723,0,0,2fd6c172462641b542f047f7ff3bf2247bdc5b8b5f34ce988c43b2bfe1795c68,2024-08-20T19:26:24.033000 -CVE-2024-41725,0,0,9fa43c2bc17c8b3a4f55f7cab7925b510f29704748d43554c32ada9221146150,2024-09-26T13:32:02.803000 +CVE-2024-41725,0,1,83f32e7cc1dec315c1c39fc812aeafe9b3d09b8b7d971df4c4ae22ade00766f8,2024-09-30T19:55:49.267000 CVE-2024-41726,0,0,e325c72cd77b10fa79a0c73cd0bce9d67f9472d40dd3ab04f6437f9f2b06b815,2024-08-01T13:59:09.707000 CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1bad,2024-08-20T19:25:12.490000 CVE-2024-41728,0,0,99c94826375f1fb80dce15bbcf8a28085193444f8aab436fe5d670c8781915eb,2024-09-16T14:14:52.840000 @@ -258237,7 +258243,7 @@ CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913 CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000 -CVE-2024-41999,0,1,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000 +CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000 CVE-2024-42005,0,0,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000 @@ -258247,6 +258253,7 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 +CVE-2024-42017,1,1,a768ca4e6eb2a9ee07a537925370a935e6b04778c28e2101328d3734d63b13e8,2024-09-30T18:15:05.827000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 CVE-2024-42020,0,0,37c4c1406166ec6fd5ab227fac5e61169cbd195ea42942d8bd175d493c4f9eb1,2024-09-09T13:03:38.303000 @@ -258634,7 +258641,7 @@ CVE-2024-42483,0,0,ca4650d6e89f90cab3f4cbd174343a58f75eabf663e066f3c3338307399ba CVE-2024-42484,0,0,a1d071a36aea45bef6715a21ed0f1766066470b11470c144bede3c9c755cd118,2024-09-12T18:14:03.913000 CVE-2024-42485,0,0,9c52a237d351fcf0752a53847291432cd122014665f3d16b6c4975bcf35af6a7,2024-09-18T18:31:40.427000 CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000 -CVE-2024-42487,0,0,cfa3e5fc5d85dee47035ee9506daaf513205a0ae2a1267b79a4b3106110a6897,2024-08-19T13:00:23.117000 +CVE-2024-42487,0,1,64075bb30e2f11b2a23a23e40f17741285ef66b94f28267872bedd221af498b5,2024-09-30T18:31:04.757000 CVE-2024-42488,0,0,2e1cd2e30af855296712aec04f31ad7dc9d3eafb93055aaa6265177ab90fd230,2024-09-27T18:49:05.410000 CVE-2024-42489,0,0,181648e804e837cda5bb13bcded826140342ba5660b47fc9ce10fe5b939de398,2024-09-16T19:46:18.913000 CVE-2024-4249,0,0,20dbadf05c38d413ed14f5d424310da5ffa119a0ccbbcb5b690e0c54ceac344f,2024-06-04T19:20:34.093000 @@ -258841,7 +258848,7 @@ CVE-2024-42850,0,0,a72d6cc9fb65147822ff703ae140dbf9bc418b2813da9b6084ec42fe436f4 CVE-2024-42851,0,0,f841f745f513412557e0c00ae557a507c262bbcf9e2f6ddfb2d4220b405d360a,2024-08-30T15:30:44.113000 CVE-2024-42852,0,0,2344821754827259ef0e7a5b96c5bf6543f51312170a85eff0c415fda2be9db8,2024-08-23T19:35:15.240000 CVE-2024-4286,0,0,4b983e074dfcf6df9bba7e92a07b4865c0022e26c41bba4144154cfeae541d31,2024-05-28T12:39:28.377000 -CVE-2024-42861,0,1,ea0f837739db3748c937246e6f5cdcd94d8051062b95988ae5af1b8fbf8f807c,2024-09-30T17:35:11.653000 +CVE-2024-42861,0,0,ea0f837739db3748c937246e6f5cdcd94d8051062b95988ae5af1b8fbf8f807c,2024-09-30T17:35:11.653000 CVE-2024-4287,0,0,e4eaa9cc0eedd48e962bf47bbdeb2988e2d50ccd6011525ef3609c758b0c263c,2024-05-20T15:17:54.513000 CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bfc6,2024-05-16T13:03:05.353000 CVE-2024-42885,0,0,b6fbfe1a8ae448a95f4eb231b38e7555bf7772a19abe7daa4ac719d8268bede7,2024-09-05T18:35:07.060000 @@ -258916,7 +258923,7 @@ CVE-2024-43011,0,0,a1a7726f53e21e3beb63c25ff5d202a0a16dad76f49dffd4b60f93fe17591 CVE-2024-4302,0,0,3989b291497fea424d341ee8d50afc238ccc795cfb4606a4430491f615d9ea6b,2024-04-29T12:42:03.667000 CVE-2024-43022,0,0,650f9fb8ccee75912422917c17fa309113c9ea3a4d5a4e724d337f4fa0323626,2024-08-21T18:35:09.733000 CVE-2024-43024,0,0,c5f0cc8bedf820b250245c83e75eef2329c1bda7ae52de51223cb56379c99592,2024-09-29T00:27:47.003000 -CVE-2024-43025,0,1,7a14f1b850d1ff4d172056732ca4178390eda10654261a2687c8e682aeece981,2024-09-30T17:51:48.050000 +CVE-2024-43025,0,0,7a14f1b850d1ff4d172056732ca4178390eda10654261a2687c8e682aeece981,2024-09-30T17:51:48.050000 CVE-2024-43027,0,0,0604ae83aadfc055c804f63006999d0d70f480945a963fa75a913e2db2c243a3,2024-08-23T18:35:06.387000 CVE-2024-4303,0,0,83a712aebf2d4281174fc319c5a3b5ed1f6b2a8b7c1590974611c884faeb0657,2024-04-29T12:42:03.667000 CVE-2024-43031,0,0,c3ec426a9c2d322dc356eb4fe356a9e19c60505e16e054c91bc62d391f4483d2,2024-08-23T18:15:07.490000 @@ -259557,7 +259564,7 @@ CVE-2024-44167,0,0,0c7f2bd46dbe690e9e6ee041bf2863bc0bf24e5ff869009fc286ce7f5e79d CVE-2024-44168,0,0,e2c5adef7f7490850ad8c9b13a830450085fc6a69a5acc58c125404fbc5d926d,2024-09-26T13:56:00.007000 CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba7e5,2024-09-20T12:31:20.110000 CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 -CVE-2024-44170,0,0,ad9c7ebf0677867158c66367ee67fb353ce44ea245452aff8d81c248a025d15c,2024-09-20T12:31:20.110000 +CVE-2024-44170,0,1,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000 CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000 @@ -259957,7 +259964,7 @@ CVE-2024-45192,0,0,7ebf90a7dd47be6e13a820a7a55bd25a33fd9e3b9dd577584cb0c6cebe711 CVE-2024-45193,0,0,aad683d38855495998b9aca0a814babde19e695a0d6614e90cdeda08f7f96a08,2024-09-10T19:35:10.143000 CVE-2024-45195,0,0,6ffd475ceaf8128f565ed8b5cb0ab8e8ef23a6c0d5b146527899f5211dfb9259,2024-09-06T15:35:05.483000 CVE-2024-4520,0,0,b2949348c863aeabf77cf8262dadc8a1301ac645ed88723ebde503df8cb28e51,2024-06-11T17:02:16.967000 -CVE-2024-45200,0,0,341f31059becdff3ffdb369c42ede5b70f73e10280e558f08f2a1342b48e6133,2024-09-30T12:45:57.823000 +CVE-2024-45200,0,1,c755ac93f1b17cd8efb21d298d911a4f5dcab9011db4f75e5e04cf5d33a0f2e5,2024-09-30T18:35:06.983000 CVE-2024-45201,0,0,83db05d7484ca5c2638e18e64e3b5c06d28a9caaae332ad6d01f844ea902b04a,2024-08-23T16:18:28.547000 CVE-2024-45203,0,0,0a34ec3cf21e7526a71f11433fb5593e3ea52ee9638fd0c30ca94a57eb961782,2024-09-16T13:27:19.190000 CVE-2024-4521,0,0,a1d240438f25322e21494c2ddd2f5ee26b23410f012534bc2c27a0a49b09a860,2024-06-04T19:20:41.223000 @@ -260244,8 +260251,8 @@ CVE-2024-45856,0,0,0d2d555a4be2f7d0582132e7868cb1ae44e7be28b33194ae92062d7b37f54 CVE-2024-45857,0,0,baf58007ae785d8a411fcf58ab797e8aa621cae99978a873f3918c60d00cf497,2024-09-12T18:14:03.913000 CVE-2024-45858,0,0,b5441be916d9d638a5a087843bce9f2981a17328a32cafaa10622a0d2ef26e3e,2024-09-20T12:30:17.483000 CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000 -CVE-2024-45861,0,0,06da4e301ea3f4e44ad40215bb90dc27994813b6ecf99be9d6a5f2f497d7d785,2024-09-20T12:30:17.483000 -CVE-2024-45862,0,0,4e9b066250722e9cd280f4a8d9e78c648ab8f1036530303a9a0926348d90730f,2024-09-20T12:30:17.483000 +CVE-2024-45861,0,1,68a3e8fb3e4597c61c4db5f65fdb33d3d4021e79b4a5583c113ba868c0e19c39,2024-09-30T19:25:01.957000 +CVE-2024-45862,0,1,a441a246649880078e2d6011e0d9789b5a78013f3cf95e46c30715bdc12df7ad,2024-09-30T19:33:30.750000 CVE-2024-45863,0,0,fa53199e81e1f2d3cad3f37b555d35fb431e4ff73450f766bc0b9224d0bde527,2024-09-30T12:45:57.823000 CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 @@ -260253,7 +260260,7 @@ CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40 CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000 CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000 CVE-2024-4592,0,0,14c53bd50ede1a956ff9d7a3d25f38fbc0411a373abc96f1d6d1bef77fb32c4e,2024-06-04T19:20:43.560000 -CVE-2024-45920,0,0,aecffc21707d23a7569a67e5884c316b7c27e8b8c18def266a5e39e0b431918c,2024-09-30T13:15:02.450000 +CVE-2024-45920,0,1,1603368018598f68b5023b023b64068849128d766e08c06a3393721c2c45efb8,2024-09-30T18:35:07.773000 CVE-2024-4593,0,0,94ecb7e459fb704ab815ca1814a0a7a4397cf6e067d30b0e365dc0bb2101508b,2024-06-20T20:15:19.237000 CVE-2024-4594,0,0,6353480e983dfe68c6b174c583e75b67b6ebde5befefc4e80bf75a35aedb2302,2024-06-04T19:20:43.657000 CVE-2024-4595,0,0,a34d956039b7343ba69c0066573aab0165928a92f89b42d7c5d672a51296492e,2024-06-17T19:15:59.063000 @@ -260270,7 +260277,7 @@ CVE-2024-45986,0,0,a85d3ec3755f724362fff27a6a522f83d6b30d560b1ead4324df3dd3027d0 CVE-2024-45987,0,0,78f20ed33f2f525a22db6a5cf4bd6c14205c0abb553bb982099aff60afe849a3,2024-09-30T12:46:20.237000 CVE-2024-45989,0,0,ab3f6bd3392b087dcb35df06d536b3edd1a33ced94d9672493bfe0cf20988e7e,2024-09-30T12:46:20.237000 CVE-2024-4599,0,0,97a585846a1cde14c82c7df8029410945eada1b1651bcc856b8e29367f63ecca,2024-05-07T13:39:32.710000 -CVE-2024-45993,1,1,ae119871753448a3d89f426e366768f08e16c8c49b38dd39480dbd860c1a41b3,2024-09-30T17:15:04.473000 +CVE-2024-45993,0,1,e26b64fa81fc283c963e728220ec6b219796ae3f5c14eda623f46362e541d825,2024-09-30T19:35:05.410000 CVE-2024-4600,0,0,078ff1a3ce0c016ebe4abdef878e85c422e5d3e27f924ee561699d3a699695bb,2024-05-07T13:39:32.710000 CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c600418862,2024-05-07T13:39:32.710000 CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000 @@ -260311,12 +260318,12 @@ CVE-2024-46256,0,0,3b1fbc605e16114ce563e72036bda20657faf5824bcb546aa9068019df133 CVE-2024-46257,0,0,97c0bb598edca401298a2c44e1e55f9c450b6967f78a45d9cce1b7ff0feafc66,2024-09-30T12:45:57.823000 CVE-2024-4626,0,0,2c49c68b79a7a3d7626dfac7c1ab161b6d51a1a10b834d04b620fc9c15d7e475,2024-07-15T17:10:52.563000 CVE-2024-4627,0,0,a94951b310ac8fa22dfdfb5dfa1a6f0b0e4706e2176059eb33a39431470f56d3,2024-07-03T15:45:08.187000 -CVE-2024-46280,0,0,4e3598879cb34b285622348725a58a1e65e7e9f2b98b0e586ca6e5c26ce1d5f3,2024-09-30T15:15:06.053000 +CVE-2024-46280,0,1,cb8470603bde60f41f29a8f0fdd66fefd604a196bc81d1ef6889b2320b179da1,2024-09-30T18:35:08.543000 CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494e8,2024-09-16T15:51:43.937000 -CVE-2024-46293,0,0,24e9618f1ff4459e0665c6150626e6f186e013555589d5e6cf147578a383e20c,2024-09-30T15:15:06.123000 +CVE-2024-46293,0,1,e318f800936ab74936ae3857b5e562d7b97d09a7e5d1d4449ae4e773afea5399,2024-09-30T19:35:06.227000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 -CVE-2024-46313,0,0,c981653645d23be16789673bbbe0d599d09452eb5c91e67913a0a79ed11f6e7e,2024-09-30T15:15:06.243000 +CVE-2024-46313,0,1,3f3dc67250f9c4539e34f729f161d47979d31807b78c8eb0a7343944c9c1b1e9,2024-09-30T19:35:07.020000 CVE-2024-4632,0,0,1847fe54466daf978000619c24fbece5b125c2ebcf9d5cf0d1e6a4b41146457c,2024-06-20T12:44:01.637000 CVE-2024-46327,0,0,d444c66c2d1131cacb5a6cc939ae8062aae08f60f0b531cdd6bc43039126a6e8,2024-09-30T12:46:20.237000 CVE-2024-46328,0,0,150e1d7b5fcc22f852cb919b13410447bdf1e8cb19cb878b6bbbd7be01f4269b,2024-09-30T12:46:20.237000 @@ -260358,7 +260365,7 @@ CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0 CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000 CVE-2024-46471,0,0,470c933b4642dc2897ace8d3fcae6cce28009d5c4dc28b3858aee18cd52a08d7,2024-09-30T12:45:57.823000 CVE-2024-46472,0,0,905efea5ffd69a3fd22b9ebc43e76cd3335e2f2038a60c220dd9d439817a4610,2024-09-30T12:45:57.823000 -CVE-2024-46475,1,1,56090d80d32b566c9ffe130afcb40a9f7fecc3ecc44246ca40f71ba01add8623,2024-09-30T16:15:09.077000 +CVE-2024-46475,0,1,f67981ea4dc5deb130e35e5981398b3bd014da3c6f6093379b2c49fae0dcdd4f,2024-09-30T18:35:09.327000 CVE-2024-4648,0,0,911dfdcd448576dec5371ac5fe5f3ab9d434d7a73d2296063b028e9785e0deda,2024-06-04T19:20:44.580000 CVE-2024-46485,0,0,904850996ff0ccd2e4983d6545a4277eb41afbf1d891eac2f17d8f906616c485,2024-09-26T13:32:02.803000 CVE-2024-46488,0,0,3defdc280bdac468f540802333e8c8fef11bc704f85948e63bbf4df7cfe91eb5,2024-09-26T13:32:02.803000 @@ -260366,14 +260373,15 @@ CVE-2024-46489,0,0,8b9d2d65fe9d89854929481ea662e27274eb10088356e47bf59cefd0f4ce4 CVE-2024-4649,0,0,bfe7ccbfc3404b8c708ca02f740529df891f18569fdd41077ac7c5a370b61531,2024-06-04T19:20:44.677000 CVE-2024-4650,0,0,f0fa9488793eee2640aafba918929101f3b3115e92dd694b2dacbccfd4d6c179,2024-06-04T19:20:44.773000 CVE-2024-4651,0,0,745218d04b1207995e3df340bed9abda2dd0952b7a1b22fcaaa17a8ad8b7b0b9,2024-06-20T20:15:19.353000 -CVE-2024-46510,1,1,6abdfe7c126b009c078a8bfcc4d64c7eb099ba425b97bc9a3c640e28f248f1b6,2024-09-30T16:15:09.137000 +CVE-2024-46510,0,0,6abdfe7c126b009c078a8bfcc4d64c7eb099ba425b97bc9a3c640e28f248f1b6,2024-09-30T16:15:09.137000 +CVE-2024-46511,1,1,ff6e1b7f18254f60637752a032f6d88d2dc27bbe0b85490bb4b3df4ea1f4b0d6,2024-09-30T19:35:07.990000 CVE-2024-4652,0,0,8fd7af949b4c89aa1e5f9f8bc7784e47292323116a1f6a56ecb880f3c410a541,2024-06-04T19:20:44.873000 CVE-2024-4653,0,0,7b6d5c0913690c5b51d844fc9718b4208eaa5f352f244fd41eee7be1add5e3bc,2024-06-04T19:20:44.990000 CVE-2024-4654,0,0,0088d34096b2578204ff98fe71c1f702e4c8866653411407f72fe940a56448df,2024-06-04T19:20:45.100000 -CVE-2024-46540,1,1,d3030ac836bcd05d054bb28d7b725b62e32cb022b99fb9367fb1f3bb0be6a337,2024-09-30T17:15:04.550000 +CVE-2024-46540,0,1,8c5cf694981ee98104cf81c89099ed6c6ff3c8950a58817e30ab7d3398595637,2024-09-30T18:35:10.127000 CVE-2024-46544,0,0,7c690592f3c3aad53f638c9c118a2efde53f0542c00b3644e612a6801f3cf547,2024-09-26T13:32:55.343000 -CVE-2024-46548,1,1,2465c85909963cf2925c0161e89a81075e19a6b6256f32c4e01ee0c0066a3476,2024-09-30T17:15:04.620000 -CVE-2024-46549,1,1,41af1cd16eccad4beee1535a8a73710140e32818fbdb8e79e3ea7e1fe0d90e4d,2024-09-30T17:15:04.683000 +CVE-2024-46548,0,0,2465c85909963cf2925c0161e89a81075e19a6b6256f32c4e01ee0c0066a3476,2024-09-30T17:15:04.620000 +CVE-2024-46549,0,0,41af1cd16eccad4beee1535a8a73710140e32818fbdb8e79e3ea7e1fe0d90e4d,2024-09-30T17:15:04.683000 CVE-2024-4655,0,0,95970f39f135367edf16c40c69bbdd98999f38726ef0802da749dedbafaa6dbb,2024-08-01T13:59:32.490000 CVE-2024-46550,0,0,fabf02166a8c8c33c1e426eb484bdd92b929c3c43f794ca555b97f11e025fe2e,2024-09-24T16:42:25.057000 CVE-2024-46551,0,0,7660e44e84b32e009845871d8384f85d8a68355b89c08ffdaab432d6ee39b978,2024-09-24T16:41:38.327000 @@ -260418,13 +260426,14 @@ CVE-2024-46600,0,0,cae524fca9cb69012594d951fa8090d3fe8d1cfa0f217e7dac4acb986038e CVE-2024-46607,0,0,19b52a4f221a81e7b0e70e694b13b9c3dc0a4fb6554fee97e54b7afadc8502a3,2024-09-26T13:32:02.803000 CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c67789542038576759bd,2024-09-27T16:35:03.627000 CVE-2024-4661,0,0,f19406aac3e0e4dd229494d2c7f4a9ae6fd94c8256be755b3955222db7d3bf70,2024-06-10T02:52:08.267000 -CVE-2024-46610,0,1,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000 +CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000 CVE-2024-46628,0,0,f50f1f0723583928f80e0fb1e30a1b830ba848791b571a0759dc9426674fa140,2024-09-30T12:46:20.237000 CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000 CVE-2024-46632,0,0,abc659def740354695cf2f3df5ac488f8137388dc197ea59e5551153368ce0a9,2024-09-30T12:46:20.237000 +CVE-2024-46635,1,1,f6d3e92a87667c9cbc9a047021a4fe2e9670f4e99e6cf851716f2f7d6e874275,2024-09-30T18:15:06.140000 CVE-2024-46639,0,0,32a1c80f017ce1b9b0a593e635fc1fe3b0612fc660594feed34360cf471ca787,2024-09-26T13:32:55.343000 CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000 CVE-2024-46640,0,0,8a8901a45f157bc967024a42c670214bc1166786f3fd7086e031ee10a8d6de95,2024-09-26T13:32:55.343000 @@ -260655,7 +260664,7 @@ CVE-2024-46865,0,0,8856d943e6bac6edc1b8d17f62726a44dfd3a608905c22f05a95decb6da14 CVE-2024-46866,0,0,9afa3f840fa224a8243f9e6c9f3cb7c513f5e2bd8db2e5b5ae7d4067e3271b3f,2024-09-30T12:45:57.823000 CVE-2024-46867,0,0,8f4325a0424e9ac315599a33ba37a3c1e3df59d8b3fbc4ee7e2c9328a49864d8,2024-09-30T12:45:57.823000 CVE-2024-46868,0,0,be6540b29e2e0469ebbcc0580d7ac6de7ea0bd656303fcfd4e016c141e820839,2024-09-30T12:45:57.823000 -CVE-2024-46869,1,1,03d54fbfb222832637d46c224483567d901deab6b48b3da7bb6d708e19c51eeb,2024-09-30T16:15:09.200000 +CVE-2024-46869,0,0,03d54fbfb222832637d46c224483567d901deab6b48b3da7bb6d708e19c51eeb,2024-09-30T16:15:09.200000 CVE-2024-4687,0,0,5435981fd840e586246d5a6c7c954862d5332569f9e647b4965c896a6669b062,2024-06-04T19:20:46.547000 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 @@ -260714,9 +260723,9 @@ CVE-2024-47061,0,0,fe88cb5968145d279da6e4fd6edb09ab3be3c5c5915bf3eb5f15f2dbcdbe9 CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d4304ec,2024-09-26T13:32:55.343000 CVE-2024-47063,0,0,7ef913b0f52a2c2f87c249824365da21f4a376160b0cd1f651073f68cbfd7c45,2024-09-30T15:15:06.293000 CVE-2024-47064,0,0,d1c3eb2fa5975d04e490b431693cbf36aea89455eac14f0c7de0287dd6e627a6,2024-09-30T15:15:06.413000 -CVE-2024-47066,0,0,c938aa14b4956e02dcf0b434c18945502d356432c94e760748910c81591de152,2024-09-26T13:32:55.343000 -CVE-2024-47067,1,1,0dcb8143eaf9fe25cf20fec1e5fc4df69090a1c1c753c53eb9903fc3acec268a,2024-09-30T16:15:09.267000 -CVE-2024-47068,0,1,70050872d840caaa2d3a7b4935edacfa0f683641a39a86ef80c1feff7746bbfc,2024-09-30T17:39:45.350000 +CVE-2024-47066,0,1,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000 +CVE-2024-47067,0,0,0dcb8143eaf9fe25cf20fec1e5fc4df69090a1c1c753c53eb9903fc3acec268a,2024-09-30T16:15:09.267000 +CVE-2024-47068,0,0,70050872d840caaa2d3a7b4935edacfa0f683641a39a86ef80c1feff7746bbfc,2024-09-30T17:39:45.350000 CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000 CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390106,2024-09-30T12:45:57.823000 @@ -260763,7 +260772,7 @@ CVE-2024-47174,0,0,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae CVE-2024-47175,0,0,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000 CVE-2024-47176,0,0,27547436bf8c76fe92f2f835eaacfc443553990b4bb1849aa668400451f9d2cb,2024-09-30T12:46:20.237000 CVE-2024-47177,0,0,c3d1fff6e6c651906b3b7b3db7e611572822f47ef60858bd0aa18bbf89a3315d,2024-09-30T12:46:20.237000 -CVE-2024-47178,1,1,e086418bd8207ac1a043b6e2c4d1942cea388c2446c3e78167e76f3ecaedee55,2024-09-30T16:15:09.410000 +CVE-2024-47178,0,0,e086418bd8207ac1a043b6e2c4d1942cea388c2446c3e78167e76f3ecaedee55,2024-09-30T16:15:09.410000 CVE-2024-47179,0,0,f556f6c034532f0e7809bac52c7041c445d298cb44c326963214d4d05cb55a7e,2024-09-30T12:46:20.237000 CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000 CVE-2024-47180,0,0,657c5516ab8b6145e58c8aac2b3c60b2287f164333060e376b2fc3a8acbd6fb3,2024-09-30T12:46:20.237000 @@ -260799,7 +260808,7 @@ CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392 CVE-2024-47303,0,0,4fd81bf971579cf0e00271b5e072c908021bfefdc76c11f84286ad7788e9cb34,2024-09-26T13:32:02.803000 CVE-2024-47305,0,0,2c8f799a296592421ee25aa9899e311f2f61ad0eb53c72b4da9231822f1148ec,2024-09-26T13:32:02.803000 CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000 -CVE-2024-47315,0,0,a868b9b83ef3c5c99d6950501dbe148a11d95f58a6c8007673b548222a36578c,2024-09-26T13:32:02.803000 +CVE-2024-47315,0,1,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000 CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000 CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000 CVE-2024-47330,0,0,a0e4c848573d9b135f4e2651c83b6b523e8c5bd0ca01b687162a3441017ae278,2024-09-26T13:32:02.803000 @@ -260821,10 +260830,10 @@ CVE-2024-4750,0,0,e7d885dbb56d4f9fc74f5666b8e26860ce8baddd6593d5428816201f1663fb CVE-2024-4751,0,0,258479d9744cea39d1125b819c638c567793396e05305e64bbc0e320bde2cbf7,2024-08-09T19:35:10.473000 CVE-2024-4752,0,0,6bc9a9ea56288a6bdc9797f778ecc1371bb94f8257819cae6e07cdc5634a3ca3,2024-08-01T13:59:33.713000 CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000 -CVE-2024-47530,1,1,fba522e024b83acf70358c93acf37e114887d5fe3a476a11c9462eadc0b44e72,2024-09-30T16:15:09.540000 -CVE-2024-47531,1,1,33301edab0f0649702484b01110937da183dc72540869ebdc9cdc877c211a23a,2024-09-30T16:15:09.750000 -CVE-2024-47532,1,1,260108fc45e8ac31160035cc2b3e7ed0f7f45e8ba1661343699d85f76bbe06fa,2024-09-30T16:15:09.960000 -CVE-2024-47536,1,1,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000 +CVE-2024-47530,0,0,fba522e024b83acf70358c93acf37e114887d5fe3a476a11c9462eadc0b44e72,2024-09-30T16:15:09.540000 +CVE-2024-47531,0,0,33301edab0f0649702484b01110937da183dc72540869ebdc9cdc877c211a23a,2024-09-30T16:15:09.750000 +CVE-2024-47532,0,0,260108fc45e8ac31160035cc2b3e7ed0f7f45e8ba1661343699d85f76bbe06fa,2024-09-30T16:15:09.960000 +CVE-2024-47536,0,0,6e4acb61d2da8d00872363d19c0ef06b941da325b5d169aae3bc2073325756a6,2024-09-30T17:15:04.780000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-4755,0,0,ca5306e45de4985a027d64d4740785092288eb6abbd1ab6d1fda3377d88d4e7e,2024-07-03T02:08:01.477000 CVE-2024-4756,0,0,56f5675f964fc18dbd2235a67dc0431c0553314b21f097091d5942b6bc7c2044,2024-08-01T13:59:34.090000 @@ -262374,7 +262383,7 @@ CVE-2024-6536,0,0,db3a8f54349ce01fbebd842277117fe6b2369b9af6752930ef3e5c8ea43f79 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000 CVE-2024-6542,0,0,bb318408eda9e57d4fba1c49251ffc615a87c88f77b6516a9b3efcf954de0990,2024-08-14T16:32:34.753000 -CVE-2024-6544,0,0,45f53c801f5be057304526bfa46ae491276bb3854816f041adef1411f73b7edd,2024-09-13T16:37:22.997000 +CVE-2024-6544,0,1,f2d528dbebd493bcdc2fe876e00362b1a02a24265861d0f9bfcbede100bb600f,2024-09-30T19:12:09.007000 CVE-2024-6545,0,0,97ee5e13519e722f4006d1598ff8b5d6e2e4cb7552f463abeca3e656c343e880,2024-07-29T14:12:08.783000 CVE-2024-6546,0,0,0eee46a34ab9f84036d2fbded3a46124e4089d04296fa0288f2cdad15177d72e,2024-07-29T14:12:08.783000 CVE-2024-6547,0,0,18c84e0486ad4b936dd6fb72fb2fdab2178f5a996a76eecb6a226aad2d913b31,2024-07-29T14:12:08.783000 @@ -262575,8 +262584,8 @@ CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0c CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000 CVE-2024-6785,0,0,ef25cfd9dd9fb398c181c2e2c1a44a7dbc0dc59353d1fa28c2cc7cafe3b60589,2024-09-27T18:59:25.253000 -CVE-2024-6786,0,0,3493add59ea41909363960472a7490ce43155eacf299d4a14021628fbd24ac57,2024-09-26T13:32:55.343000 -CVE-2024-6787,0,0,069c45bc91f1142aab5002ae41cf01ce3d1f7f8ba9e8ff23b9c4e02064c4ad40,2024-09-26T13:32:55.343000 +CVE-2024-6786,0,1,98f21ab09b2a01cca281fda0397f483af3ef0c01a5476e213ec4980c9cfa3d20,2024-09-30T18:31:50.473000 +CVE-2024-6787,0,1,f69f9a07cfd39832fdc2962e9d288436b728db50eb29cb7ded1838c3808a88b2,2024-09-30T18:02:51.080000 CVE-2024-6788,0,0,369ef896034f113597a96208fca075acd0c3bdd5e82bf3987939f5fd20470069,2024-08-13T17:11:53.553000 CVE-2024-6789,0,0,e33e978edc987b98e576665a6bdb79eb993fb5854279dc068f6ea120541693df,2024-09-16T07:15:03.877000 CVE-2024-6791,0,0,6ce79f46aa2ab35d9212f59a5703ed0b8f9ce029cc93e4591d5b48478ec576f2,2024-09-17T14:44:39.387000 @@ -262586,7 +262595,7 @@ CVE-2024-6794,0,0,ad94acaa214038da0f1d2d9a411a4c1c4e53e8ac05cf5953ca0eb0b2970fe6 CVE-2024-6795,0,0,43a9755eea89cb70653f5bb3a7b4b270588a1e76e27a27f3976e0e66d5198a2a,2024-09-20T14:53:15.217000 CVE-2024-6796,0,0,ea450aaa268d6c6930fa47bff0f10e52dfa43850b94210c20818c6bdcee5cec7,2024-09-20T14:53:11.447000 CVE-2024-6799,0,0,39536c19a9ca2d6262efda14a231fbf09108e28ad2b189e8ce4347991001df6e,2024-09-10T15:05:48.583000 -CVE-2024-6800,0,0,a5d8346745f242933d21fbed086500bc35ec95f2fa2f5715ca5593178025d7b8,2024-08-22T15:15:17.127000 +CVE-2024-6800,0,1,b0ac3d09606c05fe58c46a909539ce33c78722986ee076b3e1895bc57cb44aa0,2024-09-30T19:14:50.430000 CVE-2024-6801,0,0,6cf94e1980aea6fcc25b038d583cb2250e04ba4c9461d4d907e1f9ce16b1e09a,2024-07-19T14:55:25.753000 CVE-2024-6802,0,0,41c45597ef2d2991d0ff5de1c94d34d596167540846175036f3a8eca13168f84,2024-08-26T05:15:05.980000 CVE-2024-6803,0,0,e77960f60e5c3ea5b22b60c53aac93b8bf6ffc93dd5f015dabaabc8b5a77736e,2024-07-19T15:01:50.250000 @@ -262888,7 +262897,7 @@ CVE-2024-7202,0,0,cd873862dd9c581add7def3fb09e4d862139cb04eed28a9bf2f7047259aa2b CVE-2024-7203,0,0,9623065bb1076b933803b0136efc271bca239649fdbd7e41cb52d273c630ecf2,2024-09-05T14:33:17.567000 CVE-2024-7204,0,0,1bfd5eea41034a87a8406d1df422953de68b7d6759dfb1054c8215461bee3314,2024-09-11T14:23:45.127000 CVE-2024-7205,0,0,f8b1cbec46ea51b223aac866d1ac39ee6fa7b6e832e6e62020df5a45e4b00643,2024-07-31T15:15:10.993000 -CVE-2024-7207,0,0,7d162a46bdd86c9ef89d18404bf5c26cb639ca8d9bf2e70cc4f9daf2fa9be1a1,2024-09-25T17:51:34.800000 +CVE-2024-7207,0,1,685939e6da39eea18941ae363d793c2135cdd34b1de02f3365cc55972f116f83,2024-09-30T19:15:04.540000 CVE-2024-7208,0,0,23976b9c97cfc390397ceda1fa9cd6b5d178a3b311c11fb9c9f129febf7d4e73,2024-08-02T15:16:37.420000 CVE-2024-7209,0,0,70d88ede2ff174d67b44db29b9d64c217e00f13cf62689936f75e53f7397ee7a,2024-07-31T12:57:02.300000 CVE-2024-7211,0,0,92a84d32183c8fcd0c3fcd4c786a37ad4d038da054671ef7ebf12a51168571d0,2024-09-06T13:23:07.237000 @@ -263040,7 +263049,7 @@ CVE-2024-7394,0,0,311dd8d09f289dca72e294063b3121b4c7fd832b8fb4e9134c8457f94c79d2 CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000 CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000 CVE-2024-7397,0,0,6d2f711820d3e2f3c7573fc7d4d971b3f755ab6406b8b6440f8e39ce24e2f3e7,2024-08-06T16:31:05.780000 -CVE-2024-7398,0,1,4bceec8e4e1ae5d86e69945d7f8f61d9ec5b7ac80a4cf5b22e0ebbed49985083,2024-09-30T16:12:24.337000 +CVE-2024-7398,0,0,4bceec8e4e1ae5d86e69945d7f8f61d9ec5b7ac80a4cf5b22e0ebbed49985083,2024-09-30T16:12:24.337000 CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000 CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 @@ -263051,7 +263060,7 @@ CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e327 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 CVE-2024-7413,0,0,cc9a3132dbf30c713a640687e195177085da2f3a67f589d16f765a82cdaabb61,2024-08-12T13:41:36.517000 CVE-2024-7414,0,0,ec5a655568a866725caccc407e481351f1a5df496455996ee3102ef3dac59f70,2024-08-12T13:41:36.517000 -CVE-2024-7415,0,1,4f3e91f02c270ceca383c924b673a911f19c76918de0da2e60f23a61a9c60f70,2024-09-30T17:46:46.473000 +CVE-2024-7415,0,0,4f3e91f02c270ceca383c924b673a911f19c76918de0da2e60f23a61a9c60f70,2024-09-30T17:46:46.473000 CVE-2024-7416,0,0,67a9ab6c88d18462429964f1183d705aa9fe2b8f49f4e7e013c20651e7dbf059,2024-08-12T13:41:36.517000 CVE-2024-7418,0,0,6785004d3e0c8a7d4acd7be47cb26ee53d058e1a0fbb989539468dc8c9c8a1ec,2024-08-29T13:25:27.537000 CVE-2024-7420,0,0,307d2beb05daeaa977b791b65696d33894a9f28a7ba08d0caa6a110cc77dc054,2024-09-13T14:45:43.513000 @@ -264019,8 +264028,8 @@ CVE-2024-8919,0,0,e01b61fd584c4fffdfd8e5db7a09e1be1033f5c7df5b5418d10948726a2bc5 CVE-2024-8922,0,0,20529fa1692fa50986ba215b54fa6394828d24b19e91b98ecf8bcc0f353de572,2024-09-30T12:46:20.237000 CVE-2024-8939,0,0,1f70befe339fdb31af424859012581aeb13e8f518e2f8da7bf31e05da17f11bc,2024-09-20T12:30:51.220000 CVE-2024-8940,0,0,881a745a1b77233fe3ad09218f06df01a2061a4c2e5cfa2c2a81ed440bf13f5f,2024-09-26T13:32:02.803000 -CVE-2024-8941,0,0,5a23216cd953abba28d73d2932ca5626321bd4676456d325dae99c04345ab028,2024-09-26T13:32:02.803000 -CVE-2024-8942,0,1,856856bd14b58b19668f9a36b8a793262f5091e96c724b4e90a8dd630a5aaf77,2024-09-30T17:39:28.417000 +CVE-2024-8941,0,1,92a203d8a6a94e9c82aca27b5b4eb25cc17b0659508e43ff25edbb70a0d6f393,2024-09-30T19:45:43.223000 +CVE-2024-8942,0,0,856856bd14b58b19668f9a36b8a793262f5091e96c724b4e90a8dd630a5aaf77,2024-09-30T17:39:28.417000 CVE-2024-8944,0,0,163e8bd42c52d6cb1f3f0fdfff8b3db24acfd0dba8d50b29b1780d64b55bd42a,2024-09-23T16:56:34.637000 CVE-2024-8945,0,0,89d4e06764ee27ae462e66a2c760956f13440d7833b3b8093e505b1c71a9aac5,2024-09-25T19:24:25.167000 CVE-2024-8946,0,0,0afc0efb5414dac2f435cdc08456c904eb9a65ac4dd275170da7c9549741129d,2024-09-24T13:11:17.417000 @@ -264104,9 +264113,9 @@ CVE-2024-9130,0,0,5bd25b655f8e7a913dbf125185040ed90a768cc24bf73a5555fb1985c6ebc2 CVE-2024-9136,0,0,3a2123a7313620918321ccc10071ef5907ddec267af09127e6959a072bce8ae3,2024-09-30T12:45:57.823000 CVE-2024-9141,0,0,1186d93c71ba2b76e7029b0455d3828535e51a6f22b721a65c3963a052cae512,2024-09-26T13:32:02.803000 CVE-2024-9142,0,0,f41ad411b11065ca581c6c09a7cdbabb7231f7d077f84444580389a46c43e76b,2024-09-26T13:32:02.803000 -CVE-2024-9148,0,1,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 +CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000 -CVE-2024-9158,1,1,409612c4b8cb4a3f347d3e6118bf18cfe60f695c2a9fbb2e38a16b5a656c0709,2024-09-30T17:15:05.407000 +CVE-2024-9158,0,0,409612c4b8cb4a3f347d3e6118bf18cfe60f695c2a9fbb2e38a16b5a656c0709,2024-09-30T17:15:05.407000 CVE-2024-9160,0,0,dcb08097a2707d90887b21cc5ab80eb6cf86ff84abb571a9a69f82310c298b71,2024-09-30T12:45:57.823000 CVE-2024-9166,0,0,b24f9ebc4650fb7d123f858805d8b1a753ef6a732064f8b14cd979bccf2c240a,2024-09-30T12:46:20.237000 CVE-2024-9169,0,0,3e58e76dfb6d40928d7a81777e9f17fdbdc857f6ee99a9600a6d563079322d8f,2024-09-26T13:32:02.803000