diff --git a/CVE-2022/CVE-2022-468xx/CVE-2022-46869.json b/CVE-2022/CVE-2022-468xx/CVE-2022-46869.json index 5401243db22..c5e56c95dbc 100644 --- a/CVE-2022/CVE-2022-468xx/CVE-2022-46869.json +++ b/CVE-2022/CVE-2022-468xx/CVE-2022-46869.json @@ -2,8 +2,8 @@ "id": "CVE-2022-46869", "sourceIdentifier": "security@acronis.com", "published": "2023-08-31T20:15:08.027", - "lastModified": "2023-09-07T14:25:24.507", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T21:15:12.977", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -63,22 +63,22 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "security@acronis.com", "type": "Primary", "description": [ { "lang": "en", - "value": "CWE-59" + "value": "CWE-610" } ] }, { - "source": "security@acronis.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-59" } ] } diff --git a/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json b/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json index 2d8a45277ba..c7d3761bedb 100644 --- a/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json +++ b/CVE-2023/CVE-2023-218xx/CVE-2023-21839.json @@ -2,8 +2,8 @@ "id": "CVE-2023-21839", "sourceIdentifier": "secalert_us@oracle.com", "published": "2023-01-18T00:15:13.450", - "lastModified": "2024-09-17T14:35:05.467", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T20:10:55.523", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2023-05-01", "cisaActionDue": "2023-05-22", @@ -50,7 +50,7 @@ "description": [ { "lang": "en", - "value": "NVD-CWE-noinfo" + "value": "CWE-502" } ] }, diff --git a/CVE-2023/CVE-2023-262xx/CVE-2023-26237.json b/CVE-2023/CVE-2023-262xx/CVE-2023-26237.json index a7c9cc50769..22c86b02f09 100644 --- a/CVE-2023/CVE-2023-262xx/CVE-2023-26237.json +++ b/CVE-2023/CVE-2023-262xx/CVE-2023-26237.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26237", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T01:15:10.187", - "lastModified": "2023-10-11T14:00:07.037", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T21:35:02.027", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-639" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28600.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28600.json index f74cd03c55f..8617e1f5103 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28600.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28600.json @@ -2,13 +2,13 @@ "id": "CVE-2023-28600", "sourceIdentifier": "security@zoom.us", "published": "2023-06-13T18:15:21.533", - "lastModified": "2023-06-21T20:52:50.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:04.277", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client.\n\n" + "value": "Zoom for MacOSclients prior to 5.14.0 contain an improper access control vulnerability. A malicious user may be able to delete/replace Zoom Client files potentially causing a loss of integrity and availability to the Zoom Client." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-378" } ] } diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28601.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28601.json index af7aa55a9ba..7dea5ecda7c 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28601.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28601.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28601", "sourceIdentifier": "security@zoom.us", "published": "2023-06-13T18:15:21.613", - "lastModified": "2023-06-21T20:53:18.250", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:04.560", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-119" + "value": "CWE-358" } ] } diff --git a/CVE-2023/CVE-2023-286xx/CVE-2023-28603.json b/CVE-2023/CVE-2023-286xx/CVE-2023-28603.json index 709267b9fff..06bb45ee1a2 100644 --- a/CVE-2023/CVE-2023-286xx/CVE-2023-28603.json +++ b/CVE-2023/CVE-2023-286xx/CVE-2023-28603.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28603", "sourceIdentifier": "security@zoom.us", "published": "2023-06-13T18:15:21.760", - "lastModified": "2023-06-21T20:53:55.603", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:04.730", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-73" } ] } diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34116.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34116.json index 82f769c5d82..7810bfdab14 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34116.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34116.json @@ -2,13 +2,13 @@ "id": "CVE-2023-34116", "sourceIdentifier": "security@zoom.us", "published": "2023-07-11T17:15:13.097", - "lastModified": "2023-07-18T21:08:43.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:05.063", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access.\n" + "value": "Improper input validation in the Zoom Desktop Client for Windows before version 5.15.0 may allow an unauthorized user to enable an escalation of privilege via network access." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-78" } ] } diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34118.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34118.json index 8aa63fd7555..9df7b388351 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34118.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34118.json @@ -2,13 +2,13 @@ "id": "CVE-2023-34118", "sourceIdentifier": "security@zoom.us", "published": "2023-07-11T18:15:16.300", - "lastModified": "2023-07-19T00:47:57.243", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:05.193", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.\n" + "value": "Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-250" } ] } diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34119.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34119.json index 848b67456e2..3fe2936ffd3 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34119.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34119.json @@ -2,13 +2,13 @@ "id": "CVE-2023-34119", "sourceIdentifier": "security@zoom.us", "published": "2023-07-11T18:15:16.363", - "lastModified": "2023-07-19T00:47:47.307", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:05.337", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": " Insecure temporary file in the installer for Zoom Rooms for Windows\u00a0before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access.\n" + "value": "Insecure temporary file in the installer for Zoom Rooms for Windows\u00a0before version 5.15.0 may allow an authenticated user to enable an escalation of privilege via local access." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-377" + "value": "CWE-426" } ] } diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34120.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34120.json index 8f2a1fcee8a..91f46ef0605 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34120.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34120.json @@ -2,13 +2,13 @@ "id": "CVE-2023-34120", "sourceIdentifier": "security@zoom.us", "published": "2023-06-13T18:15:21.913", - "lastModified": "2023-06-21T20:54:35.730", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:05.440", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": " Improper privilege management in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access. Users may potentially utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges." + "value": "Improper privilege management in Zoom for Windows, Zoom Rooms for Windows, and Zoom VDI for Windows clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via local access. Users may potentially utilize higher level system privileges maintained by the Zoom client to spawn processes with escalated privileges." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-347" } ] } diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34121.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34121.json index 46ea28ec813..9c5d6650f05 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34121.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34121.json @@ -2,13 +2,13 @@ "id": "CVE-2023-34121", "sourceIdentifier": "security@zoom.us", "published": "2023-06-13T18:15:21.987", - "lastModified": "2023-06-21T20:54:52.100", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:05.570", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": " Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access." + "value": "Improper input validation in the Zoom for Windows, Zoom Rooms, Zoom VDI Windows Meeting clients before 5.14.0 may allow an authenticated user to potentially enable an escalation of privilege via network access." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-20" + "value": "CWE-79" } ] } diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36533.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36533.json index 22b76bbdc4f..94c241ca731 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36533.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36533.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36533", "sourceIdentifier": "security@zoom.us", "published": "2023-08-08T18:15:14.037", - "lastModified": "2023-08-11T13:42:42.633", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:05.733", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-400" + "value": "CWE-772" } ] } diff --git a/CVE-2023/CVE-2023-365xx/CVE-2023-36537.json b/CVE-2023/CVE-2023-365xx/CVE-2023-36537.json index 0390835f34b..52b317cbdb8 100644 --- a/CVE-2023/CVE-2023-365xx/CVE-2023-36537.json +++ b/CVE-2023/CVE-2023-365xx/CVE-2023-36537.json @@ -2,13 +2,13 @@ "id": "CVE-2023-36537", "sourceIdentifier": "security@zoom.us", "published": "2023-07-11T18:15:20.307", - "lastModified": "2023-07-19T00:25:25.517", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:15:05.913", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": " Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access.\n" + "value": "Improper privilege management in Zoom Rooms for Windows before version 5.14.5 may allow an authenticated user to enable an escalation of privilege via local access." } ], "metrics": { @@ -72,7 +72,7 @@ "description": [ { "lang": "en", - "value": "CWE-269" + "value": "CWE-354" } ] } diff --git a/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json b/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json index c132e599143..a0d635114d8 100644 --- a/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json +++ b/CVE-2023/CVE-2023-409xx/CVE-2023-40920.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40920", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T20:15:13.013", - "lastModified": "2023-10-11T17:26:13.903", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T21:35:03.493", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43269.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43269.json index dd854cebe62..54c65a1446e 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43269.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43269.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43269", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T22:15:12.180", - "lastModified": "2023-10-13T15:03:11.810", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:11.050", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-432xx/CVE-2023-43284.json b/CVE-2023/CVE-2023-432xx/CVE-2023-43284.json index f3e84db079f..fe6d8e1430d 100644 --- a/CVE-2023/CVE-2023-432xx/CVE-2023-43284.json +++ b/CVE-2023/CVE-2023-432xx/CVE-2023-43284.json @@ -2,7 +2,7 @@ "id": "CVE-2023-43284", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T20:15:13.117", - "lastModified": "2023-11-22T15:15:09.303", + "lastModified": "2024-09-19T20:35:11.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-439xx/CVE-2023-43981.json b/CVE-2023/CVE-2023-439xx/CVE-2023-43981.json index 7d00c802f0a..c7f9db55971 100644 --- a/CVE-2023/CVE-2023-439xx/CVE-2023-43981.json +++ b/CVE-2023/CVE-2023-439xx/CVE-2023-43981.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43981", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T20:15:13.200", - "lastModified": "2023-10-07T02:52:59.353", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:12.393", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44828.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44828.json index 0f410a5c417..d1abe38f8ef 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44828.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44828.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44828", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.550", - "lastModified": "2023-10-07T03:15:05.237", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:14.000", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44829.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44829.json index 7292514b1e2..d6c12a5a668 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44829.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44829.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44829", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.610", - "lastModified": "2023-10-07T03:15:25.163", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:14.773", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44830.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44830.json index 39e04f51d77..da236102163 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44830.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44830.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44830", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.657", - "lastModified": "2023-10-07T03:18:38.277", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:15.623", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44831.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44831.json index 538ede6b52d..46baf45968d 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44831.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44831.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44831", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.700", - "lastModified": "2023-10-07T03:16:56.033", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:16.490", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-448xx/CVE-2023-44832.json b/CVE-2023/CVE-2023-448xx/CVE-2023-44832.json index 0e32dbd120c..769d47324d3 100644 --- a/CVE-2023/CVE-2023-448xx/CVE-2023-44832.json +++ b/CVE-2023/CVE-2023-448xx/CVE-2023-44832.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44832", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-05T16:15:11.753", - "lastModified": "2023-10-07T03:15:46.517", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:17.307", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4582.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4582.json index 6da5edc0b70..cfd71591c74 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4582.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4582.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4582", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.617", - "lastModified": "2023-09-14T03:52:38.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:19.947", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-45xx/CVE-2023-4583.json b/CVE-2023/CVE-2023-45xx/CVE-2023-4583.json index 29bba9f30a7..053a20b84dc 100644 --- a/CVE-2023/CVE-2023-45xx/CVE-2023-4583.json +++ b/CVE-2023/CVE-2023-45xx/CVE-2023-4583.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4583", "sourceIdentifier": "security@mozilla.org", "published": "2023-09-11T09:15:09.680", - "lastModified": "2023-09-14T03:52:30.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-19T20:35:20.763", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46380.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46380.json index 241a5226517..b014f6e7d6f 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46380.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46380.json @@ -2,13 +2,13 @@ "id": "CVE-2023-46380", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-04T23:15:07.910", - "lastModified": "2023-12-14T08:15:41.037", + "lastModified": "2024-09-19T20:15:06.353", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices send password-change requests via cleartext HTTP." + "value": "LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) send password-change requests via cleartext HTTP." }, { "lang": "es", @@ -150,6 +150,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", + "source": "cve@mitre.org" + }, { "url": "https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46381.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46381.json index 57ba660393c..37d5105e4a8 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46381.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46381.json @@ -2,13 +2,13 @@ "id": "CVE-2023-46381", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-04T23:15:07.957", - "lastModified": "2023-12-14T08:15:41.450", + "lastModified": "2024-09-19T20:15:06.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI." + "value": "LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) lack authentication for the preinstalled version of LWEB-802 via an lweb802_pre/ URI. An unauthenticated attacker can edit any project (or create a new project) and control its GUI." }, { "lang": "es", @@ -150,6 +150,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", + "source": "cve@mitre.org" + }, { "url": "https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/", "source": "cve@mitre.org" diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46382.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46382.json index 268d2180852..6f463cbb7ca 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46382.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46382.json @@ -2,13 +2,13 @@ "id": "CVE-2023-46382", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-04T23:15:08.003", - "lastModified": "2023-12-14T08:15:41.690", + "lastModified": "2024-09-19T20:15:06.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "LOYTEC LINX-212 firmware 6.2.4 and LVIS-3ME12-A1 firmware 6.2.2 and LIOB-586 firmware 6.2.3 devices use cleartext HTTP for login." + "value": "LOYTEC LINX-151, LINX-212, LVIS-3ME12-A1, LIOB-586, LIOB-580 V2, LIOB-588, L-INX Configurator devices (all versions) use cleartext HTTP for login." }, { "lang": "es", @@ -150,6 +150,10 @@ "Third Party Advisory" ] }, + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-247-01", + "source": "cve@mitre.org" + }, { "url": "https://www.txone.com/blog/ten-unpatched-vulnerabilities-in-building-automation-products-identified-by-txone-networks/", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json index 26502346586..dc5bef70e86 100644 --- a/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20399.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20399", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-07-01T17:15:04.383", - "lastModified": "2024-09-17T19:15:24.747", - "vulnStatus": "Modified", + "lastModified": "2024-09-19T20:05:25.107", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-07-02", "cisaActionDue": "2024-07-23", diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json index c86a13bad97..047f83e8252 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25023.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25023", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-07-10T01:15:09.633", - "lastModified": "2024-07-11T13:05:54.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T21:14:27.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0.0", + "versionEndIncluding": "1.10.11.0", + "matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.12.0", + "versionEndExcluding": "1.10.23.0", + "matchCriteriaId": "4E1101FE-F579-4869-BFFD-6383D0F9C6A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/281429", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7159768", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34344.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34344.json index 1a011903f2e..a3d78641944 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34344.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34344.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34344", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-05T21:15:38.457", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T20:58:01.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.4.0", + "versionEndExcluding": "3.12.4", + "matchCriteriaId": "2260958F-B727-4B00-8835-29448E791AF6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nuxt/nuxt/security/advisories/GHSA-v784-fjjh-f8r4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38221.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38221.json new file mode 100644 index 00000000000..6bf8fba0bf9 --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38221.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38221", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-09-19T21:15:13.933", + "lastModified": "2024-09-19T21:15:13.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38221", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39304.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39304.json index 3bb19edec71..c9c358796dc 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39304.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39304.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39304", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-26T18:15:03.557", - "lastModified": "2024-07-29T14:12:08.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T20:59:15.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.9.2", + "matchCriteriaId": "BF260165-FC6C-43A6-A034-EBAF26131A40" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ChurchCRM/CRM/commit/e3bd7bfbf33f01148df0ef1acdb0cf2c2b878b08", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/ChurchCRM/CRM/security/advisories/GHSA-2rh6-gr3h-83j9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-401xx/CVE-2024-40125.json b/CVE-2024/CVE-2024-401xx/CVE-2024-40125.json index f42b0c38db1..018dc5c7023 100644 --- a/CVE-2024/CVE-2024-401xx/CVE-2024-40125.json +++ b/CVE-2024/CVE-2024-401xx/CVE-2024-40125.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40125", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-19T19:15:24.350", - "lastModified": "2024-09-19T19:15:24.350", + "lastModified": "2024-09-19T20:35:24.513", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An arbitrary file upload vulnerability in the Media Manager function of Closed-Loop Technology CLESS Server v4.5.2 allows attackers to execute arbitrary code via uploading a crafted PHP file to the upload endpoint." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/brendontkl/My-CVEs/tree/main/CVE-2024-40125", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41959.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41959.json index 53219e8abbe..b5e5b869706 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41959.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41959.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41959", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-05T20:15:36.270", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T20:14:02.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mailcow:mailcow\\:_dockerized:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-07", + "matchCriteriaId": "995C99DD-01FE-4772-808E-1A927518ED1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mailcow/mailcow-dockerized/commit/66aa28b5de282fc037e0d2f02fbdc84539b614a1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-v3r3-8f69-ph29", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41960.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41960.json index 729ba0b0d4b..39bf205aecc 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41960.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41960", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-05T20:15:36.477", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T20:01:58.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mailcow:mailcow\\:_dockerized:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-07", + "matchCriteriaId": "995C99DD-01FE-4772-808E-1A927518ED1D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/mailcow/mailcow-dockerized/commit/efb2572f0fa57628ad98a76a4ae884a10cac0a1a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-jpp8-rhg6-4vvv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-421xx/CVE-2024-42102.json b/CVE-2024/CVE-2024-421xx/CVE-2024-42102.json index 0e2b5ddbed4..aacb5c3accb 100644 --- a/CVE-2024/CVE-2024-421xx/CVE-2024-42102.json +++ b/CVE-2024/CVE-2024-421xx/CVE-2024-42102.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42102", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-30T08:15:02.733", - "lastModified": "2024-08-21T20:48:01.940", + "lastModified": "2024-09-19T20:38:05.737", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -22,19 +22,19 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", "attackVector": "LOCAL", - "attackComplexity": "LOW", + "attackComplexity": "HIGH", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH", - "baseScore": 5.5, + "baseScore": 4.7, "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 1.8, + "exploitabilityScore": 1.0, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-423xx/CVE-2024-42352.json b/CVE-2024/CVE-2024-423xx/CVE-2024-42352.json index cdb43702af6..08ad9e128f3 100644 --- a/CVE-2024/CVE-2024-423xx/CVE-2024-42352.json +++ b/CVE-2024/CVE-2024-423xx/CVE-2024-42352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42352", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-05T21:15:38.913", - "lastModified": "2024-08-06T16:30:24.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T20:55:46.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nuxt:nuxt:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.5", + "matchCriteriaId": "450FA494-54D1-4853-BA87-BAC6F4D749FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nuxt/icon/security/advisories/GHSA-cxgv-px37-4mp2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43042.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43042.json index 115918e9102..dff6a97ac7b 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43042.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43042", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-16T20:15:13.573", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T21:01:24.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "Pluck CMS 4.7.18 no restringe los intentos fallidos de inicio de sesi\u00f3n, lo que permite a los atacantes ejecutar un ataque de fuerza bruta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pluck-cms:pluck:4.7.18:-:*:*:*:*:*:*", + "matchCriteriaId": "D1FA72CC-1126-4DC4-8431-997BC8160715" + } + ] + } + ] + } + ], "references": [ { "url": "https://drive.google.com/file/d/1FnLCFP8xDrE1e_4Ft_TZ7VhC-JBkpsL0/view?usp=sharing", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/pluck-cms/pluck", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43144.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43144.json index 674df266a54..d13c439b507 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43144.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43144.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43144", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T15:15:28.530", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T21:47:24.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -41,7 +61,7 @@ }, "weaknesses": [ { - "source": "audit@patchstack.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -49,12 +69,43 @@ "value": "CWE-89" } ] + }, + { + "source": "audit@patchstack.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:stylemixthemes:cost_calculator_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.16", + "matchCriteriaId": "9B83880C-A635-4AAC-8F63-91B2D1E4F1E9" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cost-calculator-builder/wordpress-cost-calculator-builder-plugin-3-2-15-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43489.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43489.json new file mode 100644 index 00000000000..cc860532d00 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43489.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43489", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-09-19T21:15:15.677", + "lastModified": "2024-09-19T21:15:15.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43489", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43496.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43496.json new file mode 100644 index 00000000000..52b7015369c --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43496.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43496", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-09-19T21:15:15.917", + "lastModified": "2024-09-19T21:15:15.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43496", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43917.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43917.json index 445afd88e4e..4bc91fc0b0d 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43917.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43917.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43917", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T15:15:28.753", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T21:46:19.713", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:templateinvaders:ti_woocommerce_wishlist:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "2.8.2", + "matchCriteriaId": "3175DE1F-23E6-4CB9-B2AD-DCDF89246856" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ti-woocommerce-wishlist/wordpress-ti-woocommerce-wishlist-plugin-2-8-2-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43922.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43922.json index 00d86acce8b..a97aad5a602 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43922.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43922.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43922", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T15:15:29.227", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T21:44:49.453", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nitropack:nitropack:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.16.8", + "matchCriteriaId": "8D757B56-5E1B-473C-90A5-3777DBB1240C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/nitropack/wordpress-nitropack-plugin-1-16-7-unauthenticated-arbitrary-shortcode-execution-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json index e797c70552d..de9e992662f 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45457.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45457", "sourceIdentifier": "audit@patchstack.com", "published": "2024-09-15T08:15:13.547", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T20:53:46.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:spiffyplugins:spiffy_calendar:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.9.14", + "matchCriteriaId": "2CD91243-6FF0-44AA-AE85-B1C4B6604A9F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/spiffy-calendar/wordpress-spiffy-calendar-plugin-4-9-13-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json index 98390f573d1..107cea52e13 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45496.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45496", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-17T00:15:52.433", - "lastModified": "2024-09-19T14:15:16.980", + "lastModified": "2024-09-19T20:15:06.813", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -68,6 +68,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6691", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6705", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-45496", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json index c1dacb6d336..92852b03e5b 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45696.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45696", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:03.037", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T21:42:36.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,82 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:covr-x1870_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.03b01", + "matchCriteriaId": "B6608842-4B33-49CA-BB9A-7484370CB8DC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:covr-x1870:*:*:*:*:*:*:*:*", + "matchCriteriaId": "C8F856BE-5848-486A-87F4-A2FFC42BABF1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*", + "matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*", + "matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-8087-c3e70-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-8086-93ed5-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json index 005ec5a227e..349a55189c7 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45697", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:03.233", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T21:40:37.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,54 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*", + "matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*", + "matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-8089-32df6-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-8088-590ed-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json index 8aea9ca1f01..b4c902c96af 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45698.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45698", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-09-16T07:15:03.450", - "lastModified": "2024-09-16T15:30:28.733", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-19T21:40:02.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "twcert@cert.org.tw", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "twcert@cert.org.tw", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "twcert@cert.org.tw", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + }, + { + "source": "twcert@cert.org.tw", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +81,54 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.00:*:*:*:*:*:*:*", + "matchCriteriaId": "6E8E188F-287F-4F63-BA73-7B7D666607BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-x4860_firmware:1.04:*:*:*:*:*:*:*", + "matchCriteriaId": "9969A74F-33DE-4CC2-8F9E-962FD8EEE3BA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-x4860:a1:*:*:*:*:*:*:*", + "matchCriteriaId": "8497D176-6D8B-41BC-B377-0963EF6C24B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-8091-bcd52-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-8090-bf06b-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json index 84584151ef7..480ba519b2b 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47059.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47059", "sourceIdentifier": "security@mautic.org", "published": "2024-09-18T22:15:04.650", - "lastModified": "2024-09-18T22:15:04.650", + "lastModified": "2024-09-19T20:15:06.953", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "When logging in with the correct username and incorrect weak password, the user receives the notification, that their password is too weak.\n\nHowever when an incorrect username is provided alongside with a weak password, the application responds with \u2019Invalid credentials\u2019 notification.\n\nThis difference could be used to perform username enumeration." + }, + { + "lang": "es", + "value": "Al iniciar sesi\u00f3n con el nombre de usuario correcto y una contrase\u00f1a d\u00e9bil incorrecta, el usuario recibe una notificaci\u00f3n que indica que su contrase\u00f1a es demasiado d\u00e9bil. Sin embargo, cuando se proporciona un nombre de usuario incorrecto junto con una contrase\u00f1a d\u00e9bil, la aplicaci\u00f3n responde con una notificaci\u00f3n de \"Credenciales no v\u00e1lidas\". Esta diferencia se puede utilizar para realizar la enumeraci\u00f3n de nombres de usuario." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "attackVector": "NETWORK", - "attackComplexity": "HIGH", - "privilegesRequired": "NONE", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", + "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 0.0, - "baseSeverity": "NONE" + "baseScore": 4.3, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 2.2, - "impactScore": 0.0 + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json index eb812ea9e8a..a7cc558982d 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5971.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5971", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-08T21:15:12.480", - "lastModified": "2024-09-09T23:15:10.200", + "lastModified": "2024-09-19T20:15:07.113", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,6 +80,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6508", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6883", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-5971", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json index 86bd54d0c16..5b14a1ac6b2 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7387.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7387", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-17T00:15:52.757", - "lastModified": "2024-09-19T14:15:17.470", + "lastModified": "2024-09-19T20:15:07.277", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -68,6 +68,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6691", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6705", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-7387", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7553.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7553.json index 9b6116fd863..6e45d5f6f76 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7553.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7553", "sourceIdentifier": "cna@mongodb.com", "published": "2024-08-07T10:15:39.493", - "lastModified": "2024-08-07T15:17:46.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T20:46:04.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cna@mongodb.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "cna@mongodb.com", "type": "Secondary", @@ -51,18 +81,554 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.0.0", + "versionEndExcluding": "5.0.27", + "matchCriteriaId": "D10BC49C-B4A2-41FF-98D3-6BF65E7B4284" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.0", + "versionEndExcluding": "6.0.16", + "matchCriteriaId": "A4962B5E-0143-497C-9EBB-B5B675D8E461" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0", + "versionEndExcluding": "7.0.12", + "matchCriteriaId": "C3F476DE-A977-4F42-8637-833187D807BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0", + "versionEndExcluding": "7.3.3", + "matchCriteriaId": "006DFE2F-6693-4BFE-AA9C-B535CF2BEC6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:c_driver:*:*:*:*:*:mongodb:*:*", + "versionEndExcluding": "1.26.2", + "matchCriteriaId": "806BC7F3-24A8-4A50-BA80-04A443407073" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mongodb:php_driver:*:*:*:*:*:mongodb:*:*", + "versionEndExcluding": "1.18.1", + "matchCriteriaId": "604ED63D-4BC1-42DA-97C5-D09239230986" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "A045AC0A-471E-444C-B3B0-4CABC23E8CFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1511:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0408DF07-8A1B-47F1-99B2-F2AA77691528" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "B98DB3FF-CC3B-4E9F-A9CC-EC4C89AF3B31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "469F95D3-ABBB-4F1A-A000-BE0F6BD60FF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D82F8AF7-ED01-4649-849E-F248F0E02384" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5C5B5180-1E12-45C2-8275-B9E528955307" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0D77EA14-F61D-4B9E-A385-70B88C482116" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "F79979F1-4080-460D-8835-6D1066611ABA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83C0919F-C4C8-45AE-BDA8-4D88BF0450D5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "ED4D2412-9769-48E3-8A7F-394112FC5B79" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "83A79DD6-E74E-419F-93F1-323B68502633" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "C230D3BF-7FCE-405C-B62E-B9190C995C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5200AF17-0458-4315-A9D6-06C8DF67C05B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "0C3552E0-F793-4CDD-965D-457495475805" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "D5EC3F68-8F41-4F6B-B2E5-920322A4A321" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "8E3C1327-F331-4448-A253-00EAC7428317" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + } + ], "references": [ { "url": "https://jira.mongodb.org/browse/CDRIVER-5650", - "source": "cna@mongodb.com" + "source": "cna@mongodb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.mongodb.org/browse/PHPC-2369", - "source": "cna@mongodb.com" + "source": "cna@mongodb.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.mongodb.org/browse/SERVER-93211", - "source": "cna@mongodb.com" + "source": "cna@mongodb.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json index f3ee366c763..dffe4336ea6 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7885.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7885", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-21T14:15:09.500", - "lastModified": "2024-09-09T23:15:10.350", + "lastModified": "2024-09-19T20:15:07.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -148,6 +148,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6508", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6883", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-7885", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8302.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8302.json index 7e2bd1c801f..c2da0f495da 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8302.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8302", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-29T14:15:09.530", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-19T21:55:54.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:geeeeeeeek:dingfanzu:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-01-31", + "matchCriteriaId": "B0A5C032-706C-4646-8855-2CF5670AC54D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Xor-Gerke/webray.com.cn/blob/main/cve/dingfanzu-CMS/dingfanzu-CMS%20chpwd.php%20username%20SQL-inject.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.276074", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.276074", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.396297", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-86xx/CVE-2024-8698.json b/CVE-2024/CVE-2024-86xx/CVE-2024-8698.json index f463db379ac..1312086fc41 100644 --- a/CVE-2024/CVE-2024-86xx/CVE-2024-8698.json +++ b/CVE-2024/CVE-2024-86xx/CVE-2024-8698.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8698", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T16:15:06.177", - "lastModified": "2024-09-19T16:15:06.177", + "lastModified": "2024-09-19T20:15:07.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -48,6 +48,42 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6878", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6879", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6880", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6882", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6886", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6887", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6888", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6889", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6890", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8698", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json index 7f97a10420d..8dc6724bfa1 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8883.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8883", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T16:15:06.403", - "lastModified": "2024-09-19T16:15:06.403", + "lastModified": "2024-09-19T20:15:07.687", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -48,6 +48,42 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:6878", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6879", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6880", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6882", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6886", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6887", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6888", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6889", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:6890", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8883", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9001.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9001.json new file mode 100644 index 00000000000..15445bcc4d2 --- /dev/null +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9001.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9001", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-19T20:15:07.810", + "lastModified": "2024-09-19T20:15:07.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. This vulnerability affects the function setTracerouteCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument command leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/C9Y57/TOTOLINK_setTracerouteCfg/blob/main/setTracerouteCfg.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278152", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278152", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.406140", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.totolink.net/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9003.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9003.json new file mode 100644 index 00000000000..264d92df960 --- /dev/null +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9003.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-9003", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-19T21:15:16.143", + "lastModified": "2024-09-19T21:15:16.143", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Jinan Chicheng Company JFlow 2.0.0. It has been rated as problematic. This issue affects the function AttachmentUploadController of the file /WF/Ath/EntityMutliFile_Load.do of the component Attachment Handler. The manipulation of the argument oid leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/sweatxi/BugHub/blob/main/Jinan%20Gallop%20JFlow%20CMS%20port%20is%20not%20authorized%20to%20cause%20the%20leakage%20of%20database%20attachment%20information.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278153", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278153", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.406225", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9004.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9004.json new file mode 100644 index 00000000000..11683f0a429 --- /dev/null +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9004.json @@ -0,0 +1,152 @@ +{ + "id": "CVE-2024-9004", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-09-19T21:15:16.383", + "lastModified": "2024-09-19T21:15:16.383", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cna@vuldb.com", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in D-Link DAR-7000 up to 20240912. Affected is an unknown function of the file /view/DBManage/Backup_Server_commit.php. The manipulation of the argument host leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/mhtcshe/cve/blob/main/cve.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.278154", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.278154", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.407023", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.dlink.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 40cb7f9f0b0..fc1dac0ef39 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-19T20:00:17.597789+00:00 +2024-09-19T22:00:17.364624+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-19T19:58:23.870000+00:00 +2024-09-19T21:55:54.683000+00:00 ``` ### Last Data Feed Release @@ -33,51 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -263457 +263463 ``` ### CVEs added in the last Commit -Recently added CVEs: `7` +Recently added CVEs: `6` -- [CVE-2024-25673](CVE-2024/CVE-2024-256xx/CVE-2024-25673.json) (`2024-09-19T19:15:24.093`) -- [CVE-2024-33109](CVE-2024/CVE-2024-331xx/CVE-2024-33109.json) (`2024-09-19T19:15:24.170`) -- [CVE-2024-40125](CVE-2024/CVE-2024-401xx/CVE-2024-40125.json) (`2024-09-19T19:15:24.350`) -- [CVE-2024-47159](CVE-2024/CVE-2024-471xx/CVE-2024-47159.json) (`2024-09-19T18:15:09.803`) -- [CVE-2024-47160](CVE-2024/CVE-2024-471xx/CVE-2024-47160.json) (`2024-09-19T18:15:10.013`) -- [CVE-2024-47162](CVE-2024/CVE-2024-471xx/CVE-2024-47162.json) (`2024-09-19T18:15:10.227`) -- [CVE-2024-8963](CVE-2024/CVE-2024-89xx/CVE-2024-8963.json) (`2024-09-19T18:15:10.600`) +- [CVE-2024-38221](CVE-2024/CVE-2024-382xx/CVE-2024-38221.json) (`2024-09-19T21:15:13.933`) +- [CVE-2024-43489](CVE-2024/CVE-2024-434xx/CVE-2024-43489.json) (`2024-09-19T21:15:15.677`) +- [CVE-2024-43496](CVE-2024/CVE-2024-434xx/CVE-2024-43496.json) (`2024-09-19T21:15:15.917`) +- [CVE-2024-9001](CVE-2024/CVE-2024-90xx/CVE-2024-9001.json) (`2024-09-19T20:15:07.810`) +- [CVE-2024-9003](CVE-2024/CVE-2024-90xx/CVE-2024-9003.json) (`2024-09-19T21:15:16.143`) +- [CVE-2024-9004](CVE-2024/CVE-2024-90xx/CVE-2024-9004.json) (`2024-09-19T21:15:16.383`) ### CVEs modified in the last Commit -Recently modified CVEs: `50` +Recently modified CVEs: `53` -- [CVE-2024-31416](CVE-2024/CVE-2024-314xx/CVE-2024-31416.json) (`2024-09-19T19:06:59.787`) -- [CVE-2024-34343](CVE-2024/CVE-2024-343xx/CVE-2024-34343.json) (`2024-09-19T19:57:52.007`) -- [CVE-2024-40568](CVE-2024/CVE-2024-405xx/CVE-2024-40568.json) (`2024-09-19T19:35:13.880`) -- [CVE-2024-45159](CVE-2024/CVE-2024-451xx/CVE-2024-45159.json) (`2024-09-19T18:26:24.687`) -- [CVE-2024-45400](CVE-2024/CVE-2024-454xx/CVE-2024-45400.json) (`2024-09-19T18:04:36.627`) -- [CVE-2024-45401](CVE-2024/CVE-2024-454xx/CVE-2024-45401.json) (`2024-09-19T18:12:52.220`) -- [CVE-2024-45455](CVE-2024/CVE-2024-454xx/CVE-2024-45455.json) (`2024-09-19T18:51:15.433`) -- [CVE-2024-45456](CVE-2024/CVE-2024-454xx/CVE-2024-45456.json) (`2024-09-19T18:38:57.500`) -- [CVE-2024-45458](CVE-2024/CVE-2024-454xx/CVE-2024-45458.json) (`2024-09-19T18:55:46.513`) -- [CVE-2024-4554](CVE-2024/CVE-2024-45xx/CVE-2024-4554.json) (`2024-09-19T18:15:10.433`) -- [CVE-2024-45620](CVE-2024/CVE-2024-456xx/CVE-2024-45620.json) (`2024-09-19T19:21:38.653`) -- [CVE-2024-46373](CVE-2024/CVE-2024-463xx/CVE-2024-46373.json) (`2024-09-19T19:35:14.767`) -- [CVE-2024-46374](CVE-2024/CVE-2024-463xx/CVE-2024-46374.json) (`2024-09-19T19:35:15.573`) -- [CVE-2024-46681](CVE-2024/CVE-2024-466xx/CVE-2024-46681.json) (`2024-09-19T18:10:49.623`) -- [CVE-2024-46684](CVE-2024/CVE-2024-466xx/CVE-2024-46684.json) (`2024-09-19T18:04:22.623`) -- [CVE-2024-46688](CVE-2024/CVE-2024-466xx/CVE-2024-46688.json) (`2024-09-19T18:01:43.037`) -- [CVE-2024-46694](CVE-2024/CVE-2024-466xx/CVE-2024-46694.json) (`2024-09-19T18:16:22.247`) -- [CVE-2024-6087](CVE-2024/CVE-2024-60xx/CVE-2024-6087.json) (`2024-09-19T19:32:14.710`) -- [CVE-2024-6582](CVE-2024/CVE-2024-65xx/CVE-2024-6582.json) (`2024-09-19T19:45:30.283`) -- [CVE-2024-6862](CVE-2024/CVE-2024-68xx/CVE-2024-6862.json) (`2024-09-19T18:37:20.910`) -- [CVE-2024-6867](CVE-2024/CVE-2024-68xx/CVE-2024-6867.json) (`2024-09-19T18:28:05.477`) -- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2024-09-19T18:19:12.210`) -- [CVE-2024-7618](CVE-2024/CVE-2024-76xx/CVE-2024-7618.json) (`2024-09-19T18:20:00.000`) -- [CVE-2024-7655](CVE-2024/CVE-2024-76xx/CVE-2024-7655.json) (`2024-09-19T18:20:53.617`) -- [CVE-2024-8417](CVE-2024/CVE-2024-84xx/CVE-2024-8417.json) (`2024-09-19T19:53:12.383`) +- [CVE-2024-25023](CVE-2024/CVE-2024-250xx/CVE-2024-25023.json) (`2024-09-19T21:14:27.027`) +- [CVE-2024-34344](CVE-2024/CVE-2024-343xx/CVE-2024-34344.json) (`2024-09-19T20:58:01.827`) +- [CVE-2024-39304](CVE-2024/CVE-2024-393xx/CVE-2024-39304.json) (`2024-09-19T20:59:15.717`) +- [CVE-2024-40125](CVE-2024/CVE-2024-401xx/CVE-2024-40125.json) (`2024-09-19T20:35:24.513`) +- [CVE-2024-41959](CVE-2024/CVE-2024-419xx/CVE-2024-41959.json) (`2024-09-19T20:14:02.963`) +- [CVE-2024-41960](CVE-2024/CVE-2024-419xx/CVE-2024-41960.json) (`2024-09-19T20:01:58.633`) +- [CVE-2024-42102](CVE-2024/CVE-2024-421xx/CVE-2024-42102.json) (`2024-09-19T20:38:05.737`) +- [CVE-2024-42352](CVE-2024/CVE-2024-423xx/CVE-2024-42352.json) (`2024-09-19T20:55:46.543`) +- [CVE-2024-43042](CVE-2024/CVE-2024-430xx/CVE-2024-43042.json) (`2024-09-19T21:01:24.137`) +- [CVE-2024-43144](CVE-2024/CVE-2024-431xx/CVE-2024-43144.json) (`2024-09-19T21:47:24.613`) +- [CVE-2024-43917](CVE-2024/CVE-2024-439xx/CVE-2024-43917.json) (`2024-09-19T21:46:19.713`) +- [CVE-2024-43922](CVE-2024/CVE-2024-439xx/CVE-2024-43922.json) (`2024-09-19T21:44:49.453`) +- [CVE-2024-45457](CVE-2024/CVE-2024-454xx/CVE-2024-45457.json) (`2024-09-19T20:53:46.313`) +- [CVE-2024-45496](CVE-2024/CVE-2024-454xx/CVE-2024-45496.json) (`2024-09-19T20:15:06.813`) +- [CVE-2024-45696](CVE-2024/CVE-2024-456xx/CVE-2024-45696.json) (`2024-09-19T21:42:36.557`) +- [CVE-2024-45697](CVE-2024/CVE-2024-456xx/CVE-2024-45697.json) (`2024-09-19T21:40:37.357`) +- [CVE-2024-45698](CVE-2024/CVE-2024-456xx/CVE-2024-45698.json) (`2024-09-19T21:40:02.560`) +- [CVE-2024-47059](CVE-2024/CVE-2024-470xx/CVE-2024-47059.json) (`2024-09-19T20:15:06.953`) +- [CVE-2024-5971](CVE-2024/CVE-2024-59xx/CVE-2024-5971.json) (`2024-09-19T20:15:07.113`) +- [CVE-2024-7387](CVE-2024/CVE-2024-73xx/CVE-2024-7387.json) (`2024-09-19T20:15:07.277`) +- [CVE-2024-7553](CVE-2024/CVE-2024-75xx/CVE-2024-7553.json) (`2024-09-19T20:46:04.103`) +- [CVE-2024-7885](CVE-2024/CVE-2024-78xx/CVE-2024-7885.json) (`2024-09-19T20:15:07.410`) +- [CVE-2024-8302](CVE-2024/CVE-2024-83xx/CVE-2024-8302.json) (`2024-09-19T21:55:54.683`) +- [CVE-2024-8698](CVE-2024/CVE-2024-86xx/CVE-2024-8698.json) (`2024-09-19T20:15:07.560`) +- [CVE-2024-8883](CVE-2024/CVE-2024-88xx/CVE-2024-8883.json) (`2024-09-19T20:15:07.687`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e4e8fcc7a0c..33865e0668a 100644 --- a/_state.csv +++ b/_state.csv @@ -58299,12 +58299,12 @@ CVE-2013-0639,0,0,b31be035ceb64b0d082ddfacc740a4210652cc5e7e0dde51ddff1158c160dc CVE-2013-0640,0,0,124b8bb226f7e9d6096b31adba4a0e431bfd4cafe81871fe0024db93f6d5836d,2024-07-16T17:36:16.623000 CVE-2013-0641,0,0,8b435cbf77af4b23b70d0392c35e373c862cd1b7676f3d77a9653fe18e07ad76,2024-07-16T17:36:05.960000 CVE-2013-0642,0,0,bfadc58d9042f0563f6f464599e9d26f03ce9f43f5f43c002304603f48da66a2,2018-12-06T19:47:16.903000 -CVE-2013-0643,0,1,ac028e28f0c58cfd927fcc5eee044da647ef72101b764105bdbe0ec010bc29b2,2024-09-19T19:48:10.033000 +CVE-2013-0643,0,0,ac028e28f0c58cfd927fcc5eee044da647ef72101b764105bdbe0ec010bc29b2,2024-09-19T19:48:10.033000 CVE-2013-0644,0,0,79820981c348e4e64b9198c5d6054f480e970cc8d8c247ee3d548bff6c82ac85,2018-12-06T19:48:02.123000 CVE-2013-0645,0,0,6125d0f7d22b366190241b77a7b5922adc7339604421994dce13d534098c6aea,2018-12-06T19:48:36.513000 CVE-2013-0646,0,0,c06c944b7c73de3e62d948a2b222d45721d45f6414f5e68a92e11e952ff01974,2014-03-26T04:44:11.977000 CVE-2013-0647,0,0,eef38ab0e06ece5be29234416a43368cf2dc4818ff0481da512aa8e96cfa7923,2018-12-06T19:50:48.563000 -CVE-2013-0648,0,1,1bbefef5fe7b99ef5472e70aee3444d59a0b886e0a86d2abe59f31dd3051169e,2024-09-19T19:51:57.317000 +CVE-2013-0648,0,0,1bbefef5fe7b99ef5472e70aee3444d59a0b886e0a86d2abe59f31dd3051169e,2024-09-19T19:51:57.317000 CVE-2013-0649,0,0,08f618eda7f64799433610eda3b01050cfd3e669aa064372e20a16c5d61237e1,2018-12-06T19:50:14.467000 CVE-2013-0650,0,0,05a6fa43599436cf52455a9e658850893592583b2a41594c4c9c1629f1ff4728,2014-03-26T04:44:15.773000 CVE-2013-0651,0,0,f49ccbeee68ba586b35032f2fc9fbd62aa3c838e205fd987ab565ea2bea44c76,2013-01-30T05:00:00 @@ -64974,12 +64974,12 @@ CVE-2014-0493,0,0,5980f8ce7bccecebd2e70dd6b857cb4b656971c59fbacbb63249cc45b51f75 CVE-2014-0494,0,0,8b294b47a486336cd6b4db3f06f91abe3b0268360260099a12dc8b5ebb59c596,2017-08-29T01:34:11.030000 CVE-2014-0495,0,0,671e97412a74358a5c6e50a3bb0dbb2b494498ae12e83fc145a13daedb649abf,2018-12-13T15:50:35.977000 CVE-2014-0496,0,0,943eee2f6677ecbddd894736d06d754908e933d15ae4ea4f9cfea3e0ddbbf17b,2018-12-13T15:50:55.103000 -CVE-2014-0497,0,1,52c8371071aa4fd7738da924f81c155923a24cc665bb1c815f7c347dec1de3d5,2024-09-19T19:56:17.247000 +CVE-2014-0497,0,0,52c8371071aa4fd7738da924f81c155923a24cc665bb1c815f7c347dec1de3d5,2024-09-19T19:56:17.247000 CVE-2014-0498,0,0,1618f11598fb67e87357bcde2d1122794a71c785ac05d06e2d56fd17028571fc,2018-12-13T15:54:15.917000 CVE-2014-0499,0,0,0361066feb81eae85003bd40e34d63a55b78a3c7f0bdfd41851c555d91004b71,2018-12-13T15:54:47.153000 CVE-2014-0500,0,0,97edfd619058dc26ad56cf33391d9dc91362a50dec1d0dbc02abb7edf993b617,2018-01-03T02:29:03.130000 CVE-2014-0501,0,0,4025edf733331396525b490cf3d77ea02dc26b06228603a4b61385c7de6588f2,2018-01-03T02:29:03.210000 -CVE-2014-0502,0,1,411a92a14510541e15575d6525d0a6e735d616f03fe8f2886da4486c39f075fb,2024-09-19T19:53:44.480000 +CVE-2014-0502,0,0,411a92a14510541e15575d6525d0a6e735d616f03fe8f2886da4486c39f075fb,2024-09-19T19:53:44.480000 CVE-2014-0503,0,0,c67bf98b7682ef5050d13c43497f2af42e7aa350e509586400ddb6191e666325,2018-12-13T16:00:37.443000 CVE-2014-0504,0,0,e6a68e9a83d1aff357dde03fe34200e26c34033a1843fb3b1a467a539bb2000a,2018-12-13T16:00:23.630000 CVE-2014-0505,0,0,9cf82e807986acb6181ee7efa5d77d0a8127ac7e93c1c91848a81dbe58937cd2,2014-03-14T17:07:42.850000 @@ -128928,7 +128928,7 @@ CVE-2019-10686,0,0,071dffbfdea10181bb98b77b81173ea1ee44c0bf3f27125b70455662edc40 CVE-2019-10687,0,0,4d2aa4f6c0463103aef2503f43b6f1e6753450b125b2eb1b959d173389b0f8e1,2019-08-27T15:51:11.620000 CVE-2019-10688,0,0,139389dbc249e8cae439573037005e32285d24298cd9752f9767fbd85f7cada6,2019-06-17T16:15:11.653000 CVE-2019-10689,0,0,3a6ff66e02d9a27391650c9b85af3797719e726b15e08ea64568eab01a8deea0,2019-06-27T17:26:21.897000 -CVE-2019-1069,0,1,0515bb971e4f7a4465e7951022bb244d8e5b1246162c1944d1f49a5443592e90,2024-09-19T19:58:01.950000 +CVE-2019-1069,0,0,0515bb971e4f7a4465e7951022bb244d8e5b1246162c1944d1f49a5443592e90,2024-09-19T19:58:01.950000 CVE-2019-10691,0,0,e8e0d767bb2f3b5e08db6f24e350ea086b46abac68877bbd2cba7819c236f317,2023-11-07T03:02:32.480000 CVE-2019-10692,0,0,8adff711cac0bb2de2edadfdf1000b35b700fb5b209d412cad8743610b43de23,2023-05-23T20:30:59.777000 CVE-2019-10694,0,0,9582148ff7994145825de46f0455936b126d6116ce2adec095540a2cc82c30a9,2022-01-24T16:46:01.133000 @@ -175555,7 +175555,7 @@ CVE-2021-31555,0,0,7de5df80bc06456a2bd06cb1ed2fa6bf25b8a0e66ee1e2ceff5a7504cc2b9 CVE-2021-31556,0,0,93b949700d04612fa67f7aa21454bcfa0dedb54b45feb534dfde6a346bbdbf4e,2023-11-07T03:34:58.647000 CVE-2021-31558,0,0,ceed4d2a05c41f9fdd58ce2921315e67a6e46f1c89b4c2da0bce257ffbc7f901,2021-12-28T14:54:32.527000 CVE-2021-31559,0,0,c056101e3a724e5296c3096cffa3217710e8d3f22622b1fbc675682800b56fdf,2022-10-25T16:42:38.307000 -CVE-2021-3156,0,1,c9f0ccb5f8e0b0bd0d85e1cc30dd2ecceb494b21ff9563b3056182a6d1fce82a,2024-09-19T19:58:23.870000 +CVE-2021-3156,0,0,c9f0ccb5f8e0b0bd0d85e1cc30dd2ecceb494b21ff9563b3056182a6d1fce82a,2024-09-19T19:58:23.870000 CVE-2021-31562,0,0,ac50e4387893ec363455949ced3c17ca407e9a27f3f2c3f523390c3482b094df,2022-01-28T15:55:53.923000 CVE-2021-31566,0,0,801f1236a607222712dc7741b61bbdda3061d826b7fd22f878d0c5c45a130a15,2024-03-27T16:04:30.260000 CVE-2021-31567,0,0,0da3da305c7b1718259a905dc09c36fc318ae57a531df276f807be7858b88fad,2022-02-03T17:09:44.553000 @@ -211051,7 +211051,7 @@ CVE-2022-46865,0,0,1ce18b0d4c80950bd776595bb8b5c96b07d40159bc37282a7094f828555df CVE-2022-46866,0,0,f541a42b59f1833d0e4a42bcfa225722f7f2195940d1268d7cff8a650525ac4f,2023-05-31T19:34:00.893000 CVE-2022-46867,0,0,c94ab0fe6b7f48e99c0e7926513bd7d10a5a02a031e08d1f6eaf2b364184a4ab,2023-11-07T03:56:04.647000 CVE-2022-46868,0,0,5c29fd78a5506d9241a6126df3ffaddbb5d45b7353fb3e8e8a1a57bee2d9c2cc,2023-09-07T14:24:50.557000 -CVE-2022-46869,0,0,ec10b579cf5fcfe8681bba5149ce0134a4d833e1bf5db8b4d37818dbf0c908fe,2023-09-07T14:25:24.507000 +CVE-2022-46869,0,1,61318dfdfab72f6a43979c677601cc44719e4817d1fa78858c741523fb3f615f,2024-09-19T21:15:12.977000 CVE-2022-4687,0,0,8d166524842e8a43766adde1aff47327db05b9e4c5a11c757eff297e34d89a9d,2022-12-30T22:18:50.207000 CVE-2022-46870,0,0,1d0f9b47941d484269917c10e9d54ef1795d6eb62bc7304cfc2ae041eb9847e9,2023-11-07T03:56:04.920000 CVE-2022-46871,0,0,a439d42ef801fead2bb2d64251e9eea4857c9d447a44d6b92161fd8da35cb19a,2023-05-03T12:16:31.377000 @@ -216110,7 +216110,7 @@ CVE-2023-21835,0,0,e438453c05d0ac37a8dbebcb8cd50ddd6e38670993d51927e38ec2ac6343f CVE-2023-21836,0,0,c3cecb219c742fa03a835e3e671e7b8a3e8841c61a101c801b316bd594712266,2023-01-24T19:28:01.793000 CVE-2023-21837,0,0,af97fe408e2fef10a5feb6c477148d6e404b668cecc25bb4aad94debb6e9b9d9,2024-09-17T14:35:04.093000 CVE-2023-21838,0,0,74186bb7b4ad20682c2b856cdb6f709c19c6384e30d61d84aa3625016ed352ae,2024-09-17T14:35:04.787000 -CVE-2023-21839,0,0,03ee937492f0fca9bed25fbc8ba875898967dadafcfcb7506fc4d7dfc751997f,2024-09-17T14:35:05.467000 +CVE-2023-21839,0,1,01b0aae5066058f0d794bcc8f85bb5cccb58bff0793fead00922b3e7c62afbe3,2024-09-19T20:10:55.523000 CVE-2023-2184,0,0,1073eb25861fcee57eb9fac43c386305d0fea38d5bbd20991cb618999c7578bc,2023-11-07T04:12:07.433000 CVE-2023-21840,0,0,6fd2b5ade9915fd79466730f7996b782a086bd5ce24bdf4d9c33766ab641879a,2023-01-24T19:25:26.767000 CVE-2023-21841,0,0,7142f36cd1a6306362b6cd44b241d27ad0cea42f02641af88fe8a7f5d28ea684,2024-09-17T14:35:06.140000 @@ -219670,7 +219670,7 @@ CVE-2023-2623,0,0,18a4250853ceff90a7f8d8d6a702b5d52453fd1a466fb96a953c3f695b407a CVE-2023-26234,0,0,5322e5c72b55e16db85db47bf05bb45548729834eb0a71eff2d6401df60429b3,2023-03-02T17:12:19.767000 CVE-2023-26235,0,0,c3b08ca2f11cd4a827e4f2bd1c96091f3c3c9fdde46998edeae287ff06f89c73,2023-02-28T02:24:53.613000 CVE-2023-26236,0,0,00d8e2c3f385074de508212322737baa1cd5d73ff3fcfa075fd69b3c0b8dcfdc,2023-10-11T14:00:04.993000 -CVE-2023-26237,0,0,0fd98a5491e59458a1b8e36a11cab31ab8256a741691c9d4b83cb23b1ab76ff6,2023-10-11T14:00:07.037000 +CVE-2023-26237,0,1,5fa978ae4119c4b37166d813072a05e078e1c6cd6d296ff24be9b711a64cd7bc,2024-09-19T21:35:02.027000 CVE-2023-26238,0,0,2040636560b69dac71d3a1f70fb82188c46e6ef72503448320867aa630e77126,2023-10-11T14:00:08.897000 CVE-2023-26239,0,0,6f2f66df62807517a83faeebf30cdc21120adf02a7e1fe4f4a242979868a8dc4,2023-10-11T13:59:48.340000 CVE-2023-2624,0,0,c6bbd03f17fadba71e8fc7abaa9bc0262d59891af837080a5b95ae4388082b91,2023-11-07T04:12:59.040000 @@ -221589,10 +221589,10 @@ CVE-2023-28597,0,0,1ebc618bc09256d6b6bfd5d891fd60c0e1e3dabd7930c0045a005e0f9a127 CVE-2023-28598,0,0,2699c3dae97d97d930dd19d4ed91da9ca98a2c60bbc506549c591ce715010b21,2024-09-19T14:15:15.503000 CVE-2023-28599,0,0,3fb087fde9542d18c1c71d72cf2fa711c1369f35782fccdf0e7b314f3923ac75,2024-09-19T14:15:15.780000 CVE-2023-2860,0,0,012ee37a4c30c3774640e761fadec49362b4150a6f818d01258bacadc95a0cef,2023-11-07T04:13:25.817000 -CVE-2023-28600,0,0,de43edd04c05a2b2ee9dde4c2a1744b9fbca25677e07f0236d6c2680420ee6f8,2023-06-21T20:52:50.547000 -CVE-2023-28601,0,0,9f47422bba18065556d42e0b2c55285123cf959b1153305639eea413b1e3b58a,2023-06-21T20:53:18.250000 +CVE-2023-28600,0,1,dbc90dc15d6b00d9bb9f736af524ac5ba05316968a96c9f2131eee725fb802d6,2024-09-19T20:15:04.277000 +CVE-2023-28601,0,1,3a9f275b0419fc10bd717586c6c79ca21efbc0a5a3f9e0491b45637168e1b2a6,2024-09-19T20:15:04.560000 CVE-2023-28602,0,0,d7c91871413ce039eb495efe6c08a5612bf9f7c0ad04e17723e3c05596b264d7,2023-06-21T20:53:37.857000 -CVE-2023-28603,0,0,9c9fb9da12e970933f8cbae83118875ff2c0814be18a792e65c2b2518835866e,2023-06-21T20:53:55.603000 +CVE-2023-28603,0,1,651ef75adafe02c8275907c79496561225c03cf15cc1bf2ed409c6abe7d3d9d1,2024-09-19T20:15:04.730000 CVE-2023-28604,0,0,0a20c3db986bc11da1bdf7495a6c9df5ec56ecd69c914dc0966d4404db3dd9cd,2023-12-18T14:28:09.443000 CVE-2023-28606,0,0,a7d1de97fa7e126955209f1f9bc60182dcca6db627bf91c842b9d5ad51fe7578,2023-03-24T18:28:30.927000 CVE-2023-28607,0,0,77a9e66e244c63a6c39f4e869c705a00f50805fc37af08ee7d1a1003338f6e50,2023-03-24T18:28:05.027000 @@ -222909,7 +222909,7 @@ CVE-2023-30458,0,0,48c15acc8080e55dcad253897d98be087ef3a613a48400bab015ca689a5a0 CVE-2023-30459,0,0,5203c98e26586eb418e577e0ae073865f5b068c7334ca2353e2b79f21ee05326,2023-04-25T15:56:57.943000 CVE-2023-3046,0,0,ecac07b94baf4825a77ca2376c60e7599fadef86a6e35f7199431d4839633975,2023-07-31T18:10:15.423000 CVE-2023-30463,0,0,578403456f513186915a79f10d80ead6b521f986e8efcb462d3b4f5fdfe361bc,2023-04-28T18:49:31 -CVE-2023-30464,0,1,3aae22a2e0f43047e68f03e1c3bca7b8e0d56717d49f06b096746b3b526617e7,2024-09-19T19:35:01.113000 +CVE-2023-30464,0,0,3aae22a2e0f43047e68f03e1c3bca7b8e0d56717d49f06b096746b3b526617e7,2024-09-19T19:35:01.113000 CVE-2023-30465,0,0,03cb642b9d155b8fc540b2b5aab3b36429c8caf9db77ee091c34798766c54d43,2023-04-18T19:30:08.003000 CVE-2023-30466,0,0,a09f27d23c57f262101e1beba7bf30085bba339c92bf87babd3fd4546142e636,2023-05-05T17:27:07.267000 CVE-2023-30467,0,0,1f60c7af1fdcdbc8eac29b20ae332e43dda1d16453ce8a587bb1e16e4fb9ef03,2023-05-05T17:57:32.067000 @@ -225824,13 +225824,13 @@ CVE-2023-34112,0,0,7a0bafe259b6233aaf9ac037cdd12a903fc9782291c3de1471fa85682c929 CVE-2023-34113,0,0,a149dfb170ab0b72518b62567efc3e5a4661f0b460929a98e523c685b047c90e,2024-09-04T19:15:28.867000 CVE-2023-34114,0,0,7e3082cefbc8d762f21653a584a4bbdf2d0e97ae6f2e8648d9836343ac518514,2023-06-21T21:02:32.257000 CVE-2023-34115,0,0,b6c7e94b77a06cf9ccb62eccc58f2e11c3f5fd238a5ffb9df839efd523663c79,2023-06-23T18:18:54.580000 -CVE-2023-34116,0,0,6dcde5ce994da344bf10667f5d3e299722f5cafecd41282f269721f821797f39,2023-07-18T21:08:43.267000 +CVE-2023-34116,0,1,7cad140348717ef3d2d002c4f967a30c6b140940820dc0a17beaebfa57bcde33,2024-09-19T20:15:05.063000 CVE-2023-34117,0,0,5e9265a9a2df07aa6496224086c1106142271e0aa29b90902f19d04223d998d7,2024-09-19T14:15:15.933000 -CVE-2023-34118,0,0,e63e34f9588769c9a0efbbc4778c5a7d3deae72fea132e7db002598799fe551b,2023-07-19T00:47:57.243000 -CVE-2023-34119,0,0,e5c676a93d420f2d7675e3f0303f26d163fdaed5a82929ccc611f3ca5e9dfd05,2023-07-19T00:47:47.307000 +CVE-2023-34118,0,1,0248ef0e08c2b5c452e3d431b449159b58a85918e99e79ec3b3dd6f4c17420d0,2024-09-19T20:15:05.193000 +CVE-2023-34119,0,1,07a197dcf3100a535b6a6a5905fdc6f88dd4140df856c0869b8416f8a0e075d9,2024-09-19T20:15:05.337000 CVE-2023-3412,0,0,fa386ee3a9fe7a905b9d51484a81e06965a7be356e97e88e4f6d71b171b4b283,2023-11-07T04:18:42.630000 -CVE-2023-34120,0,0,a73e91cc800769e2ee3ec2988b07b21ec120ae1c0d7f6809ac40a9d3f8a26934,2023-06-21T20:54:35.730000 -CVE-2023-34121,0,0,a849568df411bd762ddc83e712fd460e11b36cea6a16fa340bd8baebc5d5722a,2023-06-21T20:54:52.100000 +CVE-2023-34120,0,1,c2100d4c2c977bf5180308db89741ab34803dbd12c7456d82fe8ff8d7a19a8f5,2024-09-19T20:15:05.440000 +CVE-2023-34121,0,1,ef6203013589f1167fe8041cce84462d6934a10fea58a295577c731f07d65a6a,2024-09-19T20:15:05.570000 CVE-2023-34122,0,0,f585e4332bb8bfbbab2b3607d749ecaf3551ff5d2da712c1ba0736863bada1bc,2024-09-04T19:15:29.087000 CVE-2023-34123,0,0,4541664c9b388f72117e8b0e05f57bc0f2743f369452e049240a11d4dda9bba7,2023-07-25T14:12:34.320000 CVE-2023-34124,0,0,53a8f325c1bcb94435dcaa68ff87243c15c106fb9b2b6c80d22a3e57e9985e31,2023-09-08T23:15:09.267000 @@ -227430,11 +227430,11 @@ CVE-2023-36529,0,0,080dd5a8e706e08f83d1e90238e5ba82341c6b9b991bc19eef824f2953a2b CVE-2023-3653,0,0,b94e4887e91cb18ebed2fcc692025aefff8f87f215422fe0d48d0999efdf8f2d,2023-08-16T08:15:41.653000 CVE-2023-36530,0,0,39b6e7f1f65c17d756a12a67ff7ab49bb930555b16f3c7f0c3a9a9b08631f2f6,2023-08-16T13:59:24.893000 CVE-2023-36532,0,0,346de183093708445d572201d1b91beba125a9edfa821a742e9c84556edc5810,2023-08-11T13:51:15.367000 -CVE-2023-36533,0,0,439806d55db50a839bc93deabf5a8f7d0a53b3998762eaedec4fd597ea07eb39,2023-08-11T13:42:42.633000 +CVE-2023-36533,0,1,7a3aa9a0281f92da6ec858b130bc8c49aff9e43e106a9e5252f45615815adb18,2024-09-19T20:15:05.733000 CVE-2023-36534,0,0,6cbc71eb840a2042045eac9a1bed117b4c7c1b6f49d16fba7e1aef9691ba09df,2023-08-11T13:55:20.393000 CVE-2023-36535,0,0,67b7dcf82c19974a887af94e14d304d1126dc66b1a6c22bfc06e1f0fb59ab96f,2023-08-11T14:01:17.010000 CVE-2023-36536,0,0,0ee1547dcb523dc14ed9ebc847b60fd04a4995159e536e4c1d07969953d80c80,2023-07-19T00:27:45.237000 -CVE-2023-36537,0,0,697af02b7a8f933baeba04b6f60621383a0be4407a59219400377119d4594f23,2023-07-19T00:25:25.517000 +CVE-2023-36537,0,1,394843175e0ad188622ad56ec5745a099e29bc47411e8a302f9292eb043883c1,2024-09-19T20:15:05.913000 CVE-2023-36538,0,0,00226399b1df7e922c2f186aa8a23b1e50f742272d35a8875a7def5b7adcf087,2023-07-19T00:24:36.927000 CVE-2023-36539,0,0,4e965c290bb96df6ee863b2be075f02bab55edcaa147fa532567387b1a47d23b,2024-09-18T19:15:29.133000 CVE-2023-3654,0,0,6c06260a9bd1d9a2cdc503513447bb73861a43e7934488e4e3446dc4edd9202f,2023-12-28T15:20:38.820000 @@ -230784,7 +230784,7 @@ CVE-2023-40650,0,0,352b9f0a42924a10ae1ec80f36517882f8a68e0276912361872f5d0ea9707 CVE-2023-40651,0,0,4b7377a587c45b53860a7f5cef45bd5433fa18a2bfcf837a51529a6560be5347,2023-10-11T17:35:31.657000 CVE-2023-40652,0,0,a18e3fe3990e80f554e1b4f55aa445ad66414551a973c9af4895cf611c407613,2023-10-11T17:35:49.427000 CVE-2023-40653,0,0,88eeb937a3e4c749b0b049debb5babce5dcc6cdc9ad79aae89cfb1d78ecb1fb7,2024-02-15T20:53:14.203000 -CVE-2023-40654,0,1,75ef0ecb7c1b4344a60dff2f1c173adf0d9c0494c9c6a83bf973de2bf626831c,2024-09-19T18:35:02.187000 +CVE-2023-40654,0,0,75ef0ecb7c1b4344a60dff2f1c173adf0d9c0494c9c6a83bf973de2bf626831c,2024-09-19T18:35:02.187000 CVE-2023-40655,0,0,4328cdbb4187e8b0234c53d0517ebc655578d5acdd9d3f7f4547eb76c952f50d,2023-12-19T17:09:11.113000 CVE-2023-40656,0,0,19b49d5f2f04f7adc1e8ec42eabd1ec41b91195134dc054a4b5906547d33a983,2023-12-19T16:53:42.183000 CVE-2023-40657,0,0,de372f5606a6a9c0eb353d9acefa85fa576d984d78e2f34c3e3bafeafb5ce44c,2023-12-19T16:10:07.447000 @@ -230961,7 +230961,7 @@ CVE-2023-4091,0,0,275b33b4fddb46deb9151eb35901fb683d99f1f7f7cd497ae93d7bd100a2d7 CVE-2023-40915,0,0,924135b83c37dfb32e8e4a8213481ae4ff212f967d627d3fbc626bff3fc542fd,2023-08-29T16:11:13.697000 CVE-2023-40918,0,0,fc090dba4a7f04d782d401de76c13cc5fa72b866aa75e7bf2cda17b838246fd5,2023-09-08T14:26:06.590000 CVE-2023-4092,0,0,5f31fed2eab5b0f348baf91fdb36ca5a5c02cd3313e242f154778e0217ad366a,2023-09-21T13:13:44.877000 -CVE-2023-40920,0,0,1ce37d961f35bb79f89dfdc12d2048d3170ecec27e0651936a5b67911892d395,2023-10-11T17:26:13.903000 +CVE-2023-40920,0,1,ed4cd416951d4081f8432a4ebfdf927305fcbacbdf0df8dc7ce85070cee84b58,2024-09-19T21:35:03.493000 CVE-2023-40921,0,0,2b146a84f7ce0a5839ef49947387f7f6957f6be4863120e88ced540c04ee7150,2023-12-18T19:31:35.590000 CVE-2023-40922,0,0,dd40a0a468b1bd7ff4b99edc96361008b5a99f036dabadf2e5b4d99cea0eb8d8,2023-11-13T19:34:31.343000 CVE-2023-40923,0,0,60ed4f36513d088660a805b25e6ab52170a4dea6e1ff217b52fd7d05d000a9e3,2023-11-21T02:28:24.897000 @@ -232640,7 +232640,7 @@ CVE-2023-43261,0,0,8d05d6b1c1376b6f8b4c289bacedb91e5ab5db50b13292f5bbe73649d4d61 CVE-2023-43263,0,0,903e1fac0c430cf2431319bf1c799a5f984b41cc3cd553bdd078bb6a68ccd3c9,2023-09-29T18:07:37.833000 CVE-2023-43267,0,0,89ea299c224833167956d392ad2a8dffd61ce6a44dcff4838abe297d3b0621d8,2023-10-04T17:06:47.097000 CVE-2023-43268,0,0,d805055f2448f65267d86a689dbfd9354ad2e4cebe8a1c9dee7b136709bd1049,2023-10-04T17:06:28.700000 -CVE-2023-43269,0,0,755808082a3d6619a6301c5f20cb3ce8c1f2c676d10cde728a0eb3981cab8e74,2023-10-13T15:03:11.810000 +CVE-2023-43269,0,1,785d4bf3e625fedf44f06fb981c9b90ed09fe11b927656db083e21d31e5b6b2a,2024-09-19T20:35:11.050000 CVE-2023-4327,0,0,51586f0502f63608ffb3478e75ea9411efdae92ae92e459f2a1048bb10ef733a,2024-09-05T22:15:03.240000 CVE-2023-43270,0,0,8a74cd07994cf08e20770939cd30ce47227b654ab99229bc9b09ea6f5c7e656f,2023-09-25T13:43:34.870000 CVE-2023-43271,0,0,b638f0a53dac82b777acfdc20c2f8998778c958c894beb64990d47b1c809484c,2023-10-16T18:09:54.913000 @@ -232650,7 +232650,7 @@ CVE-2023-43278,0,0,bbf061d83d67120f51666ab71df16ebf01407dd058278fae4fe9b8df8566b CVE-2023-43279,0,0,91729a4f1564f58782a825dba4e4db114d46bf6363a4bcaca381131120631ab0,2024-03-24T03:15:07.743000 CVE-2023-4328,0,0,6ee5166ac0675910219ed499af04f7d567df014e88b855812a05c6a3ae4898fc,2024-09-05T22:15:03.413000 CVE-2023-43281,0,0,a8043741c9358a4c4a6eb393caa7cb080a33c75aaafb8cfaf3705b4ad1ef0d37,2023-11-07T04:21:19.967000 -CVE-2023-43284,0,0,d19af47cad8f003ee912aefb8b077df83455ebeb41fc85cb4eac052cd716193d,2023-11-22T15:15:09.303000 +CVE-2023-43284,0,1,eb069cb8ee8a4baf7f83215c049a2651e0474ffdc63962764af570e0ae6fe118,2024-09-19T20:35:11.857000 CVE-2023-4329,0,0,8b75efb685335d1476e96d7eec54e652c5d16a0d171dc01ce34df40a6d7b080d,2023-08-21T18:40:42.853000 CVE-2023-43291,0,0,d5ba19d030168db77bf7db7e6beafa094201b9e344ad7626faccfa0f9a3f170d,2023-09-29T17:25:25.957000 CVE-2023-43292,0,0,24ca0ca0034ab3716a04050b8953f7ca74741d3547dbf42a22c571c80aa2ce0b,2024-08-16T17:35:02.787000 @@ -233119,9 +233119,9 @@ CVE-2023-43976,0,0,02187eddeb3770a7f1febec00624360ee5250e93dc31f3e8b51b3ba1d9bb4 CVE-2023-43979,0,0,b42ecb5c3472ee75481a81f4bcc721f9df20b88fcd306940b556920c1fd7490b,2023-11-21T14:07:31.363000 CVE-2023-4398,0,0,941805a464290ceda704bc08a9de74a80348460471c7271929b1e2e9a230208e,2023-12-04T18:04:39.363000 CVE-2023-43980,0,0,bbbdf96fe43913bc9148a2be4e4cf79c095e8946d088cfcca396bde192a42883,2023-10-06T16:26:51.337000 -CVE-2023-43981,0,0,7bc0b04a874fb37912d5a49421c2f5f408de1077870392e33bb57c9ca9c75f89,2023-10-07T02:52:59.353000 +CVE-2023-43981,0,1,9e5818fc3a0cfa1aa716091d7d558767c014c1deeaba42fa5935d89053edae98,2024-09-19T20:35:12.393000 CVE-2023-43982,0,0,36c050839890ac22e9c1d01ac6e12f62ba92c226ca1aa60fc6850304f993fad5,2023-11-09T22:07:27.420000 -CVE-2023-43983,0,1,9159a914c282ab44b718a500a523f5b25649be59fcdc42674f05ea6f2949ffee,2024-09-19T19:35:04.850000 +CVE-2023-43983,0,0,9159a914c282ab44b718a500a523f5b25649be59fcdc42674f05ea6f2949ffee,2024-09-19T19:35:04.850000 CVE-2023-43984,0,0,734f41a89a1d8239b9e46c66d768f28b73875d461f17b4c52b2f21e0399d5916,2024-09-05T13:35:00.617000 CVE-2023-43985,0,0,d6426e07dde5bc7e003721bf3af2143d307be62b95406f9014be4ad2380774e6,2024-01-25T20:07:56.693000 CVE-2023-43986,0,0,f6e814df340a370055926dfb76c8e5c7ca2c32dbd5d8ca11c76fab82aae5e055,2023-10-25T19:57:40.860000 @@ -233632,16 +233632,16 @@ CVE-2023-44821,0,0,caf500e59c1c1f0ae19f4b938cc2f915cdc2795e1d689b767664cd685e996 CVE-2023-44824,0,0,4c5402825d85eb712bc15b48d1e40cd1b43f468147816eba46a8463681cc81dc,2024-04-17T16:21:04.383000 CVE-2023-44826,0,0,d910375824f905ca21c7c410256be31e425b27de28c7729a6680ad36f36554d8,2023-10-11T19:16:19.453000 CVE-2023-44827,0,0,02e6e2201de61ceeb990db92440acc01432b1a7fa7a263597da8a5526fba6287,2023-10-11T19:16:58.217000 -CVE-2023-44828,0,0,671c20cf735d75bee24f2d501da4a864aa5e004ea7f4133eb75a03eac2af6ee0,2023-10-07T03:15:05.237000 -CVE-2023-44829,0,0,5db7752f8ecb00403264ccf21f2659fe0ddfcfbbceb6f5c8ddddc55c7780bf5e,2023-10-07T03:15:25.163000 -CVE-2023-44830,0,0,f49977dfe516745c571ff61090d55c8fc4270a5fd142bbbdb6ce53b5908f7adf,2023-10-07T03:18:38.277000 -CVE-2023-44831,0,0,b97e9b1170ac4de59d7ff19e0fb6f009616c576284357e866bbfe60abc61bb12,2023-10-07T03:16:56.033000 -CVE-2023-44832,0,0,9c1b721dcfa1a8d8e89ace89b9c1b3507031d5009c9747a3da72e27d19da2342,2023-10-07T03:15:46.517000 -CVE-2023-44833,0,1,0c804cc3c43204c5befa90250fbfba4df8a5bf5007c06fd8daefda112103f533,2024-09-19T19:35:05.797000 -CVE-2023-44834,0,1,08996b4cba22df2276f30026a7a29031ecdcee6cb18029b0142bf849bd6c516d,2024-09-19T19:35:06.803000 -CVE-2023-44835,0,1,e17d982550d6512cf6fe9c365f1e06a437afe69d67fde550145cafbe5bb73011,2024-09-19T19:35:07.573000 -CVE-2023-44836,0,1,62a6ff921417f32c3e565b38aade4a341ea0660c3ac13f7991d1da446ddfc7c8,2024-09-19T19:35:08.333000 -CVE-2023-44837,0,1,6edc4c0f7cb805a39f28f03e490a78fd2c9751dfa21d9ab0c3067871839fa870,2024-09-19T19:35:09.180000 +CVE-2023-44828,0,1,17cdec040e8560e717609265e11acc3fd45d6ae2630bd6277f22b7e15e617f73,2024-09-19T20:35:14 +CVE-2023-44829,0,1,883c195fcfebcab4a26816f9f7861ac18792e960694405d832ba44591298c2f2,2024-09-19T20:35:14.773000 +CVE-2023-44830,0,1,0bb12a70f152add378f1a856a47f22a2f3dc4e11f22307c841c518112d6f0f26,2024-09-19T20:35:15.623000 +CVE-2023-44831,0,1,f74e1daf69c6fd0ba02859ed32f582eb77c88abb081f03f72bdd4e42410f9fec,2024-09-19T20:35:16.490000 +CVE-2023-44832,0,1,c3b1ac4f1a1485463d95ed8985830ce6f2f55210fbf5ca415899d31dc4a30a73,2024-09-19T20:35:17.307000 +CVE-2023-44833,0,0,0c804cc3c43204c5befa90250fbfba4df8a5bf5007c06fd8daefda112103f533,2024-09-19T19:35:05.797000 +CVE-2023-44834,0,0,08996b4cba22df2276f30026a7a29031ecdcee6cb18029b0142bf849bd6c516d,2024-09-19T19:35:06.803000 +CVE-2023-44835,0,0,e17d982550d6512cf6fe9c365f1e06a437afe69d67fde550145cafbe5bb73011,2024-09-19T19:35:07.573000 +CVE-2023-44836,0,0,62a6ff921417f32c3e565b38aade4a341ea0660c3ac13f7991d1da446ddfc7c8,2024-09-19T19:35:08.333000 +CVE-2023-44837,0,0,6edc4c0f7cb805a39f28f03e490a78fd2c9751dfa21d9ab0c3067871839fa870,2024-09-19T19:35:09.180000 CVE-2023-44838,0,0,826bd96275d8c94caef15f783d57a0f555324313131d73e5992ad76971191292,2023-10-06T15:18:30.847000 CVE-2023-44839,0,0,a0e587d190a99eed8b1b0978216fd7d1258814f55b89567589a009468b22137d,2023-10-06T14:59:00.183000 CVE-2023-44846,0,0,f34b0705d17778a0a98e8c488cd79f0636bd3cd4cc85846f0269be4cceaf4a53,2024-09-19T15:35:06.370000 @@ -233932,7 +233932,7 @@ CVE-2023-45279,0,0,898ce636410e7ee87b3770444fcac6d3f827786fce9dcb4b413820160cb82 CVE-2023-4528,0,0,fb6f9d976b6ad831fd6e3df0b8811afbfab41e66da4fc9cbcc5aac0b556464af,2023-09-13T01:02:46.907000 CVE-2023-45280,0,0,587e5e1ce24b098e3665aa207a0ea7ded3e3371b3bf4c75269401122fcd388cb,2023-10-25T19:05:48.603000 CVE-2023-45281,0,0,cd0978c74ba2a3ae2f0cd409990a0511bfb93e86139e2ad7fb10f6ba5d1be143,2023-10-25T14:47:01.093000 -CVE-2023-45282,0,1,368524b1a0238251df4f98fe6fa760382cdd08500bee7e40ce4ccc29c50e3928,2024-09-19T19:35:10.307000 +CVE-2023-45282,0,0,368524b1a0238251df4f98fe6fa760382cdd08500bee7e40ce4ccc29c50e3928,2024-09-19T19:35:10.307000 CVE-2023-45283,0,0,cd5d279d60eb7cff2b94547ec8e6d00135f36cff01f6563cfb3f789184507d96,2023-12-14T10:15:07.947000 CVE-2023-45284,0,0,73d119dc77c426359595c7c8f0829890e7bf623858b010da63a96abc58828085,2024-09-03T19:35:05.593000 CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a300d,2024-01-20T04:15:08.013000 @@ -233943,7 +233943,7 @@ CVE-2023-45289,0,0,55227dc74f3b7eff2b0242a09fa3e698d7b0d3f59cb4bf8a9cc5e9e130d6e CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000 CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000 CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000 -CVE-2023-45303,0,1,688e5be499770cb09d83a318de82d649f890929552dc6a722b4fae6f03dffe83,2024-09-19T19:35:11.117000 +CVE-2023-45303,0,0,688e5be499770cb09d83a318de82d649f890929552dc6a722b4fae6f03dffe83,2024-09-19T19:35:11.117000 CVE-2023-4531,0,0,06add8a6070b98064716f1fe58388261ce4316eee88c526ba1a6617b07e80b19,2023-09-08T16:51:00.220000 CVE-2023-45311,0,0,71d49c76ae9cfe1ccb4815d505b4234841f0d63a53ece89b238db654f857d950,2023-11-28T07:15:43.260000 CVE-2023-45312,0,0,461d9c4a1f47fcd79a0ef49d81d7b730848406a39d4ed8738d381c26b5b04ed4,2024-09-18T20:35:04.773000 @@ -234002,11 +234002,11 @@ CVE-2023-45364,0,0,f79b09441be35e30c9a56051fad391b8b7b6b0ac345cea10067065f1c5feb CVE-2023-45367,0,0,ac61fe513de8db0ac0e72342e10d19f9e37057aaece3f3b1a2e37f81f09ae966,2023-10-12T16:04:00.317000 CVE-2023-45369,0,0,5f3d7f66c5694839640651e4f0443a7fcea9aecd3143e1a52583a93a833c4cc3,2023-10-12T16:04:12.437000 CVE-2023-4537,0,0,d55e9c2ec2d6a309b7146da78217b22dabb54a472777f14cd37d2689a428a754,2024-02-15T14:28:31.380000 -CVE-2023-45370,0,1,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000 +CVE-2023-45370,0,0,6d39915c7b4e81e2d0c3aec33806f0dcc7fcd46c4396757c12a20cd6a778727b,2024-09-19T18:35:05.060000 CVE-2023-45371,0,0,e59624745c98d5ae12576761e9fa77931a5e4e576fbe272ff680a617966dae6b,2023-10-12T16:04:48.003000 -CVE-2023-45372,0,1,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000 +CVE-2023-45372,0,0,45894adadb2f768beda76581b30f7cd51ed489358007696ef68936d55cea88aa,2024-09-19T18:35:05.910000 CVE-2023-45373,0,0,eae3bb62b6bed4d1a32b5243afb1d8915435578a2d4194a9f7539a9a665df972,2023-10-12T16:05:49.617000 -CVE-2023-45374,0,1,e7f1257195844480b5ab4252c7ad2dfc96c3635b0d1bdb6f06b94f101e8f72a1,2024-09-19T18:35:06.723000 +CVE-2023-45374,0,0,e7f1257195844480b5ab4252c7ad2dfc96c3635b0d1bdb6f06b94f101e8f72a1,2024-09-19T18:35:06.723000 CVE-2023-45375,0,0,76059dcd6e9ba7e45e2b8af4dc253230088aab2bc0c3d542b3bea56d2109e241,2023-10-23T13:53:31.007000 CVE-2023-45376,0,0,1752dcacc13952823593868aaeb32cb69bcd8a15123706c8973983a514b83041,2023-10-31T18:06:10.480000 CVE-2023-45377,0,0,8a38d8223faf098b86051796f3101a98163b9ac34429e2c21be3610b867c9a30,2023-11-30T05:42:43.520000 @@ -234292,7 +234292,7 @@ CVE-2023-45815,0,0,381db8ec2d60cf9d70138a9d8575df9d816b1ef03a4ceb545fa7fdc065d01 CVE-2023-45816,0,0,fc7c9d52628d81aa06d2095118a7e61badcb7b879ac6aa1f5817abfdccbe4815,2023-11-16T19:38:00.193000 CVE-2023-45818,0,0,5599bbff76f9abbfbc1d07cce206fcc712b2111034120fc45e2caf24476be2d8,2023-10-26T16:32:24.767000 CVE-2023-45819,0,0,ea1566a0fb1a952b25413ab14d6f21b6c3f9ffe167f5ea428676eeb376e29ff5,2023-10-26T16:30:27.223000 -CVE-2023-4582,0,0,da44116cf4468da4353cbb90d496757fba444591065d9a75266723a31146a9a3,2023-09-14T03:52:38.367000 +CVE-2023-4582,0,1,7b3abe25df0e96f6cccb8e076f11761c931c1642548ef52dd59cdff69dd28186,2024-09-19T20:35:19.947000 CVE-2023-45820,0,0,945ee351c44d15089b06c280530b821b21f9767ef1c42eda5c8722229c74bd2f,2023-10-25T20:27:12.457000 CVE-2023-45821,0,0,4dfdda840410ba25f81588ce8fc22d30fb032aca0e9addf708abfeb968f70135,2023-10-31T15:48:49.977000 CVE-2023-45822,0,0,619843aee15f0de9161f8f8a43acd13a7075a48995a21996499f664c636789f9,2023-10-30T15:37:49.727000 @@ -234302,7 +234302,7 @@ CVE-2023-45825,0,0,a83d2154d6a0f74053f2e47beaaa650521367a3038c60a23369118d9f8936 CVE-2023-45826,0,0,fc8c45e9e8ea12059fa59c37540d8e7f98f23a471cd0c14fbe60279d24c395c1,2023-10-27T15:27:30.243000 CVE-2023-45827,0,0,c03e30d7dc6ab22ebe929e9d8f16388f96322e8ebc186388af2d068f242825c3,2023-11-14T17:10:21.330000 CVE-2023-45829,0,0,3754488bfa38597dc5301b475641727fa16039ce4e84073305f3ed077b8fcc16,2023-10-28T03:27:33.903000 -CVE-2023-4583,0,0,769d3212363e043c452df0558efd814621eb2c71a3bb8f27919d14d8dbf48def,2023-09-14T03:52:30.463000 +CVE-2023-4583,0,1,f34e68503e6f27865fdb5f892a287379e4682286bbfdaa6bb0c652f17d84a5f4,2024-09-19T20:35:20.763000 CVE-2023-45830,0,0,e93c56ded03c8deb613479cc3ad121b8f246009db67f735a112274b94d28e1d1,2024-07-08T10:15:02.867000 CVE-2023-45831,0,0,b702b04d14f4777b4083415b5fb28e46207cb55c2cfc24bd6526af4eb5d0d926,2023-10-19T18:35:15.887000 CVE-2023-45832,0,0,301bd23c2f17529b218c96923e12d8aaa81c12872ea9c911a933da05e6b647ad,2023-11-01T16:02:09.867000 @@ -234322,7 +234322,7 @@ CVE-2023-45845,0,0,9522a3662f29e92e7ad7c10b0718fcfbd446326415f192be0026a1d413e6a CVE-2023-45846,0,0,7e97bec05528c5d3c814716d330ec4cbbf0b8dfe300e92e8f8b68aeca1cee284,2024-07-03T01:41:56.303000 CVE-2023-45847,0,0,f7a26b5da655e9a29f01aa31d2e32a7796ef0da3d21aadd9906e8c1df71a55c7,2023-12-14T18:20:40.697000 CVE-2023-45849,0,0,4630a94faf635ed71b5e98033836bda86572afa3061550d59c00be4ed0b6e7b0,2023-12-08T00:15:07.350000 -CVE-2023-4585,0,1,e01dbed274463ee65ebfe5933af4ba4d70e0f55b294738ea323aa184822c558a,2024-09-19T19:35:12.583000 +CVE-2023-4585,0,0,e01dbed274463ee65ebfe5933af4ba4d70e0f55b294738ea323aa184822c558a,2024-09-19T19:35:12.583000 CVE-2023-45850,0,0,54f0aa089c8ebefba26fc84db9cc11c8567f61a11232a6923c6e132d5e43be38,2024-02-14T18:15:46.203000 CVE-2023-45851,0,0,a3947611dcf22f6805d628e99aaae522253196bfe6bc115a5e6e07eee5573efb,2023-11-06T14:33:29.510000 CVE-2023-45852,0,0,9f9928a73d27493bd16960e42e3753b817edb53bf0a279e8c73f0394583e4b85,2023-10-18T21:02:05.847000 @@ -234724,9 +234724,9 @@ CVE-2023-46375,0,0,84d5f59477bdb6e7348bcfcf2c36a58896f127e0ba6da6c408dfc1fd96ed6 CVE-2023-46376,0,0,a18e9d021664f17accb6b1583792a9a8d7514d3d3dd1baf1ca18e1fcd59ba2c0,2023-11-03T20:11:37.757000 CVE-2023-46377,0,0,3bb3f7894a7f9d7aaa69f0e876764e40500c22caad9e4790582ca41a59d18f7d,2023-11-21T16:15:42.713000 CVE-2023-46378,0,0,a12146fa3d7597e322af8e40f0f69ae518730ec831fca511dcbbdf4ce1a550fe,2023-11-08T23:17:43.707000 -CVE-2023-46380,0,0,51de3bb958305d8f2d54f7c54ec7af10a375378098a5335c58fa49de0e106e3f,2023-12-14T08:15:41.037000 -CVE-2023-46381,0,0,42856c2abe0d4a9c0db75de54357b5b9f8c96b633237d722627e56fc5d990be1,2023-12-14T08:15:41.450000 -CVE-2023-46382,0,0,4cfbe699864e403f77d06d5e7e5ac59073599e03c122ec8154a7523bd25bd29f,2023-12-14T08:15:41.690000 +CVE-2023-46380,0,1,cfb27fba40474525504fd1fc1e2fe2f9f0ae2fba0a8ab88f11c387453b3bb20a,2024-09-19T20:15:06.353000 +CVE-2023-46381,0,1,a447809038597a633db4a285838b0b9800cb1325cbcb36f551545bc235769afa,2024-09-19T20:15:06.463000 +CVE-2023-46382,0,1,1fdf18165e958522f0af25e32e7179889fd310f10639fbfb6c52cb54cdd6b130,2024-09-19T20:15:06.523000 CVE-2023-46383,0,0,31af6bfe5ed0169159615899fc7543ddcb6fa2a8f9567ebd148ad8f756e81645,2023-12-14T08:15:41.873000 CVE-2023-46384,0,0,4b111952585f944013874793da533c9398e3c11ea09d6cd66aee745fbced957f,2023-12-14T08:15:42.140000 CVE-2023-46385,0,0,35f1fe0e094fb802af8df5755c3f7c24ab5442ff02f09a43578ed3130b3b6bec,2023-12-14T08:15:42.350000 @@ -241353,7 +241353,7 @@ CVE-2024-0216,0,0,5db0150a6defe94c534ea06b438d3680a2481b7203149642bcafa6eeb47bdd CVE-2024-0217,0,0,dff0ee3a755b5789dbb3bda1883ae669fffbc3624903a03817fe2262041b1ae5,2024-02-02T15:20:25.843000 CVE-2024-0218,0,0,e0f7082bfe7bdb2b72e28d6537974d07e10b08637004dd51d50eee8295bc543b,2024-05-28T13:15:10.927000 CVE-2024-0219,0,0,b7044527e6312a645cfd11fb721216b84cfeb88504d813d0c3eb89e1835d8e0b,2024-02-09T17:15:31.870000 -CVE-2024-0220,0,1,4478b53c04077624854d5b69c9fe95d675429fc1d7fab33a90dc864a1050bb80,2024-09-19T18:15:05 +CVE-2024-0220,0,0,4478b53c04077624854d5b69c9fe95d675429fc1d7fab33a90dc864a1050bb80,2024-09-19T18:15:05 CVE-2024-0221,0,0,50e4123bdd9330b9856aaead23e8d95b6f2e4b19cc54edeb2503c031d7426fb8,2024-02-13T18:48:37.837000 CVE-2024-0222,0,0,b3f6fc9b6decb29bb4c0f2b45d4d98de1d7ddc35add0e737e26b11cd8923ec19,2024-01-31T17:15:29.990000 CVE-2024-0223,0,0,38a64de470819b095ee0b7b4b77ec34c2ec8923a888de65b096c5951a52e2499,2024-01-31T17:15:30.487000 @@ -241458,7 +241458,7 @@ CVE-2024-0325,0,0,b11f466ff4ff08fafe0e1564b77e877f7ef01996631763e0cca61be78af48c CVE-2024-0326,0,0,46531da0f2066fdd9f046a34fce12789358ed55a6f22b205eff42d5de697942f,2024-03-13T18:16:18.563000 CVE-2024-0333,0,0,9eaf58c044c101ac9ee4da325dc0cbe7baa26316edb9c32b68718e9200d8ba0e,2024-01-18T19:39:16.620000 CVE-2024-0334,0,0,f64e24da86d08ef5624336a0a2ef7f631f77b98c0c17027395f19c584275ec3f,2024-05-01T19:50:25.633000 -CVE-2024-0335,0,1,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377db,2024-09-19T18:15:05.150000 +CVE-2024-0335,0,0,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377db,2024-09-19T18:15:05.150000 CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000 CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000 CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000 @@ -243249,7 +243249,7 @@ CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000 CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000 CVE-2024-20398,0,0,e5f8f1014ec093b19c3aee1e58f0d383406da3978da2e5e7f51f4a4a4493a0ae,2024-09-12T12:35:54.013000 -CVE-2024-20399,0,0,aaa28123a1d0398c6962f2e8bd8e12b0b06fafe6901cc3060d103023db6feb09,2024-09-17T19:15:24.747000 +CVE-2024-20399,0,1,164174c543ab6ae29aa0171daa283df0ddb65a3fecfd5ef8bf748eebe57b6b05,2024-09-19T20:05:25.107000 CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000 CVE-2024-20400,0,0,e22f5359b4eae3d1123c96473d077f1ed8cfcffe9256c923e22249fabd71dd12,2024-07-18T12:28:43.707000 CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002753,2024-07-18T12:28:43.707000 @@ -246427,7 +246427,7 @@ CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 CVE-2024-2502,0,0,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000 CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000 -CVE-2024-25023,0,0,3b6e01d80c9261e3c9d5f00ef664e0cb38b680e426f57b9aa0b21aa4414e149e,2024-07-11T13:05:54.930000 +CVE-2024-25023,0,1,bfa23d4bb52946f389f1743b48c3dffc3c3bbcf6f5e8a57fb029d24dc49627fc,2024-09-19T21:14:27.027000 CVE-2024-25024,0,0,c5213c97e29706cc8502e6ba764e983599ae5293cf5cf0bdf7f7d6886ba77ef4,2024-08-28T21:53:10.720000 CVE-2024-25026,0,0,51187726c38059d92f52ec9be2e9837ba43ea1016581cd7fb52f8ca8d70895d6,2024-04-25T13:18:02.660000 CVE-2024-25027,0,0,119aec53d2012d07639e5485533be77b5b9837d2988927dbbb62ff5ba0a76624,2024-04-02T17:57:34.440000 @@ -246835,7 +246835,7 @@ CVE-2024-25657,0,0,4b43facfdcb326ebfd5828d4d462b595cdd46fa54d1b75d686b3ce7b78fb3 CVE-2024-2566,0,0,087689b93c35b2d23260489bf51254e9dbbd90f4e3c3903cdc8f028cf28ab7f4,2024-05-17T02:38:19.710000 CVE-2024-25662,0,0,731e4a5b21d04f93342e67f003659a0e732cf91f4619ab2aeea54741b462d915,2024-05-14T16:13:02.773000 CVE-2024-2567,0,0,894c1cbf5b078d66a72f8e7a485b38287a781715f51ccca3dd4b9958cfc1e069,2024-08-01T20:15:15.443000 -CVE-2024-25673,1,1,81e639b1f7fbf8754b4e267411fcc130c67ff83ee62eb8538403064c33f649ae,2024-09-19T19:15:24.093000 +CVE-2024-25673,0,0,81e639b1f7fbf8754b4e267411fcc130c67ff83ee62eb8538403064c33f649ae,2024-09-19T19:15:24.093000 CVE-2024-25674,0,0,a93e87559f3310a2a7f0b0950089f8e58e9cb97b1d3ba4777163ca1197a89f40,2024-08-26T19:35:20.977000 CVE-2024-25675,0,0,557139e6badf2f7cbea8b1e635432a1b7bfe50ad3cd4ea09e589187f2a0848c5,2024-02-12T14:30:28.640000 CVE-2024-25676,0,0,a08186e93b8e72e7d0fccd86e2d99f3ceb03caa74e9fe0fb3ce31f97ab303d23,2024-05-02T13:27:25.103000 @@ -248272,7 +248272,7 @@ CVE-2024-27344,0,0,f44089be578e3c3f48649a645c31f1e56b7af812f6729ae649c4c888c51a0 CVE-2024-27345,0,0,639d5d88d955f31b68d7ac65a92996a1944759655dec4dc8cdc403f6280e1a1d,2024-04-03T17:24:18.150000 CVE-2024-27346,0,0,8179d23e6ef0789d37a1db2f177021069373bc1f8d521305cdf369e9fa46745f,2024-04-03T17:24:18.150000 CVE-2024-27347,0,0,aa6bb96be7bc41dc2b8b854a600f1bcc7744ab20513fb28f41f361c130b3e452,2024-07-03T01:50:32.683000 -CVE-2024-27348,0,1,e96554afb28cbad659be9176aa4ca79d5b61a879b075bffbc242daa401baea3d,2024-09-19T19:55:24.297000 +CVE-2024-27348,0,0,e96554afb28cbad659be9176aa4ca79d5b61a879b075bffbc242daa401baea3d,2024-09-19T19:55:24.297000 CVE-2024-27349,0,0,88b94935f18791608992594036627e2f38bf8f66250b8863a7cf3ad8bea894c1,2024-07-03T01:50:32.910000 CVE-2024-2735,0,0,f01bcec823b48d788d322e20cf82a4a7470344ba299463eb0cff5623d9be778d,2024-04-10T13:23:38.787000 CVE-2024-27350,0,0,0fb1d64ef379194a46b064cdf7260ff9ff0ea87fdbd1fcde9fffd1770088e5e3,2024-02-26T16:32:25.577000 @@ -251148,9 +251148,9 @@ CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea07 CVE-2024-31411,0,0,4ae8e92f24ab80cd4eeff80dde44b86a5e45219785c2eb09757e8f4f11b858d3,2024-08-22T16:07:06.267000 CVE-2024-31412,0,0,91783357bf64a7c6a8a8fc4dd61d86515f3c43b87fd5026db89b258496a563c2,2024-08-01T13:50:54.890000 CVE-2024-31413,0,0,bb1445e4de4fe6231d24b5144c9534a3d5daec05348443646de7635aa924272f,2024-07-03T01:54:50.813000 -CVE-2024-31414,0,1,e387f0c66bf477a9777c6073fbe8e1bf77c81fd3f2da5d969d5f9db7d198c8b7,2024-09-19T18:48:25.893000 -CVE-2024-31415,0,1,4af626a01b2b209263b9f18365da822790629e58a8f2859d318f652182ce6cf7,2024-09-19T18:50:27.827000 -CVE-2024-31416,0,1,0d8c2b6f5939f620709e7ed49bc9a2b299d23aa8d9465d6808a0e5cb060665e0,2024-09-19T19:06:59.787000 +CVE-2024-31414,0,0,e387f0c66bf477a9777c6073fbe8e1bf77c81fd3f2da5d969d5f9db7d198c8b7,2024-09-19T18:48:25.893000 +CVE-2024-31415,0,0,4af626a01b2b209263b9f18365da822790629e58a8f2859d318f652182ce6cf7,2024-09-19T18:50:27.827000 +CVE-2024-31416,0,0,0d8c2b6f5939f620709e7ed49bc9a2b299d23aa8d9465d6808a0e5cb060665e0,2024-09-19T19:06:59.787000 CVE-2024-31419,0,0,d12cf9d3a6a9056d09543372e3ec9556904c7fd0922004ef5361ecc4fb1ba007,2024-04-03T17:24:18.150000 CVE-2024-3142,0,0,983e14121dea75c617117997ac50797df98bf192fa8cfa7597e476b17cc231ee,2024-05-17T02:39:44.690000 CVE-2024-31420,0,0,93cd6c74288acbee362fcfe80ff941e3294a823738c730373f8d597f177cf09c,2024-04-03T17:24:18.150000 @@ -252359,7 +252359,7 @@ CVE-2024-3309,0,0,86d23734c08e91abb9c54fe3adc839130d817cf111a237c0656262c25ce176 CVE-2024-33101,0,0,02c41b74667ba4c6c855c7f8be761695b1033ca3ebd54d33f4c74ffe5c076663,2024-07-03T01:57:25.600000 CVE-2024-33102,0,0,5913737ef9c2cdea9d03e524178ff2c4a07bc37811d823721759d56c1627f7bb,2024-07-03T01:57:26.367000 CVE-2024-33103,0,0,a36bb540d060154b2c500281aeebe1e440c6921a98c2ffcc128ad329bcfc7117,2024-08-22T19:35:25.357000 -CVE-2024-33109,1,1,623840b47a3d2080ddfa6fe372db92281baacbad134dc7e3c1b1fb9648b17803,2024-09-19T19:15:24.170000 +CVE-2024-33109,0,0,623840b47a3d2080ddfa6fe372db92281baacbad134dc7e3c1b1fb9648b17803,2024-09-19T19:15:24.170000 CVE-2024-3311,0,0,6e298bee2f64a50081e2cbf2a03ac8b7d3c6b0b9fd9ec2176921cbd680375d90,2024-06-04T19:20:19.213000 CVE-2024-33110,0,0,cadaede73d3a0da5440547f9c49768ef66978382531070a9c510181ac9abc5a8,2024-07-03T01:57:27.130000 CVE-2024-33111,0,0,b6aa79d7fa96972383b596dcb7f242edbb816eac6eafb7be06fed5f14d30b343,2024-05-06T16:00:59.253000 @@ -253141,8 +253141,8 @@ CVE-2024-3434,0,0,665daf763cf280ad6e13fab45ba57a35fec69ba9e6cd1628917c4e7d75dedc CVE-2024-34340,0,0,ce6bbf8ca46ec29426c800768c938c7ed5fd800a09085acbf821400587996e11,2024-06-10T17:16:28.827000 CVE-2024-34341,0,0,874d0ac87ba692c788b408f2928cb7b384b1146ea2fb2be7ea431c974b164434,2024-05-07T20:07:58.737000 CVE-2024-34342,0,0,3e142b43b7b4afad7d384023ad82da3d4505656b73350774ba0911c6409bd959,2024-05-07T20:07:58.737000 -CVE-2024-34343,0,1,a3b005bc8eba213738fde9a67dd414ba97bac0d8e4da53b457c6cda9ca8b4f39,2024-09-19T19:57:52.007000 -CVE-2024-34344,0,0,f5a9ba01025bca91b189ed9bcd3017020d0db224ae447d4b59293ea787794849,2024-08-06T16:30:24.547000 +CVE-2024-34343,0,0,a3b005bc8eba213738fde9a67dd414ba97bac0d8e4da53b457c6cda9ca8b4f39,2024-09-19T19:57:52.007000 +CVE-2024-34344,0,1,e2c80a8b534f583df6f7a38bb120df88d9d1e69be86c956b7fa12d47a03a3266,2024-09-19T20:58:01.827000 CVE-2024-34345,0,0,af3be7ad8b1b1d44ae22efd1e5357ec15980df2dfb15c98b9c630c2989cf22cf,2024-05-14T16:12:23.490000 CVE-2024-34346,0,0,461f54cd153daac8a3bd1e483b3a64b76b9087848b91f7f6ce6604a27c331020,2024-05-08T13:15:00.690000 CVE-2024-34347,0,0,b67d4d427f02230685c362ed430c27081ec70e2b17a8dd8ee8f951ca6b6606f3,2024-05-08T17:05:24.083000 @@ -255882,6 +255882,7 @@ CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 CVE-2024-38220,0,0,a9016c861c2695b31a1ce105f60c8a7497ab86c35f7fba294238a213f50a54ec,2024-09-17T16:59:37.167000 +CVE-2024-38221,1,1,c11d02241d3df8f0ad7af5e6e5110f6528d057248017e3ad1628ab6e372ebeb2,2024-09-19T21:15:13.933000 CVE-2024-38222,0,0,a5db0f4814eda956702b6863c4d614a7079e45a1c9850c93f259b800f2bd30ac,2024-09-18T19:01:22.527000 CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000 CVE-2024-38225,0,0,a8f1d15f2be1c40a6f29c5f7c1fea9920ae59300774a3c9a21af35434dbe2539,2024-09-17T16:58:39.197000 @@ -256554,7 +256555,7 @@ CVE-2024-39300,0,0,06c907e887f3a9a49c8c034a570476f82ab0d4832c162f4aa9ed409176b9d CVE-2024-39301,0,0,05ede2147c0414ce0c80c5aedca5b458241dd00889546d94391bc82da8555dc6,2024-09-03T18:06:28.743000 CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000 CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000 -CVE-2024-39304,0,0,b5f772f01b3427664c53f2fa0501efa536f799b20c5d68d0936fe6db6ed2d717,2024-07-29T14:12:08.783000 +CVE-2024-39304,0,1,517e49cf16eeb78d1ffc791005045214ddaf39a7e2bee09d28d29c638c19dae8,2024-09-19T20:59:15.717000 CVE-2024-39305,0,0,63f56317b3a65afc1e2039e772edc429176693e571707c38de2e052250926788,2024-07-02T12:09:16.907000 CVE-2024-39306,0,0,8e446f8cd38382555b776a84edd1102287cdb22d9e95652344c53f12d26a921f,2024-08-19T14:15:22.423000 CVE-2024-39307,0,0,c6ba32c8ba3cfcd15570f781df2bcad3fc5cb61b722485741dcbdce4f9e733a2,2024-07-01T12:37:24.220000 @@ -257088,7 +257089,7 @@ CVE-2024-40111,0,0,1a3d3f73f416ea4e786f4d30c6c4afa24719f06341ce4e72c0f952d62f0ca CVE-2024-40116,0,0,eb70c9a9b1b545c9ad476d8d1542c9445241ad3bd4f0dd5767e3b25e7e8e8497,2024-08-01T13:56:51.153000 CVE-2024-40117,0,0,c995513fc31f8c8ab9b7343003983d62c093f801640bdaede808c210dab8c1f8,2024-08-01T13:56:51.860000 CVE-2024-40119,0,0,684af900644d0baaaf3eeabc10aa1cf28b30369a49ccf90f61c5cecb4e42879b,2024-08-01T13:56:52.650000 -CVE-2024-40125,1,1,cc8392b182c6e8c7ee622740e83412c4a0ff89e87d8cc4c186b22da6539e9ed9,2024-09-19T19:15:24.350000 +CVE-2024-40125,0,1,89da09b2b86f7e45dc420e5b270e874f7af016931cd8f2c8372f6127cc1d7390,2024-09-19T20:35:24.513000 CVE-2024-40129,0,0,094db6b1cc5f6ee95fab428762b39a3d67f29eab1863c6c2fa082d03f389b949,2024-08-21T18:59:09.703000 CVE-2024-4013,0,0,3586550d51b92b0f462ebc695cf4afe7e9f245d08490f98716812b60f3625af2,2024-06-07T14:56:05.647000 CVE-2024-40130,0,0,093b1fad643c93b0a06c31b2bb9b67d52d3d511f6e3c5e9dbb0e8432db230090,2024-08-21T19:00:56.183000 @@ -257207,7 +257208,7 @@ CVE-2024-40554,0,0,975eaaed007d6b505cb8ba22ce57b12be37e7b3d2ebcc8a575de58b8f5a20 CVE-2024-40555,0,0,44ce04ab9d418b7756770fd44203b58128b20e8dfc6428e77d2706cc77d9f460,2024-07-16T13:43:58.773000 CVE-2024-4056,0,0,7c25f0a1764fd01965b39ebc13bb94a8ae53607d9ce0dfc30a27083c9e919722,2024-08-27T11:15:04.430000 CVE-2024-40560,0,0,08dc0b5066047c5e119a09d69ea20c085f8549859adcaecbbf38995d7d2e2e54,2024-08-01T13:57:50.440000 -CVE-2024-40568,0,1,293cc67ac7cb929d50728436658796c25ce534bf9199331065d8c719678bb7f3,2024-09-19T19:35:13.880000 +CVE-2024-40568,0,0,293cc67ac7cb929d50728436658796c25ce534bf9199331065d8c719678bb7f3,2024-09-19T19:35:13.880000 CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000 CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 @@ -258080,9 +258081,9 @@ CVE-2024-41955,0,0,5ad0263667cf66f8813b7d99a3968b8a2424832b6c51b00aba139fada06ab CVE-2024-41956,0,0,b72cd1a22a28d2303229b868afdc5fd2adbef42d25416f48e13276835bed80e5,2024-08-02T12:59:43.990000 CVE-2024-41957,0,0,f207a653c0f0f9d782c3e5585f7eb5df8054bd1cd710ccb1397440f0e840612a,2024-08-09T14:14:01.190000 CVE-2024-41958,0,0,ac2d465ee5b5b310612655a7cc0163ff8c5d740ff2b286b950528d6c8e63af4d,2024-08-06T16:30:24.547000 -CVE-2024-41959,0,0,135bc4bf1338241a775bbfd3e5799793f19819d1fb2e41bc46b5a8bdc385fe51,2024-08-06T16:30:24.547000 +CVE-2024-41959,0,1,a5b77d1b2d0820e47ed535354d7a0a4c8217a01fe56712ebcb48a9d560e6791a,2024-09-19T20:14:02.963000 CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f10e,2024-06-25T12:24:17.873000 -CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000 +CVE-2024-41960,0,1,67871a0d9bc1f8c7c6fdefc078d06d3de9e3801e3a530c569352ce3e295b7c6a,2024-09-19T20:01:58.633000 CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000 CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000 CVE-2024-41964,0,0,54621a6adee825c0636e7afd8773c219e1650b44db222dda2ec93364b11574bb,2024-09-06T22:56:18.010000 @@ -258188,7 +258189,7 @@ CVE-2024-42099,0,0,3238974df1fe016605810e840ae3252de7cbfd02bda034d599f06c9b461b0 CVE-2024-4210,0,0,1de7eb5485317b66c30ef10a923cca5446084d9b34c55d329adb40ead2a3c10b,2024-08-23T16:56:07.537000 CVE-2024-42100,0,0,9f2359920901de15a72f82c74dd31f7cfd476c8a0553c2aa7b3605f8c3eb567f,2024-07-30T13:32:45.943000 CVE-2024-42101,0,0,ee2417d1fe5ad184a427f58671dedfca7c7497bddaa125be1e3080536f8c3d24,2024-08-22T12:58:21.527000 -CVE-2024-42102,0,0,6316e9599f21ebdb21ae9fa78c744fcee5e0d5e7ec56a75728d7b5f4ac6d9f1a,2024-08-21T20:48:01.940000 +CVE-2024-42102,0,1,64b949f58cf07c99c9bf856973343a6a086af72e3a854e43d84300cd3937aa59,2024-09-19T20:38:05.737000 CVE-2024-42103,0,0,571d1f20007ce6492a18993a5251eb19a6d81ac85736922f03454b3e3d7e7288,2024-07-30T13:32:45.943000 CVE-2024-42104,0,0,def9c837115c029fcf5d81c61cabe7e6ca6fd4848fe11d6f1a09290cf875300d,2024-08-27T14:28:28.023000 CVE-2024-42105,0,0,602b7eceacc9e23748db5c2c201abe70f13508a1dc06a4238bfa6a02e44d1d34,2024-07-30T13:32:45.943000 @@ -258393,7 +258394,7 @@ CVE-2024-42348,0,0,3517a7d5c55d1f9705cc409c5db31e9d4d925676ffe15a67d0d55067bb2f7 CVE-2024-42349,0,0,ce81a2d0ab666d0f17a2c01af4324fee21f3848bcc5cf3cb8c1c76e1d270a689,2024-09-10T16:44:12.900000 CVE-2024-4235,0,0,f578447debade3af3e230e69e9dbc9d9ff3e97fecc115950bd6af5b863fac2d3,2024-06-04T19:20:32.857000 CVE-2024-42350,0,0,41e03c0efb90d720b1c8cb3232ef6c7cb3628d75ba24650e7a94fc79624a1e0c,2024-08-06T16:30:24.547000 -CVE-2024-42352,0,0,c0479ec0c76b813a7203da737c4719c60d3f36382909bc4066a937b282774165,2024-08-06T16:30:24.547000 +CVE-2024-42352,0,1,68dece2f261bc1cb364b695b18476c34cf26a3ab9c27c6e6ade9f2ee5db441fb,2024-09-19T20:55:46.543000 CVE-2024-42353,0,0,ff6a20bb34a678482c7e929d5bf56188c5e8b6470cc5da2a5c329ecb11992f4a,2024-08-19T18:44:59.903000 CVE-2024-42354,0,0,530679279c657883c4b35ba657ab96e7283f524459574665a6f69e940f2dd9b1,2024-08-12T15:49:58.230000 CVE-2024-42355,0,0,4d53406f017c64f607be0598b7dd1b3fb3451e70edad6092c759f1ac9d9afdaf,2024-08-12T15:40:32.777000 @@ -258772,7 +258773,7 @@ CVE-2024-43032,0,0,8850a9c656ae281e32b28ba33f2ad3aef6596a2affc3579c53c1b92b428ef CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 CVE-2024-43040,0,0,1da4fee0ec9b26a667b61884070b050a8f4bcf13a2b21e01185cd5279abd34cd,2024-09-12T14:35:15.010000 -CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000 +CVE-2024-43042,0,1,d94e46af540f49a4f3c40e5f52dafd9243317a2003df44ac76bccf484c7eed66,2024-09-19T21:01:24.137000 CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000 CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000 CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d14008,2024-08-01T13:59:30.377000 @@ -258812,7 +258813,7 @@ CVE-2024-43139,0,0,c74c0f3dde7756ee6f145dfa944df2bddeeb719e29cd3b22fb911239d7691 CVE-2024-4314,0,0,5b91c731cc96c112e4837604681a355586cd629f1c71449572dfc7eb6fafd4a6,2024-05-14T16:11:39.510000 CVE-2024-43140,0,0,ddd9555407bf13c17882395b6a58ab3090224c7fbcadd5faeeb830d264aad29c,2024-08-29T16:04:30.370000 CVE-2024-43141,0,0,f29f7de7eae578d120c59b0305acaad325acb97a127ccd6d6289a33a71c747b6,2024-08-13T12:58:25.437000 -CVE-2024-43144,0,0,4965643ade074f3c07bfe744b2f02557b48b71e95e2c5b95a86c789fa9e741d8,2024-08-30T13:00:05.390000 +CVE-2024-43144,0,1,c20057596840dd1a8f603137843000e2e0f183226721451fd208a34176a83c3f,2024-09-19T21:47:24.613000 CVE-2024-43145,0,0,7ccb83b884d8dc58ceb4932d45768a752924d5c2938e5a3f671a778aaba995f8,2024-08-19T12:59:59.177000 CVE-2024-43147,0,0,667e4e165f9113b4fe4ef729d1c96bbd751ca2d031ec283022e85cfd98eae7e3,2024-08-13T12:58:25.437000 CVE-2024-43148,0,0,cff5965efef0a90e2b87f245b5b8084669061ce4646f39e1c94e0f70b2166d42,2024-08-13T12:58:25.437000 @@ -259047,10 +259048,12 @@ CVE-2024-43479,0,0,313bbcabdd9b44fdcc219a1bba9045a367d02f58a01b8953aabace95c227c CVE-2024-4348,0,0,6e86bc5560fea8dde0d2ebca4133582cb5d1167a5aec18ad6c6b9b23741c69df,2024-06-04T19:20:36.223000 CVE-2024-43482,0,0,d8f402bc0f3ce251083854e9d472514518876444465b9e6fddf99899cdf432df,2024-09-18T14:11:50.303000 CVE-2024-43487,0,0,b1bbbe6f3eeb8f594d4cca9a1e5f97347bd8ae24b6674c21dd2e36175fe4aaad,2024-09-18T14:10:20.320000 +CVE-2024-43489,1,1,ee2cf49c9fa4e936e04e2f7bfcd600b32597e40e3de91a382a9221f1a4d38319,2024-09-19T21:15:15.677000 CVE-2024-4349,0,0,a8b03025f36b8713c52951e7ebcf312d165d904bb8cd188665520ff04ec5e58b,2024-06-04T19:20:36.340000 CVE-2024-43491,0,0,66848b924ef1e3bbbd3e0b208cbe28d68dfcc77f6e79bf211914ea2a59716ae8,2024-09-12T01:00:01.133000 CVE-2024-43492,0,0,af0e73844988f19d42832ecb20006b5ce23817c5aa51bd592ac57ea711827c4a,2024-09-18T13:57:22.880000 CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca75e,2024-09-18T13:55:07.100000 +CVE-2024-43496,1,1,6c8a4591d0b7199a042f60aa1c605bcf500cf2ea49ccf6fb4e85f680cab14ad9,2024-09-19T21:15:15.917000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 CVE-2024-4351,0,0,1afa7cdd2b07ed7f6c7d4fd33431ae4e847e5055e80de2c2ff284dbdde180a83,2024-05-16T13:03:05.353000 CVE-2024-4352,0,0,83fde2dc0fb70bd9398ce4f7dc00180654ce0fb46c0f63d8091186b07c4c5ecb,2024-05-16T13:03:05.353000 @@ -259236,12 +259239,12 @@ CVE-2024-43913,0,0,1c9fd1b4295df0d3d5ed94da6708f3aa88fdfeb6b586d9b4c06ecb1ea3824 CVE-2024-43914,0,0,cecc040296533d16ec68f112b8d7429d7c31abfac86050a6f05da890be7d265c,2024-09-05T18:03:49.997000 CVE-2024-43915,0,0,d179827f4a2239697e62ac501a97b8b3109220e3bde2278c20f3a196442ad24d,2024-08-28T17:44:45.193000 CVE-2024-43916,0,0,31042afa408fe94b440478a73ae72a8d0da3ebc3aa7dccb541b916eb98fd8b0e,2024-09-12T16:21:19.030000 -CVE-2024-43917,0,0,24cdbe475912047a546c5d424d36145b60978d1605bec7e3b2ca4ce00758ae54,2024-08-30T13:00:05.390000 +CVE-2024-43917,0,1,acabaf456c8dfd741a78efbcd42603884b1ece437ab7a578f9853b1f227cbc3a,2024-09-19T21:46:19.713000 CVE-2024-43918,0,0,ddd56bcf8df0ced2fd43f465099ef1734f47f7e198c9ebd8d1474897ffb0a07e,2024-09-06T15:51:25.957000 CVE-2024-4392,0,0,5c82c123a66d3444e81adbb958bd6b8cf11e432e36668571a78dbfc8c82c1c37,2024-05-14T19:17:55.627000 CVE-2024-43920,0,0,4fe0b9b4bdc3c773cef62ba0a55678a848520d2f26b7c394fdfed7064f320ada,2024-09-04T14:06:43.780000 CVE-2024-43921,0,0,8cb3a8317d91fe8c86f2a088d9aae7d066ad8cdfd297a2cc1e6c90830f46e738,2024-09-04T14:12:12.957000 -CVE-2024-43922,0,0,d06cb19de3b21418df79a48a56a0a99911a1120cf3697935d43888e3061ff400,2024-08-30T13:00:05.390000 +CVE-2024-43922,0,1,1bda9e09eeb9cf761058baff2572a8d05071b30f4dbb7675f13cebb74973fb9f,2024-09-19T21:44:49.453000 CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000 CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000 CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000 @@ -259748,7 +259751,7 @@ CVE-2024-4514,0,0,385303b4c456222ef36bff0fbd012efb4cf0e7eb509cfab25e182e333e168c CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 -CVE-2024-45159,0,1,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000 +CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 CVE-2024-45165,0,0,b001eacfea75d370a82a50b82205930e70aa975a85c81e49480bf2cbd2fdd05a,2024-08-22T12:48:02.790000 @@ -259864,8 +259867,8 @@ CVE-2024-45395,0,0,40bba716ba89648b0a5b0a469128bfb2472f289be140a10878a9431641f22 CVE-2024-45398,0,0,7758f6d65fcbad19eab77bcca68b8445fb5c0f0afca8b3214cdef86ff36248a6,2024-09-17T20:15:04.670000 CVE-2024-45399,0,0,037a7bffbd0f8d9091903d0d9148831df46e7343b0a57250b24ff56b22720edf,2024-09-05T12:53:21.110000 CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000 -CVE-2024-45400,0,1,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000 -CVE-2024-45401,0,1,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000 +CVE-2024-45400,0,0,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000 +CVE-2024-45401,0,0,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000 CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000 CVE-2024-45407,0,0,363c12723797ac0c72d1d271ead356acc799cc8a41f14636bd37d7f20defb6ac,2024-09-10T17:43:14.410000 @@ -259897,10 +259900,10 @@ CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97a CVE-2024-45450,0,0,aa5d1afac94647878136a29faab537df333625d6375aa0ea38189e29e05bb108,2024-09-12T19:30:22.863000 CVE-2024-45451,0,0,5229461646061f5229c33d4bf801b0a9f7047a3683ddb2578fb28570321f2734,2024-09-17T23:15:20.970000 CVE-2024-45452,0,0,fdfee902792e194b32d188f2f974cff27f1fb2a2547b725b9bb68c5c8e0a2fab,2024-09-17T23:15:21.183000 -CVE-2024-45455,0,1,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000 -CVE-2024-45456,0,1,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000 -CVE-2024-45457,0,0,56f051ff4ecd4b6bed95d9151f6e0b39eb3d323739c8a3289fa8218221d2fc6c,2024-09-16T15:30:28.733000 -CVE-2024-45458,0,1,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000 +CVE-2024-45455,0,0,4d27dc502cdc314ca65322205c1992846fdc5d39734d6d904b9bfe916c2c58d0,2024-09-19T18:51:15.433000 +CVE-2024-45456,0,0,47f416b4ad02b4137088267164d544ec869b0c8806ca776b6a7c643c5eb500b1,2024-09-19T18:38:57.500000 +CVE-2024-45457,0,1,5900191db09039069fbddda66128c2809bcb929085a84aed28a0c8f708ed46f3,2024-09-19T20:53:46.313000 +CVE-2024-45458,0,0,a61716ce0d3fef0ec6cc594d56bae2d0a9a90d5b7d46e3aad6884d33d8f55d2d,2024-09-19T18:55:46.513000 CVE-2024-45459,0,0,4154d879d23930c356c924ee9751025192ea472198f82d912c4042ce38a9f5ab,2024-09-16T15:30:28.733000 CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 CVE-2024-45460,0,0,7056065a678a74d2d3d00e0fb051b2bcdebb702f17f31078c0bb6fea26b93765,2024-09-16T15:30:28.733000 @@ -259911,7 +259914,7 @@ CVE-2024-4549,0,0,e09f9cdaebb6118867e13a9d3ab643eb98c9f9e356cd137ad04d5c4afde157 CVE-2024-45490,0,0,4a9544858f8ad52701885faaacc054b024c5e1d139687b3f21fcc2ee9f6ad4a9,2024-09-04T14:28:19.313000 CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 -CVE-2024-45496,0,0,93743dbbf163bb09514a60eaad059819dae246f577c0fc9cd1d2a5f4d71b5559,2024-09-19T14:15:16.980000 +CVE-2024-45496,0,1,bf715a05c794fd20083634b49f1eb068776d0e150060120d941d4d1e0abe15a4,2024-09-19T20:15:06.813000 CVE-2024-45498,0,0,c0b73fd56e19fc295690d422c61db0b0a34ba9767e31b80f7a635220e3379808,2024-09-09T13:03:38.303000 CVE-2024-4550,0,0,15fbc24f09319144879d8500386f895513bfa5772ea62a92e0fabd950300c406,2024-09-14T11:47:14.677000 CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000 @@ -259927,7 +259930,7 @@ CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000 CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000 CVE-2024-45537,0,0,522e8ad70c4a2b88082c6938714c807f5fbe9d880fbc938f7c7e90871d6ceaae,2024-09-17T19:15:28.157000 -CVE-2024-4554,0,1,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000 +CVE-2024-4554,0,0,937a5d36b2a75a32b850145e7584d302fcbf1e70f1d70fb88494beed5a5d0988,2024-09-19T18:15:10.433000 CVE-2024-4555,0,0,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000 CVE-2024-4556,0,0,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000 CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000 @@ -259958,7 +259961,7 @@ CVE-2024-45617,0,0,6cb16d6fbb6421ff7c08177427efbe84e4a03cb3cf72e212ba5673d3ad33a CVE-2024-45618,0,0,dc2dc7fd3bf0d86469d9d1e7cf8afe886c6a0db83c5b7c56e1d5c7bc488c4153,2024-09-13T16:30:27.693000 CVE-2024-45619,0,0,19913ec071f09571eb2fafb85b3bcf05650473cef15788106e54de572df55757,2024-09-18T09:15:05.227000 CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000 -CVE-2024-45620,0,1,62d7efd1f4f3b2c671c5ae6f75d170d2e8f1f728e1204e1922e6a8c5eec065f3,2024-09-19T19:21:38.653000 +CVE-2024-45620,0,0,62d7efd1f4f3b2c671c5ae6f75d170d2e8f1f728e1204e1922e6a8c5eec065f3,2024-09-19T19:21:38.653000 CVE-2024-45621,0,0,0e87271e3b523f5d125d92dc504ca3a7772b99de219d6f52d1ecafc891e937da,2024-09-16T17:28:53.437000 CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000 CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000 @@ -259977,9 +259980,9 @@ CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c0 CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000 CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000 CVE-2024-45695,0,0,da601d84ea417c0c9279d85654ade81af5192308ba1ba5409f7a2b21c121a433,2024-09-17T18:40:38.573000 -CVE-2024-45696,0,0,b551b9e5a33d60ee884b352cc58e0de6e4358b9a2aa8ac71cf9d81795dbc0d1d,2024-09-16T15:30:28.733000 -CVE-2024-45697,0,0,b061a52d423d0f158415b239b7e20000a7f8fedec2e7f4abb8775b53aaeae721,2024-09-16T15:30:28.733000 -CVE-2024-45698,0,0,a981e18179a6b778934544cccfd9a0e75be9eb8d89acdc683c6a6d70ffb7ea78,2024-09-16T15:30:28.733000 +CVE-2024-45696,0,1,15dc5b5bd95cf2badd72adb77d96e01d4ef86e61af344574364ee75cad060ea9,2024-09-19T21:42:36.557000 +CVE-2024-45697,0,1,f5a37290219fae59e8d61a5bcf73769a3b20c61fab40a7e37a2a1d321507c010,2024-09-19T21:40:37.357000 +CVE-2024-45698,0,1,ae3e99b30522a0cc22ac110f0e079a19451e6ffc669d2c6984799a2bd6bce8f9,2024-09-19T21:40:02.560000 CVE-2024-4570,0,0,c1cc5ae154200d1c8cbc554d2bd91b7f0d0e2fb1c25faf550303ad23eb2c106c,2024-06-28T13:38:13.630000 CVE-2024-4571,0,0,76823bb120333d1d68e24e57a18868a62bd826931cb118db3f1630877d1250ae,2024-05-14T15:44:05.750000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 @@ -260096,8 +260099,8 @@ CVE-2024-4636,0,0,5f6d994195b0d258cedd76eef14490d422ed4d9e1ed2778ad911a6f2ded3ef CVE-2024-46362,0,0,19797b772fedfa56b8ab1944bfa10d47aee5c75ee333d19ae89a45da58afb3c6,2024-09-17T18:35:02.140000 CVE-2024-4637,0,0,feac91fbe82af9a41f47d1c690f7cb9ac382f5ae365379b4bab97a7b08b57d3e,2024-06-04T16:57:41.053000 CVE-2024-46372,0,0,fd6f56a0663f220726a1bac55ab58f9ad10bc05a60b983463690dc99ae056ea6,2024-09-18T21:15:13.443000 -CVE-2024-46373,0,1,26308fac89234bd0c4e6545029c0375bca524ac42183e23bc115426b28dd097d,2024-09-19T19:35:14.767000 -CVE-2024-46374,0,1,d8f5ae0d53687ee2132192046d5833100ce6e39c88021fb4246bbf0f13d8b372,2024-09-19T19:35:15.573000 +CVE-2024-46373,0,0,26308fac89234bd0c4e6545029c0375bca524ac42183e23bc115426b28dd097d,2024-09-19T19:35:14.767000 +CVE-2024-46374,0,0,d8f5ae0d53687ee2132192046d5833100ce6e39c88021fb4246bbf0f13d8b372,2024-09-19T19:35:15.573000 CVE-2024-46375,0,0,a3753b0b860f3107bde948855a197ee1efaa17527c91f22e315c5003ce34e48c,2024-09-19T14:35:06.727000 CVE-2024-46376,0,0,a3c7dd3b4bc749abac101cd27fd7d78b57ef129d32ef5359aae71578abaf0c50,2024-09-19T14:35:07.493000 CVE-2024-46377,0,0,95e91e17e2ab812f3da9298bb3d6639e1f6afea01389da755fb47626e16ccaef,2024-09-19T15:35:09.843000 @@ -260178,21 +260181,21 @@ CVE-2024-46678,0,0,0e842f6f0546edbddbc3c711ac91deff93c4a1dd44f16ff31c31239d48d66 CVE-2024-46679,0,0,5bde69d05e3c296a2601ee086688ce4b06bc49b8b5611729b2be82e470bb0f3d,2024-09-13T14:06:04.777000 CVE-2024-4668,0,0,ecbe5c3985983203e802de76c9f88e6fca1078853835be834d70b53a54cc9e61,2024-05-30T13:15:41.297000 CVE-2024-46680,0,0,53c6bf89a5bc3949c31b94cf312216e18ee2de106f93d5214fdad7ca6fdc356e,2024-09-13T14:06:04.777000 -CVE-2024-46681,0,1,66e176f13756dcc0d8ab331fd0f39d2f2c349ffd10d9d4cbb6d64818840f1c2b,2024-09-19T18:10:49.623000 +CVE-2024-46681,0,0,66e176f13756dcc0d8ab331fd0f39d2f2c349ffd10d9d4cbb6d64818840f1c2b,2024-09-19T18:10:49.623000 CVE-2024-46682,0,0,ac171974a7e950a314e59d0243b9e9f062b63a309ff607f2a164bec5594c8099,2024-09-13T16:52:02.067000 CVE-2024-46683,0,0,5299c97d1fc80f78dbfc5ccddf1bf7e66a8882d99e8d0b9ff70c92161eec2568,2024-09-13T16:52:14.373000 -CVE-2024-46684,0,1,3dd8d6161a75a02a3be01356f95b0f512dd073e666142fad3ca14e59b093e391,2024-09-19T18:04:22.623000 +CVE-2024-46684,0,0,3dd8d6161a75a02a3be01356f95b0f512dd073e666142fad3ca14e59b093e391,2024-09-19T18:04:22.623000 CVE-2024-46685,0,0,1b48d894cf37f05d909d964324e0bdd0c004048501a99e5c3c6ac200b20fa0d2,2024-09-14T16:00:55.547000 CVE-2024-46686,0,0,4afc0303c037a90aa176527c5c1d12aa028b7efb97890dbc9b5bee7f3de95eed,2024-09-14T16:16:33.087000 CVE-2024-46687,0,0,6df93b329e4c9b4912f75ba797c3862dd3825d176bc4b8d52421481a95ca02a9,2024-09-14T16:17:33.073000 -CVE-2024-46688,0,1,742ceea25117b25b2bd80750a6e9911adc074107f75e2746760ff11b497a9894,2024-09-19T18:01:43.037000 +CVE-2024-46688,0,0,742ceea25117b25b2bd80750a6e9911adc074107f75e2746760ff11b497a9894,2024-09-19T18:01:43.037000 CVE-2024-46689,0,0,d4a917f4af8389cbed7fe97091a2204305beeb74bbc4442a420d1eb90798629a,2024-09-13T14:06:04.777000 CVE-2024-4669,0,0,a0976f7ea3148ea450eb6167436e6be2dce8d6ef83862711f573c56cae3ce5e3,2024-06-13T18:36:09.013000 CVE-2024-46690,0,0,5af0b3656d8665491f28716ea7603bb0aea5a272e8c1bf40ddd30a1255705d3f,2024-09-13T14:06:04.777000 CVE-2024-46691,0,0,8d55b848b81c7cb2c778de047700fe79e5a572a7f93e6b725cb6041c3a622df9,2024-09-13T16:52:21.057000 CVE-2024-46692,0,0,9bca0a6bdb61a96f9bc64b59f8db4ea9997f8804d892b4802b2be44c689f8375,2024-09-13T16:52:31.627000 CVE-2024-46693,0,0,f40beda26d58dd63f40fce79476da79807c21e41b509da1c16e262d523bfeffd,2024-09-13T16:52:41.270000 -CVE-2024-46694,0,1,06269357f08eee761908cfd9b04c5fe20fc860e28bbdb44b42b210145df9925d,2024-09-19T18:16:22.247000 +CVE-2024-46694,0,0,06269357f08eee761908cfd9b04c5fe20fc860e28bbdb44b42b210145df9925d,2024-09-19T18:16:22.247000 CVE-2024-46695,0,0,2c8af9d60124692d9b6ffbee8d85890498f0625ad48f0bbdd570b3ffb4d38d01,2024-09-19T17:59:23.113000 CVE-2024-46696,0,0,4daffe95396a7dfd0d7acd939b4305def2a9b7710efef4f9245a07291857d3de,2024-09-13T16:52:54.363000 CVE-2024-46697,0,0,43464ee626e8d8f74d444b3501adf5b870c21b9df376053a20055ac938fa0f19,2024-09-19T17:53:43.173000 @@ -260354,7 +260357,7 @@ CVE-2024-47049,0,0,0632fb9d999b7a0f0772c4bcd61e6520e2d1b47f1300e76d8780773c41e65 CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000 CVE-2024-47050,0,0,9fb75eec65018e4d647a95f2333bff20c9711ca8d7d9db03b47fb8b221e40194,2024-09-18T21:15:13.743000 CVE-2024-47058,0,0,531cdfc92f76cf21d508b7b6b64addb62803353166eabe55a6bed18bc21358e2,2024-09-18T21:15:13.923000 -CVE-2024-47059,0,0,963e19b9c43cf5c2fc64d99e9fc14f93e8e1c53bf419efc5d22841199e5248e4,2024-09-18T22:15:04.650000 +CVE-2024-47059,0,1,9466c943a41a2a8bfe710cc2c837a4487b91955bb723557f79ac146e1930f89d,2024-09-19T20:15:06.953000 CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76dfc,2024-05-24T01:15:30.977000 CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000 @@ -260370,10 +260373,10 @@ CVE-2024-4712,0,0,8c9912a72fdb973e445c03f0c431e473f67586d80716ea23b3c04f9af648d8 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-4714,0,0,d7e9d9d95d84a12a856ae94c0b47f221a8b241db6b1f0d94ea74b84fa1b36764,2024-06-04T19:20:47.027000 CVE-2024-4715,0,0,8280b54df57d141f79c5c5ba7edbd4b8610f06a30ecbd5ba39cd6c268b4b3f05,2024-06-04T19:20:47.130000 -CVE-2024-47159,1,1,37cd59fd117f5cf50861cd88b8abebb1e1884db1ba94dfcf9ceb69cfa69bb528,2024-09-19T18:15:09.803000 +CVE-2024-47159,0,0,37cd59fd117f5cf50861cd88b8abebb1e1884db1ba94dfcf9ceb69cfa69bb528,2024-09-19T18:15:09.803000 CVE-2024-4716,0,0,17dd73abada87214ed7c4da9787dcdd43aa5089416e4d3395c3029d4b8a776fa,2024-06-04T19:20:47.230000 -CVE-2024-47160,1,1,3f6af29a5418c0ea31328b241c0a67d429ed0f2ea9a2a4795d9856d4f3850696,2024-09-19T18:15:10.013000 -CVE-2024-47162,1,1,7a918a68f616964c3a64fa06f015fde786d9abd7d452c1eb72d0cb1650c8a0a1,2024-09-19T18:15:10.227000 +CVE-2024-47160,0,0,3f6af29a5418c0ea31328b241c0a67d429ed0f2ea9a2a4795d9856d4f3850696,2024-09-19T18:15:10.013000 +CVE-2024-47162,0,0,7a918a68f616964c3a64fa06f015fde786d9abd7d452c1eb72d0cb1650c8a0a1,2024-09-19T18:15:10.227000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 @@ -261470,7 +261473,7 @@ CVE-2024-5966,0,0,554ab96b833511e084a1ba15972a76a5727ada41d1caccbee2c2fb11ec3339 CVE-2024-5967,0,0,2abd808298732cc4b1964c14eae7561fd71fe2ea4a15e03466adc54a1382b0dd,2024-09-09T19:15:13.920000 CVE-2024-5969,0,0,54d46cadd04c8b436788a5c40941c4acf03c3675c749089b56e7845a318ca37a,2024-07-29T14:12:08.783000 CVE-2024-5970,0,0,e17a8b7d022fd70a35f0b32d2191e09c5597e5e1c83547c2cb361b6d17360bc1,2024-06-20T12:44:01.637000 -CVE-2024-5971,0,0,90369bbae7ec6d0a431cb805e5b4d95e2a2bbc43686a90d71299e68e9272ae8b,2024-09-09T23:15:10.200000 +CVE-2024-5971,0,1,b240fc2a76fc52f8e8a86abd78dd833d601e288ed9a23c68d806cff359ade316,2024-09-19T20:15:07.113000 CVE-2024-5972,0,0,3700c5b3eb4bcd1d3bafe18b568e7aab0a0471128c3ce92a2f73ba8aa9a9cb4f,2024-06-28T19:15:07.500000 CVE-2024-5973,0,0,149a91603c9d83724ac65f413ff97fc2f66dbcbaf98a063fb82f82fbdd67043a,2024-08-01T14:00:06.420000 CVE-2024-5974,0,0,6465747ebb7259fe338ca54f64293ac9e5e639bde8c31a40e65e3d25cce88c2a,2024-08-22T14:26:55.657000 @@ -261571,7 +261574,7 @@ CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5 CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000 CVE-2024-6085,0,0,e5356847d2f9e7fb365a9afe07e5899cc989c4ce949a989ba1a4d6bdfc914a39,2024-06-27T19:25:12.067000 CVE-2024-6086,0,0,28c3e2540b87e65e53355efd52e7428f1a054dcf2c80ab6446e2a8ede4d737ac,2024-09-19T15:57:50.267000 -CVE-2024-6087,0,1,2f3eb6d59e26864799858a36adcfa783331a6d1634807496019392d9a2953a02,2024-09-19T19:32:14.710000 +CVE-2024-6087,0,0,2f3eb6d59e26864799858a36adcfa783331a6d1634807496019392d9a2953a02,2024-09-19T19:32:14.710000 CVE-2024-6088,0,0,ed650bb4582239ce54305f8b10efe45d50e8cb6f1aa2aa30a6eb4b92f9ce96ee,2024-07-02T18:08:38.550000 CVE-2024-6089,0,0,fa11ebbd3c2f4a5c1117ab55af0cf255d158d35dec5a0296617f7f6f3c04b619,2024-09-10T14:05:16.183000 CVE-2024-6090,0,0,97ec0efad50117bd537daa7e8cf0d79ae16e3a9835d40dc90b67ac25a55b7eab,2024-06-27T19:25:12.067000 @@ -261986,7 +261989,7 @@ CVE-2024-6576,0,0,173ec86e8bf671719ebb8c23252d7cacd934d3a530ec0d1cd90d8e5a216070 CVE-2024-6578,0,0,8257f7484236e424ea5fc80479c626bf5a4575b6af53231a1ef13b8f880d14c5,2024-08-20T14:51:08.483000 CVE-2024-6579,0,0,70ddc19f754f7cb2643cde5cc84c5570c5648bfc6d8e404da6cc6aa9bb2155c8,2024-07-16T13:43:58.773000 CVE-2024-6580,0,0,d43dfa58651574c4447e8f323f3cb1f6a00d6bdef0613d5834aefccecf968c5d,2024-07-09T18:19:14.047000 -CVE-2024-6582,0,1,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000 +CVE-2024-6582,0,0,f1b25d4279cac74ab3d7a85e57ca8c7ee792f976a2129063fda41c9a32a1f1a1,2024-09-19T19:45:30.283000 CVE-2024-6585,0,0,21557c5e847867bddd52df3ea3c8bef1c24ed1d84f80217fb776a5f25fb72332,2024-09-03T15:35:16.350000 CVE-2024-6586,0,0,fae1812021b838f78d9872593f00167428e312ab2f13f81f35231f528789de0a,2024-09-03T15:35:16.577000 CVE-2024-6587,0,0,a3f7b0fbe3d852ff05f7aac13ae8f9e1a110910501abae4c571a6fba27015678,2024-09-13T16:37:22.997000 @@ -262187,10 +262190,10 @@ CVE-2024-6853,0,0,bfc770724a0cf755cd219c2fcd6258a625eb83bca7472f15162225f6a8c2c1 CVE-2024-6855,0,0,747d35631c84525ad9c2f1282cefb607972b06ed8ec8bcfcc6cf90db5747a736,2024-09-11T16:21:38.833000 CVE-2024-6856,0,0,19b5d479e1e69973e8f497d2ae00f38aea8ffd7644169a9718f707450440aae4,2024-09-11T16:20:45.503000 CVE-2024-6859,0,0,5a84bd798224932fef849d8b4793f644b651b362a6172317aad467bf1bad3991,2024-09-11T16:19:18.517000 -CVE-2024-6862,0,1,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000 +CVE-2024-6862,0,0,073f5a8c1f8e2bec8087db878aed60d70af4b3c11209547716a8f3a82485e7e6,2024-09-19T18:37:20.910000 CVE-2024-6864,0,0,469a0ad039e39ca71e90d0d65b529134e06346783388106a10d2fa7d0b356379,2024-09-03T20:22:16.433000 CVE-2024-6865,0,0,cb8e3c3258edaecfb2408f04adfa69a3419179f287cf4fd0248689bfb8e952c7,2024-08-05T14:15:34.847000 -CVE-2024-6867,0,1,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000 +CVE-2024-6867,0,0,97784f08d4711dc358ee536a5af5e617f34cad9ff3713963d54758397f7f7f62,2024-09-19T18:28:05.477000 CVE-2024-6869,0,0,cc765e0741eb808a23e90ee3171ba570febcbdba6db7038c79938ac8aebc9baa,2024-08-08T13:04:18.753000 CVE-2024-6870,0,0,fdc9781daaba3083ba91ed61390ac3ea5e3a3c1deb45aa4706aee786b8d5379e,2024-08-22T12:48:02.790000 CVE-2024-6872,0,0,9eb628e3a6d1ea0380e94dd099512f5a2f74ddb0ba75bf9a102e83ab13e260f5,2024-08-05T12:41:45.957000 @@ -262582,7 +262585,7 @@ CVE-2024-7381,0,0,ca7cc8a67702d68f3387a7110e4857f594b40c8a2313eee62c5e5767902903 CVE-2024-7382,0,0,38dbfd05201dede10e421fed3e3b0d675c062e51a3aa3f6428b06fad8a88c553,2024-08-12T13:41:36.517000 CVE-2024-7383,0,0,d2737cd69fd6977c5ff3be04ae298e1bf45647197e69a7bb44ed13fcf569259a,2024-09-18T20:15:03.760000 CVE-2024-7384,0,0,959c51f9d9089f82b75c53d05c8efe51e41a9d17d895f5f42948ac7d882f9351,2024-08-22T12:48:02.790000 -CVE-2024-7387,0,0,7214f5d5054d4691e77d0832bdeaf771fbee38c6d6e438c4147da17cf7c3db4d,2024-09-19T14:15:17.470000 +CVE-2024-7387,0,1,02e3ddf0d1b53309fa616b29b5397e6bbcf37df8e8f5e06d91f5505bbe8c5d56,2024-09-19T20:15:07.277000 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 CVE-2024-7390,0,0,7895dab66ddc704219ddf6d579bba9623189661f47faa0372744a2c8c5dc8ef9,2024-08-21T12:30:33.697000 @@ -262699,7 +262702,7 @@ CVE-2024-7548,0,0,a83134ab837c1f044f7727880755ec030be1b2bfb863a86ddf4e4c1bc02ee7 CVE-2024-7550,0,0,0ccf7d721eccaf753ef6c8a48b561ee0f9b8839c90b74eac00f4a21c8fe96817,2024-08-12T18:32:08.900000 CVE-2024-7551,0,0,b186fc017c389d319de7d861b1d913a84a5458cd5dbd51c140f542d4aff6a7a9,2024-08-12T16:12:12.377000 CVE-2024-7552,0,0,811aa90d2d18bb406f73befc3765a8f78539782307b57a4dcd481925c3ed1f73,2024-08-07T21:29:57.417000 -CVE-2024-7553,0,0,423c29f04f0f081a0c5d9465a918cf0ed131ece97e02d2f5996269c83101214a,2024-08-07T15:17:46.717000 +CVE-2024-7553,0,1,a003128917872942bd112101b4a09fecd49ec3896a9f8c6e71229fee4c654d46,2024-09-19T20:46:04.103000 CVE-2024-7554,0,0,dfc64307827dd001a7e870992bca03e6a424d33d4584f122a641b15fec5c52ce,2024-08-29T15:42:13.387000 CVE-2024-7557,0,0,ae8c41f4adb3726b27116f90c8ab746ad0ea79736dd5450dde42c0320a002e78,2024-09-18T07:15:04.293000 CVE-2024-7559,0,0,4dc25ec2b0f2eec8919ecc81f209446d933d662f72b02d2630c82c602d53e698,2024-08-23T16:18:28.547000 @@ -262723,7 +262726,7 @@ CVE-2024-7585,0,0,c8cbc83b6349dead88df56624342a371a1668d621fa6cda31e8fc0e9835fc3 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 -CVE-2024-7591,0,1,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000 +CVE-2024-7591,0,0,9bcedc7acbbd809dd6a6f1ce5b15338605c84badc4e03df5409c4faa7e372fa9,2024-09-19T18:19:12.210000 CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000 CVE-2024-7593,0,0,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000 CVE-2024-7599,0,0,425c886d21e000ef875307fcd7ee082e5b24e31594a14a2fc6a0c956123982af,2024-09-06T16:46:26.830000 @@ -262743,7 +262746,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 -CVE-2024-7618,0,1,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00 +CVE-2024-7618,0,0,e379ad82065f512d4128a18f1f44cca9c9ed5e25a8aa7122c36d82acf515d6a2,2024-09-19T18:20:00 CVE-2024-7619,0,0,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000 CVE-2024-7620,0,0,2469206363fd07a16a5de81f046bd6f1d56a8441f8330f436267f4dce05a3b0c,2024-09-09T13:03:38.303000 CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000 @@ -262775,7 +262778,7 @@ CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000 CVE-2024-7652,0,0,c7f694e385002b920efe17a183ba7538023c7cf88dd53a372f2912343dfa2405,2024-09-09T13:03:38.303000 CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000 -CVE-2024-7655,0,1,0e49c78835c3c35a884c75ee847ab7ab55175fc03260920848d00a05b510db96,2024-09-19T18:20:53.617000 +CVE-2024-7655,0,0,0e49c78835c3c35a884c75ee847ab7ab55175fc03260920848d00a05b510db96,2024-09-19T18:20:53.617000 CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000 CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000 CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 @@ -262932,7 +262935,7 @@ CVE-2024-7870,0,0,4141f264a23149fdea486ca620816f1c3f41138cabf6c23297e955fee3254f CVE-2024-7871,0,0,d47ede6ca23d1578a9b705a8257da890832c1e69392e6414a190c6fb054ce14f,2024-09-04T17:34:14.630000 CVE-2024-7873,0,0,f5b47e1fae6843a68da1453efc0beadae64e0f4319f9390c480de261438a8dd5,2024-09-17T13:15:04.003000 CVE-2024-7884,0,0,785c516d1dabe55fa31f7695706ba6a05f994a8f8d63c46081a0777ad4e173ab,2024-09-12T20:47:13.387000 -CVE-2024-7885,0,0,8ccead187965a5f1c2abb39b48c133d9f576a21859dc9731309caf892f9de5e4,2024-09-09T23:15:10.350000 +CVE-2024-7885,0,1,b180edc3f841635966345269d0abc3580da7735701efbdcde3f656f6bc9ddf46,2024-09-19T20:15:07.410000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 CVE-2024-7888,0,0,2881b53b5410d8b7f634ff84d81ce7bcb024ba75858c366b9280d55d99841e21,2024-09-13T14:06:04.777000 @@ -263196,7 +263199,7 @@ CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de CVE-2024-8297,0,0,cc2df51be4ac5261775d9a448c17018496059825966f6585d5dfd052f6e898fe,2024-08-30T15:28:50.863000 CVE-2024-8298,0,0,b6e0265f7e06064f96a4b1454f4843c935b76c78438dc3aea3b160aebd5f455b,2024-09-06T14:53:06.890000 CVE-2024-8301,0,0,517ca402c22af2219c7d5e72c26f25471bc06be609f1fc004544a29726452fb8,2024-08-30T15:24:09.830000 -CVE-2024-8302,0,0,73573fb95f4db9829ae46e4068d229d908324e137e6241c89a1030ab338e0051,2024-08-30T13:00:05.390000 +CVE-2024-8302,0,1,e8302268b823029df660336594addee00302ff9a5d73561baeea3f2fb742c200,2024-09-19T21:55:54.683000 CVE-2024-8303,0,0,7d291660edacb98ef58ef33c4f7785c68c1ad74e546b2f9d99bc765dad9ef6ed,2024-08-30T13:00:05.390000 CVE-2024-8304,0,0,85b305b2398367dad597d38ceb56cadd779bad44eaa5caa6e4c63c6b9d707691,2024-09-19T17:39:46.687000 CVE-2024-8306,0,0,8e0a05cb4cc1d2892722cafe041f9325413c92ba2fea525dcf4a3adbe1e3e801,2024-09-18T19:51:14.850000 @@ -263269,7 +263272,7 @@ CVE-2024-8413,0,0,c7339b673131014f9dfb6c78c5b0192adccb852147a0c7cbd0ff5fa07a7854 CVE-2024-8414,0,0,40169a23a4033486754844c64fbfe06d703efd0c5e76953cc0d7fdb87952af16,2024-09-06T16:44:04.583000 CVE-2024-8415,0,0,ab2184731c9f97a955dc07eba7cdff71ad9ccc33249e750d3db8dd063bdd30fc,2024-09-06T16:40:06.120000 CVE-2024-8416,0,0,135a04ecfe4373dd7e99d043d76128d31e33f9197f002be9000b3ee4a6fb8417,2024-09-06T16:38:44.053000 -CVE-2024-8417,0,1,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000 +CVE-2024-8417,0,0,8580cbd844a53cf335c90d7b0b427ee4c081c6060c525d72a654406a58e7a040,2024-09-19T19:53:12.383000 CVE-2024-8418,0,0,45db7c5e32209561e336e52f972f2bde6e59f6364560666284054dcf874b8fe1,2024-09-17T20:15:06.710000 CVE-2024-8427,0,0,57dcbf97b68dfdac544ef9faf52bed3587edeaacde16f067da96879677802837,2024-09-11T17:41:18.733000 CVE-2024-8428,0,0,d38eeb7d0c97ad7b1cddb799376a1380930df039d2cf833bc9165ae4323bcbef,2024-09-06T16:46:26.830000 @@ -263378,7 +263381,7 @@ CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490dae CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000 CVE-2024-8695,0,0,52bc6b8b60aae6c315837e4eb131cf540e2b445dfd9cef8ca664c148d103d584,2024-09-13T16:01:31.340000 CVE-2024-8696,0,0,3ba62a921109450e540b318e77e86831bda9c658513319d0aed77dfa516028ff,2024-09-13T16:01:22.410000 -CVE-2024-8698,0,0,c0d35a3336e4f52767b135ff04ba45500c7dcae9cd5d2fa662eee7f90410608f,2024-09-19T16:15:06.177000 +CVE-2024-8698,0,1,57a50d1b448574a1d6821c44ecd8389a2da97b4c787b5f2a0c2f40af59c885a7,2024-09-19T20:15:07.560000 CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000 CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000 CVE-2024-8707,0,0,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000 @@ -263428,7 +263431,7 @@ CVE-2024-8869,0,0,b189f35b5a28c07852ca6d00280a8a46d906bab51b4d56357a90dd535f0651 CVE-2024-8875,0,0,0e9f0f93ae52ceba12c10384b7bbc3067de71e5c05493a69fd2a253e00e4d595,2024-09-16T15:30:28.733000 CVE-2024-8876,0,0,addb0b44112b1a235842444519e6fae7cff8dfa26076fe63459831c9d856ee31,2024-09-16T15:30:28.733000 CVE-2024-8880,0,0,c70f0c1183e8c3d27f59a30fcb8fb19e438cfaca91533ac680f84142f408d715,2024-09-16T15:30:28.733000 -CVE-2024-8883,0,0,0f1b63aa77f8575956d79a906cb024f514d666d4a8c9ffedf8d766e5d9bb5bf7,2024-09-19T16:15:06.403000 +CVE-2024-8883,0,1,a0be9b5da5d215b8fc392d3c8a617ce7263ca56781c3f2afcdacabf77294a182,2024-09-19T20:15:07.687000 CVE-2024-8887,0,0,3a4ee8c7c72402467690a1d5baf4ee46122c1a9bd1979c36a47f557846bba5ff,2024-09-18T11:15:10.530000 CVE-2024-8888,0,0,1e74f6eae96ea2bc3e4d1e807f25808d32b7d4278014e4cabc70fec925ff3214,2024-09-18T12:15:03.520000 CVE-2024-8889,0,0,d14885671be48487e73dc26a56497c68dd08124696a268e049900425bd24a291,2024-09-18T12:15:03.710000 @@ -263453,6 +263456,9 @@ CVE-2024-8949,0,0,558b0f2a15aa10d0215f6e776b245d8a42240ea8527c9ffd4d56905704832d CVE-2024-8951,0,0,fdcc8f1ef8d6875cdf064fe8ca72ee0e4237f3f89d53a358120e1931bee39aef,2024-09-17T20:15:07.020000 CVE-2024-8956,0,0,8fb796f1e52be7bf3f012ac38934615fcbd07a654b11f2c40ea225bc31651e57,2024-09-17T20:15:07.287000 CVE-2024-8957,0,0,745e7f02f1c26d5de4df67e0c2795340d562588c5301af2d060cb965e1ba5dae,2024-09-17T21:15:13.423000 -CVE-2024-8963,1,1,bad5e8de51e4d1a286774f7d07084658a354cb4de050dbe04254efc089204dfb,2024-09-19T18:15:10.600000 +CVE-2024-8963,0,0,bad5e8de51e4d1a286774f7d07084658a354cb4de050dbe04254efc089204dfb,2024-09-19T18:15:10.600000 CVE-2024-8969,0,0,b91ca645bf2071dccf15db49fd3efa26a97008959fe8a964028e51af15b02de3,2024-09-18T07:15:04.657000 CVE-2024-8986,0,0,26509263613f6b019d61b82311e5933cc6dfa31601ff6ae6235d1951248ed56c,2024-09-19T11:15:10.913000 +CVE-2024-9001,1,1,0d8d90841bb39ddd316a3b0f07a2238c63d1c3d63bb40bbe9e637e97326eb595,2024-09-19T20:15:07.810000 +CVE-2024-9003,1,1,a7edb4b1e5aaa5d75db10253bc650df7937e844fac757479d623a505ae81903c,2024-09-19T21:15:16.143000 +CVE-2024-9004,1,1,fa45f62c4f8208914b8b10a2adf7a01880d466c20d27c0e44bd9dc0f676ce217,2024-09-19T21:15:16.383000