From f501e156eecddc26efc40a663f8a9b548420e9d6 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 12 Sep 2024 16:03:31 +0000 Subject: [PATCH] Auto-Update: 2024-09-12T16:00:32.041579+00:00 --- CVE-1999/CVE-1999-00xx/CVE-1999-0038.json | 34 +- CVE-2021/CVE-2021-225xx/CVE-2021-22509.json | 58 ++- CVE-2021/CVE-2021-225xx/CVE-2021-22529.json | 57 ++- CVE-2021/CVE-2021-381xx/CVE-2021-38122.json | 57 ++- CVE-2022/CVE-2022-35xx/CVE-2022-3556.json | 54 ++- CVE-2022/CVE-2022-383xx/CVE-2022-38382.json | 60 ++- CVE-2022/CVE-2022-45xx/CVE-2022-4529.json | 44 +- CVE-2022/CVE-2022-489xx/CVE-2022-48901.json | 111 ++++- CVE-2022/CVE-2022-489xx/CVE-2022-48902.json | 111 ++++- CVE-2023/CVE-2023-378xx/CVE-2023-37831.json | 14 +- CVE-2023/CVE-2023-388xx/CVE-2023-38845.json | 14 +- CVE-2023/CVE-2023-388xx/CVE-2023-38846.json | 14 +- CVE-2023/CVE-2023-388xx/CVE-2023-38847.json | 14 +- CVE-2023/CVE-2023-388xx/CVE-2023-38848.json | 14 +- CVE-2023/CVE-2023-433xx/CVE-2023-43352.json | 14 +- CVE-2023/CVE-2023-447xx/CVE-2023-44794.json | 14 +- CVE-2023/CVE-2023-458xx/CVE-2023-45867.json | 14 +- CVE-2023/CVE-2023-462xx/CVE-2023-46277.json | 14 +- CVE-2023/CVE-2023-463xx/CVE-2023-46393.json | 14 +- CVE-2023/CVE-2023-465xx/CVE-2023-46509.json | 14 +- CVE-2023/CVE-2023-465xx/CVE-2023-46510.json | 14 +- CVE-2023/CVE-2023-529xx/CVE-2023-52908.json | 77 +++- CVE-2023/CVE-2023-529xx/CVE-2023-52909.json | 95 ++++- CVE-2023/CVE-2023-529xx/CVE-2023-52910.json | 97 ++++- CVE-2023/CVE-2023-529xx/CVE-2023-52911.json | 99 ++++- CVE-2023/CVE-2023-529xx/CVE-2023-52912.json | 84 +++- CVE-2023/CVE-2023-529xx/CVE-2023-52913.json | 92 ++++- CVE-2023/CVE-2023-529xx/CVE-2023-52914.json | 85 +++- CVE-2023/CVE-2023-56xx/CVE-2023-5654.json | 14 +- CVE-2023/CVE-2023-56xx/CVE-2023-5671.json | 14 +- CVE-2023/CVE-2023-57xx/CVE-2023-5739.json | 34 +- CVE-2024/CVE-2024-213xx/CVE-2024-21302.json | 130 +++++- CVE-2024/CVE-2024-237xx/CVE-2024-23716.json | 39 +- CVE-2024/CVE-2024-271xx/CVE-2024-27114.json | 30 +- CVE-2024/CVE-2024-289xx/CVE-2024-28990.json | 60 +++ CVE-2024/CVE-2024-289xx/CVE-2024-28991.json | 60 +++ CVE-2024/CVE-2024-313xx/CVE-2024-31336.json | 39 +- CVE-2024/CVE-2024-31xx/CVE-2024-3163.json | 39 +- CVE-2024/CVE-2024-330xx/CVE-2024-33005.json | 351 +++++++++++++++- CVE-2024/CVE-2024-341xx/CVE-2024-34128.json | 33 +- CVE-2024/CVE-2024-373xx/CVE-2024-37397.json | 36 +- CVE-2024/CVE-2024-382xx/CVE-2024-38202.json | 89 +++- CVE-2024/CVE-2024-404xx/CVE-2024-40457.json | 32 ++ CVE-2024/CVE-2024-406xx/CVE-2024-40650.json | 39 +- CVE-2024/CVE-2024-410xx/CVE-2024-41012.json | 172 +++++++- CVE-2024/CVE-2024-411xx/CVE-2024-41173.json | 44 +- CVE-2024/CVE-2024-411xx/CVE-2024-41174.json | 66 ++- CVE-2024/CVE-2024-411xx/CVE-2024-41175.json | 39 +- CVE-2024/CVE-2024-411xx/CVE-2024-41176.json | 68 ++- CVE-2024/CVE-2024-418xx/CVE-2024-41839.json | 67 ++- CVE-2024/CVE-2024-424xx/CVE-2024-42483.json | 60 +++ CVE-2024/CVE-2024-424xx/CVE-2024-42484.json | 60 +++ CVE-2024/CVE-2024-430xx/CVE-2024-43040.json | 39 +- CVE-2024/CVE-2024-432xx/CVE-2024-43214.json | 47 ++- CVE-2024/CVE-2024-449xx/CVE-2024-44938.json | 86 +++- CVE-2024/CVE-2024-449xx/CVE-2024-44940.json | 86 +++- CVE-2024/CVE-2024-456xx/CVE-2024-45624.json | 39 +- CVE-2024/CVE-2024-458xx/CVE-2024-45823.json | 100 +++++ CVE-2024/CVE-2024-458xx/CVE-2024-45824.json | 100 +++++ CVE-2024/CVE-2024-458xx/CVE-2024-45825.json | 100 +++++ CVE-2024/CVE-2024-458xx/CVE-2024-45826.json | 100 +++++ CVE-2024/CVE-2024-45xx/CVE-2024-4554.json | 62 ++- CVE-2024/CVE-2024-45xx/CVE-2024-4555.json | 64 ++- CVE-2024/CVE-2024-45xx/CVE-2024-4556.json | 62 ++- CVE-2024/CVE-2024-64xx/CVE-2024-6449.json | 64 ++- CVE-2024/CVE-2024-64xx/CVE-2024-6450.json | 64 ++- CVE-2024/CVE-2024-65xx/CVE-2024-6510.json | 64 +++ CVE-2024/CVE-2024-66xx/CVE-2024-6658.json | 56 +++ CVE-2024/CVE-2024-67xx/CVE-2024-6700.json | 56 +++ CVE-2024/CVE-2024-67xx/CVE-2024-6701.json | 56 +++ CVE-2024/CVE-2024-67xx/CVE-2024-6702.json | 56 +++ CVE-2024/CVE-2024-69xx/CVE-2024-6929.json | 64 ++- CVE-2024/CVE-2024-76xx/CVE-2024-7605.json | 37 +- CVE-2024/CVE-2024-78xx/CVE-2024-7816.json | 27 +- CVE-2024/CVE-2024-78xx/CVE-2024-7817.json | 39 +- CVE-2024/CVE-2024-78xx/CVE-2024-7818.json | 39 +- CVE-2024/CVE-2024-78xx/CVE-2024-7820.json | 39 +- CVE-2024/CVE-2024-78xx/CVE-2024-7822.json | 39 +- CVE-2024/CVE-2024-78xx/CVE-2024-7859.json | 39 +- CVE-2024/CVE-2024-78xx/CVE-2024-7860.json | 39 +- CVE-2024/CVE-2024-78xx/CVE-2024-7861.json | 39 +- CVE-2024/CVE-2024-78xx/CVE-2024-7862.json | 39 +- CVE-2024/CVE-2024-80xx/CVE-2024-8054.json | 39 +- CVE-2024/CVE-2024-85xx/CVE-2024-8504.json | 27 +- CVE-2024/CVE-2024-87xx/CVE-2024-8707.json | 4 +- README.md | 99 ++--- _state.csv | 436 ++++++++++---------- 87 files changed, 4839 insertions(+), 505 deletions(-) create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28990.json create mode 100644 CVE-2024/CVE-2024-289xx/CVE-2024-28991.json create mode 100644 CVE-2024/CVE-2024-404xx/CVE-2024-40457.json create mode 100644 CVE-2024/CVE-2024-424xx/CVE-2024-42483.json create mode 100644 CVE-2024/CVE-2024-424xx/CVE-2024-42484.json create mode 100644 CVE-2024/CVE-2024-458xx/CVE-2024-45823.json create mode 100644 CVE-2024/CVE-2024-458xx/CVE-2024-45824.json create mode 100644 CVE-2024/CVE-2024-458xx/CVE-2024-45825.json create mode 100644 CVE-2024/CVE-2024-458xx/CVE-2024-45826.json create mode 100644 CVE-2024/CVE-2024-65xx/CVE-2024-6510.json create mode 100644 CVE-2024/CVE-2024-66xx/CVE-2024-6658.json create mode 100644 CVE-2024/CVE-2024-67xx/CVE-2024-6700.json create mode 100644 CVE-2024/CVE-2024-67xx/CVE-2024-6701.json create mode 100644 CVE-2024/CVE-2024-67xx/CVE-2024-6702.json diff --git a/CVE-1999/CVE-1999-00xx/CVE-1999-0038.json b/CVE-1999/CVE-1999-00xx/CVE-1999-0038.json index 3f1ef9c9edb..7f9a03937ed 100644 --- a/CVE-1999/CVE-1999-00xx/CVE-1999-0038.json +++ b/CVE-1999/CVE-1999-00xx/CVE-1999-0038.json @@ -2,7 +2,7 @@ "id": "CVE-1999-0038", "sourceIdentifier": "cve@mitre.org", "published": "1997-04-26T04:00:00.000", - "lastModified": "2022-08-17T07:15:09.050", + "lastModified": "2024-09-12T15:35:31.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -12,6 +12,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -48,6 +70,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-225xx/CVE-2021-22509.json b/CVE-2021/CVE-2021-225xx/CVE-2021-22509.json index 0078c0162ec..31cb17bf5cb 100644 --- a/CVE-2021/CVE-2021-225xx/CVE-2021-22509.json +++ b/CVE-2021/CVE-2021-225xx/CVE-2021-22509.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22509", "sourceIdentifier": "security@opentext.com", "published": "2024-08-28T07:15:04.753", - "lastModified": "2024-08-28T12:57:27.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:22:30.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:netiq_advance_authentication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.5.1", + "matchCriteriaId": "B37C4B8A-B724-4C7C-98E6-9BE7B476BBCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-225xx/CVE-2021-22529.json b/CVE-2021/CVE-2021-225xx/CVE-2021-22529.json index 37a092f10f3..528ae1f7c09 100644 --- a/CVE-2021/CVE-2021-225xx/CVE-2021-22529.json +++ b/CVE-2021/CVE-2021-225xx/CVE-2021-22529.json @@ -2,8 +2,8 @@ "id": "CVE-2021-22529", "sourceIdentifier": "security@opentext.com", "published": "2024-08-28T07:15:06.223", - "lastModified": "2024-08-28T12:57:27.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:55:31.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:netiq_advance_authentication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.5.1", + "matchCriteriaId": "B37C4B8A-B724-4C7C-98E6-9BE7B476BBCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-381xx/CVE-2021-38122.json b/CVE-2021/CVE-2021-381xx/CVE-2021-38122.json index 8967674d586..4760d9c2167 100644 --- a/CVE-2021/CVE-2021-381xx/CVE-2021-38122.json +++ b/CVE-2021/CVE-2021-381xx/CVE-2021-38122.json @@ -2,8 +2,8 @@ "id": "CVE-2021-38122", "sourceIdentifier": "security@opentext.com", "published": "2024-08-28T07:15:08.300", - "lastModified": "2024-08-28T12:57:17.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:05:51.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:opentext:netiq_advance_authentication:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.3.5.1", + "matchCriteriaId": "B37C4B8A-B724-4C7C-98E6-9BE7B476BBCB" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.netiq.com/documentation/advanced-authentication-63/advanced-authentication-releasenotes-6351/data/advanced-authentication-releasenotes-6351.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-35xx/CVE-2022-3556.json b/CVE-2022/CVE-2022-35xx/CVE-2022-3556.json index 60060c3a517..386413c0ca2 100644 --- a/CVE-2022/CVE-2022-35xx/CVE-2022-3556.json +++ b/CVE-2022/CVE-2022-35xx/CVE-2022-3556.json @@ -2,8 +2,8 @@ "id": "CVE-2022-3556", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T11:15:11.853", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-12T14:30:58.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kanev:cab_fare_calculator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.6", + "matchCriteriaId": "68570211-08DD-4117-82F8-F231D8815536" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/cab-fare-calculator/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/219de193-32d0-40b0-a471-bf8bf6e2bb62?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json b/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json index 65dac124763..1aac814c929 100644 --- a/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json +++ b/CVE-2022/CVE-2022-383xx/CVE-2022-38382.json @@ -2,8 +2,8 @@ "id": "CVE-2022-38382", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-13T02:15:04.730", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:37:51.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + }, { "source": "psirt@us.ibm.com", "type": "Secondary", @@ -51,14 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0.0", + "versionEndIncluding": "1.10.11.0", + "matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.12.0", + "versionEndIncluding": "1.10.23.0", + "matchCriteriaId": "681CAB61-9525-422C-91F5-10AAEC7BC1BD" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/233672", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7165286", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-45xx/CVE-2022-4529.json b/CVE-2022/CVE-2022-45xx/CVE-2022-4529.json index fe5cf6d85e8..2c2ffc62cde 100644 --- a/CVE-2022/CVE-2022-45xx/CVE-2022-4529.json +++ b/CVE-2022/CVE-2022-45xx/CVE-2022-4529.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4529", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T11:15:12.147", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-12T14:29:03.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:msoftplugins:security_antivirus_firewall:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3.5", + "matchCriteriaId": "5798AD71-3560-4419-8FC4-02650DE38A8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/security-antivirus-firewall/trunk/includes/wptsafEnv.php#L68", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd177a43-6059-4125-9408-1090b9a54117?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48901.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48901.json index 115634cfe00..dcabed25e4a 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48901.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48901.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48901", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:04.733", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:05:35.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,118 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: btrfs: no inicie la reubicaci\u00f3n hasta que se completen las ca\u00eddas en progreso. Nos topamos con un error con una reubicaci\u00f3n de recuperaci\u00f3n en el montaje para uno de nuestros sistemas de archivos en producci\u00f3n. Reproduje esto localmente inyectando errores en la eliminaci\u00f3n de instant\u00e1neas con el saldo ejecut\u00e1ndose al mismo tiempo. Esto se present\u00f3 como un error al buscar un elemento de extensi\u00f3n ADVERTENCIA: CPU: 5 PID: 1501 en fs/btrfs/extent-tree.c:866 lookup_inline_extent_backref+0x647/0x680 CPU: 5 PID: 1501 Comm: btrfs-balance No contaminado 5.16 .0-rc8+ #8 RIP: 0010:lookup_inline_extent_backref+0x647/0x680 RSP: 0018:ffffae0a023ab960 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0000000000000000 RCX: 000000000000000 RDX: 0000000000000000 RSI: 000000000000000c RDI: 0000000000000000 RBP: ffff943fd2a39b60 R08: 0000000000000000 R09: 000000000001 R10: 0001434088152de0 R11: 0000000000000000 R12: 0000000001d05000 R13: ffff943fd2a39b60 R14: ffff943fdb96f2a0 R15: ffff9442fc923000 FS: 000000000000000(0000) GS:ffff944e9eb40000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 3: 000000010f092000 CR4: 0000000000350ee0 Seguimiento de llamadas: insert_inline_extent_backref+0x46/0xd0 __btrfs_inc_extent_ref.isra.0+0x5f/0x200 ? btrfs_merge_delayed_refs+0x164/0x190 __btrfs_run_delayed_refs+0x561/0xfa0 ? btrfs_search_slot+0x7b4/0xb30? btrfs_update_root+0x1a9/0x2c0 btrfs_run_delayed_refs+0x73/0x1f0 ? btrfs_update_root+0x1a9/0x2c0 btrfs_commit_transaction+0x50/0xa50 ? btrfs_update_reloc_root+0x122/0x220 prepare_to_merge+0x29f/0x320 relocate_block_group+0x2b8/0x550 btrfs_relocate_block_group+0x1a6/0x350 btrfs_relocate_chunk+0x27/0xe0 btrfs_balance+0x777/0xe60 balance_kthread+0x35/0x50? btrfs_balance+0xe60/0xe60 kthread+0x16b/0x190 ? set_kthread_struct+0x40/0x40 ret_from_fork+0x22/0x30 Normalmente, fs_info->cleaner_mutex excluye la ejecuci\u00f3n simult\u00e1nea de la eliminaci\u00f3n y reubicaci\u00f3n de instant\u00e1neas. Sin embargo, si tuvi\u00e9ramos un saldo pendiente esperando obtener ->cleaner_mutex, y se estuviera ejecutando una eliminaci\u00f3n de instant\u00e1nea y luego el cuadro fallara, llegar\u00edamos a un estado en el que tendr\u00edamos una instant\u00e1nea medio eliminada. Nuevamente, en el caso normal, la eliminaci\u00f3n de la instant\u00e1nea debe completarse antes de que pueda comenzar la reubicaci\u00f3n, pero en este caso la reubicaci\u00f3n podr\u00eda muy bien comenzar antes de que se complete la eliminaci\u00f3n de la instant\u00e1nea, ya que simplemente agregamos la ra\u00edz a la lista de ra\u00edces muertas y esperamos la pr\u00f3xima vez que se complete la eliminaci\u00f3n de la instant\u00e1nea. El limpiador se ejecuta para limpiar la instant\u00e1nea. Solucione este problema configurando un bit en fs_info si tenemos alg\u00fan DEAD_ROOT que tenga una clave drop_progress pendiente. Si lo hacen, entonces sabremos que est\u00e1bamos en medio de la operaci\u00f3n de colocaci\u00f3n y configuramos una bandera en fs_info. Luego, el saldo puede esperar hasta que se borre esta bandera para comenzar nuevamente. Si hay DEAD_ROOT que no tienen drop_progress configurado, entonces podemos comenzar a equilibrar de inmediato, ya que estaremos protegidos adecuadamente por clean_mutex." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.27", + "matchCriteriaId": "A48510A0-1C49-4D24-BB6E-AC9B5F1C4DFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.13", + "matchCriteriaId": "B871B667-EDC0-435D-909E-E918D8D90995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", + "matchCriteriaId": "B2D2677C-5389-4AE9-869D-0F881E80D923" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", + "matchCriteriaId": "EFA3917C-C322-4D92-912D-ECE45B2E7416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", + "matchCriteriaId": "BED18363-5ABC-4639-8BBA-68E771E5BB3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5e70bc827b563caf22e1203428cc3719643de5aa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6599d5e8bd758d897fd2ef4dc388ae50278b1f7e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b4be6aefa73c9a6899ef3ba9c5faaa8a66e333ef", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-489xx/CVE-2022-48902.json b/CVE-2022/CVE-2022-489xx/CVE-2022-48902.json index 99bb050f9cf..9a39efa32de 100644 --- a/CVE-2022/CVE-2022-489xx/CVE-2022-48902.json +++ b/CVE-2022/CVE-2022-489xx/CVE-2022-48902.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48902", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-22T02:15:04.807", - "lastModified": "2024-08-22T12:48:02.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:01:44.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,118 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: btrfs: no haga WARN_ON() si tenemos configurado PageError. Siempre que realizamos operaciones de b\u00fafer de extensi\u00f3n, llamamos a afirmar_eb_page_uptodate() para quejarnos en voz alta si estamos operando en una p\u00e1gina no actualizada. Nuestras pruebas nocturnas detectaron esta advertencia a principios de esta semana ADVERTENCIA: CPU: 1 PID: 553508 en fs/btrfs/extent_io.c:6849 afirmar_eb_page_uptodate+0x3f/0x50 CPU: 1 PID: 553508 Comm: kworker/u4:13 Tainted: GW 5.17. 0-rc3+ #564 Nombre de hardware: PC est\u00e1ndar QEMU (Q35 + ICH9, 2009), BIOS 1.13.0-2.fc32 01/04/2014 Cola de trabajo: btrfs-cache btrfs_work_helper RIP: 0010:assert_eb_page_uptodate+0x3f/0x50 RSP: 0018 :ffffa961440a7c68 EFLAGS: 00010246 RAX: 0017ffffc0002112 RBX: ffffe6e74453f9c0 RCX: 00000000000001000 RDX: ffffe6e74467c887 RSI: ffffe6e74453f9c0 ffff8d4c5efc2fc0 RBP: 0000000000000d56 R08: ffff8d4d4a224000 R09: 0000000000000000 R10: 00015817fa9d1ef0 R11: 000000000000000c R12: 000000007b1 R13: ffff8d4c5efc2fc0 R14: 0000000001500000 R15: 0000000001cb1000 FS: 0000000000000000(0000) GS:ffff8d4dbbd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 448d8 CR3: 0000000118be8004 CR4: 0000000000370ee0 Seguimiento de llamadas: extend_buffer_test_bit+0x3f/0x70 free_space_test_bit+0xa6/0xc0 load_free_space_tree +0x1f6/0x470 caching_thread+0x454/0x630 ? rcu_read_lock_sched_held+0x12/0x60? rcu_read_lock_sched_held+0x12/0x60? rcu_read_lock_sched_held+0x12/0x60? lock_release+0x1f0/0x2d0 btrfs_work_helper+0xf2/0x3e0 ? lock_release+0x1f0/0x2d0? terminar_task_switch.isra.0+0xf9/0x3a0 proceso_one_work+0x26d/0x580 ? proceso_one_work+0x580/0x580 trabajador_thread+0x55/0x3b0? proceso_one_work+0x580/0x580 kthread+0xf0/0x120 ? kthread_complete_and_exit+0x20/0x20 ret_from_fork+0x1f/0x30 Esto fue solucionado parcialmente por c2e39305299f01 (\"btrfs: borrar la actualizaci\u00f3n del b\u00fafer de extensi\u00f3n cuando no logramos escribirlo\"), sin embargo, todo lo que esa soluci\u00f3n hizo fue evitar que encontr\u00e1ramos b\u00faferes de extensi\u00f3n despu\u00e9s de una escritura fallida. Eso no nos impidi\u00f3 seguir usando un b\u00fafer que ya hab\u00edamos encontrado. En este caso, estamos buscando la ra\u00edz de confirmaci\u00f3n para almacenar en cach\u00e9 el grupo de bloques, de modo que podamos comenzar a confirmar la transacci\u00f3n, cambiar la ra\u00edz de confirmaci\u00f3n y luego comenzar a escribir. Despu\u00e9s del cambio, podemos buscar un b\u00fafer de extensi\u00f3n que a\u00fan no se ha escrito y comenzar a procesar ese grupo de bloques. Luego no escribimos ese bloqueo y borramos Actualizar en la p\u00e1gina, y luego comenzamos a arrojar estos errores. Normalmente aqu\u00ed estamos protegidos hasta cierto punto por el candado del \u00e1rbol. Si leemos un bloque, tenemos la lectura del bloque bloqueada y evitamos que el escritor bloquee el bloque antes de enviarlo para la escritura. Sin embargo, esto no es necesariamente infalible porque la lectura podr\u00eda ocurrir antes de submit_bio y despu\u00e9s de bloquear y desbloquear el b\u00fafer de extensi\u00f3n. Tambi\u00e9n en este caso particular tenemos configurado path->skip_locking, por lo que eso no nos salvar\u00e1 aqu\u00ed. Simplemente obtendremos un bloque que era v\u00e1lido cuando lo le\u00edmos, pero dej\u00f3 de ser v\u00e1lido mientras lo us\u00e1bamos. Lo que realmente queremos es detectar el caso en el que hemos \"le\u00eddo\" un bloque pero no est\u00e1 marcado como Actualizado. Al leer, usamos ClearPageError(), por lo que si estamos !Uptodate y !Error sabremos que no hicimos lo correcto al leer la p\u00e1gina. Solucione esto marcando !Uptodate && !Error, de esta manera no nos quejaremos si nuestro b\u00fafer se invalida mientras lo estamos usando, y mantendremos el esp\u00edritu de la verificaci\u00f3n, que es asegurarnos de que tengamos un cach\u00e9 completo. bloquear mientras estamos jugando con \u00e9l." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.15.27", + "matchCriteriaId": "A48510A0-1C49-4D24-BB6E-AC9B5F1C4DFD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "5.16.13", + "matchCriteriaId": "B871B667-EDC0-435D-909E-E918D8D90995" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7BD5F8D9-54FA-4CB0-B4F0-CB0471FDDB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*", + "matchCriteriaId": "E6E34B23-78B4-4516-9BD8-61B33F4AC49A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc3:*:*:*:*:*:*", + "matchCriteriaId": "C030FA3D-03F4-4FB9-9DBF-D08E5CAC51AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc4:*:*:*:*:*:*", + "matchCriteriaId": "B2D2677C-5389-4AE9-869D-0F881E80D923" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc5:*:*:*:*:*:*", + "matchCriteriaId": "EFA3917C-C322-4D92-912D-ECE45B2E7416" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:5.17:rc6:*:*:*:*:*:*", + "matchCriteriaId": "BED18363-5ABC-4639-8BBA-68E771E5BB3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9efcc83b33b576302147634eca9bece8e3737e34", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a50e1fcbc9b85fd4e95b89a75c0884cb032a3e06", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e00077aa439f0e8f416699fa4e9600db6583db70", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37831.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37831.json index d52136e0b31..8f3956a488d 100644 --- a/CVE-2023/CVE-2023-378xx/CVE-2023-37831.json +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37831.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37831", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-31T18:15:08.527", - "lastModified": "2023-11-08T18:00:34.107", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T14:35:05.870", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-204" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38845.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38845.json index 0193241f048..1fe2473bdb7 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38845.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38845.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38845", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T22:15:09.227", - "lastModified": "2023-11-03T16:39:40.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:33.573", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38846.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38846.json index 0a47770d9b7..791fbab95ef 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38846.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38846.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38846", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T22:15:09.290", - "lastModified": "2023-11-03T17:00:05.280", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:34.370", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38847.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38847.json index a1f88889e4d..2d5e7f03660 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38847.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38847.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38847", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T22:15:09.340", - "lastModified": "2023-11-03T17:22:18.760", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:35.200", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-388xx/CVE-2023-38848.json b/CVE-2023/CVE-2023-388xx/CVE-2023-38848.json index a6b7a54d3c1..e18c76dc2a7 100644 --- a/CVE-2023/CVE-2023-388xx/CVE-2023-38848.json +++ b/CVE-2023/CVE-2023-388xx/CVE-2023-38848.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38848", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T22:15:09.383", - "lastModified": "2023-11-03T17:27:41.767", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:36.227", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-433xx/CVE-2023-43352.json b/CVE-2023/CVE-2023-433xx/CVE-2023-43352.json index bdc1212e6d7..4167c91cd7d 100644 --- a/CVE-2023/CVE-2023-433xx/CVE-2023-43352.json +++ b/CVE-2023/CVE-2023-433xx/CVE-2023-43352.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43352", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-26T22:15:08.700", - "lastModified": "2023-11-07T17:23:49.890", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:38.720", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-447xx/CVE-2023-44794.json b/CVE-2023/CVE-2023-447xx/CVE-2023-44794.json index 1aff21d8b89..eb2cd05dd57 100644 --- a/CVE-2023/CVE-2023-447xx/CVE-2023-44794.json +++ b/CVE-2023/CVE-2023-447xx/CVE-2023-44794.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44794", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-25T18:17:32.863", - "lastModified": "2023-10-31T20:08:45.883", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:40.080", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45867.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45867.json index da09dc466fb..c28d9786456 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45867.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45867.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45867", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-26T15:15:08.900", - "lastModified": "2023-11-14T18:34:47.817", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:41.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46277.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46277.json index 029e51f69e9..3e66e8d61d5 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46277.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46277.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46277", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-20T05:15:08.487", - "lastModified": "2023-10-26T17:45:23.253", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:41.900", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-463xx/CVE-2023-46393.json b/CVE-2023/CVE-2023-463xx/CVE-2023-46393.json index adc245dc07d..2991e475e1b 100644 --- a/CVE-2023/CVE-2023-463xx/CVE-2023-46393.json +++ b/CVE-2023/CVE-2023-463xx/CVE-2023-46393.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46393", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-27T14:15:08.567", - "lastModified": "2023-11-07T21:24:28.183", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:42.627", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-460" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46509.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46509.json index 534d5682790..b99ed9d815b 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46509.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46509.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46509", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-27T21:15:09.897", - "lastModified": "2023-10-31T15:24:07.963", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:43.353", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-465xx/CVE-2023-46510.json b/CVE-2023/CVE-2023-465xx/CVE-2023-46510.json index 9c10c486cc0..df9a81abc63 100644 --- a/CVE-2023/CVE-2023-465xx/CVE-2023-46510.json +++ b/CVE-2023/CVE-2023-465xx/CVE-2023-46510.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46510", "sourceIdentifier": "cve@mitre.org", "published": "2023-10-27T21:15:09.947", - "lastModified": "2023-11-08T00:54:34.267", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:44.080", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json index 57e19855c0e..5d844d86eea 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52908.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52908", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.800", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:54:41.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,82 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: corrige una posible desreferencia NULL. Se corrige una posible desreferencia NULL, en el caso de que sea \"man\", el administrador de recursos podr\u00eda ser NULL, cuando/si imprimimos informaci\u00f3n de depuraci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.9", + "versionEndExcluding": "6.1", + "matchCriteriaId": "28CC5A62-2D03-429C-A726-BF09788C85CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1.5", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "43DB50CE-32DB-4D33-9568-7E0E5EA53986" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0be7ed8e7eb15282b5d0f6fdfea884db594ea9bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/f2faf0699af78968a27ca154bf76e94247f8c471", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json index adebce07994..3717e33321c 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52909.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52909", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.857", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:52:54.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,104 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: corrige el manejo de archivos abiertos almacenados en cach\u00e9 en la ruta de c\u00f3digo nfsd4_open el commit fb70bf124b05 (\"NFSD: crear una instancia de un archivo de estructura al crear un archivo NFSv4 normal\") agreg\u00f3 la capacidad de almacenar en cach\u00e9 un fd abierto sobre un compuesto. Hay un par de problemas con la forma en que esto funciona actualmente: Es picante, ya que un nfsd_file reci\u00e9n creado puede terminar con su bit PENDIENTE borrado mientras el nf tiene hash, y el puntero nf_file todav\u00eda est\u00e1 puesto a cero. Otras tareas pueden encontrarlo en este estado y esperan ver un nf_file v\u00e1lido, y pueden ir si nf_file es NULL. Adem\u00e1s, no hay garant\u00eda de que terminemos creando un nuevo nfsd_file si ya hay uno en el hash. Si una entrada existente est\u00e1 en el hash con un nf_file v\u00e1lido, nfs4_get_vfs_file golpear\u00e1 su puntero nf_file con el valor de op_file y el antiguo nf_file se filtrar\u00e1. Solucione ambos problemas creando una nueva variante nfsd_file_acquirei_opened que toma un puntero de archivo opcional. Si hay uno presente cuando se llama, tomaremos una nueva referencia en lugar de intentar abrir el archivo. Si el nfsd_file ya tiene un nf_file v\u00e1lido, simplemente ignoraremos el archivo opcional y devolveremos el nfsd_file tal como est\u00e1. Tambi\u00e9n vuelva a trabajar un poco los puntos de seguimiento para permitir una variante \"abierta\" y no intente evitar contar adquisiciones en el caso de que ya tengamos un archivo abierto en cach\u00e9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "A3B4D9E4-9005-47B1-B0C1-FFC9874D6FF6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/0b3a551fa58b4da941efeb209b3770868e2eddd7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0b778361998d6c6356b8d2fc7ddf025fb3224654", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45c08a752982116f3287afcd1bd9c50f4fab0c28", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/973acfdfe90c8a4e58ade97ff0653a498531ff2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json index b20e57f4256..b3dd4cec2bd 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52910.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52910", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.910", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:47:08.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,104 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: iommu/iova: soluciona el problema de desbordamiento de alloc iova. En __alloc_and_insert_iova_range, hay un problema que retry_pfn se desborda. El valor de iovad->anchor.pfn_hi es ~0UL, luego, cuando iovad->cached_node es iovad->anchor, curr_iova->pfn_hi + 1 se desbordar\u00e1. Como resultado, si se ejecuta la l\u00f3gica de reintento, low_pfn se actualiza a 0 y luego new_pfn < low_pfn devuelve falso para que la asignaci\u00f3n sea exitosa. Este problema ocurre en las dos situaciones siguientes: 1. El tama\u00f1o del primer iova excede el tama\u00f1o del dominio. Al inicializar el dominio iova, iovad->cached_node se asigna como iovad->anchor. Por ejemplo, el tama\u00f1o del dominio iova es 10 M, start_pfn es 0x1_F000_0000 y el tama\u00f1o de iova asignado por primera vez es 11 M. La siguiente es la informaci\u00f3n de registro, new->pfn_lo es m\u00e1s peque\u00f1o que iovad->cached_node. Registro de ejemplo como sigue: [ 223.798112][T1705487] sh: [name:iova&]__alloc_and_insert_iova_range start_pfn:0x1f0000,retry_pfn:0x0,size:0xb00,limit_pfn:0x1f0a00 [ 223.799590][T1705487] [nombre:iova&]__alloc_and_insert_iova_range \u00e9xito start_pfn :0x1f0000,new->pfn_lo:0x1efe00,new->pfn_hi:0x1f08ff 2. El nodo con el valor iova->pfn_lo m\u00e1s grande en el dominio iova se elimina, iovad->cached_node se actualizar\u00e1 a iovad->anchor y luego el tama\u00f1o de alloc iova excede el tama\u00f1o m\u00e1ximo de iova que se puede asignar en el dominio. Despu\u00e9s de juzgar que retry_pfn es menor que limit_pfn, llame a retry_pfn+1 para solucionar el problema de desbordamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.89", + "matchCriteriaId": "E706841F-E788-4316-9B05-DA8EB60CE6B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9275C81F-AE96-4CDB-AD20-7DBD36E5D909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/61cbf790e7329ed78877560be7136f0b911bba7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/c929a230c84441e400c32e7b7b4ab763711fb63e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dcdb3ba7e2a8caae7bfefd603bc22fd0ce9a389c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json index b6e86a1c195..5318685516d 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52911.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52911", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:06.967", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:49:30.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,104 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/msm: otra soluci\u00f3n para la GPU Adreno sin cabeza. Se corrigi\u00f3 otro error reproducible al reiniciar la placa con la GPU Adreno funcionando en modo sin cabeza (por ejemplo, plataformas iMX). No se puede manejar la desreferencia del puntero NULL del kernel en la direcci\u00f3n virtual 00000000 cuando se lee [00000000] *pgd=74936831, *pte=00000000, *ppte=00000000 Error interno: Ups: 17 [#1] ARM CPU: 0 PID: 51 Comm: reiniciar Not tainted 6.2.0-rc1-dirty #11 Nombre del hardware: Freescale i.MX53 (soporte de \u00e1rbol de dispositivos) La PC est\u00e1 en msm_atomic_commit_tail+0x50/0x970 LR est\u00e1 en commit_tail+0x9c/0x188 pc: [] lr: [< c067a214>] psr: 600e0013 sp: e0851d30 ip: ee4eb7eb fp: 00090acc r10: 00000058 r9: c2193014 r8: c4310000 r7: c4759380 r6: 07bef61d r5: 00000 r4: 00000000 r3: c44cc440 r2: 00000000 r1: 00000000 r0: 00000000 Banderas: nZCv IRQ en FIQ en Modo SVC_32 ISA ARM Segmento ninguno Control: 10c5387d Tabla: 74910019 DAC: 00000051 Informaci\u00f3n del registro r0: puntero NULL Informaci\u00f3n del registro r1: puntero NULL Informaci\u00f3n del registro r2: puntero NULL Informaci\u00f3n del registro r3: slab kmalloc-1k inicio c44cc400 desplazamiento del puntero 64 tama\u00f1o 1024 Informaci\u00f3n del registro r4: puntero NULL Informaci\u00f3n del registro r5: puntero NULL Informaci\u00f3n del registro r6: memoria no paginada Informaci\u00f3n del registro r7: slab kmalloc-128 inicio c4759380 desplazamiento del puntero 0 tama\u00f1o 128 Informaci\u00f3n del registro r8: slab kmalloc-2k inicio c4310000 desplazamiento del puntero 0 tama\u00f1o 2048 Informaci\u00f3n del registro r9: memoria no slab/vmalloc Informaci\u00f3n del registro r10: memoria no paginada Informaci\u00f3n del registro r11: memoria no paginada Informaci\u00f3n del registro r12: memoria no paginada Reinicio del proceso (pid: 51, l\u00edmite de pila = 0xc80046d9) Pila : (0xe0851d30 a 0xe0852000) 1d20: c4759380 fbd77200 000005ff 002b9c70 1d40: c4759380 c4759380 00000000 07bef61d 00000600 c0d6fe7c 3014 00000058 1d60: 00090acc c067a214 00000000 c4759380 c4310000 00000000 c44cc854 c067a89c 1d80: 00000000 00000000 00000000 c431046 8 00000000 c4759380 c4310000 c4310468 1da0: c4310470 c0643258 c4759380 00000000 00000000 c0c4ee24 00000000 c44cc810 1dc0: 00000000 c0c4ee24 00000000 c44cc810 00000000 0347d2a8 e0851e00 e0851e00 1de0: c4759380 c067ad20 c4310000 00 c44cc810 c27f8718 c44cc854 c067adb8 1e00: c4933000 00000002 00000001 00000000 00000000 c2130850 00000000 c2130854 1e20: c25fc488 00000 c0ff162c 00000000 00000001 00000002 00000000 00000000 1e40: c43102c0 c43102c0 00000000 0347d2a8 c44cc810 c44cc814 c2133da8 c06d1a60 1e60: 00000000 00000000 00079028 c2012f24 fee1dead c4933000 00000058 c01431e4 1e80: 01234567 c0143a20 00000000 000 00000000 00000000 00000000 00000000 1ea0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1ec0: 000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1ee0: 00000000 00000000 00000000 00000000 00000000 0000 00000000 00000000 1f00: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1f20: 00000000 00000000 000000 00000000 00000000 00000000 00000000 00000000 1f40: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000 1f60: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 1f80: 00000000 00000000 00000000 0347d2a 8 00000002 00000004 00000078 00000058 1fa0: c010028c c0100060 00000002 00000004 fee1dead 28121969 01234567 00079028 1fc0: 00000002 00000004 00000078 0000058 0002fdc5 00000000 00000000 00090acc 1fe0: 00000058 becc9c64 b6e97e05 b6e0e5f6 600e0030 fee1dead 00000000 00000000 msm_atomic_commit_tail de commit_tail+ 0x9c/0x188 commit_tail de drm_atomic_helper_commit+0x160/0x188 drm_atomic_helper_commit de drm_atomic_commit+ 0xac/0xe0 drm_atomic_commit de drm_atomic_helper_disable_all+0x1b0/0x1c0 drm_atomic_helper_disable_all de drm_atomic_helper_shutdown+0x88/0x140 drm_atomic_helper_shutdown de device_shutdown+0x16c/0x240 device_shutdown de kernel_restart+0x 38/0x90 kernel_restart desde __do_sys_reboot+0x ---truncado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.19.17", + "versionEndExcluding": "6.0", + "matchCriteriaId": "6817F83D-0EC4-49B2-AAB2-1836D288AE4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0.3", + "versionEndExcluding": "6.1", + "matchCriteriaId": "B25A852D-8667-4C72-9253-EEF71841020B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.1", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "043B7290-EDB8-4ACE-A87A-8FA7D130B565" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/00dd060ab3cf95ca6ede7853bc14397014971b5e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b107b08c41b3076a508113fbaaffe15ce1fe7f65", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json index abd4a756581..4fb313e7be5 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52912.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52912", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:07.020", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:35:58.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,89 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: Se corrigi\u00f3 el error al descargar amdgpu. Se corrigi\u00f3 el error al descargar amdgpu. El mensaje de error es el siguiente: [377.706202] ERROR del kernel en drivers/gpu/drm/drm_buddy.c:278. [ 377.706215] c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] PREEMPT SMP NOPTI [ 377.706222] CPU: 4 PID: 8610 Comm: modprobe Contaminado: G IOE 6.0.0-thomas #1 [ 377.706231] Nombre de hardware: Nombre del producto del sistema ASUS/PRIME Z390 -A, BIOS 2004 02/11/2021 [377.706238] RIP: 0010:drm_buddy_free_block+0x26/0x30 [drm_buddy] [377.706264] C\u00f3digo: 00 00 00 90 0f 1f 44 00 00 48 8b 0e 89 8 25 00 0c 00 00 3d 00 04 00 00 75 10 48 8b 47 18 48 d3 e0 48 01 47 28 e9 fa fe ff ff <0f> 0b 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 41 54 55 48 89 f5 [ 377.706282] RSP : 0018:ffffad2dc4683cb8 EFLAGS: 00010287 [ 377.706289] RAX: 0000000000000000 RBX: ffff8b1743bd5138 RCX: 0000000000000000 [ 377.706297] RDX: ffff8b1743bd5160 RSI: ffff8b1743bd5c78 RDI: ffff8b16d1b25f70 [ 377.706304] RBP: ffff8b1743bd59e0 R08: 0000000000000001 R09: 00000000000000001 [ 377.706311] R10: ffff8b16c8572400 R11 : ffffad2dc4683cf0 R12: ffff8b16d1b25f70 [ 377.706318] R13: ffff8b16d1b25fd0 R14: ffff8b1743bd59c0 R15: ffff8b16d1b25f70 [ 377.706325] FS: 07fec56c72c40(0000) GS:ffff8b1836500000(0000) knlGS:0000000000000000 [ 377.706334] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 377.706340] CR2: 00007f9b88c1ba50 CR3: 0000000110450004 CR4: 00000000003706e0 [ 377.706347] DR0: 0000000000000000 DR1: 00000000000000 00 DR2: 0000000000000000 [ 377.706354] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 377.706361] Seguimiento de llamadas: [ 377.706365] > [ 377.706369 ] drm_buddy_free_list+0x2a/0x60 [drm_buddy] [ 377.706376] amdgpu_vram_mgr_fini+0xea/0x180 [amdgpu] [ 377.706572] amdgpu_ttm_fini+0x12e/0x1a0 [amdgpu] [ 377.706650] dgpu_bo_fini+0x22/0x90 [amdgpu] [ 377.706727] gmc_v11_0_sw_fini+0x26/0x30 [amdgpu] [ 377.706821] amdgpu_device_fini_sw+0xa1/0x3c0 [amdgpu] [ 377.706897] amdgpu_driver_release_kms+0x12/0x30 [amdgpu] [ 377.706975] drm_dev_release+0x20/0x40 [drm] 377.707006] release_nodes+0x35/0xb0 [ 377.707014] devres_release_all+0x8b /0xc0 [ 377.707020] dispositivo_unbind_cleanup+0xe/0x70 [ 377.707027] dispositivo_release_driver_internal+0xee/0x160 [ 377.707033] driver_detach+0x44/0x90 [ 377.707039] bus_remove_driver+0x55/0x e0 [377.707045] pci_unregister_driver+0x3b/0x90 [377.707052] amdgpu_exit+0x11/0x6c [amdgpu] [377.707194] __x64_sys_delete_module+0x142/0x2b0 [377.707201]? fpregs_assert_state_consistent+0x22/0x50 [377.707208]? exit_to_user_mode_prepare+0x3e/0x190 [ 377.707215] do_syscall_64+0x38/0x90 [ 377.707221] entrada_SYSCALL_64_after_hwframe+0x63/0xcd" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "7728F53D-42CF-4970-B14A-FDAE02704780" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/9196eb7c52e55749a332974f0081f77d53d60199", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/99f1a36c90a7524972be5a028424c57fa17753ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json index 884872094b5..421519e76b5 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52913.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52913", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:07.087", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:38:40.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,97 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/i915: corrige posibles UAF de contexto gem_context_register() hace que el contexto sea visible para el espacio de usuario, y en qu\u00e9 punto un hilo separado puede activar el ioctl I915_GEM_CONTEXT_DESTROY. Por lo tanto, debemos asegurarnos de que nada use ctx ptr despu\u00e9s de esto. Y debemos asegurarnos de que agregar ctx al xarray sea lo *\u00faltimo* que hace gem_context_register() con el puntero ctx. [tursulin: etiquetas estables y corregidas agregadas/ordenadas.] (seleccionado de el commit bed4b455cf5374e68879be56971c1da563bcd90c)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.8.11", + "versionEndExcluding": "5.9", + "matchCriteriaId": "06BCA914-E4BD-46C7-A8F5-74061C8BC138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.10", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "7349455C-BBB3-4263-B0EA-BC54BA76B4C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/afce71ff6daa9c0f852df0727fe32c6fb107f0fa", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b696c627b3f56e173f7f70b8487d66da8ff22506", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json b/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json index 54a80f8c95b..fe93ac1f63a 100644 --- a/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json +++ b/CVE-2023/CVE-2023-529xx/CVE-2023-52914.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52914", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-21T07:15:07.143", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:07:17.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: io_uring/poll: agregue hash si la solicitud de sondeo lista no se puede completar en l\u00ednea. Si no lo hacemos, podemos perder el acceso a ella por completo, lo que provocar\u00e1 una fuga de solicitud. Esto eventualmente tambi\u00e9n detendr\u00e1 el proceso de salida del anillo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.0", + "versionEndExcluding": "6.1.7", + "matchCriteriaId": "9A23C236-3F02-4454-B9C9-0A91464BDE09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc1:*:*:*:*:*:*", + "matchCriteriaId": "FF501633-2F44-4913-A8EE-B021929F49F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc2:*:*:*:*:*:*", + "matchCriteriaId": "2BDA597B-CAC1-4DF0-86F0-42E142C654E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.2:rc3:*:*:*:*:*:*", + "matchCriteriaId": "725C78C9-12CE-406F-ABE8-0813A01D66E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4ad6c063541665c407d17e1faf2fe4f04e947dcc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/febb985c06cb6f5fac63598c0bffd4fd823d110d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5654.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5654.json index 58c5b3511f9..dde03be972c 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5654.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5654.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5654", "sourceIdentifier": "report@snyk.io", "published": "2023-10-19T15:15:09.973", - "lastModified": "2023-10-27T21:53:06.943", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:44.870", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-285" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-56xx/CVE-2023-5671.json b/CVE-2023/CVE-2023-56xx/CVE-2023-5671.json index 6190eb69c24..c07f041e248 100644 --- a/CVE-2023/CVE-2023-56xx/CVE-2023-5671.json +++ b/CVE-2023/CVE-2023-56xx/CVE-2023-5671.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5671", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-10-25T18:17:43.867", - "lastModified": "2023-11-07T21:46:49.640", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T15:35:45.620", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-57xx/CVE-2023-5739.json b/CVE-2023/CVE-2023-57xx/CVE-2023-5739.json index c7d00bd981c..297be14c307 100644 --- a/CVE-2023/CVE-2023-57xx/CVE-2023-5739.json +++ b/CVE-2023/CVE-2023-57xx/CVE-2023-5739.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5739", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-10-31T16:15:10.307", - "lastModified": "2023-11-08T17:57:37.590", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-12T14:35:09.683", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json index ded93c1a58c..6204d75eb94 100644 --- a/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json +++ b/CVE-2024/CVE-2024-213xx/CVE-2024-21302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21302", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-08T02:15:37.827", - "lastModified": "2024-08-16T19:15:06.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:06:55.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,122 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "2FC29448-7141-4214-9649-CED500988576" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20710", + "matchCriteriaId": "E75CE9C1-0E1A-428C-BCD0-93101BACE69B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "FA0304FD-3109-4A15-A2BC-CB1AA66C7877" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "02BC3C30-4E56-47F1-950A-FC7D71FFB11C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "C0893DB0-24BA-41A1-907E-8B6F66741A0E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.4780", + "matchCriteriaId": "8D75E5B4-14B7-4D0F-96B5-2B9C270B7F98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.4780", + "matchCriteriaId": "3F9C3ED0-C639-42B9-8512-5CAD50B7095B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22000.3147", + "matchCriteriaId": "66EC161E-9908-4511-933C-727D46A8271E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4037", + "matchCriteriaId": "EE5B452D-B921-4E5F-9C79-360447CD3BF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4037", + "matchCriteriaId": "B56F0E20-88FD-4A42-B5DE-06A6D2FAC6FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "39CF5041-1FEC-420E-9D73-F78CC9C091C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.1457", + "matchCriteriaId": "836AD97E-1760-48F1-9667-8E0B9F170E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7259", + "matchCriteriaId": "7CA31F69-6718-4968-8B0D-88728179F3CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6189", + "matchCriteriaId": "A2267317-26DF-4EB8-A7EA-EA467727DA71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.2655", + "matchCriteriaId": "8E3975C0-EA3C-4B85-94BC-43BA94474FCA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1085", + "matchCriteriaId": "094C36FE-9CCB-4148-AA0F-5727D6933768" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21302", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json index ba909da3223..ccdf996ff6b 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23716.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23716", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:10.957", - "lastModified": "2024-09-11T16:26:11.920", + "lastModified": "2024-09-12T14:35:11.523", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En DevmemIntPFNotify de devicemem_server.c, existe un posible use after free debido a una condici\u00f3n de ejecuci\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-09-01", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json index d75af08b8cb..a8792a0f128 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27114.json @@ -2,13 +2,17 @@ "id": "CVE-2024-27114", "sourceIdentifier": "csirt@divd.nl", "published": "2024-09-11T14:15:13.040", - "lastModified": "2024-09-11T16:26:11.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-12T14:35:12.397", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. If the public view setting is enabled, a attacker can upload a PHP-file that will be available for execution for a few milliseconds before it is removed, leading to execution of code on the underlying system. The vulnerability has been remediated in version 1.52.02." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) no autenticada en la herramienta de planificaci\u00f3n en l\u00ednea SO Planning. Si la configuraci\u00f3n de vista p\u00fablica est\u00e1 habilitada, un atacante puede cargar un archivo PHP que estar\u00e1 disponible para su ejecuci\u00f3n durante unos milisegundos antes de que se elimine, lo que provocar\u00e1 la ejecuci\u00f3n de c\u00f3digo en el sistema subyacente. La vulnerabilidad se ha solucionado en la versi\u00f3n 1.52.02." } ], "metrics": { @@ -55,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28990.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28990.json new file mode 100644 index 00000000000..c21e0263fc2 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28990.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-28990", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-09-12T14:16:06.273", + "lastModified": "2024-09-12T14:16:06.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SolarWinds Access Rights Manager (ARM) was found to contain a hard-coded credential authentication bypass vulnerability. If exploited, this vulnerability would allow access to the RabbitMQ management console.\n\nWe thank Trend Micro Zero Day Initiative (ZDI) for its ongoing partnership in coordinating with SolarWinds on responsible disclosure of this and other potential vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3-1_release_notes.htm", + "source": "psirt@solarwinds.com" + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28990", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28991.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28991.json new file mode 100644 index 00000000000..fac7da5a336 --- /dev/null +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28991.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-28991", + "sourceIdentifier": "psirt@solarwinds.com", + "published": "2024-09-12T14:16:06.540", + "lastModified": "2024-09-12T14:16:06.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SolarWinds Access Rights Manager (ARM) was found to be susceptible to a remote code execution vulnerability. If exploited, this vulnerability would allow an authenticated user to abuse the service, resulting in remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@solarwinds.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://documentation.solarwinds.com/en/success_center/arm/content/release_notes/arm_2024-3-1_release_notes.htm", + "source": "psirt@solarwinds.com" + }, + { + "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2024-28991", + "source": "psirt@solarwinds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json index ba83210f030..47d776d0090 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31336.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31336", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.023", - "lastModified": "2024-09-11T16:26:11.920", + "lastModified": "2024-09-12T14:35:13.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Imagination PowerVR-GPU en Android antes del 5 de septiembre de 2024 tiene una vulnerabilidad de alta gravedad, tambi\u00e9n conocida como A-337949672." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-09-01", diff --git a/CVE-2024/CVE-2024-31xx/CVE-2024-3163.json b/CVE-2024/CVE-2024-31xx/CVE-2024-3163.json index 596a6be12fc..e76e09badbe 100644 --- a/CVE-2024/CVE-2024-31xx/CVE-2024-3163.json +++ b/CVE-2024/CVE-2024-31xx/CVE-2024-3163.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3163", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:23.607", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T15:35:47.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Easy Property Listings de WordPress anterior a la versi\u00f3n 3.5.4 no tiene verificaci\u00f3n CSRF al eliminar contactos en masa, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los elimine mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f89c8654-5486-4939-880d-101f33d359c0/", diff --git a/CVE-2024/CVE-2024-330xx/CVE-2024-33005.json b/CVE-2024/CVE-2024-330xx/CVE-2024-33005.json index 8ea1c218c0d..61f70ed1a19 100644 --- a/CVE-2024/CVE-2024-330xx/CVE-2024-33005.json +++ b/CVE-2024/CVE-2024-330xx/CVE-2024-33005.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33005", "sourceIdentifier": "cna@sap.com", "published": "2024-08-13T04:15:07.740", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:39:03.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.5 + }, { "source": "cna@sap.com", "type": "Secondary", @@ -51,14 +71,337 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:kernel_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "816DBDA9-E4F1-476B-95B3-19758627E3A7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:kernel_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "E640D6CD-A1BA-46C5-B652-0A65F6FF17E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:kernel_7.54:*:*:*:*:*:*:*", + "matchCriteriaId": "5A3C3F09-14C5-4E8C-93B4-40F444F3B9F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:kernel_7.77:*:*:*:*:*:*:*", + "matchCriteriaId": "6F567192-ED9A-47B9-A386-0A83AB64948E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:kernel_7.85:*:*:*:*:*:*:*", + "matchCriteriaId": "86C349D7-8F6C-42F4-9B8B-A7E0008FB3A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:kernel_7.89:*:*:*:*:*:*:*", + "matchCriteriaId": "A548E7E7-EAB0-40B7-89BD-F7682F76FD45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:kernel_7.93:*:*:*:*:*:*:*", + "matchCriteriaId": "B3532BC5-507D-4517-A017-19E2B95A8FD9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "BE1BE43A-6659-4C08-8194-F85FA47D7D81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:krnl64nuc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "4673CFDB-C17D-437B-8FE8-F0EA5BA97831" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "E415C122-70DF-478E-8493-4CF9E9AD934C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "FA5A9939-C663-4B52-97DB-64D80B40FB5F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_abap:krnl64uc_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "9F5C3E99-E68D-4CC2-8F9B-779406AE8B1A" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:kernel_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "E0DB3FCF-F720-4DA5-AF2D-D0E3B1F2297E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:kernel_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "7109185C-385B-451E-AD63-BC09BD06B1F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:kernel_7.54:*:*:*:*:*:*:*", + "matchCriteriaId": "D30D9CA9-4704-4CEA-AC05-C501ED5AAFCB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:kernel_7.77:*:*:*:*:*:*:*", + "matchCriteriaId": "FDDEDE97-D538-4899-BEC0-0A1AF88283F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:kernel_7.85:*:*:*:*:*:*:*", + "matchCriteriaId": "A80E509A-4262-41F0-92B4-1A3639F4B80D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:kernel_7.89:*:*:*:*:*:*:*", + "matchCriteriaId": "016D047B-F45A-4357-865F-75C6EB392FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:kernel_7.93:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA04598-FB33-4DF1-A5B1-1433FB7BCA28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:krnl64nuc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "D41AD192-F087-441A-B875-3626AD1142F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:krnl64nuc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "6F8A21AA-F5E0-4332-9654-DABDCA0C5363" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:krnl64uc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "D31F22F6-7C40-4FDB-A8CE-EF63E9E7B220" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:krnl64uc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "4CABDDC7-44AF-4F15-BEB0-C60EFE732B3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver_java:krnl64uc_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "F373984D-DB7D-4FA8-B8B1-DA9F55B4CDE3" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:kernel_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "EA4E320D-178F-4F08-A9F6-8244148768EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:kernel_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "414F67F4-A294-4097-B6E1-7FBBDEDB8AE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:kernel_7.54:*:*:*:*:*:*:*", + "matchCriteriaId": "CD0EDBD6-7716-4521-8E98-392DA6C6D7E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:kernel_7.77:*:*:*:*:*:*:*", + "matchCriteriaId": "36362B65-8434-404C-AAE6-D778E533B1DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:kernel_7.85:*:*:*:*:*:*:*", + "matchCriteriaId": "BEF1E060-A7ED-4ED3-A514-FCDE6EE52C57" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:kernel_7.89:*:*:*:*:*:*:*", + "matchCriteriaId": "598F9F0F-82C7-4199-8E86-65D8D6FC2BA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:kernel_7.93:*:*:*:*:*:*:*", + "matchCriteriaId": "FA38CCCD-9003-4A64-8646-66C4719C366F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:krnl64nuc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "5C4003CF-11F3-4BF6-B976-37DC0BB5F881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:krnl64nuc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "70C658C4-2571-4C71-A4CA-82AA6A4E7259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:krnl64uc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "B0052599-8162-44D5-B7B6-72C3DD621DB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:krnl64uc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "E09C7350-983D-4D9D-B0EA-E1D9262EF6C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:content_server:krnl64uc_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "4191B6B2-EC7E-460E-A98F-A239AF022454" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:kernel_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "A2E1A535-8362-454E-AC22-85C4E957CCF5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:kernel_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "A7E4BC89-114A-4EA3-A9E8-D956A26BCB18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:kernel_7.54:*:*:*:*:*:*:*", + "matchCriteriaId": "65A5FFAC-93F9-4204-9FA1-4D749D443173" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:kernel_7.77:*:*:*:*:*:*:*", + "matchCriteriaId": "E0098E57-6A7F-4CC6-8109-E2400E0FFFEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:kernel_7.85:*:*:*:*:*:*:*", + "matchCriteriaId": "E7ABB030-9A13-4194-A2A4-9623B2F22D7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:kernel_7.89:*:*:*:*:*:*:*", + "matchCriteriaId": "DB22EAAE-F75C-4902-9734-52B048D5D7B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:kernel_7.93:*:*:*:*:*:*:*", + "matchCriteriaId": "30459CD4-451D-4C3D-8FE2-17552F83D7CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:krnl64nuc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "3CA8BFCF-0A55-4DEE-B426-1DEF04DA0464" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:krnl64nuc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "54AE89EF-E64B-43C5-B9C2-8F41ACCD3482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:krnl64uc_7.22:*:*:*:*:*:*:*", + "matchCriteriaId": "52C58E1D-8A91-451C-A1E1-85BE336DC763" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:krnl64uc_7.22ext:*:*:*:*:*:*:*", + "matchCriteriaId": "89262244-880C-41CB-A904-3B06D3A73460" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:krnl64uc_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "3A8CD933-E217-445A-B244-C07625F9EE74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:webdisp_7.22_ext:*:*:*:*:*:*:*", + "matchCriteriaId": "715F51D3-00BA-4512-A8E4-FE32F4B176F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:webdisp_7.53:*:*:*:*:*:*:*", + "matchCriteriaId": "5481831F-91CC-49DD-A54B-277A6E6D22AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:webdisp_7.54:*:*:*:*:*:*:*", + "matchCriteriaId": "F04B311B-7FCC-421E-BF3C-8D020245F83D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:webdisp_7.77:*:*:*:*:*:*:*", + "matchCriteriaId": "44FA685E-8C00-45E0-AC72-C21EA1DD66FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:webdisp_7.85:*:*:*:*:*:*:*", + "matchCriteriaId": "3905B636-9BD2-4D27-8CE8-35135F98B7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:webdisp_7.89:*:*:*:*:*:*:*", + "matchCriteriaId": "F7B0AEE9-CD7F-47D5-8F3C-08E1BEE9E820" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:web_dispatcher:webdisp_7.93:*:*:*:*:*:*:*", + "matchCriteriaId": "C04CED5F-79E6-410C-8BA4-2F202810576A" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3438085", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://url.sap/sapsecuritypatchday", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json index 80f9c9b3a5a..9ff096e36db 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34128", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-23T12:15:09.763", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:58:26.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.21.0", + "matchCriteriaId": "AAF67BB0-572D-4DCA-9CEB-C30D5D8FDB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndIncluding": "2024.5.0", + "matchCriteriaId": "FFBF1159-72E3-4163-A403-8909C50C2E92" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37397.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37397.json index c849f76a84d..a986e889d88 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37397.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37397.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37397", "sourceIdentifier": "support@hackerone.com", "published": "2024-09-12T02:15:03.700", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T15:35:46.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ], "cvssMetricV30": [ { "source": "support@hackerone.com", @@ -39,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json index c6e45178a9d..fef5eb87fb1 100644 --- a/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38202", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-08T02:15:38.180", - "lastModified": "2024-08-16T19:15:09.843", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:09:04.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,81 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61019899-D7AF-46E4-A72C-D189180F66AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E332666-2E03-468E-BC30-299816D6E8ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB4AE761-6FAC-4000-A63D-42CE3FAB8412" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4793BFB-2E4E-4067-87A5-4B8749025CA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42D329B2-432D-4029-87EB-4C3C5F55CD95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40457.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40457.json new file mode 100644 index 00000000000..840725db970 --- /dev/null +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40457.json @@ -0,0 +1,32 @@ +{ + "id": "CVE-2024-40457", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-12T14:16:06.780", + "lastModified": "2024-09-12T14:16:06.780", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "No-IP Dynamic Update Client (DUC) v3.x uses cleartext credentials that may occur on a command line or in a file. NOTE: the vendor's position is that cleartext in /etc/default/noip-duc is recommended and is the intentional behavior." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.noip.com/support/knowledgebase/install-linux-3-x-dynamic-update-client-duc", + "source": "cve@mitre.org" + }, + { + "url": "https://www.noip.com/support/knowledgebase/running-linux-duc-v3-0-startup-2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json b/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json index 27aebdace0c..43c2ce7b276 100644 --- a/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json +++ b/CVE-2024/CVE-2024-406xx/CVE-2024-40650.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40650", "sourceIdentifier": "security@android.com", "published": "2024-09-11T00:15:11.080", - "lastModified": "2024-09-11T16:26:11.920", + "lastModified": "2024-09-12T14:35:14.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En wifi_item_edit_content de styles.xml, existe una posible omisi\u00f3n de FRP debido a la falta de verificaci\u00f3n del estado de FRP. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/2968ccc911956fa5813a9a6a5e5c8970e383a60f", diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json index 4ffdebf88b1..860b813a290 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41012", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-23T08:15:01.877", - "lastModified": "2024-07-29T07:15:05.083", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:28:48.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,189 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: filelock: Elimina bloqueos de manera confiable cuando se detecta fcntl/close race Cuando fcntl_setlk() corre con close(), elimina el bloqueo creado con do_lock_file_wait(). Sin embargo, los LSM pueden permitir el primer do_lock_file_wait() que cre\u00f3 el bloqueo y al mismo tiempo negar el segundo do_lock_file_wait() que intenta eliminar el bloqueo. Por separado, posix_lock_file() tambi\u00e9n podr\u00eda no eliminar un bloqueo debido a un fallo en la asignaci\u00f3n de GFP_KERNEL (al dividir un rango por la mitad). Despu\u00e9s de que se haya activado el error, se producir\u00e1n lecturas de use-after-free en lock_get_status() cuando el espacio de usuario lea /proc/locks. Es probable que esto se pueda usar para leer memoria del kernel arbitraria, pero no puede da\u00f1ar la memoria del kernel. Solucionelo llamando a locks_remove_posix() en su lugar, que est\u00e1 dise\u00f1ado para deshacerse de manera confiable de los bloqueos POSIX asociados con el archivo dado y files_struct y tambi\u00e9n lo usa filp_flush()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.13", + "versionEndExcluding": "4.19.319", + "matchCriteriaId": "09B96E21-A9AA-4FE9-9963-81674510791D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.281", + "matchCriteriaId": "92317F4D-6FF1-4A82-8834-52B023F0A242" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.223", + "matchCriteriaId": "12CD4E48-26A1-40B4-AF6A-1CC066193F4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.164", + "matchCriteriaId": "3D6B1E23-6E6C-4761-ACD4-EA687A95F56F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.101", + "matchCriteriaId": "2B46438B-72B8-4053-8554-94AED3EB13EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.42", + "matchCriteriaId": "972274A2-D688-4C37-BE42-689B58B4C225" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.9", + "matchCriteriaId": "ADCC1407-0CB3-4C8F-B4C5-07F682CD7085" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3173713D-909A-4DD3-9DD4-1E171EB057EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", + "matchCriteriaId": "79F18AFA-40F7-43F0-BA30-7BDB65F918B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", + "matchCriteriaId": "BD973AA4-A789-49BD-8D57-B2846935D3C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*", + "matchCriteriaId": "8F3E9E0C-AC3E-4967-AF80-6483E8AB0078" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3cad1bc010416c6dd780643476bc59ed742436b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/52c87ab18c76c14d7209646ccb3283b3f5d87b22", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5661b9c7ec189406c2dde00837aaa4672efb6240", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5f5d0799eb0a01d550c21b7894e26b2d9db55763", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b6d223942c34057fdfd8f149e763fa823731b224", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d30ff33040834c3b9eee29740acd92f9c7ba2250", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/dc2ce1dfceaa0767211a9d963ddb029ab21c4235", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ef8fc41cd6f95f9a4a3470f085aecf350569a0b3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41173.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41173.json index f0693fa855d..2586e115b3c 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41173.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41173.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41173", "sourceIdentifier": "info@cert.vde.com", "published": "2024-08-27T08:15:04.620", - "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:52:20.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "info@cert.vde.com", "type": "Secondary", @@ -51,10 +61,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beckhoff:ipc_diagnostics_package:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0.1", + "matchCriteriaId": "18F97E31-D97A-40A3-BD8A-4EBB91374378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:beckhoff:twincat\\/bsd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.2.0", + "matchCriteriaId": "A311642D-9723-4D61-8979-20A1F28EB17E" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-045", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41174.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41174.json index 1b7a3a92f8a..0afea906cd7 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41174.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41174.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41174", "sourceIdentifier": "info@cert.vde.com", "published": "2024-08-27T08:15:04.860", - "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:33:54.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + }, { "source": "info@cert.vde.com", "type": "Secondary", @@ -41,7 +61,7 @@ }, "weaknesses": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", "description": [ { @@ -49,12 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beckhoff:ipc_diagnostics_package:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1.1.0", + "matchCriteriaId": "6CE6AD04-5B96-480C-A9A4-1A3DE962306D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:beckhoff:twincat\\/bsd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.2.0", + "matchCriteriaId": "A311642D-9723-4D61-8979-20A1F28EB17E" + } + ] + } + ] } ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-048", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41175.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41175.json index dd58060667c..04a0d4755e8 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41175.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41175.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41175", "sourceIdentifier": "info@cert.vde.com", "published": "2024-08-27T08:15:05.080", - "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:25:10.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beckhoff:ipc_diagnostics_package:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.0.0.1", + "matchCriteriaId": "18F97E31-D97A-40A3-BD8A-4EBB91374378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:beckhoff:twincat\\/bsd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.2.0", + "matchCriteriaId": "A311642D-9723-4D61-8979-20A1F28EB17E" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-049/", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://infosys.beckhoff.com/content/1033/twincat_bsd/11780818443.html?id=4222392218353411614", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json index 7e7558702c6..58c23cbb6cf 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41176.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41176", "sourceIdentifier": "info@cert.vde.com", "published": "2024-08-27T08:15:05.317", - "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:26:00.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "info@cert.vde.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "info@cert.vde.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beckhoff:mdp_package:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.2.7.0", + "matchCriteriaId": "E249BB97-D030-457D-B2AA-53460328757B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:beckhoff:twincat\\/bsd:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.1.2.0", + "matchCriteriaId": "A311642D-9723-4D61-8979-20A1F28EB17E" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.vde.com/en/advisories/VDE-2024-050", - "source": "info@cert.vde.com" + "source": "info@cert.vde.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json index 612f0272300..e7bb9a1daf1 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41839.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41839", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-23T12:15:10.520", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:58:11.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.21.0", + "matchCriteriaId": "AAF67BB0-572D-4DCA-9CEB-C30D5D8FDB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5.0", + "matchCriteriaId": "5FF97DFB-A8E0-4311-A6EA-303A4D8612C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42483.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42483.json new file mode 100644 index 00000000000..686d35b2e04 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42483.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42483", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-12T15:18:22.093", + "lastModified": "2024-09-12T15:18:22.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An replay attacks vulnerability was discovered in the implementation of the ESP-NOW because the caches is not differentiated by message types, it is a single, shared resource for all kinds of messages, whether they are broadcast or unicast, and regardless of whether they are ciphertext or plaintext. This can result an attacker to clear the cache of its legitimate entries, there by creating an opportunity to re-inject previously captured packets. This vulnerability is fixed in 2.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-349" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/espressif/esp-now/commit/4e30db50d541b2909d278ef0db05de1a3d7190ef", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-now/security/advisories/GHSA-wf6q-c2xr-77xj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42484.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42484.json new file mode 100644 index 00000000000..5c0dab85c4d --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42484.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42484", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-12T15:18:22.320", + "lastModified": "2024-09-12T15:18:22.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ESP-NOW Component provides a connectionless Wi-Fi communication protocol. An Out-of-Bound (OOB) vulnerability was discovered in the implementation of the ESP-NOW group type message because there is no check for the addrs_num field of the group type message. This can result in memory corruption related attacks. Normally there are two fields in the group information that need to be checked, i.e., the addrs_num field and the addrs_list fileld. Since we only checked the addrs_list field, an attacker can send a group type message with an invalid addrs_num field, which will cause the message handled by the firmware to be much larger than the current buffer, thus causing a memory corruption issue that goes beyond the payload length." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/espressif/esp-now/commit/b03a1b4593713fa4bf0038a87edca01f10114a7a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/espressif/esp-now/security/advisories/GHSA-q6f6-4qc5-vhx5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json index f0b6e175d79..4a30a15c395 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43040.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43040", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-10T20:15:04.527", - "lastModified": "2024-09-11T16:26:11.920", + "lastModified": "2024-09-12T14:35:15.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Renwoxing Enterprise Intelligent Management System anterior a la versi\u00f3n 3.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro parid en /fx/baseinfo/SearchInfo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/X1lyS/75a8ea48c4997b683e8b41c94e79e5f9", diff --git a/CVE-2024/CVE-2024-432xx/CVE-2024-43214.json b/CVE-2024/CVE-2024-432xx/CVE-2024-43214.json index 4d7d1f2cca2..2c7716abbc9 100644 --- a/CVE-2024/CVE-2024-432xx/CVE-2024-43214.json +++ b/CVE-2024/CVE-2024-432xx/CVE-2024-43214.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43214", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-26T21:15:24.763", - "lastModified": "2024-08-27T13:01:52.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:17:59.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mycred:mycred:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.7.3", + "matchCriteriaId": "6E05DB02-1B8F-47AE-8750-594D0288BC1A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/mycred/wordpress-mycred-plugin-2-7-2-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json index 19c297705cf..a9bbea5da75 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44938.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44938", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T12:15:05.960", - "lastModified": "2024-08-29T17:15:08.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:05:44.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,95 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: jfs: corrigi\u00f3 el desplazamiento fuera de los l\u00edmites en dbDiscardAG Al buscar el siguiente bloque log2 m\u00e1s peque\u00f1o, BLKSTOL2() devolvi\u00f3 0, lo que provoc\u00f3 que el exponente de desplazamiento -1 fuera negativo. Este parche soluciona el problema saliendo del bucle directamente cuando se encuentra un cambio negativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.47", + "matchCriteriaId": "CF4F8EA7-C643-4B9C-8E32-BD81930A5E8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.6", + "matchCriteriaId": "C1CDF130-CCA6-47F6-9718-8949BF4E05CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/234e6ea0855cdb5673d54ecaf7dc5c78f3e84630", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7063b80268e2593e58bee8a8d709c2f3ff93e2f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bd04a149e3a29e7f71b7956ed41dba34e42d539e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://git.kernel.org/stable/c/f650148b43949ca9e37e820804bb6026fff404f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json index 61ccce5d06c..1f0e2a5662d 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44940.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44940", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-08-26T12:15:06.053", - "lastModified": "2024-08-29T17:15:08.903", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T14:10:00.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,95 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: fou: elimine la advertencia en gue_gro_receive en un protocolo no compatible. Descarte WARN_ON_ONCE en gue_gro_receive si el tipo encapsulado no se conoce o no tiene un controlador GRO. Un paquete de este tipo se construye f\u00e1cilmente. Syzbot los genera y activa esta advertencia. Elimine la advertencia como se esperaba y no es procesable. La advertencia se redujo previamente de WARN_ON a WARN_ON_ONCE en el commit 270136613bf7 (\"fou: Haga WARN_ON_ONCE en gue_gro_receive para devoluciones de llamadas de proto incorrectas\")." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "6.6.47", + "matchCriteriaId": "CF4F8EA7-C643-4B9C-8E32-BD81930A5E8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.10.6", + "matchCriteriaId": "C1CDF130-CCA6-47F6-9718-8949BF4E05CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3db4395332e7050ef9ddeb3052e6b5019f2a2a59", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/440ab7f97261bc28501636a13998e1b1946d2e79", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a2e37bc648a2503bf6d687aed27b9f4455d82eb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://git.kernel.org/stable/c/dd89a81d850fa9a65f67b4527c0e420d15bf836c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45624.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45624.json index 585c4743fe6..d7ce8e8b192 100644 --- a/CVE-2024/CVE-2024-456xx/CVE-2024-45624.json +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45624.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45624", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-09-12T05:15:05.053", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T15:35:48.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Existe un problema de exposici\u00f3n de informaci\u00f3n confidencial debido a pol\u00edticas incompatibles en Pgpool-II. Si un usuario de la base de datos accede a un cach\u00e9 de consultas, es posible que se recuperen datos de tablas no autorizados para el usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN67456481/", diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45823.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45823.json new file mode 100644 index 00000000000..6df78875b6c --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45823.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-45823", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-09-12T15:18:22.547", + "lastModified": "2024-09-12T15:18:22.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CVE-2024-45823 IMPACT\n\n\n\nAn\nauthentication bypass vulnerability exists in the affected product. The\nvulnerability exists due to shared secrets across accounts and could allow a threat\nactor to impersonate a user if the threat actor is able to enumerate additional\ninformation required during authentication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD%201698.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45824.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45824.json new file mode 100644 index 00000000000..c5ee8df1123 --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45824.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-45824", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-09-12T14:16:06.953", + "lastModified": "2024-09-12T14:16:06.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CVE-2024-45824 IMPACT\n\n\n\nA remote\ncode vulnerability exists in the affected products. The vulnerability occurs\nwhen chained with Path Traversal, Command Injection, and XSS Vulnerabilities\nand allows for full unauthenticated remote code execution. The link in the\nmitigations section below contains patches to fix this issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1696.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45825.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45825.json new file mode 100644 index 00000000000..cccd752ae44 --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45825.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-45825", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-09-12T15:18:23.387", + "lastModified": "2024-09-12T15:18:23.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CVE-2024-45825 IMPACT\nA denial-of-service vulnerability exists in the affected products. The vulnerability occurs when a malformed CIP packet is sent over the network to the device and results in a major nonrecoverable fault causing a denial-of-service." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1699.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-458xx/CVE-2024-45826.json b/CVE-2024/CVE-2024-458xx/CVE-2024-45826.json new file mode 100644 index 00000000000..3a1667bae73 --- /dev/null +++ b/CVE-2024/CVE-2024-458xx/CVE-2024-45826.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-45826", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-09-12T15:18:24.287", + "lastModified": "2024-09-12T15:18:24.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CVE-2024-45826 IMPACT\nDue to improper input validation, a path traversal and remote code execution vulnerability exists when the ThinManager\u00ae processes a crafted POST request. If exploited, a user can install an executable file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.5, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-610" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1700.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json index 1f139e1c21e..faf459a2946 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4554.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4554", "sourceIdentifier": "security@opentext.com", "published": "2024-08-28T07:15:09.330", - "lastModified": "2024-08-28T12:57:17.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:01:12.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.4.1", + "matchCriteriaId": "8011A46E-5BD5-4330-888F-9BB2558C650D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4555.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4555.json index 87ab2447fb9..7af2d42533f 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4555.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4555.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4555", "sourceIdentifier": "security@opentext.com", "published": "2024-08-28T07:15:09.830", - "lastModified": "2024-08-28T12:57:17.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:13:25.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -51,14 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.4.1", + "matchCriteriaId": "8011A46E-5BD5-4330-888F-9BB2558C650D" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4556.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4556.json index 4f2d3029c8a..3d3fbfb3f59 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4556.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4556", "sourceIdentifier": "security@opentext.com", "published": "2024-08-28T07:15:10.320", - "lastModified": "2024-08-28T12:57:17.117", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:09:55.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@opentext.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@opentext.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:netiq_access_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.4", + "matchCriteriaId": "96CD67B1-1A6C-4485-853F-A62402766C14" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.microfocus.com/documentation/access-manager/5.0/accessmanager504-p1-release-notes/accessmanager504-p1-release-notes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.microfocus.com/documentation/access-manager/5.1/accessmanager51-release-notes/accessmanager51-release-notes.html", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6449.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6449.json index 035a237c0b9..338a309a0ae 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6449.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6449.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6449", "sourceIdentifier": "cvd@cert.pl", "published": "2024-08-28T12:15:06.340", - "lastModified": "2024-09-06T13:15:06.110", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:32:19.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -73,14 +105,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hyperview:geoportal_toolkit:*:*:*:*:*:*:*:*", + "versionEndIncluding": "8.5.0", + "matchCriteriaId": "367D4360-8F40-4B9E-8EFD-8E08C8EEF734" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/08/CVE-2024-6449", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/08/CVE-2024-6449", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6450.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6450.json index b2755844a05..15455a259fd 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6450.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6450.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6450", "sourceIdentifier": "cvd@cert.pl", "published": "2024-08-28T12:15:06.507", - "lastModified": "2024-09-06T13:15:06.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-12T15:42:45.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cvd@cert.pl", "type": "Secondary", @@ -73,14 +105,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hyperview:geoportal_toolkit:*:*:*:*:*:*:*:*", + "versionEndExcluding": "8.5.0", + "matchCriteriaId": "05587DF4-201B-438C-9EC6-FC927D748B80" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert.pl/en/posts/2024/08/CVE-2024-6449", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://cert.pl/posts/2024/08/CVE-2024-6449", - "source": "cvd@cert.pl" + "source": "cvd@cert.pl", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6510.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6510.json new file mode 100644 index 00000000000..be78536ebcd --- /dev/null +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6510.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-6510", + "sourceIdentifier": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "published": "2024-09-12T15:18:26.347", + "lastModified": "2024-09-12T15:18:26.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Local Privilege Escalation in AVG Internet Security v24 on Windows allows a local unprivileged user to escalate privileges to SYSTEM via COM-Hijacking." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + }, + { + "lang": "en", + "value": "CWE-732" + }, + { + "lang": "en", + "value": "CWE-749" + } + ] + } + ], + "references": [ + { + "url": "https://www.cirosec.de/sa/sa-2023-008", + "source": "a341c0d1-ebf7-493f-a84e-38cf86618674" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6658.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6658.json new file mode 100644 index 00000000000..68f399aeb72 --- /dev/null +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6658.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6658", + "sourceIdentifier": "security@progress.com", + "published": "2024-09-12T15:18:26.543", + "lastModified": "2024-09-12T15:18:26.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows OS Command Injection.This issue affects:\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.0 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.11 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.11 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.0 (inclusive)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://support.kemptechnologies.com/hc/en-us/articles/28910587250701", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6700.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6700.json new file mode 100644 index 00000000000..bd1495afc15 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6700.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6700", + "sourceIdentifier": "security@pega.com", + "published": "2024-09-12T15:18:26.757", + "lastModified": "2024-09-12T15:18:26.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pega Platform versions 8.1 to Infinity 24.1.2 are affected by an XSS issue with App name." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@pega.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@pega.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.pega.com/support-doc/pega-security-advisory-c24-vulnerability-remediation-note", + "source": "security@pega.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6701.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6701.json new file mode 100644 index 00000000000..c8696ed2bc7 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6701.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6701", + "sourceIdentifier": "security@pega.com", + "published": "2024-09-12T15:18:26.953", + "lastModified": "2024-09-12T15:18:26.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pega Platform versions 8.1 to Infinity 24.1.2 are affected by an XSS issue with case type." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@pega.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@pega.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.pega.com/support-doc/pega-security-advisory-c24-vulnerability-remediation-note", + "source": "security@pega.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6702.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6702.json new file mode 100644 index 00000000000..71a6c4278f2 --- /dev/null +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6702.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-6702", + "sourceIdentifier": "security@pega.com", + "published": "2024-09-12T15:18:27.133", + "lastModified": "2024-09-12T15:18:27.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Pega Platform versions 8.1 to Infinity 24.1.2 are affected by an HTML Injection issue with Stage." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@pega.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@pega.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://support.pega.com/support-doc/pega-security-advisory-c24-vulnerability-remediation-note", + "source": "security@pega.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-69xx/CVE-2024-6929.json b/CVE-2024/CVE-2024-69xx/CVE-2024-6929.json index ed5de4dbd02..2fbd8ed2ea4 100644 --- a/CVE-2024/CVE-2024-69xx/CVE-2024-6929.json +++ b/CVE-2024/CVE-2024-69xx/CVE-2024-6929.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6929", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T10:15:03.980", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-12T14:32:51.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ankitpokhrel:dynamic_featured_image:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.7.0", + "matchCriteriaId": "AC2359BD-E7A6-42AC-83F1-0C1CA74F3700" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/dynamic-featured-image/trunk/dynamic-featured-image.php#L434", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/dynamic-featured-image/trunk/dynamic-featured-image.php#L469", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/dynamic-featured-image/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6700e926-21c1-45c9-bca9-62ef0218e998?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7605.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7605.json index 956281aab46..80136160ea4 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7605.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7605", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-05T11:15:13.257", - "lastModified": "2024-09-05T12:53:21.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-12T14:24:03.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:helloasso:helloasso:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.11", + "matchCriteriaId": "ABB11B6A-A8C1-4EF0-BF69-EA3EE398BB88" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/helloasso/trunk/admin/class-hello-asso-admin.php#L457", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3145151/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1690631b-0e5d-45d1-9db6-6ac426874762?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7816.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7816.json index 4f1593365b5..00dc4c7c236 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7816.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7816.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7816", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.440", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:15.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento Gixaw Chat para WordPress hasta la versi\u00f3n 1.0 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/f610c4a5-ccde-4305-93e0-3c6f50c741ee/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7817.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7817.json index 2c95597b7b6..b125a2bb4bf 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7817.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7817.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7817", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.503", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:16.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Misiek Photo Album de WordPress hasta la versi\u00f3n 1.4.3 no tiene comprobaciones CSRF en algunos lugares, lo que podr\u00eda permitir a los atacantes hacer que los usuarios registrados eliminen \u00e1lbumes arbitrarios mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/ab09e5a3-f5ea-479f-be2d-366f8707775e/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7818.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7818.json index 4fae5c6cd2e..9fb3c2b84b9 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7818.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7818.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7818", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.570", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:16.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Misiek Photo Album de WordPress hasta la versi\u00f3n 1.4.3 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/3d2263b9-e1e7-4e86-8475-5e468eef1826/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7820.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7820.json index 229d25ee7c0..99a76d04dd7 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7820.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7820.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7820", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.633", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:17.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento ILC Thickbox WordPress hasta la versi\u00f3n 1.0 no tiene una verificaci\u00f3n CSRF activada al actualizar sus configuraciones, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n las cambie a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/31b2c97b-2458-43ee-93db-e57968ac8455/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7822.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7822.json index 9b9ba93db4e..afdbe116d1e 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7822.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7822.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7822", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.713", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:18.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Quick Code de WordPress hasta la versi\u00f3n 1.0 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/3a5bdd7e-7dd5-4749-9fad-ff4d7df20273/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7859.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7859.json index 9475381f741..67feb02dfb0 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7859.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7859.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7859", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.783", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:19.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Visual Sound de WordPress hasta la versi\u00f3n 1.03 no tiene una verificaci\u00f3n CSRF activada al actualizar sus configuraciones, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n las cambie mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/88cacd47-d900-478c-b833-c6c55fd4b082/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json index 966dab6da66..0af5d01c935 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7860.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7860", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.853", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:19.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Simple Headline Rotator para WordPress hasta la versi\u00f3n 1.0 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta saneamiento y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/584156d7-928e-48c9-8b81-539ccb06f3f5/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json index a72adbd406f..406c124338c 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7861.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7861", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:24.933", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:20.767", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento Misiek Paypal para WordPress hasta la versi\u00f3n 1.1.20090324 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/df9aa795-ba16-4806-b01a-311f80aa52c0/", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json index e560547eac1..dc6508ea595 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7862.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7862", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:25.003", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:21.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento blogintroduction-wordpress-plugin de WordPress hasta la versi\u00f3n 0.3.0 no tiene la comprobaci\u00f3n CSRF activada al actualizar sus configuraciones, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n las cambie mediante un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/9b54cd05-3bb8-4bb9-a0e4-fb00d97d5cae/", diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json index 4cdbcb3fdbb..a2f0014b317 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8054.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8054", "sourceIdentifier": "contact@wpscan.com", "published": "2024-09-12T06:15:25.077", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T14:35:22.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El complemento MM-Breaking News para WordPress hasta la versi\u00f3n 0.7.9 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta saneamiento y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador que haya iniciado sesi\u00f3n agregue payloads XSS almacenado a trav\u00e9s de un ataque CSRF." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/f27deffc-9555-44bf-8dee-1891c210ecfd/", diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json index 9e9fdfe0b80..8c76af00466 100644 --- a/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8504.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8504", "sourceIdentifier": "bbf0bd87-ece2-41be-b873-96928ee8fab9", "published": "2024-09-10T20:15:05.363", - "lastModified": "2024-09-11T16:26:11.920", + "lastModified": "2024-09-12T14:35:23.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un atacante con acceso autenticado a VICIdial como \"agente\" puede ejecutar comandos de shell arbitrarios como usuario \"superusuario\". Este ataque se puede encadenar con CVE-2024-8503 para ejecutar comandos de shell arbitrarios a partir de una perspectiva no autenticada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "bbf0bd87-ece2-41be-b873-96928ee8fab9", diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8707.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8707.json index e44e3a0033f..398f49b58be 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8707.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8707.json @@ -2,13 +2,13 @@ "id": "CVE-2024-8707", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-12T01:15:10.110", - "lastModified": "2024-09-12T12:35:54.013", + "lastModified": "2024-09-12T15:18:27.333", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in ?????????? Yunke Online School System up to 3.0.6. It has been declared as problematic. This vulnerability affects the function downfile of the file application/admin/controller/Appadmin.php. The manipulation of the argument url leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + "value": "A vulnerability was found in \u4e91\u8bfe\u7f51\u7edc\u79d1\u6280\u6709\u9650\u516c\u53f8 Yunke Online School System up to 3.0.6. It has been declared as problematic. This vulnerability affects the function downfile of the file application/admin/controller/Appadmin.php. The manipulation of the argument url leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", diff --git a/README.md b/README.md index af1d8632661..a9199cd78e7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-12T14:00:29.248440+00:00 +2024-09-12T16:00:32.041579+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-12T13:58:48.473000+00:00 +2024-09-12T15:58:26.700000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,58 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262663 +262677 ``` ### CVEs added in the last Commit -Recently added CVEs: `26` +Recently added CVEs: `14` -- [CVE-2021-22518](CVE-2021/CVE-2021-225xx/CVE-2021-22518.json) (`2024-09-12T13:15:08.553`) -- [CVE-2021-22532](CVE-2021/CVE-2021-225xx/CVE-2021-22532.json) (`2024-09-12T13:15:08.837`) -- [CVE-2021-22533](CVE-2021/CVE-2021-225xx/CVE-2021-22533.json) (`2024-09-12T13:15:09.137`) -- [CVE-2021-38131](CVE-2021/CVE-2021-381xx/CVE-2021-38131.json) (`2024-09-12T13:15:09.700`) -- [CVE-2021-38132](CVE-2021/CVE-2021-381xx/CVE-2021-38132.json) (`2024-09-12T13:15:10.050`) -- [CVE-2021-38133](CVE-2021/CVE-2021-381xx/CVE-2021-38133.json) (`2024-09-12T13:15:10.327`) -- [CVE-2022-26322](CVE-2022/CVE-2022-263xx/CVE-2022-26322.json) (`2024-09-12T13:15:10.620`) -- [CVE-2024-27320](CVE-2024/CVE-2024-273xx/CVE-2024-27320.json) (`2024-09-12T13:15:11.987`) -- [CVE-2024-27321](CVE-2024/CVE-2024-273xx/CVE-2024-27321.json) (`2024-09-12T13:15:12.267`) -- [CVE-2024-3305](CVE-2024/CVE-2024-33xx/CVE-2024-3305.json) (`2024-09-12T13:15:12.540`) -- [CVE-2024-3306](CVE-2024/CVE-2024-33xx/CVE-2024-3306.json) (`2024-09-12T13:15:12.767`) -- [CVE-2024-45846](CVE-2024/CVE-2024-458xx/CVE-2024-45846.json) (`2024-09-12T13:15:12.920`) -- [CVE-2024-45847](CVE-2024/CVE-2024-458xx/CVE-2024-45847.json) (`2024-09-12T13:15:13.177`) -- [CVE-2024-45848](CVE-2024/CVE-2024-458xx/CVE-2024-45848.json) (`2024-09-12T13:15:13.437`) -- [CVE-2024-45849](CVE-2024/CVE-2024-458xx/CVE-2024-45849.json) (`2024-09-12T13:15:13.700`) -- [CVE-2024-45850](CVE-2024/CVE-2024-458xx/CVE-2024-45850.json) (`2024-09-12T13:15:13.933`) -- [CVE-2024-45851](CVE-2024/CVE-2024-458xx/CVE-2024-45851.json) (`2024-09-12T13:15:14.170`) -- [CVE-2024-45852](CVE-2024/CVE-2024-458xx/CVE-2024-45852.json) (`2024-09-12T13:15:14.403`) -- [CVE-2024-45853](CVE-2024/CVE-2024-458xx/CVE-2024-45853.json) (`2024-09-12T13:15:14.643`) -- [CVE-2024-45854](CVE-2024/CVE-2024-458xx/CVE-2024-45854.json) (`2024-09-12T13:15:14.900`) -- [CVE-2024-45855](CVE-2024/CVE-2024-458xx/CVE-2024-45855.json) (`2024-09-12T13:15:15.143`) -- [CVE-2024-45856](CVE-2024/CVE-2024-458xx/CVE-2024-45856.json) (`2024-09-12T13:15:15.373`) -- [CVE-2024-45857](CVE-2024/CVE-2024-458xx/CVE-2024-45857.json) (`2024-09-12T13:15:16.227`) -- [CVE-2024-8749](CVE-2024/CVE-2024-87xx/CVE-2024-8749.json) (`2024-09-12T12:15:53.060`) -- [CVE-2024-8750](CVE-2024/CVE-2024-87xx/CVE-2024-8750.json) (`2024-09-12T12:15:54.007`) +- [CVE-2024-28990](CVE-2024/CVE-2024-289xx/CVE-2024-28990.json) (`2024-09-12T14:16:06.273`) +- [CVE-2024-28991](CVE-2024/CVE-2024-289xx/CVE-2024-28991.json) (`2024-09-12T14:16:06.540`) +- [CVE-2024-40457](CVE-2024/CVE-2024-404xx/CVE-2024-40457.json) (`2024-09-12T14:16:06.780`) +- [CVE-2024-42483](CVE-2024/CVE-2024-424xx/CVE-2024-42483.json) (`2024-09-12T15:18:22.093`) +- [CVE-2024-42484](CVE-2024/CVE-2024-424xx/CVE-2024-42484.json) (`2024-09-12T15:18:22.320`) +- [CVE-2024-45823](CVE-2024/CVE-2024-458xx/CVE-2024-45823.json) (`2024-09-12T15:18:22.547`) +- [CVE-2024-45824](CVE-2024/CVE-2024-458xx/CVE-2024-45824.json) (`2024-09-12T14:16:06.953`) +- [CVE-2024-45825](CVE-2024/CVE-2024-458xx/CVE-2024-45825.json) (`2024-09-12T15:18:23.387`) +- [CVE-2024-45826](CVE-2024/CVE-2024-458xx/CVE-2024-45826.json) (`2024-09-12T15:18:24.287`) +- [CVE-2024-6510](CVE-2024/CVE-2024-65xx/CVE-2024-6510.json) (`2024-09-12T15:18:26.347`) +- [CVE-2024-6658](CVE-2024/CVE-2024-66xx/CVE-2024-6658.json) (`2024-09-12T15:18:26.543`) +- [CVE-2024-6700](CVE-2024/CVE-2024-67xx/CVE-2024-6700.json) (`2024-09-12T15:18:26.757`) +- [CVE-2024-6701](CVE-2024/CVE-2024-67xx/CVE-2024-6701.json) (`2024-09-12T15:18:26.953`) +- [CVE-2024-6702](CVE-2024/CVE-2024-67xx/CVE-2024-6702.json) (`2024-09-12T15:18:27.133`) ### CVEs modified in the last Commit -Recently modified CVEs: `128` +Recently modified CVEs: `71` -- [CVE-2024-8155](CVE-2024/CVE-2024-81xx/CVE-2024-8155.json) (`2024-09-12T13:53:23.827`) -- [CVE-2024-8292](CVE-2024/CVE-2024-82xx/CVE-2024-8292.json) (`2024-09-12T12:37:18.380`) -- [CVE-2024-8522](CVE-2024/CVE-2024-85xx/CVE-2024-8522.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8529](CVE-2024/CVE-2024-85xx/CVE-2024-8529.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8622](CVE-2024/CVE-2024-86xx/CVE-2024-8622.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8636](CVE-2024/CVE-2024-86xx/CVE-2024-8636.json) (`2024-09-12T13:35:12.283`) -- [CVE-2024-8637](CVE-2024/CVE-2024-86xx/CVE-2024-8637.json) (`2024-09-12T13:35:17.667`) -- [CVE-2024-8638](CVE-2024/CVE-2024-86xx/CVE-2024-8638.json) (`2024-09-12T13:35:04.660`) -- [CVE-2024-8639](CVE-2024/CVE-2024-86xx/CVE-2024-8639.json) (`2024-09-12T13:35:02.863`) -- [CVE-2024-8686](CVE-2024/CVE-2024-86xx/CVE-2024-8686.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8687](CVE-2024/CVE-2024-86xx/CVE-2024-8687.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8688](CVE-2024/CVE-2024-86xx/CVE-2024-8688.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8689](CVE-2024/CVE-2024-86xx/CVE-2024-8689.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8690](CVE-2024/CVE-2024-86xx/CVE-2024-8690.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8691](CVE-2024/CVE-2024-86xx/CVE-2024-8691.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8692](CVE-2024/CVE-2024-86xx/CVE-2024-8692.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8693](CVE-2024/CVE-2024-86xx/CVE-2024-8693.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8694](CVE-2024/CVE-2024-86xx/CVE-2024-8694.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8705](CVE-2024/CVE-2024-87xx/CVE-2024-8705.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8706](CVE-2024/CVE-2024-87xx/CVE-2024-8706.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8707](CVE-2024/CVE-2024-87xx/CVE-2024-8707.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8708](CVE-2024/CVE-2024-87xx/CVE-2024-8708.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8709](CVE-2024/CVE-2024-87xx/CVE-2024-8709.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8710](CVE-2024/CVE-2024-87xx/CVE-2024-8710.json) (`2024-09-12T12:35:54.013`) -- [CVE-2024-8711](CVE-2024/CVE-2024-87xx/CVE-2024-8711.json) (`2024-09-12T12:35:54.013`) +- [CVE-2024-41839](CVE-2024/CVE-2024-418xx/CVE-2024-41839.json) (`2024-09-12T15:58:11.690`) +- [CVE-2024-43040](CVE-2024/CVE-2024-430xx/CVE-2024-43040.json) (`2024-09-12T14:35:15.010`) +- [CVE-2024-43214](CVE-2024/CVE-2024-432xx/CVE-2024-43214.json) (`2024-09-12T14:17:59.390`) +- [CVE-2024-44938](CVE-2024/CVE-2024-449xx/CVE-2024-44938.json) (`2024-09-12T14:05:44.310`) +- [CVE-2024-44940](CVE-2024/CVE-2024-449xx/CVE-2024-44940.json) (`2024-09-12T14:10:00.857`) +- [CVE-2024-4554](CVE-2024/CVE-2024-45xx/CVE-2024-4554.json) (`2024-09-12T15:01:12.217`) +- [CVE-2024-4555](CVE-2024/CVE-2024-45xx/CVE-2024-4555.json) (`2024-09-12T15:13:25.520`) +- [CVE-2024-4556](CVE-2024/CVE-2024-45xx/CVE-2024-4556.json) (`2024-09-12T15:09:55.107`) +- [CVE-2024-45624](CVE-2024/CVE-2024-456xx/CVE-2024-45624.json) (`2024-09-12T15:35:48.600`) +- [CVE-2024-6449](CVE-2024/CVE-2024-64xx/CVE-2024-6449.json) (`2024-09-12T15:32:19.680`) +- [CVE-2024-6450](CVE-2024/CVE-2024-64xx/CVE-2024-6450.json) (`2024-09-12T15:42:45.430`) +- [CVE-2024-6929](CVE-2024/CVE-2024-69xx/CVE-2024-6929.json) (`2024-09-12T14:32:51.000`) +- [CVE-2024-7605](CVE-2024/CVE-2024-76xx/CVE-2024-7605.json) (`2024-09-12T14:24:03.833`) +- [CVE-2024-7816](CVE-2024/CVE-2024-78xx/CVE-2024-7816.json) (`2024-09-12T14:35:15.873`) +- [CVE-2024-7817](CVE-2024/CVE-2024-78xx/CVE-2024-7817.json) (`2024-09-12T14:35:16.087`) +- [CVE-2024-7818](CVE-2024/CVE-2024-78xx/CVE-2024-7818.json) (`2024-09-12T14:35:16.877`) +- [CVE-2024-7820](CVE-2024/CVE-2024-78xx/CVE-2024-7820.json) (`2024-09-12T14:35:17.657`) +- [CVE-2024-7822](CVE-2024/CVE-2024-78xx/CVE-2024-7822.json) (`2024-09-12T14:35:18.437`) +- [CVE-2024-7859](CVE-2024/CVE-2024-78xx/CVE-2024-7859.json) (`2024-09-12T14:35:19.213`) +- [CVE-2024-7860](CVE-2024/CVE-2024-78xx/CVE-2024-7860.json) (`2024-09-12T14:35:19.980`) +- [CVE-2024-7861](CVE-2024/CVE-2024-78xx/CVE-2024-7861.json) (`2024-09-12T14:35:20.767`) +- [CVE-2024-7862](CVE-2024/CVE-2024-78xx/CVE-2024-7862.json) (`2024-09-12T14:35:21.530`) +- [CVE-2024-8054](CVE-2024/CVE-2024-80xx/CVE-2024-8054.json) (`2024-09-12T14:35:22.300`) +- [CVE-2024-8504](CVE-2024/CVE-2024-85xx/CVE-2024-8504.json) (`2024-09-12T14:35:23.173`) +- [CVE-2024-8707](CVE-2024/CVE-2024-87xx/CVE-2024-8707.json) (`2024-09-12T15:18:27.333`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 483c4a3449e..9dba584f406 100644 --- a/_state.csv +++ b/_state.csv @@ -36,7 +36,7 @@ CVE-1999-0034,0,0,43bb5bdf16feb1716fd4c515e99849db419fb22188c6e9f91b6c40a76e52d2 CVE-1999-0035,0,0,2b77a0699cc5e5ebdeb4870fddbdffd7df51c593a91f98e3b0f2c9ae32fb185f,2022-08-17T07:15:08.930000 CVE-1999-0036,0,0,540dc95d7f883d3820afffca88e7f789f702102237b5bb4ca3cb0c1f50f38459,2024-08-01T20:35:05.300000 CVE-1999-0037,0,0,d38bd6b9e0375b7fa44485e0d1d6c73541ae8bce5f8d9e8d5d51c4af1812b56d,2022-08-17T07:15:08.993000 -CVE-1999-0038,0,0,432a38bf0cf2f9380b144b3a907bd99fad33431f90f5eb62964ce2b15f5ea142,2022-08-17T07:15:09.050000 +CVE-1999-0038,0,1,0e695c6ea4468dc7260d5239b78b551040c17942d36f3c7876221e3099aafb7e,2024-09-12T15:35:31.693000 CVE-1999-0039,0,0,663ca0cbe1947ed25ded76a3fcb97f2a9ac70d43241bfe92c0b4661e5f666022,2018-05-03T01:29:01.223000 CVE-1999-0040,0,0,a84d03ec8353b15fecb32d6cce6c89013d4deb319f44cc51d7a56c36cb8cb7fe,2022-08-17T07:15:09.177000 CVE-1999-0041,0,0,53c5f3b22e946cd681d04783ff577d50057fc9ccd66163b1ccd983fcc9ac9d07,2022-08-17T07:15:09.257000 @@ -168723,13 +168723,13 @@ CVE-2021-22499,0,0,70c055aa31b37148dca64de83c87eeb1f43d27137b2496f17ef113f50d482 CVE-2021-2250,0,0,3a87a38ad4938462c03de55ab516a234235f4da6cfa48a3f28229d40f9d4b95e,2022-09-23T13:27:38.033000 CVE-2021-22500,0,0,bc568527a8f921b7d318316f66d48f00a67d6993e13f79bedaa2128449593258,2023-11-07T03:30:14.327000 CVE-2021-22502,0,0,e32c3dc7dba463b0f8bea66cf991a2b26228941d3e9adf82f206da08b4cdfa6c,2024-07-25T17:52:31.453000 -CVE-2021-22503,1,1,0b278b1d6a1640b45a5e5614d6eaba52fd6ad8b93bb86434e2cab293d545dd34,2024-09-12T13:15:08.203000 +CVE-2021-22503,0,0,0b278b1d6a1640b45a5e5614d6eaba52fd6ad8b93bb86434e2cab293d545dd34,2024-09-12T13:15:08.203000 CVE-2021-22504,0,0,a934ec069d5c4d2c90c76aac69d1c73a45459029286161b251ecd4721d8c8e93,2023-11-07T03:30:14.997000 CVE-2021-22505,0,0,675e854cabcaeacf3b78a58593a856837df3f64f635c2f4dd4c947fa88d2f6f3,2023-11-07T03:30:15.257000 CVE-2021-22506,0,0,7377ec998ae060ed34b511d8dd7b1645447b5531a985bd6c0ecd5db299ab8c1d,2024-07-26T20:01:47.710000 CVE-2021-22507,0,0,49a8df4354221c1d979c5377b3f9b1248fa19b8c379d04eb8b6a4dc3660b49f5,2023-11-07T03:30:15.790000 CVE-2021-22508,0,0,67652588d6598b9dba62407096c17326f8c4c524d1709ce1b654eeddc41e3e93,2024-05-20T13:00:24.667000 -CVE-2021-22509,0,0,4501af1cb728a8aacaa7788df6b50d3a2e5c18b90fd96380ac7d1dd48c2461d5,2024-08-28T12:57:27.610000 +CVE-2021-22509,0,1,45c1433e689547227726662bdca4754fdcaffc1bb813ad8d9669da0eb0c812d2,2024-09-12T15:22:30.923000 CVE-2021-2251,0,0,4286961cf0137de4568c5f4c5b69bb31850c9f2bab612da4f72c39c76dba0177,2021-04-29T12:58:39.193000 CVE-2021-22510,0,0,dcc596e7382beb136aa69c33e161a613333c65851d59175ffc16ad5915f58f7e,2023-11-07T03:30:16.050000 CVE-2021-22511,0,0,f41f49f6ec16503a60944cca593f738d35701c43b2681c82c497e647c5c624c7,2023-11-07T03:30:16.310000 @@ -168739,7 +168739,7 @@ CVE-2021-22514,0,0,8e3a075292032f763628c85554f5c2f69f3a2119c7d4d915625b0f6c61d01 CVE-2021-22515,0,0,d5d9c4633cb99577d00912a48205489b53f3ad8216660fc95e68df9cb4700418,2023-11-07T03:30:17.387000 CVE-2021-22516,0,0,360fc4a2a6473080797119cb4592870152572368993c6eb823854ef0d1d34fac,2023-11-07T03:30:17.613000 CVE-2021-22517,0,0,3f8db58a324ed832f25a5c30c02cf604eadc18ad7b27ab795858edb5dc2a1474,2023-11-07T03:30:17.900000 -CVE-2021-22518,1,1,37818c6e513761ea0e4674751522d5394518bf4782b00c113d81a34d8c2e83f7,2024-09-12T13:15:08.553000 +CVE-2021-22518,0,0,37818c6e513761ea0e4674751522d5394518bf4782b00c113d81a34d8c2e83f7,2024-09-12T13:15:08.553000 CVE-2021-22519,0,0,9e3616afe340966651f08a0581129e9a33a0208f1e92c7b863668a89efe71aaf,2023-11-07T03:30:18.160000 CVE-2021-2252,0,0,f732e389d5f0da8a27d20c1ea9b59e42162179f0f11af0391630f653380a4d63,2021-04-29T12:58:18.223000 CVE-2021-22521,0,0,520037ed9a82a64b433b975e996f24f9dc1e905547ecb64e14a0ed212673c8fb,2023-11-07T03:30:18.417000 @@ -168750,12 +168750,12 @@ CVE-2021-22525,0,0,296450ca1e1233adcf3143ac5bdea72d2264725eafb87a4c07a15b7b7e801 CVE-2021-22526,0,0,e31e530327ad3bebc011bfe3d7d9a24dcf8f77efdd622cf1af58a96cf7283010,2023-11-07T03:30:19.707000 CVE-2021-22527,0,0,bc0c2ffc8677e4ec8b64c8e43d2a38fc47ca1cbe2713f899b24a62400ab1a12f,2023-11-07T03:30:19.927000 CVE-2021-22528,0,0,5bf59e7d54e0ee9528364054296e2d9a2de193e1d8cb55d017d3177f24ebff26,2023-11-07T03:30:20.143000 -CVE-2021-22529,0,0,cdcbcd062fb7f9870c47c8bc14636ac9f8c02643f36031bd4ff1b89140509bab,2024-08-28T12:57:27.610000 +CVE-2021-22529,0,1,7394ff287ac4cce16d1cd97d869612465af7e01e7b2e7aed1a1c341a8ead78b0,2024-09-12T14:55:31.813000 CVE-2021-2253,0,0,9e2be9bb813a2e3899ee4a36c9db4012f6aae0eed717889a70a4a84f203004b0,2021-04-29T12:57:58.230000 CVE-2021-22530,0,0,00e01806384084e8163bc8f5510cf7ff9efd69cfedee055cdd090e19ae62e25f,2024-08-28T12:57:17.117000 CVE-2021-22531,0,0,2ffef1a3095a1f67c14a48602d93f0c886d38c01b7653274771e69e8e9e12dcb,2023-11-07T03:30:20.380000 -CVE-2021-22532,1,1,9c3630d21621055c42a030eafeb25ffd3659aab12151ccb742c3ebf2da392774,2024-09-12T13:15:08.837000 -CVE-2021-22533,1,1,9d4bc412f0ddb82a269470e804cf6a9908048b3efcb475de2b82901a03487e80,2024-09-12T13:15:09.137000 +CVE-2021-22532,0,0,9c3630d21621055c42a030eafeb25ffd3659aab12151ccb742c3ebf2da392774,2024-09-12T13:15:08.837000 +CVE-2021-22533,0,0,9d4bc412f0ddb82a269470e804cf6a9908048b3efcb475de2b82901a03487e80,2024-09-12T13:15:09.137000 CVE-2021-22535,0,0,0cff80698ce8ede7035f297b2f9817048e9d9e9718e7dc9eb83b3305cbb47e07,2023-11-07T03:30:20.670000 CVE-2021-22538,0,0,447322567d97db99dd06b56b17c4818a654489f5f18b93925c9e7c6e4f0028d2,2021-04-06T14:11:52.257000 CVE-2021-22539,0,0,ab26a79b38b3ff6b1f55feed5488a8adaa85a7b58c7eac64009e1979b006d609,2022-10-25T16:36:46.623000 @@ -180326,7 +180326,7 @@ CVE-2021-38115,0,0,0d4529d2dc20d029bb9ee8663c7b78d5bfa9be575f5879ed777d4526582a3 CVE-2021-3812,0,0,afacf08a6926dd761cd14ea7be38b0c773f7d4e31838aabc34b4a238033af577,2021-09-28T02:32:32.737000 CVE-2021-38120,0,0,c4d3d2007fda774ae5dce33557525b106d9347eeda948f9121626daac0306b9c,2024-08-28T12:57:17.117000 CVE-2021-38121,0,0,7af46a1fe507acc66bc52087f8889865a9e583d0432869b8c31b39e0930bd1a6,2024-08-28T12:57:17.117000 -CVE-2021-38122,0,0,03fb8128f502e7e3a999638dd15a327029456e4447673cce4ec75e54ee3b8c12,2024-08-28T12:57:17.117000 +CVE-2021-38122,0,1,c35b5e4ca68e4ae920718e14108be3a5dc7334324b8910186d07de2161762de3,2024-09-12T15:05:51.547000 CVE-2021-38123,0,0,733f1d31597cbc536fab4d2ae9084a85932eb1447339cd96f79697cf7ce2cf3d,2023-11-07T03:37:14.523000 CVE-2021-38124,0,0,f2fcd4839f48ca621d12d11b2f6b8169a58cfe9389901fc30c449c923b2bbef3,2023-11-07T03:37:15.587000 CVE-2021-38125,0,0,cca5fea4853ef2eaacee614aaf6f07a8d197ea57c437239ce440cbbd8a6e3f17,2023-11-07T03:37:16.490000 @@ -180335,9 +180335,9 @@ CVE-2021-38127,0,0,62d79b0ca2ea7804467f82eb3d2c206ac02f1e5aa0dfbcef95bb17f5dc323 CVE-2021-38129,0,0,211f6fe50496995a361fe454c985c9c091a1fca5c52405349f3b165cbb2119d3,2023-11-07T03:37:19.620000 CVE-2021-3813,0,0,c5bdf0c4b3810a3b61e4bc5b663568787d7daf575e6d5ffbbe9760323d11ff11,2022-10-27T11:53:48.567000 CVE-2021-38130,0,0,64242ee1b6ab1dd8e143fbf949c411ac308e78bfaccdc6ea842400cc2368e449,2023-11-07T03:37:21.320000 -CVE-2021-38131,1,1,98058df09a0795ebc0c496575bdad2d8cd61383a91333b82f27c9fd66f55dcd1,2024-09-12T13:15:09.700000 -CVE-2021-38132,1,1,396dcf3bced67f53a2216ad23a30b35451eb11d9b1cc7742e6a1798bf8653cb2,2024-09-12T13:15:10.050000 -CVE-2021-38133,1,1,3ca420a77cd4636853bc0a700fdfd65a49d1bbf633c9bf218cef3caea49bc540,2024-09-12T13:15:10.327000 +CVE-2021-38131,0,0,98058df09a0795ebc0c496575bdad2d8cd61383a91333b82f27c9fd66f55dcd1,2024-09-12T13:15:09.700000 +CVE-2021-38132,0,0,396dcf3bced67f53a2216ad23a30b35451eb11d9b1cc7742e6a1798bf8653cb2,2024-09-12T13:15:10.050000 +CVE-2021-38133,0,0,3ca420a77cd4636853bc0a700fdfd65a49d1bbf633c9bf218cef3caea49bc540,2024-09-12T13:15:10.327000 CVE-2021-38136,0,0,99abafadd29664ff7e73aaddb0e4dd8e90faf2f76a379188e73b31045a6e40be,2021-08-13T16:05:37.600000 CVE-2021-38137,0,0,4ed6daee83bdd907d0d027e9b6cb9ab4e4a315fc0407142681da73df71dcac02,2022-07-12T17:42:04.277000 CVE-2021-38138,0,0,4d84b6bb6ea7f7a0c97d4950ad6b78c0175c93c9603dab4a6d2826c2e56a6333,2022-09-28T17:19:39.460000 @@ -195079,7 +195079,7 @@ CVE-2022-26317,0,0,9c3778762ebd62b5c88b18d617a321f87f2f3cd2e79d6a4238ec738f50f6b CVE-2022-26318,0,0,3164c0ae6f338172eda55b12f58a3708a3217e7c65e42299722e7024448c4e8e,2023-08-08T14:21:49.707000 CVE-2022-26319,0,0,df89539e33ae729765bbf5708419e9238cd5395f00f3879c2a7d76f26e1eb725,2022-03-19T23:55:42.653000 CVE-2022-26320,0,0,0821ab29948bcb8ff6394127add06f2455ef2463ce545b333685d1b7d5e7ee9b,2022-03-23T15:02:20.840000 -CVE-2022-26322,1,1,b96f23dd6ec62278f1ef356d839c0c081531b5c15a190e1d83b811a9bf0d8da6,2024-09-12T13:15:10.620000 +CVE-2022-26322,0,0,b96f23dd6ec62278f1ef356d839c0c081531b5c15a190e1d83b811a9bf0d8da6,2024-09-12T13:15:10.620000 CVE-2022-26325,0,0,71c58e61480c4b27374f3a990d8a54d98de2bdee3e9fb84b64281d4b075b3b7a,2023-11-07T03:44:56.980000 CVE-2022-26326,0,0,9ad27885fa0c540266ca1167975a0cab125c731a5ab45882b07301ce6001b68d,2023-11-07T03:44:57.197000 CVE-2022-26327,0,0,7940acac4e72dc19f89caa27a931bc65c9c7e042d50d2b29976f338f3c1d6aed,2024-08-21T17:25:08.560000 @@ -195674,9 +195674,9 @@ CVE-2022-2700,0,0,0e33332395881b2cefbbffac1937294df11a919b4c217142b8eeb7474edfce CVE-2022-27000,0,0,82c8244d9393fa2eb7977a21170da7258697071d271c3fe0f72ebd69582aefde,2023-08-08T14:21:49.707000 CVE-2022-27001,0,0,e831efb13b66b6b2ff526743bc62fc1d8a3976c5333b46a1cd7313ac85315b3c,2023-08-08T14:21:49.707000 CVE-2022-27002,0,0,a744baf868ae2703d8932147e073934fea361eb9d534076c66357cf32c982ba5,2023-11-07T03:45:16.493000 -CVE-2022-27003,0,1,59157f86bbba24e05a979304479f77003c8c01d1fc0661c74a2a543f637bb4bc,2024-09-12T13:35:03.300000 -CVE-2022-27004,0,1,68d96251bfad76b5f83669535576d6feb02698d1a9b03daec8a4c97d92ed0e18,2024-09-12T13:35:10.583000 -CVE-2022-27005,0,1,e8f2678c67957d35d2bec417887e2f2413b904d37446aa161a5f3c2b88298833,2024-09-12T13:35:11.427000 +CVE-2022-27003,0,0,59157f86bbba24e05a979304479f77003c8c01d1fc0661c74a2a543f637bb4bc,2024-09-12T13:35:03.300000 +CVE-2022-27004,0,0,68d96251bfad76b5f83669535576d6feb02698d1a9b03daec8a4c97d92ed0e18,2024-09-12T13:35:10.583000 +CVE-2022-27005,0,0,e8f2678c67957d35d2bec417887e2f2413b904d37446aa161a5f3c2b88298833,2024-09-12T13:35:11.427000 CVE-2022-27007,0,0,37d40ad69c9907e259c2ffd9ea657f7215f809ff95e54e3cd66ebdfaf6014042,2022-09-09T16:53:23.317000 CVE-2022-27008,0,0,142836377f7f099cd728f8bad387cd8200ca3211e20b05da6c41b7a17c9ec15e,2022-09-09T16:53:52.590000 CVE-2022-2701,0,0,871991395f39a5dedd8e37f45d0a5b27a12e51f97e68bf7c9e60170980580d1b,2022-08-11T13:53:23.687000 @@ -202529,7 +202529,7 @@ CVE-2022-35555,0,0,54dd80abd32f1b045b99445ad8a17b6e26366f233f98bf175b2ec0d82094b CVE-2022-35557,0,0,a26a613f14b6013c2adebb7757bc05b2e82720db64bf863f9777cab0ab7acad0,2022-08-16T14:50:03.940000 CVE-2022-35558,0,0,85d270bf05e5de9a8abfe49de3e5007366b5142b7b88a679442802bae082e824,2022-08-16T14:50:37.237000 CVE-2022-35559,0,0,ad484c442f27b298d07835a74a3872b2a9074daf4041cd8517e66c509d578008,2022-08-16T14:52:03 -CVE-2022-3556,0,0,19d6d8c728a5779d24feb7317c5bbf3076b710e79867dfb8f61f4efd0611322b,2024-09-05T12:53:21.110000 +CVE-2022-3556,0,1,6860859eb0b25a33790f5c242078b2a7a28c62255d70382572a669a4a702de73,2024-09-12T14:30:58.577000 CVE-2022-35560,0,0,ad411e1a4c9e75e590e9900fe20e530d5834900e4c78eb482c3cc47a349779e7,2022-08-16T14:53:02.307000 CVE-2022-35561,0,0,2b87c7f060bbe3f8bee04908b1ca80cd11fc98e51c654001a9f356f5ab3b0cda,2022-08-16T14:53:31.823000 CVE-2022-35569,0,0,60515d9ccf8c6a0e62faa38e7539e843741fe488d102594b0eeec3196f5d3a93,2022-07-27T17:19:13.727000 @@ -204766,7 +204766,7 @@ CVE-2022-38379,0,0,9eb70de0c72565c49201ab1fc48e6de31cbb23bd0ef17c431d4cd96f5e78e CVE-2022-3838,0,0,b6c87f6371b3c42529104fa7683905834b7f4d26db23a4d8470e1e7da69bdcdb,2023-11-07T03:51:51.887000 CVE-2022-38380,0,0,bd883f9c774317159de2534f7103c0f6276317266728ea8b96d8dc126654e307,2022-11-04T14:56:46.817000 CVE-2022-38381,0,0,33ab62a56155391eb2d41b3ba9666f38dda60cd0a3cd9ef1e728baa24c1b8bac,2022-11-04T15:03:40.800000 -CVE-2022-38382,0,0,7495c87326a88e9b7268de359a90d48ec901893c91f9e3c3ce696da436a3c81d,2024-08-13T12:58:25.437000 +CVE-2022-38382,0,1,3caf80f95152461b2bbfefb30d37536b3ea8031842563d7040c007dde28ad6c6,2024-09-12T15:37:51.147000 CVE-2022-38383,0,0,c6f707ee147e1c14c9059720db840b81389d2405c75180fb0f2c0e4d4d08569f,2024-08-01T17:57:30.093000 CVE-2022-38385,0,0,e5ce73aa67e344471446b9267cebeab2bedbacce8ae377f39c844e85d6dedb4e,2023-11-07T03:50:07.243000 CVE-2022-38386,0,0,cd5b6a6598df693531015e8583f683aad3b24e500fbcaa6ba22ce0152abd819c,2024-05-01T19:50:25.633000 @@ -209880,7 +209880,7 @@ CVE-2022-45280,0,0,dd48ae4a337a29dedb0da94bb275f1b511181faf6aa6b0b03a0b432586ed3 CVE-2022-45283,0,0,8fb1ca8fbc8b78b46c1cc9704b85fcd0bcb62515874d297dbc58d4f996229a22,2023-05-27T04:15:22.423000 CVE-2022-45285,0,0,98469622e68d7b7b4f0593bd1b0b6280c3b54f83b534d00bbb34748245e2d667,2023-02-22T22:30:01.127000 CVE-2022-45287,0,0,4507538752624b6694a989860cfcc119cc790a2c88190e10e866db826d481d73,2023-06-28T17:33:09.597000 -CVE-2022-4529,0,0,251657bc9a80b428e4253a494581c9a7c3a767095f8d7aeae72f1b1c1aad5f9b,2024-09-05T12:53:21.110000 +CVE-2022-4529,0,1,827c341bcb5157de19eaff9964c0b04d1ad630d5feabbb5239a55c196957621b,2024-09-12T14:29:03.923000 CVE-2022-45290,0,0,1574103282ae0ba4c544426a685aefbe2bca03b480d5c7259efeea41df9cc296,2022-12-12T17:40:32.867000 CVE-2022-45291,0,0,744b5c2cd77ef0b567a922de6e418842cfc53f9b272dffaa39d394499f5cc9e1,2023-05-04T19:57:26.577000 CVE-2022-45292,0,0,464c0966b0e0b437ee2cdd1bbe16fe01734b7f530f9395828bb2786e8d86fe64,2022-12-13T00:36:18.090000 @@ -212260,7 +212260,7 @@ CVE-2022-4873,0,0,666c94076854a8a821e8edd91b9090dda2c8e9960022c374c3759cf89e6c2e CVE-2022-48730,0,0,927e7fae9500f7d1d76c595495e5d68ddde80a2da0a22ed9d01a96f4a588ddf8,2024-06-20T12:43:25.663000 CVE-2022-48731,0,0,f2137fdaa4becb4ed0190377e8df6f4b116a98b0fb57b5a4ce7886128d2a2fb4,2024-06-20T12:43:25.663000 CVE-2022-48732,0,0,d6cc74e82f107b126febfe008777c2c97d6e8cbe09c0878031c0fd17cd48e390,2024-08-19T17:58:27.230000 -CVE-2022-48733,0,1,9ee2e6e9ecabae5b87258617eb99e87307e6a5268d57b03c37e160e5d564f656,2024-09-12T12:15:46.847000 +CVE-2022-48733,0,0,9ee2e6e9ecabae5b87258617eb99e87307e6a5268d57b03c37e160e5d564f656,2024-09-12T12:15:46.847000 CVE-2022-48734,0,0,a10c6df7a42e2cfe05caa8c89dfd6fc497700a9e09171ca89bd5070583fc92fa,2024-08-19T17:22:11.393000 CVE-2022-48735,0,0,f6e636dab2ea285d480bff4ef4cf308fbc0f6a9ee0941d7e62ec484863a3959c,2024-08-19T16:41:21.037000 CVE-2022-48736,0,0,81ca9bdcd7e3a82c08985a14ce832c395c4228e286c7331dc57b0f38ea5fffd7,2024-07-05T07:15:09.673000 @@ -212444,31 +212444,31 @@ CVE-2022-48898,0,0,9d5dd8e327564f897f54b9b96edffffc8bfcf745dcbb3b6158a8c1b6ec465 CVE-2022-48899,0,0,b259a9d35504eacb9390e4c82acd7d334eb4dd0d897a0af2ebaa062eea49f3a9,2024-09-11T16:22:26.583000 CVE-2022-4890,0,0,6681cfa53e1bf5f370bc8c8bc62693e3d5b22cda3aa6b9f40531dae97a716dfa,2024-05-17T02:17:01.647000 CVE-2022-48900,0,0,3d3abc510bd2bdcb727ecba5ff8ee20443365f0e7442b7ce50fe28fe2c089d32,2024-08-22T08:15:04.233000 -CVE-2022-48901,0,0,27dcaf94e83e51c704998f574606d45652a56b6673c775b1e373714e83cc418c,2024-08-22T12:48:02.790000 -CVE-2022-48902,0,0,0babd0f9b5559f1d6f05ba784549600b73b15033279a839f5c6f325e4331e964,2024-08-22T12:48:02.790000 -CVE-2022-48903,0,1,075f468f96cfd244098a03984ad1bc5d8eafa109acdf3d1fcbe6d48dc2a8d6f9,2024-09-12T13:58:48.473000 -CVE-2022-48904,0,1,f02beac0acb507eb492011f9936eac015b9f07536ccf213556f84d686cf19d34,2024-09-12T13:55:34.123000 -CVE-2022-48905,0,1,87f979d82f30ebdaf7907a93f1fe7e9d6135ba45f78bf986e8ab97814763e212,2024-09-12T13:44:45.753000 -CVE-2022-48906,0,1,ca1326718540f13cc0237639af26c38aa928672a7564b2618555bcb17531076e,2024-09-12T13:41:56.660000 -CVE-2022-48907,0,1,1db12a668bbdfba096ddf32c9270801fe7d337c346c852f73092cea806962eeb,2024-09-12T13:33:22.423000 -CVE-2022-48908,0,1,25c17c88806f23e30dba3af96f0065984b08c37ab3d762925c6e926ec89eda3b,2024-09-12T13:37:52.190000 -CVE-2022-48909,0,1,022ceb1ed0e8370f4f8034d502d9594b2b2f2d6ddbb32245812f4667131053ec,2024-09-12T13:36:11.253000 +CVE-2022-48901,0,1,8f3f220ebd5cd5dabd5d5f6f89faab641ff2958472a57e8bd94c79e8f761227c,2024-09-12T14:05:35.127000 +CVE-2022-48902,0,1,25bb67eadd44bf8fb78f197e6e0494e0c319a2004c5b28c0cdd71455b92a4091,2024-09-12T14:01:44.523000 +CVE-2022-48903,0,0,075f468f96cfd244098a03984ad1bc5d8eafa109acdf3d1fcbe6d48dc2a8d6f9,2024-09-12T13:58:48.473000 +CVE-2022-48904,0,0,f02beac0acb507eb492011f9936eac015b9f07536ccf213556f84d686cf19d34,2024-09-12T13:55:34.123000 +CVE-2022-48905,0,0,87f979d82f30ebdaf7907a93f1fe7e9d6135ba45f78bf986e8ab97814763e212,2024-09-12T13:44:45.753000 +CVE-2022-48906,0,0,ca1326718540f13cc0237639af26c38aa928672a7564b2618555bcb17531076e,2024-09-12T13:41:56.660000 +CVE-2022-48907,0,0,1db12a668bbdfba096ddf32c9270801fe7d337c346c852f73092cea806962eeb,2024-09-12T13:33:22.423000 +CVE-2022-48908,0,0,25c17c88806f23e30dba3af96f0065984b08c37ab3d762925c6e926ec89eda3b,2024-09-12T13:37:52.190000 +CVE-2022-48909,0,0,022ceb1ed0e8370f4f8034d502d9594b2b2f2d6ddbb32245812f4667131053ec,2024-09-12T13:36:11.253000 CVE-2022-4891,0,0,a455b0842f19c717ee670b5db60155cb5018f293a7aaf3547e3c50a0a475a09d,2024-05-17T02:17:01.767000 -CVE-2022-48910,0,1,515d307d0932c285233fb77181675d4b7cdc65f630da06dba4580b7081831f80,2024-09-12T13:31:57.197000 -CVE-2022-48911,0,1,65a1700969705417fffddf0aece45b8f3e93aeffe510818de11966f71bac96aa,2024-09-12T13:24:58.060000 +CVE-2022-48910,0,0,515d307d0932c285233fb77181675d4b7cdc65f630da06dba4580b7081831f80,2024-09-12T13:31:57.197000 +CVE-2022-48911,0,0,65a1700969705417fffddf0aece45b8f3e93aeffe510818de11966f71bac96aa,2024-09-12T13:24:58.060000 CVE-2022-48912,0,0,4685b9e0b04647e6391699b48fe4ec760b8fb2a11c99c401b692a1b301b0a4c2,2024-08-27T16:12:47.173000 CVE-2022-48913,0,0,713c03b83b436a4ed81d31fa61e38a9c0b02c5d54599e753ca949890fd4f7312,2024-08-27T16:12:58.620000 -CVE-2022-48914,0,1,de12b704cc32b0a5e74f53e1499e421f271cfcf8530e6f1db808bed152cae819,2024-09-12T13:27:34.623000 +CVE-2022-48914,0,0,de12b704cc32b0a5e74f53e1499e421f271cfcf8530e6f1db808bed152cae819,2024-09-12T13:27:34.623000 CVE-2022-48915,0,0,c80b107b935c48929981801a893b263b71560ca74e5ba8b7bdc00b678cfcbb35,2024-08-27T16:07:09.037000 -CVE-2022-48916,0,1,a075fd379091e1297d3e5326de458c36857ef8c6e4896d2e85875bb54ee16883,2024-09-12T13:11:36.230000 -CVE-2022-48917,0,1,df96467b68c8ae7bf16088d95a9147bce4804ef366abd37fdb6c7e98131ba937,2024-09-12T13:07:29.723000 +CVE-2022-48916,0,0,a075fd379091e1297d3e5326de458c36857ef8c6e4896d2e85875bb54ee16883,2024-09-12T13:11:36.230000 +CVE-2022-48917,0,0,df96467b68c8ae7bf16088d95a9147bce4804ef366abd37fdb6c7e98131ba937,2024-09-12T13:07:29.723000 CVE-2022-48918,0,0,dcfb706418ae75fe3a7007d02977541ca10039ee009c0974217f4396febbaf6a,2024-08-27T16:07:19.127000 CVE-2022-48919,0,0,e5790babb6da0b073ed5bbf67690020a0aac3bba58730f51363a0ef2d8059741,2024-08-27T16:07:32.900000 CVE-2022-4892,0,0,a02afb40fce024abebfb05a40298b81994dfc2b7567f3762fdb2b328cbdbe6a9,2024-05-17T02:17:01.897000 -CVE-2022-48920,0,1,a1ccdf5044d655da581f83f79835f2662c26eec81d5cefa764e656b0f5b78fd1,2024-09-12T13:04:26.640000 -CVE-2022-48921,0,1,39c41872203d1683f24e0241088eec3827e9b7e44b4862c98dfc92383c1ba5e6,2024-09-12T12:58:50.660000 -CVE-2022-48922,0,1,ce6260139eb421825a12f425c83c825f671c91568e44098c60a482c7f17411fa,2024-09-12T12:52:54.023000 -CVE-2022-48923,0,1,52406e728e5fcee226d8223e60ee3a149f2b0e969846b642569f4a809b177bab,2024-09-12T12:50:02.173000 +CVE-2022-48920,0,0,a1ccdf5044d655da581f83f79835f2662c26eec81d5cefa764e656b0f5b78fd1,2024-09-12T13:04:26.640000 +CVE-2022-48921,0,0,39c41872203d1683f24e0241088eec3827e9b7e44b4862c98dfc92383c1ba5e6,2024-09-12T12:58:50.660000 +CVE-2022-48922,0,0,ce6260139eb421825a12f425c83c825f671c91568e44098c60a482c7f17411fa,2024-09-12T12:52:54.023000 +CVE-2022-48923,0,0,52406e728e5fcee226d8223e60ee3a149f2b0e969846b642569f4a809b177bab,2024-09-12T12:50:02.173000 CVE-2022-48924,0,0,7b72b5b3779cbd334a58cc81c4e33f1856c26dfe0ed7b0b6108d32c9ead83b93,2024-08-27T16:07:43.660000 CVE-2022-48925,0,0,12c2847f9c2abd72fae449a80a3efdbc821679cca9a301519e7e3dab31ee93f8,2024-08-23T02:07:41.047000 CVE-2022-48926,0,0,7c14eba9301c644179737e4ff06c47dd3ab70d7b7dc5b7cdc8ddbc7cbe0a8516,2024-08-23T02:05:14.960000 @@ -227793,9 +227793,9 @@ CVE-2023-3694,0,0,b3d7b36d99422cc5ddb58a5a27c755d655d777d2a00055fe0c2c495aab3148 CVE-2023-36940,0,0,1b43d4a6f4cd7b13dc376d4e310eebfbbadb93d58b4ad29f97fc0c8b28787183,2023-12-21T03:58:37.810000 CVE-2023-36941,0,0,1a0f4ed7e3c4c8723a7b1da4bf54a6a7a6b1862f63acfaaade19db8b382d75aa,2023-12-21T01:48:24.940000 CVE-2023-36942,0,0,9a2970c45435a656c9429e700c7833111f36464bd86d7a04fc922fa5f5522d7b,2023-12-28T14:36:28.463000 -CVE-2023-36947,0,1,20e82224048a65ce0c8d3f6c79c3f7280162a8cdde79d9518f30a951dd36ebbd,2024-09-12T13:35:13.497000 +CVE-2023-36947,0,0,20e82224048a65ce0c8d3f6c79c3f7280162a8cdde79d9518f30a951dd36ebbd,2024-09-12T13:35:13.497000 CVE-2023-3695,0,0,0d250e79024675060835025e102b961d57a179ac7d6a5484b54dd08dfa8328b9,2024-05-17T02:27:43.757000 -CVE-2023-36950,0,1,8f22796e27990181cb796e959262c278f3b0c17ce0752805db4b7bf7525034c1,2024-09-12T13:35:15.180000 +CVE-2023-36950,0,0,8f22796e27990181cb796e959262c278f3b0c17ce0752805db4b7bf7525034c1,2024-09-12T13:35:15.180000 CVE-2023-36952,0,0,3aaeea75ebe0866b23bd5f866dc3098285b61bc08d29799398d8a7b7f9158b8e,2023-10-19T11:10:31.540000 CVE-2023-36953,0,0,f9ad1c5c329695f744983d4681687634e285de4e9e8901d8ab3030d95641e113,2023-10-19T11:10:43.373000 CVE-2023-36954,0,0,14a5bec6747b443c16832f008545ba9f1e56e177badd853f518ac0ee7f860e45,2023-10-19T11:10:49.327000 @@ -228398,7 +228398,7 @@ CVE-2023-37828,0,0,bf6a1407c8b34f46c140cf1a2f9b73c79c4d85d3b34c5cf464bd96d03c099 CVE-2023-37829,0,0,4e3024f184f6c79c43d20da08e3015e450fa53465ecc48ef44006870903af901,2023-09-07T13:03:28.967000 CVE-2023-3783,0,0,632e03463e5006933a845fca75e703681bf8efa47d5bce9e8e8afdad626c1b2d,2024-05-17T02:27:47.243000 CVE-2023-37830,0,0,618747257c0fe30bcb989a9dbeef6c8e17afa497ae818f4be6defc128f575805,2023-09-07T12:58:00.423000 -CVE-2023-37831,0,0,30a594652ded2ea30e1ae10325decd12d0763f03f9f6b0ea5a318ae1fa54cd78,2023-11-08T18:00:34.107000 +CVE-2023-37831,0,1,8001b5e1a8e92daa387401dfc409ca74fab192f55f8c78a6c4244a6cde8e473b,2024-09-12T14:35:05.870000 CVE-2023-37832,0,0,ae2d69a4488ceb1c8be012aed4d2ed85b3c5c81415777316f1e364f31a6ec92b,2023-11-08T18:16:33.060000 CVE-2023-37833,0,0,157f6c3a403e63b59a54cea4bfd76586c9515a0df4218d8ec5b111168ec50972,2023-11-08T23:09:11.267000 CVE-2023-37835,0,0,4b792765894220971f4886dc774ec100596558d9483d39c501bed264fe8b3634,2023-11-07T20:15:08.150000 @@ -229298,10 +229298,10 @@ CVE-2023-3884,0,0,082cb264ff5a70ab211c510fedd1897f7c990119b677602aa33773e5cb53ea CVE-2023-38840,0,0,452514f9b9b2356986e8beb24f51c7e9224b6a85e5b75a8d7e1584bb4d157947,2023-08-22T14:58:17.927000 CVE-2023-38843,0,0,e657cf40a1d798c726d7148667811c9550fb1ef28510a892e2f8120d2edd7183,2023-08-23T16:52:08.800000 CVE-2023-38844,0,0,ff193c55c187072f96aca2f504742892510c2e1694b0794c192fe172313299c7,2024-08-29T20:35:14.163000 -CVE-2023-38845,0,0,5a77e7ec3d4e7265163c28fff8876ddf0c946869ca73b68058a724d3c5f7ad37,2023-11-03T16:39:40.890000 -CVE-2023-38846,0,0,892ab8c7a4ed2879e2c4b5d416bbaa7f0519cccf972e82dc79b1889bb8a52998,2023-11-03T17:00:05.280000 -CVE-2023-38847,0,0,ba611ca5392068bcf369d39606afde189683ecfbdb072f10171a11e153e78f02,2023-11-03T17:22:18.760000 -CVE-2023-38848,0,0,f13186ad00b8cd14af654c3006f3909f18556fea3da58330f1e168a7c463dc6c,2023-11-03T17:27:41.767000 +CVE-2023-38845,0,1,9197e582cec346db6e961671f9951df06bdedf541c22494133dc3ba63b5da72e,2024-09-12T15:35:33.573000 +CVE-2023-38846,0,1,9e734f347c011f35ce479609ffdbe0eeb9e9f5ad63675525e8b0641a94f7058e,2024-09-12T15:35:34.370000 +CVE-2023-38847,0,1,ffeaeb25d9f6ec36a28795714b2364023fbbe5826dd1053bb7efbab8bcd9ac0e,2024-09-12T15:35:35.200000 +CVE-2023-38848,0,1,772b0e4f131dc937392f438e6f03452b93e2bc4bf5ad6de6bbfaaeeba7a136d7,2024-09-12T15:35:36.227000 CVE-2023-38849,0,0,7ea1d4699319115186509e7d15bffcd656d3de2a0061786cf9b170d98c962579,2024-09-11T19:35:02.600000 CVE-2023-3885,0,0,346256803e6015564c007c1923f28009955d02721d2abddcbca5617f0b721d01,2024-05-17T02:27:56.590000 CVE-2023-38850,0,0,ddd8bae1435588d60992e38b1dfa56c1cc4b6ce696296078d7ef0ffc4c05e8fe,2023-08-22T13:30:25.907000 @@ -232662,7 +232662,7 @@ CVE-2023-43344,0,0,e14fdfeb61156b2c96ea7f9ecfd98c220cb0718e6e3b3b6539125c4c67722 CVE-2023-43345,0,0,c46de3fecebad3f129c80a4e4bf46d6ac9aaf1f7fe76d9dbb5b60986a583e480,2023-10-27T15:13:29.200000 CVE-2023-43346,0,0,a750d41ce2f42d6122eceec1e6768134d9dfa79dd9bae2c584c48ab746e3b85c,2023-10-25T09:54:11.453000 CVE-2023-4335,0,0,3768dc96b0e0f82db9d8d26fd06c4ce7894a160ff7d6eccf3398b4865e036f89,2023-08-21T18:45:53.070000 -CVE-2023-43352,0,0,e6e31e78fba4e003f6efa5097520b9a95bf6cb9062eb306fc33ab43543e19f4a,2023-11-07T17:23:49.890000 +CVE-2023-43352,0,1,fff2c76577b63bd4638ac5ec70892c98d7195b44c39a3fdc0a104ada0a2211ff,2024-09-12T15:35:38.720000 CVE-2023-43353,0,0,6810287ac5359552ba48c9b5be75b218bd7b822b83bd59379b45e32152af3860,2023-10-25T09:55:23.023000 CVE-2023-43354,0,0,218d273d7c27ef15c0cb6e46a796efe360114facafc61ab9dbbc505367ac92bc,2023-10-25T09:55:06.573000 CVE-2023-43355,0,0,c4b117c9804944c75cd5dc5b66ef9822dd7d587eb07f60aff552edf28fd17ac5,2023-10-25T09:54:56.877000 @@ -233585,7 +233585,7 @@ CVE-2023-44771,0,0,759f5caa4ff312adc1844eacc372b48edd64e9bbd76e6d932dfda8d616c83 CVE-2023-4478,0,0,5348235a48a55f31c4572d4018dc627b4d33591f8c27dad039edc84a4b665d59,2023-08-31T17:44:40.807000 CVE-2023-4479,0,0,6818bfd5bbc7a4a78de9639bab341181d3652d7bc8d8f1a6a93b644473398db0,2024-08-28T09:15:09.450000 CVE-2023-44793,0,0,94e699c7a5c1e5050c78917e026942966ba2334ee7cc3325919c619a07556029,2023-11-07T04:21:40.633000 -CVE-2023-44794,0,0,bbec943d13bdd3cc8202c6dd512f179690d957e90f51299b9e92a73da523ac85,2023-10-31T20:08:45.883000 +CVE-2023-44794,0,1,44795488961ab454b7c5d150748d935e69cf855973febc03e5526823a71329a8,2024-09-12T15:35:40.080000 CVE-2023-44796,0,0,4682972f268622535ca980cffce83dc3b08ecad74ff376fd2971fa55a6a27574,2024-01-10T03:15:43.313000 CVE-2023-4480,0,0,8f720a32700f0dcf88298f81723ae2c513370bf9c361e1a327c21e8404982fd9,2023-09-08T17:26:45.223000 CVE-2023-44807,0,0,cc9fa087fd498d5c0142310406c2f8e5ac715823650cae019eedc78dd30884f7,2023-10-10T20:16:41.627000 @@ -234305,7 +234305,7 @@ CVE-2023-45862,0,0,a3fb90f83c4489594bd26a84b93eb5897361e2bdfb615fcafc80fdd37f3c6 CVE-2023-45863,0,0,cf6fae54a14f38a06c16e080afb9ebbb51eb002a14bcbc450a25d2e79b041be0,2024-01-11T21:15:10.273000 CVE-2023-45864,0,0,49d0683abe5283d204b1632f92af572fad99867fbce0bd9d10ff82475a42f2b9,2023-12-15T19:18:31.150000 CVE-2023-45866,0,0,d3ec482177bb59545008c255cf987cfa8286ec66b1b42630424b6b7203f4a174,2024-01-05T13:15:08.603000 -CVE-2023-45867,0,0,5db5da4730a3eda998a4fd6ce2a21c0f3484bbd84571954836990317e57f8be8,2023-11-14T18:34:47.817000 +CVE-2023-45867,0,1,0314c515880fb017d31649ac97dfd1a27739fb723da54b4f85c7ca0a77c36aaa,2024-09-12T15:35:41.190000 CVE-2023-45868,0,0,df1b586624033c287b172839b213cbc8ec979ba18d71fde3b01da0f77fe96b10,2024-02-22T19:06:44.663000 CVE-2023-45869,0,0,ae0033b8875e66831bd0fa49aa37f059d0cc638339d10a85f589d8c5031628cb,2023-11-14T17:40:53.637000 CVE-2023-4587,0,0,2d9161b0ba4b4b9f51444521be9ee96176e07c56f44d6bd3c1d677910159fe30,2024-08-02T08:15:22.973000 @@ -234377,7 +234377,7 @@ CVE-2023-45960,0,0,b60ca086d7e781b599600f55c001e52e60402b7c8b53d659fb0d7e1482274 CVE-2023-45966,0,0,5770c23d7a1055925da75e30237365daf9b25eb3ab24d68eff7bd1883a3acb1f,2023-10-30T11:36:04.983000 CVE-2023-4597,0,0,37f4e825d223bcac78b0fd4971391bf181b167c9f77973cf513b20328d557be7,2023-11-07T04:22:46.810000 CVE-2023-4598,0,0,30ecfcece6a135395d77ec5bd149a9e9f7764624b99ed4b4eb6f0fdef4a87984,2023-11-07T04:22:46.967000 -CVE-2023-45984,0,1,3350883358c9cbe745683f8800ad354769be613f75b3c9d0bbff66cfa5d239b5,2024-09-12T13:35:15.987000 +CVE-2023-45984,0,0,3350883358c9cbe745683f8800ad354769be613f75b3c9d0bbff66cfa5d239b5,2024-09-12T13:35:15.987000 CVE-2023-45985,0,0,6f6cff27e522f1a9c4ed08f05809f336a5cceb16e4c2e8bfd2842f5711e6990b,2023-10-19T13:05:14.910000 CVE-2023-4599,0,0,bf65c63aa8c185a85104c44b82d5d9dfafee212a7388fbf49b37629b3ab2f770,2023-11-07T04:22:47.130000 CVE-2023-45990,0,0,d0dfe21b4b9588af001bdf27bd6216896d4d5a6d7e9da31cd0209a36589edef9,2023-11-02T15:56:06.930000 @@ -234612,7 +234612,7 @@ CVE-2023-46266,0,0,0cca64c4da0074c979fd0ea9f81014c10bea066b722fef62e45896591292d CVE-2023-46267,0,0,56d82f2136293ec805643b7aa2c34e057834346a4d6f8a282f29d606a8893e13,2023-11-07T04:21:53.713000 CVE-2023-4627,0,0,c3f215d7266421d11303f9b598a6cce58aa44785825679007cc56bf5ea031cd8,2024-03-12T12:40:13.500000 CVE-2023-46270,0,0,a78f63a0a6ef56712302cf2b6a08a466f7d890fbbfb5f306dc50afda07c2bc31,2024-04-30T13:11:16.690000 -CVE-2023-46277,0,0,a6fa4dbc780bfb3b6a6202bb0e83283f9b99e7e1a7b8f1ed53b4a92f0140d53a,2023-10-26T17:45:23.253000 +CVE-2023-46277,0,1,be6fe4d0b7cb70dd6214423a62fcfe115996bdd636e939e24cf7a25f94904c74,2024-09-12T15:35:41.900000 CVE-2023-46278,0,0,283a5f4d3b1f995039a2ae4f0ff4efe94da460721819375532b8f8104a5b1ff6,2023-11-08T23:22:08.177000 CVE-2023-46279,0,0,cad5cbf92c67be5e79c0f7d5a9fbe732104c543f1cf9a464893a67bc498495cf,2023-12-19T17:40:49.427000 CVE-2023-4628,0,0,9dd80f318e00bb6d35ea5e4f6175e104ad476846cbe758532913d6d17d532560,2024-03-12T12:40:13.500000 @@ -234701,7 +234701,7 @@ CVE-2023-46386,0,0,ed3371f1b68dd0ea202a314511605831267cce9e9adf81b603f147a07204c CVE-2023-46387,0,0,8909e4e6027bceb8d25cfe981ba526efce9f661777a2154ed032efdeacf43fda,2023-12-14T08:15:42.770000 CVE-2023-46388,0,0,8190be35a3b345538acc3354fcd61fe26280e3abff77a39556a10284b12b4d0c,2023-12-14T08:15:42.987000 CVE-2023-46389,0,0,580ab66b7131dede6fb282d42df59a76c2bde1dda748a78e2c687f185e5e8319,2023-12-14T08:15:43.187000 -CVE-2023-46393,0,0,d36843941bbf21f36aa7edfc5deeb49c407f06348ace9b27227c50075176e898,2023-11-07T21:24:28.183000 +CVE-2023-46393,0,1,ddccba58ba518df9c7b69b1f4bedd8c88454a3b9557da36fba8ad9c40f0bdd93,2024-09-12T15:35:42.627000 CVE-2023-46394,0,0,a4de4800ba9072f54d1bc0271928ac028c9cbec6c3baa0f74abcd72cfb575146,2023-11-03T21:34:46.077000 CVE-2023-46396,0,0,74f481bd37b42e6c5810d0851c91d8d9d55975de01fc2eeba4f5140ada061430,2023-11-02T15:03:59.683000 CVE-2023-4640,0,0,ef517ea28d5508716f101ef0a0cba846372ee2fe78cf6a3f47954c41f51018f6,2023-09-05T15:22:15.190000 @@ -234776,9 +234776,9 @@ CVE-2023-46502,0,0,d3babc7cf842caba025a854cc8650858396278f2df3b763f1a40e3007bb10 CVE-2023-46503,0,0,6aad2b11adbdf63ee2b98f2f9874d22294e8a21b124457d8975e7ab396baabb6,2023-11-03T21:50:17.803000 CVE-2023-46504,0,0,b1a792f6a001c3d4624673f603358c1faf3cbc35add3c27ad7ea5f5fb8811653,2023-11-03T21:49:46.150000 CVE-2023-46505,0,0,73642bb3b3e8d529ba4d3c5fa261eed03dce9b0a346af67bd48472e1f53469b4,2023-11-03T20:05:18.503000 -CVE-2023-46509,0,0,95092c6f299d2e64b8c8111b4b81f45bb6851bc59f2bf49256564e34cd454896,2023-10-31T15:24:07.963000 +CVE-2023-46509,0,1,1af3627fc1d236005c3182504e0bd51fe2b97fb35469ff44084fffdce0628b8d,2024-09-12T15:35:43.353000 CVE-2023-4651,0,0,5e40b8eb508a481ec27d34bd3bf988326bcfa73d1715fcd3bc452e4e1523793c,2023-09-01T14:50:55.347000 -CVE-2023-46510,0,0,a6cb193115d8cda16b0ff9fa8d9df3095f54d11b7c2bbb05a8e6009a4bf740bb,2023-11-08T00:54:34.267000 +CVE-2023-46510,0,1,bf712f9cf3d8f34dc25ce1740e093b9e206f31740e4413d03b57e112a7a603d5,2024-09-12T15:35:44.080000 CVE-2023-46517,0,0,b081a7170d3ca581d01a8ada8dfefe1c35f98b29ee4f5c66c49934bd23cc6bbf,2023-11-07T04:21:57 CVE-2023-46518,0,0,50a6b72c9eca27d9118865834eb8eeb2d6571605663676a98cbc4bc277ffc33d,2023-11-01T20:15:22.357000 CVE-2023-4652,0,0,5222738c738474475cc77f6118c2f194c8e026777ab00d0851e9cdbfda77bd35,2023-09-01T18:39:07.780000 @@ -237898,7 +237898,7 @@ CVE-2023-51010,0,0,d60af8a0ac1d722da984cff22e061fb1af97f5e876af4aeefe71ccd2f4f31 CVE-2023-51011,0,0,8499ff04d8a804b9293e8e451c8181ff2e1753bf3ead1ad48a0b5eab3902ed99,2023-12-27T21:10:33.847000 CVE-2023-51012,0,0,0d04c446f81f1b10f76f9be9488f2220a67c008b373b72a6a7bfdfe77969da10,2023-12-27T21:10:27.917000 CVE-2023-51013,0,0,d540acde61c6a0816d8214343da7f21d898e1e5738ec7065a1b498e4d05a72ee,2023-12-27T21:10:22.830000 -CVE-2023-51014,0,1,7a416dd88fb13dd4671f518ea4295c806a74d21ae582c829bc0c228dbb42eda6,2024-09-12T13:35:17.787000 +CVE-2023-51014,0,0,7a416dd88fb13dd4671f518ea4295c806a74d21ae582c829bc0c228dbb42eda6,2024-09-12T13:35:17.787000 CVE-2023-51015,0,0,f04ba1d51d5facd8714d1334c83e1227011c11a53fd9c2ea6d1729104e8be057,2024-08-27T20:35:06.640000 CVE-2023-51016,0,0,61ceaa15cef820a3a123ce1b88ddb80bec8a57b30d17ad67cf0ca5774934779d,2023-12-27T21:07:25.007000 CVE-2023-51017,0,0,91f71748c8584726ac785f883d240e345da011e02d754cbd5729f6b76e8a6dd4,2023-12-27T21:09:57.983000 @@ -237910,7 +237910,7 @@ CVE-2023-51021,0,0,ed61a40cac7029040bfd50696f5a8268fc879f410d488489bb806ccdb5b82 CVE-2023-51022,0,0,62ac5f7a3652397f9416cf18b3fc32001e92227d8e056b5ca565197d5eda7e73,2023-12-27T21:08:45.027000 CVE-2023-51023,0,0,97fd10b657e979f02ff01872561b3bc89bb54d4285929f3d237eefc50fa4a9f3,2023-12-27T21:11:11.397000 CVE-2023-51024,0,0,cfc1b278a9c197b16b490384a9d547ff37dc7e7e969aa0669548d53b216bd4f4,2023-12-27T21:11:05.060000 -CVE-2023-51025,0,1,51b4cb55ef600183f7474341575a0622afb7ecd2662bb5e62be415325b0776db,2024-09-12T13:35:20.590000 +CVE-2023-51025,0,0,51b4cb55ef600183f7474341575a0622afb7ecd2662bb5e62be415325b0776db,2024-09-12T13:35:20.590000 CVE-2023-51026,0,0,469c6bc86a9803d2bc97b4672eddc902338da8d54e3575585bd28fac2770080c,2024-08-27T21:35:04.070000 CVE-2023-51027,0,0,36d78e7e4fb6f6d3a1dd064e6461d5fda34eb3e45e61356f69a1805313d44aed,2023-12-27T21:10:41.763000 CVE-2023-51028,0,0,c45a34077d471b7125aa2cbc11bce0da1d1f6f51e351f1883a73eedec46c187e,2023-12-29T19:25:10.280000 @@ -238554,7 +238554,7 @@ CVE-2023-52026,0,0,97e210a7f595754664d5ef40b6d2d6bfd47bf2efe0c39fc35540e8b01a98e CVE-2023-52027,0,0,193fcb4723dbc6f6df50c2a741f36f147bcc58cbe679fe018cd81ab06f835b7b,2024-01-17T21:46:49.123000 CVE-2023-52028,0,0,ca649cf6420af6a916d4ff6f573aa07e9755fff5083ddd89cad045dc95f8ab11,2024-01-17T18:26:49.623000 CVE-2023-52029,0,0,f273d8a19ed98bb890b6fbda29808d2fc4a9593a969a333209d93a879cc5dbf8,2024-01-17T18:26:18.677000 -CVE-2023-5203,0,1,2e3b5ddcdf8daa7f1f05a91e81304f61872052d4962b0df8a5d2b69b641b971e,2024-09-12T13:35:21.440000 +CVE-2023-5203,0,0,2e3b5ddcdf8daa7f1f05a91e81304f61872052d4962b0df8a5d2b69b641b971e,2024-09-12T13:35:21.440000 CVE-2023-52030,0,0,76d554e95f16c64503e7b6018e2d99319376d1d27ea9579f62077528e8ba84bf,2024-01-17T18:25:43.917000 CVE-2023-52031,0,0,b5700d96bf9c3bc724e272100f7bceeee700dc1f84164452fc1688de1fd80cf2,2024-01-17T18:24:45.007000 CVE-2023-52032,0,0,97ab280ce7f21720b81b7f6893c45f8f4965477ca6bac23b53d863df7c1b8814,2024-01-17T18:10:27.367000 @@ -239386,14 +239386,14 @@ CVE-2023-52904,0,0,6a62cac2e74e694a7019d2b3113a49f6f191f6af788282fe6177012b7b8b2 CVE-2023-52905,0,0,03dfd45469c5dbe0fccc3e21152dd6845f9d3290abc3f07c2476edbdd31ead32,2024-08-21T12:30:33.697000 CVE-2023-52906,0,0,5be340f900a447b138c7a11c9c32330c21841a8c27915ba1003ccfb90f2f3116,2024-08-21T12:30:33.697000 CVE-2023-52907,0,0,9fc91f9b6f469ee2c7d90e8be3c4bf2080716d7f1aa948d846045c5b2b5687a3,2024-08-21T12:30:33.697000 -CVE-2023-52908,0,0,465a7ae751e1da9f6a7e7863f437ec34f852120ae1d5f7abfafa074e2570b590,2024-08-21T12:30:33.697000 -CVE-2023-52909,0,0,ef530b97ed5961aa46bf9f7268392078a7c8fdc5448f21665f011386cb145fbb,2024-08-21T12:30:33.697000 +CVE-2023-52908,0,1,531fb64c1bafc6ed44bf1e0f48c909a289409c64299751ace32af4157b44a112,2024-09-12T14:54:41.943000 +CVE-2023-52909,0,1,d5706817190bc5ee11d87d5ab7bd4d1a37d41b6be25533876d8fa9a349e63a04,2024-09-12T14:52:54.573000 CVE-2023-5291,0,0,9fbf4165ef098167a71fe88b00d2bfc45902a0f6c10baa2f3dd4bdabd4d91739,2023-11-07T04:23:48.757000 -CVE-2023-52910,0,0,e84706cf5fc8baa20efd9058799060ed52ce217237537a633b2cb258e76bd450,2024-08-21T12:30:33.697000 -CVE-2023-52911,0,0,d583bf0c3994a5cde3f25badb72d8404d832e6fe0d8e110e053203df0effa90d,2024-08-21T12:30:33.697000 -CVE-2023-52912,0,0,76d151333b77b2bd9a44e2c7429e02509b46f2a3384c99f9d0812059fa9223aa,2024-08-21T12:30:33.697000 -CVE-2023-52913,0,0,e1054c26f9dea56ffd68b68caf0b3e79a17694aea6f3abb40c24e04a641898c2,2024-08-21T12:30:33.697000 -CVE-2023-52914,0,0,ea9dbf463cbd5598879fed8b6374213941d18b44baa0478af4d6ebdab43bbea1,2024-08-21T12:30:33.697000 +CVE-2023-52910,0,1,69eda1973b13cfadaf8b20a334fd599e0379ee79db2182529ec79266ddfae5a8,2024-09-12T14:47:08.540000 +CVE-2023-52911,0,1,8f960710719c78a6de7f250dad79de80fd560c1357dff4d16b798919567c9b16,2024-09-12T14:49:30.220000 +CVE-2023-52912,0,1,f73b559c46c779fc7572cade474bf3639785ae5be9b2a49b2309827f935357b8,2024-09-12T14:35:58.593000 +CVE-2023-52913,0,1,0dff51631ec1ab5b0464af1dd4af3149cc942bacf8d31e47da582f111f384c57,2024-09-12T14:38:40.430000 +CVE-2023-52914,0,1,3e2f63e6fcc2429a7a056b2f17033ece733c3917a2a011b1363b92bf8c84ed22,2024-09-12T14:07:17.137000 CVE-2023-52915,0,0,ce3c89a4bf7cab80e859d29c06c18dc19c9bdeb973ab832dffae6eeb3861fdf4,2024-09-10T17:12:41.607000 CVE-2023-52916,0,0,5bbab86a5a2f596b1e1ed53b9221822f4b413f719a69472a8344983675045bd3,2024-09-06T12:08:04.550000 CVE-2023-5292,0,0,214d7ae5654e29ed0e372211abf39e379cdbd830eab553609e162ffb791fd787,2023-11-07T04:23:48.910000 @@ -239731,7 +239731,7 @@ CVE-2023-5650,0,0,f6e0dc230c0b540535b0b9ebae2d319657337868df469dae78545850c2347a CVE-2023-5651,0,0,0a8a2bfd51bc8a7e45f7e7f896e8a88e87c7b037e9759e8639c46f9ebe17aa97,2023-11-27T16:30:23.423000 CVE-2023-5652,0,0,0dc4a6ccbcf18205eb94eb075191d5829689d47529037094e238a68cef8bbe4e,2023-11-27T16:30:00.860000 CVE-2023-5653,0,0,bd8fafc0cbf5d974cd3e86abf449c0cb7a4f03cf033b27e863aa08c089812366,2023-12-04T14:53:32.297000 -CVE-2023-5654,0,0,9f70f3bb0cb9d399212aa5a85161624d79514a2ac054a8bcba8105667d7de1c9,2023-10-27T21:53:06.943000 +CVE-2023-5654,0,1,e307ffc3c443daefe760a1f786b6aac20080c65ed168c23ed909e1f3506c0a6e,2024-09-12T15:35:44.870000 CVE-2023-5655,0,0,e756830a1ea64e50929cb41df3818e46d7b47e803847a9c5c85371b0c4620df7,2024-01-23T23:15:08.403000 CVE-2023-5656,0,0,b6036d2812962d949d768e5f714bae5314833cb32311ee092a1a1c60d5aa04bf,2024-01-23T23:15:08.440000 CVE-2023-5658,0,0,d87976ce58d5ca8f83fab98d8ff2d1b0dd2be7169175e47ab628824cd6110289,2023-11-14T18:12:25.910000 @@ -239746,7 +239746,7 @@ CVE-2023-5666,0,0,f2483079ef5e97ae7a96cbca91496e168943ff44509841e8947dbd9938d11d CVE-2023-5667,0,0,fbfb8124df78a0e2dcd7753130f3011a0359b4cb50cba47b2030ab1ae3cf7f4a,2023-11-28T19:22:46.013000 CVE-2023-5668,0,0,ceb0ea397eb6f67ac3a609571d1cca2680e2c13d72754d3b95dbf74e9c4230a0,2023-11-07T04:24:14.117000 CVE-2023-5669,0,0,91ba468ea593cd8a4d3235d0fca65ed4fcc5e76b9f18600fd8a4e14c058f2ee4,2023-11-20T13:15:07.450000 -CVE-2023-5671,0,0,50ac10b9cc7488ff45beca022ca2c8bfeca913601f0e3037d8310da6b8aebf50,2023-11-07T21:46:49.640000 +CVE-2023-5671,0,1,d06dece2faf0b0f0a3880639de29344b329ad68581d3c506172ab800ce17d806,2024-09-12T15:35:45.620000 CVE-2023-5672,0,0,3a02ae788e6479b0973d2859fc92f0f3aa5f1eacc4aeaf95969cc73a95f6377c,2024-01-04T17:08:45.617000 CVE-2023-5673,0,0,0790e42d3f7d18a38cdd70e6e65a841d138cd94613d9381c2d41690098ccc5b6,2024-01-04T17:09:37.303000 CVE-2023-5674,0,0,ad6a524623973b785443ed5ef1d7ce3fc434ea992e37165634367ac391476b75,2024-01-04T18:49:34.613000 @@ -239810,7 +239810,7 @@ CVE-2023-5731,0,0,c1daf03dfeb34a82b6a0b38106668813b5fe61b49c93910bf8ca3f99cff3dc CVE-2023-5732,0,0,70b33167b6b01f2251a02426109b1eedfb791dcbe336442b3d2c1f20e22c9c08,2023-11-01T19:28:03.360000 CVE-2023-5737,0,0,5c2d05865ebc989c4a5d9700001e6aa67213d28f02f590a163cf65d99187f862,2023-12-01T20:41:26.787000 CVE-2023-5738,0,0,6ce9454bd5480ab30028052ddfdee5279d5fd437e35db346ad8fcae48841253f,2023-12-02T04:36:42.670000 -CVE-2023-5739,0,0,7314509493ebb1ef72c216c69a35bd4ee3ecc387a8b0290f362b1cf16413179e,2023-11-08T17:57:37.590000 +CVE-2023-5739,0,1,9d44d1528d73b42485a3cf4fc5d45d60f79ca4338a50d00aa694b0e679b70237,2024-09-12T14:35:09.683000 CVE-2023-5740,0,0,f30072a29f5167bf376bd50aa2cbaf094aff4de0aaf054eb6eb5c0cc77fa5116,2023-11-07T04:24:19.073000 CVE-2023-5741,0,0,9850a98399f209bcc9e7f4faae817c7e054fbc36458fba5e3a11bdc874730c27,2023-11-17T13:57:53.227000 CVE-2023-5742,0,0,56ceb169baeebffcf4fdc4a61f6cae8babcffcdb84d9c703297e86bc2a6a599a,2023-11-27T21:40:48.237000 @@ -240200,7 +240200,7 @@ CVE-2023-6151,0,0,c74bd4f52d23e8ab5950a1a437b3d7ee59bc95b0878829f08be40405e2f4b8 CVE-2023-6152,0,0,0d2825ec69cb4b721a6f1646fd77933be6585a1e1d45fd8c34332975f0217d22,2024-02-14T13:59:35.580000 CVE-2023-6153,0,0,64c8750e1add6b283c202acc9f7c145138f085f17b9a40e6d77edbf949e4648d,2024-03-27T15:49:51.300000 CVE-2023-6154,0,0,ea79ef7106538fbc68e1e41b2608f4b1a33d1c9bd0e166ed2658519f1ceeb79f,2024-04-01T12:49:00.877000 -CVE-2023-6155,0,1,8999e28dacf358c98e2deb0d543f61d7454111fd1c5e35599649cebc3b861eb6,2024-09-12T13:35:21.663000 +CVE-2023-6155,0,0,8999e28dacf358c98e2deb0d543f61d7454111fd1c5e35599649cebc3b861eb6,2024-09-12T13:35:21.663000 CVE-2023-6156,0,0,cce0f565e31bbd5b369b30b0d530576fb9249e1dbb1b5f89f4393ae594d53bdd,2024-07-23T19:37:16.630000 CVE-2023-6157,0,0,782b912eab721255f9c55fa132b62392c4c9b34a5e1fa4665d20d55ef1a3ac08,2024-07-23T19:37:16.630000 CVE-2023-6158,0,0,62a89451846c950ce19dfd20a450b8496f2772cda6944d8c586f76270905e41a,2024-01-17T17:36:01.273000 @@ -243077,7 +243077,7 @@ CVE-2024-20087,0,0,2f5d7a31aa34aa82f766600cc0380d879410c6c21363c39a9c898fbc9d48e CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac946fe,2024-09-05T14:27:24.840000 CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 -CVE-2024-2010,0,1,aa8252b752543a7021f6ec665f991b01935989d11bbc2ce1d9d3c73d6ca240db,2024-09-12T12:35:54.013000 +CVE-2024-2010,0,0,aa8252b752543a7021f6ec665f991b01935989d11bbc2ce1d9d3c73d6ca240db,2024-09-12T12:35:54.013000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 @@ -243138,7 +243138,7 @@ CVE-2024-2030,0,0,f47e609ec6da92e4d0f51eb73197726fa40c04bd5fba84d7e80690a86556bb CVE-2024-20301,0,0,ee58125f54e59b57e5b1ea49a524ecc5e7feeaab3c308ff448cca9b61624ff41,2024-03-07T13:52:27.110000 CVE-2024-20302,0,0,bb282df08e1d4adc1029a76ce336553cafd173c3d92914cdfd5b12151cc62afc,2024-04-03T17:24:18.150000 CVE-2024-20303,0,0,393665d251452d2f76b8a508b1c314e9e2878d06110c2d34091d44dcf2cc0a6d,2024-03-27T17:48:21.140000 -CVE-2024-20304,0,1,3812936275e0a166362c6d7eaaeefb6bce56f66dc1bd8b9bf9cb5cda78792939,2024-09-12T12:35:54.013000 +CVE-2024-20304,0,0,3812936275e0a166362c6d7eaaeefb6bce56f66dc1bd8b9bf9cb5cda78792939,2024-09-12T12:35:54.013000 CVE-2024-20305,0,0,e4850a7e4dfd71e4153c0c643b6c021aca041e6b1000ad76e287dea34422e456,2024-02-15T19:56:38.910000 CVE-2024-20306,0,0,a55540a2cb6844d768b14dffbabe4bb78cc3a5c4d9558b64001a5a52e8d62bc6,2024-03-27T17:48:21.140000 CVE-2024-20307,0,0,c9b1980d050b3fffe9b920134a5cc15d4bc4342c9015ce0f25b18451c8603eb9,2024-03-28T02:01:21.693000 @@ -243152,7 +243152,7 @@ CVE-2024-20313,0,0,96b72ec3ea9a86485607e2ffa69836dccdb51202f4c2887cc83e951c773db CVE-2024-20314,0,0,a98784f9bd6648b4e9213d024554c4bdc3787c88a73e5444218360086545b280,2024-03-27T17:48:21.140000 CVE-2024-20315,0,0,5caa6584a9f7867d452c644b063cd61c8678e63915145863d235ac082ed1caf7,2024-03-13T18:15:58.530000 CVE-2024-20316,0,0,1089bd3d53e5b2c49a8770723814eaf98c1e5899b4afab359e71b3645406a923,2024-03-27T17:48:21.140000 -CVE-2024-20317,0,1,669b143dbdcaa85e2b1322632669051074327ab943b5c5aec98dcf35c1b64a00,2024-09-12T12:35:54.013000 +CVE-2024-20317,0,0,669b143dbdcaa85e2b1322632669051074327ab943b5c5aec98dcf35c1b64a00,2024-09-12T12:35:54.013000 CVE-2024-20318,0,0,41adde3fb857f9cea03517c6a4e2f4dbc032d61fb88e0a42b8543d819f5a2d70,2024-03-13T18:15:58.530000 CVE-2024-20319,0,0,0a1466563a9818d205ff8725c3cf2a5afe9d75f3720a76315e91f8e81770c747,2024-03-13T18:15:58.530000 CVE-2024-2032,0,0,6c9fab941a4b444e93407737c1e5c294d8f201f8109308d2a41aae9e970336f2,2024-06-07T14:56:05.647000 @@ -243173,7 +243173,7 @@ CVE-2024-20335,0,0,3ae82e4e51ce7dc67e890bbf3242dddc369bcec5a9c67ccb96545dde173de CVE-2024-20336,0,0,7da9174c756054acc761610c3354924a4d132dd65f90fcdc8e0995c2dbe104c8,2024-03-07T13:52:27.110000 CVE-2024-20337,0,0,a7c8d58b2276bc115bd59fc582b798a8fadaf5ed39ee4effba6490a0740366a8,2024-03-07T13:52:27.110000 CVE-2024-20338,0,0,510c65881ff77bd5a9b4264c80e30939b8e2e91bda87ae599bea8187a8352e74,2024-03-07T13:52:27.110000 -CVE-2024-20343,0,1,6d459c359b803056556eafa204a9c75c219dfa0e37ccc8515b9843ba8c10d3de,2024-09-12T12:35:54.013000 +CVE-2024-20343,0,0,6d459c359b803056556eafa204a9c75c219dfa0e37ccc8515b9843ba8c10d3de,2024-09-12T12:35:54.013000 CVE-2024-20344,0,0,0c95d8c456a266581d87105f2300bfe021552d9f4a6b780624736cdaf9bbf776,2024-02-29T13:49:29.390000 CVE-2024-20345,0,0,e5a5f742b4ff4031a273ec9fe2b2ad050940d29d6b880414ea07f31d237eeb39,2024-03-07T13:52:27.110000 CVE-2024-20346,0,0,e4704ca0489e4b87a71ea5f4cd06c08893e2d13b9b7afaf3042bc49437657528,2024-03-06T21:42:54.697000 @@ -243202,24 +243202,24 @@ CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc CVE-2024-20378,0,0,1d0c211142ee7b64cb979c7d6fe81a8dda4cc3d613763c0904f9ebf5643e5461,2024-05-01T19:50:25.633000 CVE-2024-2038,0,0,84783e34583c406994ceb062343516951516f0b07f0d721026ee845e3108d0ec,2024-05-24T01:15:30.977000 CVE-2024-20380,0,0,ed7ad99e229e06574506624c01ede2d6fb857cd8a1e722ec6a335ed1ef4a76e1,2024-04-19T13:10:25.637000 -CVE-2024-20381,0,1,206ca6b90b48001500d951647099fc1ca56b0d1770630ec5c7fd8591f92f83a7,2024-09-12T12:35:54.013000 +CVE-2024-20381,0,0,206ca6b90b48001500d951647099fc1ca56b0d1770630ec5c7fd8591f92f83a7,2024-09-12T12:35:54.013000 CVE-2024-20383,0,0,3adbaddaf4554eb7166804e65fe9fdbf83fea813b82dd738821e310951cf1618,2024-05-15T19:15:07.900000 CVE-2024-20389,0,0,160949b8c6cf6fc5f7f18a2471e2354fcd0f701247dfba3a85f25095732dcffa,2024-05-16T15:44:44.683000 CVE-2024-2039,0,0,0fb3eb6d9df1cb8dd04206e4fde20555dc794b24595aa985157932f2a933450d,2024-04-10T13:23:38.787000 -CVE-2024-20390,0,1,5a2907cab8e9bf15e845ea050c44bed3aeb43d2fce6592a7a3404a48f7d61dbb,2024-09-12T12:35:54.013000 +CVE-2024-20390,0,0,5a2907cab8e9bf15e845ea050c44bed3aeb43d2fce6592a7a3404a48f7d61dbb,2024-09-12T12:35:54.013000 CVE-2024-20391,0,0,901fcf36cebee039d4f38edb4044ef84c4f44829a18fc236320c17fd1b5f7286,2024-05-15T18:35:11.453000 CVE-2024-20392,0,0,94a9ebb2bcbc95d69522cf1a691e2eef5f012e7892caae86240bb4af40e4b8c2,2024-05-15T18:35:11.453000 CVE-2024-20394,0,0,ef9256f36e7609b8b050262ee885b4f4c47119c80c5a1a8288a0a5eef0d4f23d,2024-05-15T18:35:11.453000 CVE-2024-20395,0,0,28ce7d382757f62de6c6fa8be8ab2c7d5b7fe481f67f112d437fdc5648f5ed0d,2024-07-18T12:28:43.707000 CVE-2024-20396,0,0,ab24e73adad18da7437bdd92525b27eaf5bf0f1df88229897bcf01b790a24b3d,2024-07-18T12:28:43.707000 -CVE-2024-20398,0,1,e5f8f1014ec093b19c3aee1e58f0d383406da3978da2e5e7f51f4a4a4493a0ae,2024-09-12T12:35:54.013000 +CVE-2024-20398,0,0,e5f8f1014ec093b19c3aee1e58f0d383406da3978da2e5e7f51f4a4a4493a0ae,2024-09-12T12:35:54.013000 CVE-2024-20399,0,0,1658084bea8e53da217e51840f29eeda502742ddfa8390e457cdfba97449b979,2024-08-14T19:41:18.033000 CVE-2024-2040,0,0,84818b4f00c676396e69702449b7daec96ba4021835b05a5adb074a919ab8480,2024-07-08T14:18:10.367000 CVE-2024-20400,0,0,e22f5359b4eae3d1123c96473d077f1ed8cfcffe9256c923e22249fabd71dd12,2024-07-18T12:28:43.707000 CVE-2024-20401,0,0,4e570494182ec3fb0c9186b46f7948499e59b61e9f8ec1f0ca5200f010002753,2024-07-18T12:28:43.707000 CVE-2024-20404,0,0,9ff8f593f71d4a0ff7aecb6b668971610942799ed16450e68ad59cf7f0b9f5af,2024-06-13T20:25:46.837000 CVE-2024-20405,0,0,2fa5b4e65c2f399507a2e57227d51876c94b3517d024d761ea8ec8bc4f4a8a91,2024-06-18T18:04:04.497000 -CVE-2024-20406,0,1,01aaafe449ee420500b1edefdacc3ddc2b6232e6350a88c752467bf1ed2b3c7d,2024-09-12T12:35:54.013000 +CVE-2024-20406,0,0,01aaafe449ee420500b1edefdacc3ddc2b6232e6350a88c752467bf1ed2b3c7d,2024-09-12T12:35:54.013000 CVE-2024-2041,0,0,7b4fc911113d944c485bed2a7f958b069e0536bf197811dc0e3dcb8018df3bd7,2024-05-06T14:15:07.747000 CVE-2024-20411,0,0,4f003e5090f28bf95bd35a4fbdae5180d9a8ba20c425549807eec3131f67ce95,2024-08-29T13:25:27.537000 CVE-2024-20413,0,0,86bcdec57862054505f9b68ddff1575eb21295556bb50a8805e2f8ad7064ffd1,2024-08-29T13:25:27.537000 @@ -243246,10 +243246,10 @@ CVE-2024-2047,0,0,65f16d2420b90c918e9e57877aac5f0440eb772d779ccbd58288e6312f3c80 CVE-2024-20478,0,0,2552b4b9bbc0a5cff57b3b8f7e9d97910094a88aceb9d33bb06e1a51f9db4e5e,2024-08-29T13:25:27.537000 CVE-2024-20479,0,0,ced5b461eb6ab05478119ddf8b399bbc19a6ff248adc19d6fde8eab586c6db76,2024-08-23T15:14:45.913000 CVE-2024-2048,0,0,3fe9d949673d5eedf190595df45c4c7d30c6a66a4722ea0631f740f815dd3cc0,2024-06-10T17:16:25.067000 -CVE-2024-20483,0,1,c3aaa012ac8e934bf0fa344f4717405eb9a54f40a1dd6df07175cd5998974e08,2024-09-12T12:35:54.013000 +CVE-2024-20483,0,0,c3aaa012ac8e934bf0fa344f4717405eb9a54f40a1dd6df07175cd5998974e08,2024-09-12T12:35:54.013000 CVE-2024-20486,0,0,1ec7a6c2a991b67e11827b3b316fed30b5b5340988b303f9088e0f10e2e894f9,2024-08-22T12:48:02.790000 CVE-2024-20488,0,0,b3c319abc05ee7d52fc498f08ba4c2d91fe7b6f1527a7957b5c4a113170ee559,2024-09-06T17:18:11.813000 -CVE-2024-20489,0,1,21cc73253209554f6b4b15a9223bc3f2b9ae3b7c0f2dd8d7b8823af1edcfee1e,2024-09-12T12:35:54.013000 +CVE-2024-20489,0,0,21cc73253209554f6b4b15a9223bc3f2b9ae3b7c0f2dd8d7b8823af1edcfee1e,2024-09-12T12:35:54.013000 CVE-2024-2049,0,0,398a9eaf0287296877598afba029844504bbde28a3270479d8cbbb594cc11b40,2024-03-12T16:02:33.900000 CVE-2024-20497,0,0,422eb4ecec5d7dd92ef5d49505af3bc2f0e220b53f5fa76471b6dd3d460b94cb,2024-09-05T12:53:21.110000 CVE-2024-2050,0,0,309a92deb7dc6d1c9b389273f8521ce493fa3e8c536f740883081c4cdf858e77,2024-03-18T19:40:00.173000 @@ -243838,7 +243838,7 @@ CVE-2024-2127,0,0,fee555ba22c69f33931ace66815b77d0a5796e2ad55c5d25b843a412734e73 CVE-2024-2128,0,0,ad241575873847a0cb8491370112d4603dbee504ed1e31d448d346ee3b31a6d6,2024-03-08T14:02:57.420000 CVE-2024-2129,0,0,4e7afd99b608981f119f3e5da184ba51484f21aa33b32d2a6446850d6a9f1652,2024-03-20T13:00:16.367000 CVE-2024-2130,0,0,949f4490e30f20ac86b94271cd74ebfff8857dc5306a19f843591857ffe5e5d6,2024-03-13T12:33:51.697000 -CVE-2024-21302,0,0,7f077992178db4f9ca7e7ab38205852128c041a69581614131fbf99216ddb39b,2024-08-16T19:15:06.787000 +CVE-2024-21302,0,1,f41e35b670099b969d37a43978e4938e033f0e174348b929aecd112a84c90a1b,2024-09-12T15:06:55.120000 CVE-2024-21303,0,0,31305e4f13f06e014520a5c4242d36bb9f7e995e328fd8a39c76a2a5f7c7bab2,2024-09-10T17:49:31.897000 CVE-2024-21304,0,0,aee35375e056bcda8357796076fddae312bf87811aac2cea1256e28fc4176e51,2024-06-11T15:15:58.253000 CVE-2024-21305,0,0,53ae725a4db9001e5894d4654d0d4d95d10acc8936d902ba245a4100e59e1d3e,2024-06-11T15:15:58.433000 @@ -245564,7 +245564,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 -CVE-2024-23716,0,0,b8d91fec54a7796bb4940ee26af69138a73b4839567fbb8e275623c55afe157c,2024-09-11T16:26:11.920000 +CVE-2024-23716,0,1,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 CVE-2024-23722,0,0,af1e6a2b53efd211283ec4f6a153b9c2bd466feef4ec2b55fd6db947ef4fb0f6,2024-08-06T14:35:05.600000 @@ -247994,7 +247994,7 @@ CVE-2024-2711,0,0,50ffd1863952a28cb20d757a1f3a8a646342dad98b8dd38660e5f271553772 CVE-2024-27110,0,0,cbd5f20a9295447075c0d9ddae39d8a0518f51482cf9653676931acac4a2af17,2024-05-14T19:17:55.627000 CVE-2024-27112,0,0,41c14305ce29ba929571729adf6232d512555280634d6a8770ba26178a7c6ad3,2024-09-11T16:26:11.920000 CVE-2024-27113,0,0,2c82b79fa533bf59473fa978b81949df2d6b2c94e8681438945525d1559125f7,2024-09-11T16:26:11.920000 -CVE-2024-27114,0,0,c524202d503c9645b59617b2e93f59293aaa827223bce7691c27d555aae04b0e,2024-09-11T16:26:11.920000 +CVE-2024-27114,0,1,3e1fae20c9adad815745a794b2932d5ca31de37ce5dbae672cdbb468f3bcdcfb,2024-09-12T14:35:12.397000 CVE-2024-27115,0,0,8ce6819b2281b5044808d901b951c9af48fcfc88b1321324751d7dfba9f3dbde,2024-09-11T16:26:11.920000 CVE-2024-2712,0,0,12d5f119117cab5321059a19687d0b6e7d22fe860cd65815723e1f9810583e44,2024-06-27T19:15:13.167000 CVE-2024-27120,0,0,4abe17d3c70fcebeaed9cfc849b5af8035eacfb7b2d62a88500c7d222ad02f14,2024-08-20T19:08:54.490000 @@ -248190,8 +248190,8 @@ CVE-2024-27317,0,0,c4936bf6b1ea8eb440227e5af31c10ab09a9d8539bf9187002383935723d4 CVE-2024-27318,0,0,bb1e039cfeff54678be2a3d7675b064a42975817bdfb0398be1540195f1fd295,2024-03-30T02:15:08.007000 CVE-2024-27319,0,0,198bfb473ae5c4a00a4bf458aba8771a9487b41224f35d4388056e6f7ba27f15,2024-03-30T02:15:08.090000 CVE-2024-2732,0,0,59c41b28a53d51de59243e9e076d0b70e0706e7684df1ed7a61104bd5a3689d1,2024-03-26T12:55:05.010000 -CVE-2024-27320,1,1,2a7b0f2c21153f3ba9baf90c95c5fb332577b954dcf916eae94d45ededf1a44c,2024-09-12T13:15:11.987000 -CVE-2024-27321,1,1,9066b29d47490e2527102ea2c6e7141b9dd14f25801131f64029670903aa0714,2024-09-12T13:15:12.267000 +CVE-2024-27320,0,0,2a7b0f2c21153f3ba9baf90c95c5fb332577b954dcf916eae94d45ededf1a44c,2024-09-12T13:15:11.987000 +CVE-2024-27321,0,0,9066b29d47490e2527102ea2c6e7141b9dd14f25801131f64029670903aa0714,2024-09-12T13:15:12.267000 CVE-2024-27322,0,0,b770b9d962cb08865ef72f437565bd0d77dc69db533af805410b12f466305679,2024-06-10T18:15:28.103000 CVE-2024-27323,0,0,69807669535ca94b03be7000671f196786b1f00fd0db4b0142b97dcabe39642e,2024-04-02T12:50:42.233000 CVE-2024-27324,0,0,bd68fc610631d765b504e2eb0f9c966837d653f843cbd0dbbbd7151aba723966,2024-04-02T12:50:42.233000 @@ -249281,13 +249281,15 @@ CVE-2024-28977,0,0,595331eb11b0123839e916f01746f57387cac5ac57ba95b8bd9b5a83f3c74 CVE-2024-28978,0,0,4f3d3e4cd04d1637d7e0c8567c10bca3a3eac8362091f1c3bdfba2d85e114338,2024-05-23T19:05:13.353000 CVE-2024-28979,0,0,94e9b6c95a24be8b1cdd5a15709ed8083c2893ee5b5273129b8771382be39a15,2024-08-20T17:15:18.597000 CVE-2024-2898,0,0,7dabbc345008f13b8373a1a2d71ee4344db041576d9ae3f0290950d4a3a3f396,2024-05-17T02:38:36.130000 -CVE-2024-28981,0,1,cd4c5692c9a70928a3c82dd2dfe70b15e0b1849d79bf5c6ce297f02b6b1c1728,2024-09-12T12:35:54.013000 +CVE-2024-28981,0,0,cd4c5692c9a70928a3c82dd2dfe70b15e0b1849d79bf5c6ce297f02b6b1c1728,2024-09-12T12:35:54.013000 CVE-2024-28982,0,0,4cfbf3591cf96f37013314412d2a968313b4953b63ec28142d546cf8f6808f7e,2024-06-27T12:47:19.847000 CVE-2024-28983,0,0,57b7369f9816fa1a55923b116dcbb27a793b7aad06b7761c68b9fcd8c194e8f4,2024-06-27T12:47:19.847000 CVE-2024-28984,0,0,276bc8c54cf8ee7419930c3e9177a9acf5146d6167c989ef6d1387fafadac995,2024-06-27T12:47:19.847000 CVE-2024-28986,0,0,1bc724868f1fc8a3c45a5557a2e0154a8318c8e26360517fdaccaced6288454f,2024-08-16T15:04:28.150000 CVE-2024-28987,0,0,a8b388aa0866daa044867e0e7549769a8c4ba15acabd6bd0464b05f5ad13c511,2024-08-22T12:48:02.790000 CVE-2024-2899,0,0,0be0fb50fdcc13228c9b49554460e4a306be4c6e83ee7f9bfb94b945f4f9e595,2024-05-17T02:38:36.220000 +CVE-2024-28990,1,1,cd6567be02208b6875f7a000e666b2f87973688091040f2ad26d5a47849b73d5,2024-09-12T14:16:06.273000 +CVE-2024-28991,1,1,fe172b3d1d36356b2503dace310ce527cff2cf2c967a2ad87b9ae9d09f6ec917,2024-09-12T14:16:06.540000 CVE-2024-28992,0,0,dcb8c493077168591aebe4d60d7719870f581d45ce48e73108abe9067fb629eb,2024-08-22T15:56:58.207000 CVE-2024-28993,0,0,9c5125da7327315f017a58b350f8b638b25e9c0dcede224162aff682993b7d59,2024-08-22T15:54:56.087000 CVE-2024-28995,0,0,23c52fbffb3e9fb74833a00e094548a239a07eefa8716c4e259000599c6e6a05,2024-07-18T01:00:03.197000 @@ -249797,7 +249799,7 @@ CVE-2024-29842,0,0,77cf514c0b32e2065b42a210e85de1b3dd1fcfd9ce78ade0fcde1fe2e668b CVE-2024-29843,0,0,41804c6878fff306ad535908f3d209167ac225d5623d60cea113e3286e770f48,2024-04-15T13:15:31.997000 CVE-2024-29844,0,0,3495725dc250eb1949854b406c5dfcbd5242a9c1587751d7036922a17379ddc0,2024-04-15T13:15:31.997000 CVE-2024-29846,0,0,ecf705f8a3f3d5200a5c3119a1c5f5c4508879a9b659519aff9f7061bee1cc64,2024-07-03T01:52:46.270000 -CVE-2024-29847,0,1,b26a8341cd380578fcf157a96533b4f6eef0d5b2064430632ceabcfe942193d3,2024-09-12T12:35:54.013000 +CVE-2024-29847,0,0,b26a8341cd380578fcf157a96533b4f6eef0d5b2064430632ceabcfe942193d3,2024-09-12T12:35:54.013000 CVE-2024-29848,0,0,572f203a18b60b1fdf8b35785afb572e4ba27bc9b1677d0760a64742aa875c84,2024-07-03T01:52:46.980000 CVE-2024-29849,0,0,072b0476443be0a966db74d66f638a80778dd162866abb6662b51c636fbdf995,2024-07-11T15:05:34.760000 CVE-2024-2985,0,0,eccd7e0304328f19c740fa6917e6be8e07842d176de854a8967fc91747386345,2024-05-17T02:38:40.683000 @@ -250964,7 +250966,7 @@ CVE-2024-31332,0,0,fe533958eb1f5014a983744e26d4dc56008592fb4b2dc96ebd425a317d9ee CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd8ff,2024-08-19T13:00:23.117000 CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 -CVE-2024-31336,0,0,00037ad75b852320b53e760cf14335f32bcc6e8b8147ec73fd652c18f445295f,2024-09-11T16:26:11.920000 +CVE-2024-31336,0,1,3fabf9b98cda8744ca51bd8782251957978d895be1926c83ec7e0b7664011a38,2024-09-12T14:35:13.360000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 @@ -251178,7 +251180,7 @@ CVE-2024-31626,0,0,6d48ca244a7fb039538d6e9b26f71170e207ffafb08843b89ee3ec2f370dd CVE-2024-31627,0,0,5c857ff477019105381749492d85a34695636b9db0c5f4e905fef7028afdac5f,2024-06-05T17:15:12.817000 CVE-2024-31628,0,0,d1e1002cfeaa20bb2521d6174b8a95169d4f2c09dd222e852d091ee789ef0ab3,2024-06-05T17:15:12.890000 CVE-2024-31629,0,0,553c81e4d5a1720d369cb037cd3d3fdc00a0ab2d6da0b4add50845296fba4630,2024-06-05T17:15:12.960000 -CVE-2024-3163,0,1,43c8667f435158152c29c7936fb6d57a493be990a83d53d2cba112f793a62768,2024-09-12T12:35:54.013000 +CVE-2024-3163,0,1,1535c9efcaa1d6891b6aa3f21424f4ecb2cb747a2a55ebb48ec46194778426b2,2024-09-12T15:35:47.627000 CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1eb7a,2024-06-05T17:15:13.040000 CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000 CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000 @@ -252040,12 +252042,12 @@ CVE-2024-32833,0,0,b251b4f8fe4dba495c950e90dbb25a178e9b5789b8f999b1d382e6170a624 CVE-2024-32834,0,0,97599c5c014b164caaac46faf02e3adeddddd6e841bed406870b8707da4aa493,2024-04-24T13:39:42.883000 CVE-2024-32835,0,0,fc292842100527900bf0d1c703a8349fdd7fc48d6ac327e0d92cfb86815d727a,2024-04-24T13:39:42.883000 CVE-2024-32836,0,0,c5fcecde1d31672603e6b98cee8f2b00770cad10996bf26cae90650302e2a97a,2024-04-24T13:39:42.883000 -CVE-2024-32840,0,1,06e06b5eb4239c6256f752393f68eb215d7842c6527561707491f00e8bcb47fb,2024-09-12T12:35:54.013000 -CVE-2024-32842,0,1,d62ce5902036537eb9ba13c23c85e05959ce2df74ebf34d9f2f2b26504e11f85,2024-09-12T12:35:54.013000 -CVE-2024-32843,0,1,b642c45981eded474f58c0faa20cba13174975e30a184c078b7cb92ac92ff990,2024-09-12T12:35:54.013000 -CVE-2024-32845,0,1,869193be8a9fccf9dd4a6dbd3e23db9648b8356d85633e8da0c92b88d43dbd51,2024-09-12T12:35:54.013000 -CVE-2024-32846,0,1,9c7a8d4212a6040e6df3a3ebad285ddc1aa99dcc7a216bf9700a7967c5a957b7,2024-09-12T12:35:54.013000 -CVE-2024-32848,0,1,07a091e11d71d1790d91f6d72bb19d29e49c2d3c63220062e559dc1998fe60b5,2024-09-12T12:35:54.013000 +CVE-2024-32840,0,0,06e06b5eb4239c6256f752393f68eb215d7842c6527561707491f00e8bcb47fb,2024-09-12T12:35:54.013000 +CVE-2024-32842,0,0,d62ce5902036537eb9ba13c23c85e05959ce2df74ebf34d9f2f2b26504e11f85,2024-09-12T12:35:54.013000 +CVE-2024-32843,0,0,b642c45981eded474f58c0faa20cba13174975e30a184c078b7cb92ac92ff990,2024-09-12T12:35:54.013000 +CVE-2024-32845,0,0,869193be8a9fccf9dd4a6dbd3e23db9648b8356d85633e8da0c92b88d43dbd51,2024-09-12T12:35:54.013000 +CVE-2024-32846,0,0,9c7a8d4212a6040e6df3a3ebad285ddc1aa99dcc7a216bf9700a7967c5a957b7,2024-09-12T12:35:54.013000 +CVE-2024-32848,0,0,07a091e11d71d1790d91f6d72bb19d29e49c2d3c63220062e559dc1998fe60b5,2024-09-12T12:35:54.013000 CVE-2024-32849,0,0,2dff3f0f8458f9bc03b8b89ff3ed496d4d9a414f0ec65647eae66f330eefae8c,2024-07-03T01:57:09.160000 CVE-2024-3285,0,0,1ef5c367ccecf316e1895071bcc508779dcf2b19a0822ab0b89afcd5bbef04ef,2024-04-11T12:47:44.137000 CVE-2024-32850,0,0,4f078b72cb56eb731f7f52f47246fffeecf7a87d9cac03b2c1a5c91db75a028f,2024-07-03T01:57:09.843000 @@ -252201,7 +252203,7 @@ CVE-2024-33001,0,0,e89dbc37b1bbada386268abb25bbfd26ba11d29f63337f64d12b9c9ded295 CVE-2024-33002,0,0,bbd8f2f002227dcd69fa7ae031c0a1ecfe37f7776553c4961a527a6eaa21d480,2024-05-14T19:17:55.627000 CVE-2024-33003,0,0,225d205f470d78d7f04a914fc9cc66b403650d1c92e0d55240ac67f1bd989660,2024-08-13T12:58:25.437000 CVE-2024-33004,0,0,fd3947efc9f6a79b80c112947403a2b0a9c6fdaf32bf5c0bd7b38f5115845055,2024-07-03T01:57:23.963000 -CVE-2024-33005,0,0,d2cfd79fcdd17818b9c867a5ac09eeea02d4452e148692cd695340bf80932ea7,2024-08-13T12:58:25.437000 +CVE-2024-33005,0,1,b6e8581506b98b3d048c876ef09153cc5329e2b3c294dcc9c0512597d7564067,2024-09-12T14:39:03.480000 CVE-2024-33006,0,0,36d8448e64529b3242e1d14d3223c50e6fc2fd869abf9e54a01bde3e4dc1ca08,2024-05-14T19:17:55.627000 CVE-2024-33007,0,0,8e38d5b6d2b9eb1b80b7c4b68a0aa966535c1221f485493f9e187b5af17c2ba9,2024-07-03T01:57:24.730000 CVE-2024-33008,0,0,0bcdb3b7e19679fd6080e0c5f4ecdde63f1bf333ca492bd35c2d1bf34e5150a9,2024-05-14T19:17:55.627000 @@ -252234,13 +252236,13 @@ CVE-2024-33043,0,0,e440b5c9b2a1727157025810ce1b92ddb45351842873f98e286f1378d612b CVE-2024-33045,0,0,c750be85f91783e59cd18e60c65725c2f8e2b0f2771fc29ca9f691ba1ec0dcfe,2024-09-04T17:20:55.297000 CVE-2024-33047,0,0,cb0eb88ac7f41a9c98cf0d3c8ebd2b1f66d8a5c56732d8ae21823446d39c74ab,2024-09-04T17:07:31.877000 CVE-2024-33048,0,0,f9f67875b847da24eb9cf137e9f097d769cd7f8f3d65d24eb4619818f972d900,2024-09-04T17:20:01.083000 -CVE-2024-3305,1,1,251398717ae2254a59cbeead3f799008299adeaca2d285c27ac98c93b3ee0c17,2024-09-12T13:15:12.540000 +CVE-2024-3305,0,0,251398717ae2254a59cbeead3f799008299adeaca2d285c27ac98c93b3ee0c17,2024-09-12T13:15:12.540000 CVE-2024-33050,0,0,90923f1d1865d88057676c94e2b893aea7270f8731add142aed38ad6597070db,2024-09-04T17:07:13.930000 CVE-2024-33051,0,0,1fd409b2ba830a4d68baa6f497a6e4704a55e16bd6f855473d9753382be831b5,2024-09-04T17:18:10.950000 CVE-2024-33052,0,0,13554474bfa747d124854139f3134a9830507865a3c50c094520491b9689b9b9,2024-09-04T17:18:07.783000 CVE-2024-33054,0,0,67fa57bf4b27f2520026aaaf6b13807e21cefd1307528e92c6c6a61d930ac6dc,2024-09-04T17:06:47.337000 CVE-2024-33057,0,0,fc38afeaa7486b0a5aebc4f1315319ab783e3abf0a4193027aaf853eaf32aed0,2024-09-04T17:06:24.843000 -CVE-2024-3306,1,1,6f9a634d3680e97b20d52c7ae28c2763cd7c78646c333eb5459268e42750dfbf,2024-09-12T13:15:12.767000 +CVE-2024-3306,0,0,6f9a634d3680e97b20d52c7ae28c2763cd7c78646c333eb5459268e42750dfbf,2024-09-12T13:15:12.767000 CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b78e7,2024-09-04T17:06:08.407000 CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000 CVE-2024-33078,0,0,32899b4391f10b7cbfcaee5abff907eff95c8894218149b7342d82053a7e337b,2024-08-01T13:51:41.723000 @@ -252914,7 +252916,7 @@ CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058 CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000 CVE-2024-34126,0,0,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000 CVE-2024-34127,0,0,06c2fc49cbcf18b0add9499f10b3a0814654b0e291f183a8ee09c382b3d1ec3c,2024-08-16T18:22:57.230000 -CVE-2024-34128,0,0,561d0c2f49958069c211b829f892dcdc119082c49a2ef627e335253a40108cd9,2024-07-24T12:55:13.223000 +CVE-2024-34128,0,1,940538d1064063913156106c2ac294bfa9095d326a70437d66729f6036d7973a,2024-09-12T15:58:26.700000 CVE-2024-34129,0,0,c47df7ddf934177974799de9912c4e8ae1e6353624749fd9b063535c8cf739aa,2024-08-07T15:15:55.070000 CVE-2024-3413,0,0,393490437f33ce616f0a6848540c1c0d3eed8ed2038327f28efd50e305f3828b,2024-05-17T02:39:54.073000 CVE-2024-34130,0,0,29b15cda4f7383fc7738011069e5f5981ecee8f8ebe6f1acd48c5ae17439fbe8,2024-08-07T15:15:55.287000 @@ -253401,10 +253403,10 @@ CVE-2024-34771,0,0,452ec502adbdf587176d97ed478a2d6f8beb3a64c98f7d59c911ddec3954d CVE-2024-34772,0,0,bf5aa55974c4947b2a40ae851f7aa83dde7195e97317e1244709204543c5bdfb,2024-05-14T19:17:55.627000 CVE-2024-34773,0,0,100b1cb449b7ae251f86bd995ac4446f704b2d5bcbff0a59ab0bc97995491271,2024-05-14T19:17:55.627000 CVE-2024-34777,0,0,47369db5c522c34e9489779523e2c10406821ae54d821b2c269278d042fde193,2024-06-21T15:58:51.410000 -CVE-2024-34779,0,1,e7ed8d9f6ffbdd69994127868693950e3b4ab2284b442fbebdc86425e83522ff,2024-09-12T12:35:54.013000 +CVE-2024-34779,0,0,e7ed8d9f6ffbdd69994127868693950e3b4ab2284b442fbebdc86425e83522ff,2024-09-12T12:35:54.013000 CVE-2024-3478,0,0,d6058a0e6db67f9fedb470e62fc4a04776cf84b327b4bd61639e707b408d963f,2024-05-02T13:27:25.103000 -CVE-2024-34783,0,1,5596401a4dd61b9640d2c040ab1cac99f80b42a12698bd7241863e95b0a5e2b0,2024-09-12T12:35:54.013000 -CVE-2024-34785,0,1,225564c41a11639bea93cc57e5af6c8fad2e4ca2e4f56ffecff04de3b011ffcf,2024-09-12T12:35:54.013000 +CVE-2024-34783,0,0,5596401a4dd61b9640d2c040ab1cac99f80b42a12698bd7241863e95b0a5e2b0,2024-09-12T12:35:54.013000 +CVE-2024-34785,0,0,225564c41a11639bea93cc57e5af6c8fad2e4ca2e4f56ffecff04de3b011ffcf,2024-09-12T12:35:54.013000 CVE-2024-34786,0,0,7e8cb80185704202113f9da64eeb79cd413e4b998d966b2b2f4137b8800de467,2024-07-09T18:19:14.047000 CVE-2024-34788,0,0,d3400f02a32ab882f9673e171c113d7d87e605c008eb11cc936f5027941a3e18,2024-08-12T18:52:25.127000 CVE-2024-34789,0,0,4f72636ebbc4b0b39015d14b70eb26533195de09d45d80202a2d9d74dbf95795,2024-06-03T14:46:24.250000 @@ -255199,7 +255201,7 @@ CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000 CVE-2024-37392,0,0,0ae8929f71fb71c8f43226023298d80c9dbf69da2ed93f7866d1e406015cec5e,2024-08-26T12:47:20.187000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 -CVE-2024-37397,0,1,e28ecf750b1a64b152fab72c441f5ab495b59012251cdcf0bc040b79f6ddc55f,2024-09-12T12:35:54.013000 +CVE-2024-37397,0,1,557830eddad0f86f90e2eef46dd2538b16d13b90e5d40a6045c541b4adc38609,2024-09-12T15:35:46.803000 CVE-2024-37399,0,0,308e730bcc199d112d6cfe8bdbdbf7120fa96451bfff020b7962dbf1afddf5e4,2024-08-15T17:31:49.067000 CVE-2024-3740,0,0,cf4cd6bcfe639a4f771a19ddc36f820864da86f0d9d9f91c68694d8633fab251,2024-05-17T02:40:06.170000 CVE-2024-37403,0,0,82a2fe28b07e6e9fe5e86dff02fa8c242d19ac626eea029ca875aeaf76338b4d,2024-08-12T18:55:15.890000 @@ -255732,7 +255734,7 @@ CVE-2024-38199,0,0,642a12aa02f5e7b673baecdb6185f8efbceb0f3cbe1ac18a60e869ce79b2e CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab84082f,2024-06-03T14:46:24.250000 CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000 CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000 -CVE-2024-38202,0,0,a5a58b9c1bd065b331e78383a23d6dbade69efe203405d06eac742a5e769b0bf,2024-08-16T19:15:09.843000 +CVE-2024-38202,0,1,e7eadf2aa03d0772605750e940cfb378e16a9e72bdbea5747d3c43f7807b7c12,2024-09-12T15:09:04.470000 CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000 CVE-2024-38207,0,0,a33038bbdf8e1de24b0ec1ff70f0030afb50f5d8993af830215c5c1e88e41f0d,2024-08-27T14:50:40.303000 CVE-2024-38208,0,0,3f330e6b999623cf1daf7ef78e19b91e45bf2d522b8d21d8758840717d25aa36,2024-08-29T21:53:38.903000 @@ -255749,7 +255751,7 @@ CVE-2024-38218,0,0,d8154113c709876f61605539852c344572b202f6d86619699565b8c3f572b CVE-2024-38219,0,0,34502e067fd7412232e3cff9d01123fa667f329fff13204df696956cac257c32,2024-08-29T14:45:17.383000 CVE-2024-3822,0,0,51b0f82a9028abb2f3a6ab312236a4c8392000a211092257ada320c541b18cc9,2024-05-15T16:40:19.330000 CVE-2024-38220,0,0,75d1d2b4a4c084fa7a781cee5622397ece32cf08d890075be7f73458ef7b79aa,2024-09-10T17:43:14.410000 -CVE-2024-38222,0,1,aec7e2fad4827207c36069caf1f8b3f6a2b5c3bdd7b1b16fb24debea97181ddd,2024-09-12T12:35:54.013000 +CVE-2024-38222,0,0,aec7e2fad4827207c36069caf1f8b3f6a2b5c3bdd7b1b16fb24debea97181ddd,2024-09-12T12:35:54.013000 CVE-2024-38223,0,0,bc14ce3f021016f5d7fdf26984192d7afd912fddeb21523c067e8db2fe7a06a5,2024-08-15T20:18:28.240000 CVE-2024-38225,0,0,9fef32ff53f02aa8c1358c50b31033ff2c3e33337edda025b0788ca47e24a0a2,2024-09-10T17:43:14.410000 CVE-2024-38226,0,0,4bf5fa6111be97c9b6ca9705aef4b23890b24164017bf51690e04459d4fe4310,2024-09-12T01:00:01.133000 @@ -256022,7 +256024,7 @@ CVE-2024-38573,0,0,ca8898dfb11b5dd535a57345209c5053ecbd565ef57ea10dbb17683dd19ec CVE-2024-38574,0,0,6afdc30adbe5999044de1cc76d2cc76289f74910e8879e6f74197c6ff1a2b954,2024-06-20T12:44:01.637000 CVE-2024-38575,0,0,2bb1d17f38c40f1a364165b77b7ca5fceadcc7cb4b05f83746adb6eb31d29aa9,2024-06-20T12:44:01.637000 CVE-2024-38576,0,0,2236920d60064e661a944c733eb2e7966e7c6fdf3b15109d7e99a4086a362b36,2024-07-03T02:05:14.340000 -CVE-2024-38577,0,1,1efc1e7397f24359bd6439871f08b63ff432bc413f747234aacf9ee77a51c8fb,2024-09-12T12:15:47.620000 +CVE-2024-38577,0,0,1efc1e7397f24359bd6439871f08b63ff432bc413f747234aacf9ee77a51c8fb,2024-09-12T12:15:47.620000 CVE-2024-38578,0,0,59aca8de5dbd59caa444dd7e2a1cba02589d14b7e716ca8b1544730c92701d84,2024-07-15T07:15:10.620000 CVE-2024-38579,0,0,b473c1338d077f4b1eb5b907c1fe49edff8282b40b79f122f252878eded18e82,2024-07-15T07:15:10.703000 CVE-2024-3858,0,0,dd053838f3e277a81d969816e65a4f781c68054bd6d54d527d61add36147e05e,2024-08-22T15:35:08.807000 @@ -256645,7 +256647,7 @@ CVE-2024-39583,0,0,2595854d2609ec80581d5c8e20bd16c50016792474e66d9b02fb6dca96d25 CVE-2024-39584,0,0,1d0a6aff0073f4836d9654764326ceeb368acd09f92344e463ab3214871c70e5,2024-08-28T12:57:27.610000 CVE-2024-39585,0,0,d477ac70d70122b93a30d70fba939fc56092d9a6275e57b99e3a0b2a412cd216,2024-09-06T12:08:04.550000 CVE-2024-3959,0,0,1ce1302f5c536ae0ba1596a30e53c3274b88d91eb780326b1103788329e8cf86,2024-06-28T13:21:52.223000 -CVE-2024-39591,0,1,7234f5f72639a034d956dd5df541035bcac3a09d36d7ba9ed10f23ab4dd7d7f9,2024-09-12T13:29:47.207000 +CVE-2024-39591,0,0,7234f5f72639a034d956dd5df541035bcac3a09d36d7ba9ed10f23ab4dd7d7f9,2024-09-12T13:29:47.207000 CVE-2024-39592,0,0,541b14c1914f7693bac69344218050bd21bf7511f9226d6471041f73dd5bbff5,2024-08-29T19:25:41.740000 CVE-2024-39593,0,0,f64d4a9107e758157cf94d8020a15d87354768c39cc9030a607faa8c819f82ce,2024-08-29T19:08:19.200000 CVE-2024-39594,0,0,637cf3efe25f76e3f7049bdd8fb7c900c50753635b8417f794e35a21a4031116,2024-07-09T18:19:14.047000 @@ -256994,6 +256996,7 @@ CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b CVE-2024-40453,0,0,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000 CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 CVE-2024-40456,0,0,f1acaf3e46ce38cdd4b72320186132bab37cc38f6f4c796e31eaece0545a5e4c,2024-08-01T13:57:29.487000 +CVE-2024-40457,1,1,b80c7ac717e5ba03b3dbc096c1279b0c37cda1d124f6541ab88502f2f9ad3fcf,2024-09-12T14:16:06.780000 CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcdb1,2024-05-14T16:11:39.510000 CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33 CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000 @@ -257098,7 +257101,7 @@ CVE-2024-40645,0,0,c5d696c93dacee54aa97dfea7bb392eb61945c1f1d80336104e770237e779 CVE-2024-40647,0,0,20e5e587d0777d0bcce77df9be17d322be6b8b310278f85b131c82750480c300,2024-07-19T13:01:44.567000 CVE-2024-40648,0,0,e2349aa5f69c8421d1802e501ed70a5d9670cb28532fa26d74d83879e98ba750,2024-07-19T13:01:44.567000 CVE-2024-4065,0,0,e9243298c32ccba8ab1ac6d427150517ee98217790d2dec0b1b5ec685d8cbc83,2024-06-04T19:20:29.227000 -CVE-2024-40650,0,0,f047acc09ee38f2045f941487a7c68acc94e37df091b795523ba363338dec30a,2024-09-11T16:26:11.920000 +CVE-2024-40650,0,1,84d69f74023b7625d57fbc8106fe861d15f00562153a0ec27f968621fa8a16e3,2024-09-12T14:35:14.240000 CVE-2024-40652,0,0,0dc9a34620355d1a82f6409ecc9e9411449a2ec7843cc6a278a0f0f3b1b9a70e,2024-09-11T21:35:09.017000 CVE-2024-40654,0,0,89d13eda0f67a3a9a7b2cedb1fd2e93ba750322387fa1a658c26c352ad7fc226,2024-09-11T16:26:11.920000 CVE-2024-40655,0,0,f9e742a073d4783d6e3e69c7c29dfc537f097ccbb827a6e63290bf1fc0f97f80,2024-09-11T16:26:11.920000 @@ -257357,7 +257360,7 @@ CVE-2024-41008,0,0,86de6e2be092cac70f5596fb96d0253f26291855f34ae4ddc015775261181 CVE-2024-41009,0,0,c4729b5cb64b59a8130835040cce4fcac734ad6152593d4547aa0a45482d47fd,2024-07-29T07:15:04.560000 CVE-2024-41010,0,0,ae8d1d1b3ebaab40dc6ac6afde49ce66895bb7f4e7ee92f295ff5ca1fa79b217,2024-07-19T15:24:59.137000 CVE-2024-41011,0,0,0ea0f8cc21c6447d8c7d604f8cb128d5314c6d4d9477517c491af1541a3fc28d,2024-09-06T13:19:10.197000 -CVE-2024-41012,0,0,100aa94909001769d833a9407cf1a1d29626a5b74fec5cc1935ff6c4fd015723,2024-07-29T07:15:05.083000 +CVE-2024-41012,0,1,0fb60422840407ec3f93b63d0852cd513977e14ce53be0635ab74a9fae88aeea,2024-09-12T15:28:48.250000 CVE-2024-41013,0,0,e60bba3e408ef7ae0e4e783aa0f35051774aa2a8d236b750438ef4fbd7846f74,2024-07-29T14:12:08.783000 CVE-2024-41014,0,0,705963fa55cb8c9deb35bac026b5f0f3c8c6d9abda445da5a02c7d95e767c33f,2024-07-29T14:12:08.783000 CVE-2024-41015,0,0,91a1e3d42b94aa1fa04960f80c1d9c387f924861296d16a8769f7bf7292df329,2024-07-29T14:12:08.783000 @@ -257497,10 +257500,10 @@ CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1b CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000 CVE-2024-41171,0,0,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000 CVE-2024-41172,0,0,7f370211b6a2ed7e58844e8bf12bc0dae731f676537ceaaec3667e5da63dc1de,2024-08-07T20:16:45.237000 -CVE-2024-41173,0,0,a32d0d9cca7b111b26d35b49c29c3c8130c1f7828fce2b3badc03095e7e93d7f,2024-08-27T13:01:37.913000 -CVE-2024-41174,0,0,a822cde4328796519e509a3e4c690c9e9350782e4bad75b387a246a5f3be44f1,2024-08-27T13:01:37.913000 -CVE-2024-41175,0,0,ab7c4bbe73285c601e9dc954554b6ea0b5c6257b067115821c04b2633bec6026,2024-08-27T13:01:37.913000 -CVE-2024-41176,0,0,4c96f5a58b11a50c728e87bfb1c4778d538153763f7f177844bf1811ef9f9a88,2024-08-27T13:01:37.913000 +CVE-2024-41173,0,1,2a967ba5e095ab1e47f786a956c1f076df7830bb3f39a08c0b36771178149730,2024-09-12T14:52:20.820000 +CVE-2024-41174,0,1,46f7512448f854e48ad9da184e7c8ef9b0c8ebf22c2d6d526796b00f1d907a8d,2024-09-12T14:33:54.917000 +CVE-2024-41175,0,1,35e860a2d31eb21e3779e1686be69664a02d6ab1bab83d6168914f472f9b9f73,2024-09-12T14:25:10.307000 +CVE-2024-41176,0,1,9617663e2578b6f0fb4f568d478dd287853a4464c7fe3c6dcc4d7c2bd5bf268c,2024-09-12T14:26:00.527000 CVE-2024-41178,0,0,5da27e6bd4cfecb3274c0413ac77a628456bf2e70cb97b3347c2830cb191bae8,2024-08-01T13:58:24.173000 CVE-2024-4118,0,0,261b7c2db2db4c5bd0863007ba022afd6141eeb3c40d43094e801a457a5edb93,2024-06-04T19:20:30.147000 CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b249634fe,2024-08-02T05:15:47.217000 @@ -257742,14 +257745,14 @@ CVE-2024-41727,0,0,f64de623c1f3cae418235db50af8da33c1315446224a7b8505bd8fc5343d1 CVE-2024-41728,0,0,a44236b8b8381750bb6b36d92fffe5b7b52d9e26a485ce4cee57ecc37824df44,2024-09-10T12:09:50.377000 CVE-2024-41729,0,0,d9349e4b0c516aa096dba9dc989576fef69f0da894dceaf82929700fdd5be9c4,2024-09-10T12:09:50.377000 CVE-2024-4173,0,0,47f39f3e8e603eac743ed4815cd724decf015716a2f0d9c17daf4d8fa3affc2d,2024-04-25T23:15:47.240000 -CVE-2024-41730,0,1,296c1e90a2febb31a4577a14bd16083e2ebbad70f0cade6d819cb4026c6b3f0e,2024-09-12T13:56:51.237000 +CVE-2024-41730,0,0,296c1e90a2febb31a4577a14bd16083e2ebbad70f0cade6d819cb4026c6b3f0e,2024-09-12T13:56:51.237000 CVE-2024-41731,0,0,4126cd0c30302e9c7380ccee1e7323dc125073bee521b0d7988e30a845f2e7bb,2024-09-11T17:48:18.073000 CVE-2024-41732,0,0,e2dca567214be5568571959773e28599e7cbcbeb041ed41e27c6a914c5581a4b,2024-09-11T17:52:39.477000 -CVE-2024-41733,0,1,580e8b247709efe1a8ff885341c8c65c8c2e5300f32e52fc4252f7a3d8a36a32,2024-09-12T13:55:49.880000 -CVE-2024-41734,0,1,ee1445b5a6c50fe46a456bea41ccb696f4523dbb75f2650033b52fcf021a5cf7,2024-09-12T13:28:03.450000 -CVE-2024-41735,0,1,9b1bcbea87f6f37440d1c449d6340c711ae945b18c9cda4029f4e601f348537e,2024-09-12T13:53:32.993000 -CVE-2024-41736,0,1,f12f0374fcc58eb9fac9e1d169220d47e16a0e5ad6c2e28256d8df041476b834,2024-09-12T13:51:42.727000 -CVE-2024-41737,0,1,bcc2c31b9f08a899ad8c6d2953a09d2c0889e7eb08f1011b3147192ea690de38,2024-09-12T13:49:41.953000 +CVE-2024-41733,0,0,580e8b247709efe1a8ff885341c8c65c8c2e5300f32e52fc4252f7a3d8a36a32,2024-09-12T13:55:49.880000 +CVE-2024-41734,0,0,ee1445b5a6c50fe46a456bea41ccb696f4523dbb75f2650033b52fcf021a5cf7,2024-09-12T13:28:03.450000 +CVE-2024-41735,0,0,9b1bcbea87f6f37440d1c449d6340c711ae945b18c9cda4029f4e601f348537e,2024-09-12T13:53:32.993000 +CVE-2024-41736,0,0,f12f0374fcc58eb9fac9e1d169220d47e16a0e5ad6c2e28256d8df041476b834,2024-09-12T13:51:42.727000 +CVE-2024-41737,0,0,bcc2c31b9f08a899ad8c6d2953a09d2c0889e7eb08f1011b3147192ea690de38,2024-09-12T13:49:41.953000 CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 @@ -257794,7 +257797,7 @@ CVE-2024-41833,0,0,85fc1d4f81094922dce51fd479c7b435396bc7c4f95057b5b31db4afd23d3 CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb8d6,2024-08-15T17:13:25.090000 CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 -CVE-2024-41839,0,0,93b253c3913bf311f27ee8e9c3a0b79e28cf35f2139eff51a2e98210735a78b9,2024-07-24T12:55:13.223000 +CVE-2024-41839,0,1,5ef460cfd4cab1da61d6ea06c2a0157d7dd82f5004a20224cb3c7be32bb81d0c,2024-09-12T15:58:11.690000 CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 CVE-2024-41841,0,0,b3d7229e1df9655b819c6cdfc619b24790032230acf9c060fa1958fc581d2315,2024-08-26T14:08:05.547000 CVE-2024-41842,0,0,081439e1e1c0c36fa35dfc90cd7c1dab0afb799471eb093958cbeb73afdd7760,2024-08-26T14:08:17.263000 @@ -258092,7 +258095,7 @@ CVE-2024-42242,0,0,76feb11ff1b64882ae98cb05d8fee01154bb93b05ad0f7b74505099ce9d0f CVE-2024-42243,0,0,a100e682d084e1c9afe0b29d6e1ddb97769c71cbec41adefbc9f2f46e71c060a,2024-08-08T14:53:35.073000 CVE-2024-42244,0,0,8350951c1f121df7fc6c6b2a03b5a60ecd4b9bb8d83190ea911de7a8506e77e9,2024-08-08T14:53:27.147000 CVE-2024-42245,0,0,fcb264c29551cd3e5d6115618e13535ac0249a42a696c4e8493e8f7d1f5c12ef,2024-08-08T14:53:19.530000 -CVE-2024-42246,0,1,e8948480e21000a4ac46c6a85c452caaee9ab5f09793bf14eab70cafb762313f,2024-09-12T12:15:48.497000 +CVE-2024-42246,0,0,e8948480e21000a4ac46c6a85c452caaee9ab5f09793bf14eab70cafb762313f,2024-09-12T12:15:48.497000 CVE-2024-42247,0,0,3e8b3f558d251c3978924ee255c30e74df6492b1da5085ab4e636b80775e9831,2024-08-08T14:52:25.213000 CVE-2024-42248,0,0,a4c871a843ec4ebaf7266331bbf45bb853808d9d58017b146752d4bde19f2c1f,2024-08-08T20:55:35.180000 CVE-2024-42249,0,0,273d2e61a1b49951ffbd8c20389c9c76559ac159ab90b5fda4da3c7651f4a6a8,2024-08-08T20:55:25.943000 @@ -258214,11 +258217,11 @@ CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2be CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000 CVE-2024-42371,0,0,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000 -CVE-2024-42373,0,1,0a911f8c7b65a5ac6f64a8e43f34010f8e931ac83329dff9f7884c56f10ce33a,2024-09-12T13:26:37.753000 +CVE-2024-42373,0,0,0a911f8c7b65a5ac6f64a8e43f34010f8e931ac83329dff9f7884c56f10ce33a,2024-09-12T13:26:37.753000 CVE-2024-42374,0,0,fbac271476e1e2a5530eb62b051d58c9133aff05c9b2fa9d3a5620c40d2acb9c,2024-08-13T12:58:25.437000 -CVE-2024-42375,0,1,f88914f78c046f57acc08161978ed742ad9df5262df6fb06ce5cd75ac24c71ad,2024-09-12T13:46:39.527000 -CVE-2024-42376,0,1,49cb2579969fc5a25e219c672f04f97a28e04aea98eaeb1b3b8fc881f46ce0bc,2024-09-12T13:43:27.507000 -CVE-2024-42377,0,1,9face528ce5b147140c71d88d734a9d4c3870323279e5a3837b9bee3a938b5ae,2024-09-12T13:42:11.890000 +CVE-2024-42375,0,0,f88914f78c046f57acc08161978ed742ad9df5262df6fb06ce5cd75ac24c71ad,2024-09-12T13:46:39.527000 +CVE-2024-42376,0,0,49cb2579969fc5a25e219c672f04f97a28e04aea98eaeb1b3b8fc881f46ce0bc,2024-09-12T13:43:27.507000 +CVE-2024-42377,0,0,9face528ce5b147140c71d88d734a9d4c3870323279e5a3837b9bee3a938b5ae,2024-09-12T13:42:11.890000 CVE-2024-42378,0,0,ed3c29cd04dad91d13a86cdbb0dce43700fdc4ea711c91735e1103cb6c6b554c,2024-09-10T12:09:50.377000 CVE-2024-42379,0,0,3df4e462d3527273fa2a98871af6d02d089a425040231b6521435b06449dcc55,2024-08-30T20:15:07.623000 CVE-2024-4238,0,0,188cceccdce16b8df034bef32fee010a6dd0f801c6690e1589421c7cadfb521c,2024-06-04T19:20:33.063000 @@ -258285,6 +258288,8 @@ CVE-2024-4248,0,0,ae8e3a45d49ca48b9dcec0ca557a7d91d483e50d5e5d3f5d5f7e2c0dd6ffe3 CVE-2024-42480,0,0,a493fdcfd2cab0bed771f4294216832fdd84bd63bcd8976ed48629d61d56dc9b,2024-08-16T16:24:40.430000 CVE-2024-42481,0,0,f17bd96b5dbaec9cba44d498d9c9262bc86fc96c852d5e4344475a0f54baa696,2024-08-12T18:57:29.247000 CVE-2024-42482,0,0,ee38da65f82c804eaedcf134ace0faf2e2bb9182856f5a242f4e6a9a1c05ab47,2024-08-12T18:57:17.383000 +CVE-2024-42483,1,1,1d06307bfa3f6a5de26b6507724fa4de8dc1f951a458e9ced7b465b45fd6ee98,2024-09-12T15:18:22.093000 +CVE-2024-42484,1,1,22ea8933942c555c6d111b7dae168cbf868b4e00e48d29f033b6edd6f10f9f3c,2024-09-12T15:18:22.320000 CVE-2024-42485,0,0,b09b549a640b11a354d44b9475923cc6fe2bb8793f6b86eac9ba8078a1b1156d,2024-08-12T18:57:17.383000 CVE-2024-42486,0,0,a989fdd89a78984e53108438ae1d4599e890f4b44bbe2719c613b74d6b8f2b23,2024-08-19T13:00:23.117000 CVE-2024-42487,0,0,2efeb3a744823d93cb77dca921c5d1e1876bd604d6d9b9e3d12e2ec5d005b3d2,2024-08-19T13:00:23.117000 @@ -258428,7 +258433,7 @@ CVE-2024-42756,0,0,ce5af71546f0263f395c227c3cfac6fe59ce60f8865d3d0ed46c37703f4af CVE-2024-42757,0,0,7f6ba25a82908bfc7acb20e761fdbba6f23f597232f39843fc1cc43949e3074d,2024-08-20T15:35:25.190000 CVE-2024-42758,0,0,78591070e9343c09b0ea814d5b331b967691862f9b02d6e8c624fb011530a86d,2024-08-19T18:35:14.237000 CVE-2024-42759,0,0,83ca77ff674de3e3917aa205efaf61575c9c366960c9df81199b2455f1152daa,2024-09-10T16:35:05.400000 -CVE-2024-42760,0,1,85ab4e0edf9f9f4f30f7c0bbfa280d9fb232762dd5bc9865dc15792ebefac07f,2024-09-12T12:35:54.013000 +CVE-2024-42760,0,0,85ab4e0edf9f9f4f30f7c0bbfa280d9fb232762dd5bc9865dc15792ebefac07f,2024-09-12T12:35:54.013000 CVE-2024-42761,0,0,33c8e57e29c80d5ab961692c95c32ec38cca8789d3650f2c188fd350c643ff13,2024-08-23T16:18:28.547000 CVE-2024-42762,0,0,72ec602fc53ee57aef43714af8d33108807c25cff9ab4122dccfb6373af1e78c,2024-08-23T16:18:28.547000 CVE-2024-42763,0,0,a111402090b60e50fe4bee869a5fbabeff40957f7ec249ab20f07b5214e58d6c,2024-08-23T17:35:06.477000 @@ -258558,7 +258563,7 @@ CVE-2024-43031,0,0,c3ec426a9c2d322dc356eb4fe356a9e19c60505e16e054c91bc62d391f448 CVE-2024-43032,0,0,8850a9c656ae281e32b28ba33f2ad3aef6596a2affc3579c53c1b92b428efb34,2024-08-23T18:15:07.550000 CVE-2024-43033,0,0,fd57d359a27fcaf19587aca04a23681152ba867b02d3eb512220398c8467fb35,2024-08-22T16:35:08.663000 CVE-2024-4304,0,0,cc036c021f3a6e70e19e6533fc0c5b7e8e9615d68f40d67450c876ce97ebcd8f,2024-04-29T12:42:03.667000 -CVE-2024-43040,0,0,0e8a64b311437af77beed652bb48ac2262cf1a4bb46f6fbcea467e98efe83c9a,2024-09-11T16:26:11.920000 +CVE-2024-43040,0,1,1da4fee0ec9b26a667b61884070b050a8f4bcf13a2b21e01185cd5279abd34cd,2024-09-12T14:35:15.010000 CVE-2024-43042,0,0,b853bda14fa02964a16c19d1896f72364ccfb9e1c7f5c0faac2a5ae6d185d191,2024-08-19T13:00:23.117000 CVE-2024-43044,0,0,0f847f7b25552f59db6fe108bc5868ae7095ef3bf92eb01d14caa8a1c32e542a,2024-08-16T17:19:30.643000 CVE-2024-43045,0,0,0dfb92f72f0dbde6ae96c501ce5cc9672bcd5c0db43f23e4e6beeb976b582ca3,2024-08-16T17:21:26.803000 @@ -258628,7 +258633,7 @@ CVE-2024-43207,0,0,e22c5710770b6cfc075b06ecdaad97a6d82c458382d84efdd62d5cddbde66 CVE-2024-4321,0,0,9cab2a859d144dd765da27aaa03d49bb12083c0b11abfa900a9b065f4ea718e1,2024-05-16T13:03:05.353000 CVE-2024-43210,0,0,38b1ddd569737ddf84a414c75c09c54bffe5570d779b3b2b7d84160c7c88ff6c,2024-08-13T12:58:25.437000 CVE-2024-43213,0,0,6c696e57f95479918ef25ca22ce88cf027f14ad7abeabc2f23e004d6693a5cce,2024-08-13T12:58:25.437000 -CVE-2024-43214,0,0,6ec465e3754cff3b3243514a35bccc353719721f2a8b9b7bab6b977b495b281f,2024-08-27T13:01:52.723000 +CVE-2024-43214,0,1,e772b18793672d06b1bfe4d88f116d9521d26ae1727a72efbef192814b0907e8,2024-09-12T14:17:59.390000 CVE-2024-43216,0,0,b986dc9a8b3b2203463866beb8a53631207ae789a2b2f2fe22846d054a89bfa2,2024-08-13T12:58:25.437000 CVE-2024-43217,0,0,f82c4fc5d8211638ca35d56d40ca602f216f2cb77b05fbf9169296f7ea83635e,2024-08-13T12:58:25.437000 CVE-2024-43218,0,0,7211cf498c311837d292e9f824bafb9f3bdd8538b1ebf61d4a91523261453a7b,2024-08-13T12:58:25.437000 @@ -258924,7 +258929,7 @@ CVE-2024-43831,0,0,d2d2b5793f8c890b4b992408f65959bbc46269161bd855b4336fdc8262090 CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000 CVE-2024-43833,0,0,b30b83d76397439bef43f76504d35264f0368821411284c2b15462cf53f03404,2024-08-22T15:42:46.827000 CVE-2024-43834,0,0,76e2d6369e7d6ad23c4c79e5f16adb028cca8d18769694b501fae11b3f998575,2024-08-19T12:59:59.177000 -CVE-2024-43835,0,1,a46066252489ca07ac33084bac581d7b6db1ff03c684ec702a7865c83c61bd6f,2024-09-12T12:15:48.653000 +CVE-2024-43835,0,0,a46066252489ca07ac33084bac581d7b6db1ff03c684ec702a7865c83c61bd6f,2024-09-12T12:15:48.653000 CVE-2024-43836,0,0,e20113b16d82c5c2e4bb122ce52a725f5444590d487c2fb8daa577de32ce154c,2024-08-22T15:43:26.303000 CVE-2024-43837,0,0,2029cea2c86194c36b6c131e1ea74e1961ace80d0c79989b0fb86fab2b65d1ae,2024-08-22T15:44:03.417000 CVE-2024-43838,0,0,aea18ddc95b4597b8fcc9d42c5f12cf2294cab2381941209a829361028b9d783,2024-08-19T12:59:59.177000 @@ -258945,7 +258950,7 @@ CVE-2024-43850,0,0,af5a8e5c81d2d7083cc2063dd97b917fab8a477ad546922bdeb0b7cb165eb CVE-2024-43851,0,0,6b377a11182d300738f6cb3fcaa1aa4d6b0f57bbe7852e35522a14ee29006899,2024-08-19T12:59:59.177000 CVE-2024-43852,0,0,e16a39e3485e6268d56a06e4f3ecc24b277dfc853c8871fb0e21f6f409c0a86d,2024-08-20T19:32:55.747000 CVE-2024-43853,0,0,3a6c96c14ae012eaed5b1ef682d62a9cbd9b79ece1f1039255ad0f2a7b3d5c29,2024-09-04T12:15:04.827000 -CVE-2024-43854,0,1,943f3c79d7b420a0653deb8f71d3689984fa9a81ab761b689f2a54c06fa320af,2024-09-12T12:15:49.423000 +CVE-2024-43854,0,0,943f3c79d7b420a0653deb8f71d3689984fa9a81ab761b689f2a54c06fa320af,2024-09-12T12:15:49.423000 CVE-2024-43855,0,0,b20a91fb4977616b14c0349af9fe6fdf38deab2ab7796fadba2ea00dab4f6345,2024-08-22T17:48:09.100000 CVE-2024-43856,0,0,91d346c264b1a27e13a95a79650da4390a2d02a7cc5798231b8314954af3044d,2024-08-22T17:57:08.640000 CVE-2024-43857,0,0,1770874efc8d117e3bd251f738e88729b0ef15b20bed1182b733a19e974e06d4,2024-08-22T17:38:21.003000 @@ -258987,12 +258992,12 @@ CVE-2024-43889,0,0,5465d7ffa5fc173afac72302c5033ac280f7187ac42839effc5a469d05fb8 CVE-2024-4389,0,0,ea54671e2f1f297a2bfa11e14d812b86fa7a7f36f3487a0625bc52be81ee66b3,2024-08-14T13:00:37.107000 CVE-2024-43890,0,0,822d0066e26c4794d884984a8e03a3a06f467a55da908fa8402229c4f6b6fd95,2024-09-05T18:48:30.320000 CVE-2024-43891,0,0,1c23f1bf42b54dadc6cc9129673e1e978162326fb473b5b49bcbd4f88fba9477,2024-09-05T18:46:18.440000 -CVE-2024-43892,0,1,812cea58111e66bfe7a639c7b3451759707a135ffec31209bf0fc6dafba8a03b,2024-09-12T12:15:49.593000 +CVE-2024-43892,0,0,812cea58111e66bfe7a639c7b3451759707a135ffec31209bf0fc6dafba8a03b,2024-09-12T12:15:49.593000 CVE-2024-43893,0,0,03380463385702f0b845516f8bceb11262b313ed31f3974a8fadd31a5948d88b,2024-09-10T18:13:21.920000 CVE-2024-43894,0,0,6a944d0f551c2b10307e4d0aa1c5b1c1d9cef2ca832a7a9679c07a82b1c23326,2024-09-10T18:09:41.230000 CVE-2024-43895,0,0,79a9bdf0ce4aa3b39e8f96120c9bea0eceaefee25a6e31f739fb6d05e4c3cb57,2024-09-10T18:08:57.550000 CVE-2024-43896,0,0,9e528459b2e50d1f7ce6be809e552e51735f0b29caed43fdd44f11c615a94e16,2024-09-05T18:37:16.483000 -CVE-2024-43897,0,1,a3720581779f061f902fffa02faf7be461be206432a41a755d03dce9fe694b90,2024-09-12T12:15:50.297000 +CVE-2024-43897,0,0,a3720581779f061f902fffa02faf7be461be206432a41a755d03dce9fe694b90,2024-09-12T12:15:50.297000 CVE-2024-43898,0,0,b70a0322f8294223b16267a9061a592097cc320e64347a35bbaee6def942a528,2024-09-10T08:15:02.960000 CVE-2024-43899,0,0,1953a8ac8e9197ec884f1f7ed08130ca2ce11e7bc600d6d066b299186890c781,2024-08-27T14:38:19.740000 CVE-2024-4390,0,0,e7e7976abdd60c38776b1ca6e6489a541123a6d22aaefce9d02ee1d97e2bf9c9,2024-07-17T14:10:55.550000 @@ -259001,7 +259006,7 @@ CVE-2024-43901,0,0,7be8f7dc4bf09de426f00d5d02023b84d29a03cabc8ff89591749666578d8 CVE-2024-43902,0,0,c37472b064b345fa8fe25985d1bf76a11413a9f498d9f5b152ce2e7578168faa,2024-08-27T14:38:51.730000 CVE-2024-43903,0,0,c889729c6b4c992efb6382be5e0515b66e86fe6570936e30b472ad7500810adb,2024-08-27T13:39:48.683000 CVE-2024-43904,0,0,b989d9f9c68082637dc63029425b18b22bdee2eb24851a91094888ca00d2fb77,2024-08-27T13:40:50.577000 -CVE-2024-43905,0,1,2991c5e81cb34c3859947b3efc34af1928caab546b01a8090fc3ab2e2d3b4377,2024-09-12T12:15:51.260000 +CVE-2024-43905,0,0,2991c5e81cb34c3859947b3efc34af1928caab546b01a8090fc3ab2e2d3b4377,2024-09-12T12:15:51.260000 CVE-2024-43906,0,0,779aa474267695b99fe2e67309386add980c332f20c4c315c9ddf6fefbf535a7,2024-08-27T13:41:30.093000 CVE-2024-43907,0,0,73e780d9fe01ae8cc5a4e065d7a6d0780649fed471971eb378d0bc9554d2f7ff,2024-08-27T13:41:40.497000 CVE-2024-43908,0,0,37f71e1240c38f7f5d5430994391502a308fcc5874d7b6b8d1d03bb0a35a093a,2024-08-27T13:41:55.260000 @@ -259146,7 +259151,7 @@ CVE-2024-4451,0,0,7d9df0a3b011ad00943a7e8af468a8b44c5ed08f6530b7317d9be30e3e418e CVE-2024-4452,0,0,8393f4e948f53b2fbde25aaf7f55c55c1f0989c48fbd4a40cb4c1f768b7a8d7d,2024-05-21T16:54:26.047000 CVE-2024-4453,0,0,bc1bfc8908fbb505485206b11e5cc2278d2416192493c6c78b1ac2e39a46d4c3,2024-06-10T17:16:33.460000 CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88fa2,2024-05-24T01:15:30.977000 -CVE-2024-44541,0,1,3a1e561d6510cb46fc3025d4e567327c4a8fc313204436661e66190b9e443f5d,2024-09-12T12:35:54.013000 +CVE-2024-44541,0,0,3a1e561d6510cb46fc3025d4e567327c4a8fc313204436661e66190b9e443f5d,2024-09-12T12:35:54.013000 CVE-2024-44549,0,0,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000 CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000 CVE-2024-44550,0,0,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000 @@ -259160,13 +259165,13 @@ CVE-2024-44558,0,0,6d87f392eda09922944831aa9fc2790f469b514dece92bfccefe48ebd558f CVE-2024-4456,0,0,4944908816b0dabd168db28a33c87155bafc589f1ccdd7f87c25aad569cea442,2024-05-08T13:15:00.690000 CVE-2024-44563,0,0,6dbd76e0f089d60e056938eea08be0958b9b4b0e2739be9b2567dba585143e70,2024-08-27T13:43:26.300000 CVE-2024-44565,0,0,e25f465e010d5d48f951ee0faaea27800251f5ba71d3aee72b61ca7f81604b74,2024-08-27T13:43:46.897000 -CVE-2024-44570,0,1,f31dd0f16dce6578a9c7f72b7c19d2bcd61b4bcd828f5dded7771736a6590860,2024-09-12T12:35:54.013000 -CVE-2024-44571,0,1,6ef20a14725bae57f9a567f27cd564fd830fef7d5d8219a7373f1812eb1e3a7d,2024-09-12T12:35:54.013000 -CVE-2024-44572,0,1,1fb641294c45b891575d0c3a1b41047f1bbad864be426defb5572f6f38bcfd4a,2024-09-12T12:35:54.013000 -CVE-2024-44573,0,1,41e92f6cfccd021915284e1af0565e7ec29897019f610246c12a825f59a10382,2024-09-12T12:35:54.013000 -CVE-2024-44574,0,1,cfb193c0fdfb56729a274c91dd51261fc44a3306d91c3856efba426d2348d691,2024-09-12T12:35:54.013000 -CVE-2024-44575,0,1,201a6ca7c7ab73c1cf72eb94fa46c058ee5fb2f214506723411e1243ae73df24,2024-09-12T12:35:54.013000 -CVE-2024-44577,0,1,f23b5398825615b1e4c9cdd4a9ee17debd24c87e40c16b163c6e9227921995f9,2024-09-12T12:35:54.013000 +CVE-2024-44570,0,0,f31dd0f16dce6578a9c7f72b7c19d2bcd61b4bcd828f5dded7771736a6590860,2024-09-12T12:35:54.013000 +CVE-2024-44571,0,0,6ef20a14725bae57f9a567f27cd564fd830fef7d5d8219a7373f1812eb1e3a7d,2024-09-12T12:35:54.013000 +CVE-2024-44572,0,0,1fb641294c45b891575d0c3a1b41047f1bbad864be426defb5572f6f38bcfd4a,2024-09-12T12:35:54.013000 +CVE-2024-44573,0,0,41e92f6cfccd021915284e1af0565e7ec29897019f610246c12a825f59a10382,2024-09-12T12:35:54.013000 +CVE-2024-44574,0,0,cfb193c0fdfb56729a274c91dd51261fc44a3306d91c3856efba426d2348d691,2024-09-12T12:35:54.013000 +CVE-2024-44575,0,0,201a6ca7c7ab73c1cf72eb94fa46c058ee5fb2f214506723411e1243ae73df24,2024-09-12T12:35:54.013000 +CVE-2024-44577,0,0,f23b5398825615b1e4c9cdd4a9ee17debd24c87e40c16b163c6e9227921995f9,2024-09-12T12:35:54.013000 CVE-2024-4458,0,0,0a429f9bf96fae3ee6bbb1cf09933ff34e8fcd6340740204bd4095a557c4fb2e,2024-07-24T20:23:12.307000 CVE-2024-44587,0,0,df65b03ef618d179da9d66b0f4fc4c4e495ab75863a2207f1a4d99901686f98d,2024-09-05T17:44:56.007000 CVE-2024-4459,0,0,b17743adc54c2996e578e7c399fafb8182f2604175c352726fa92e67f639f3de,2024-07-24T18:00:21.097000 @@ -259264,10 +259269,10 @@ CVE-2024-44934,0,0,c02ef0b8f3f4254298df3ea9cd3b57ad77027d83bf4e5f989954ab58227e0 CVE-2024-44935,0,0,d95aec9e91962acc52eb3e384a6783d63909024bc92ab328e0dd424f360e30ba,2024-08-27T16:09:01.633000 CVE-2024-44936,0,0,f9815d599f28fad94981996d900e9d02a0d2f13fbfa06d4ba10d6ebc83ea02d0,2024-09-05T17:53:43.867000 CVE-2024-44937,0,0,d456b794ce05568f4cfe23042c645d8e132bd17f43b2774d90973742618e150d,2024-08-27T16:10:11.423000 -CVE-2024-44938,0,0,78c7eb7f4b70b2193d6a764b661f1c4b34c66de744f08d6fe3e652c84bf9ba47,2024-08-29T17:15:08.753000 +CVE-2024-44938,0,1,cac367901b693b8791f0dd02822a4a05e43218fd4c6b94a799c4fec632e7e7e6,2024-09-12T14:05:44.310000 CVE-2024-44939,0,0,77e340056998b85a0edb6eda2bb5776e7eba0084412d6173fbb841dbdf80b07a,2024-08-29T17:15:08.837000 CVE-2024-4494,0,0,48359226f338c9b2ea2806c2c68d5e2ef65a24ac708162309f084eae0ceb81a4,2024-06-04T19:20:39.240000 -CVE-2024-44940,0,0,6d3559648bdfa621b46434f9855de2178fa1de08defe3fd31c71176641a2c51c,2024-08-29T17:15:08.903000 +CVE-2024-44940,0,1,3d7a36ee27f7c290f32cda36725439925cd59b4b1a4b081b71d7802f9cb5b9bf,2024-09-12T14:10:00.857000 CVE-2024-44941,0,0,20521e6b3375de1ef5f8d927ded27494829abd96af181743a86f9f68bd518b56,2024-08-26T12:47:20.187000 CVE-2024-44942,0,0,17b37362bd3ba24b1a5ce481b72105519e3d684fbcb26bdd0327529225c432f3,2024-08-27T16:09:10.010000 CVE-2024-44943,0,0,283eaecb4a15bfc58a84156c8fa38a69ba8363c53f00af38995bb3b34fd2d3c5,2024-09-10T18:12:43.380000 @@ -259304,7 +259309,7 @@ CVE-2024-44970,0,0,70414797c7f1420a60b48e34277f5530ec1aa67aed6a07d8d2aaeded9223b CVE-2024-44971,0,0,44403d9889954211cee528d64ed0dc86351f6fa04277308e5630c2d58c6cab86,2024-09-05T17:54:36.607000 CVE-2024-44972,0,0,0b967112ef26e3fe5b0935b427f88208867173c88daf36aa5bd2c336c4f07e64,2024-09-05T12:53:21.110000 CVE-2024-44973,0,0,add414a58e878f3aee3366f7678bfde348bdae69c48419c508ba030f370d1ae1,2024-09-05T12:53:21.110000 -CVE-2024-44974,0,1,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000 +CVE-2024-44974,0,0,fd141e065f0472f9c20f0e926fb616aa814fa8f29c09362dbf81fd47c4c1b225,2024-09-12T12:15:51.397000 CVE-2024-44975,0,0,012dcb6db335aa97afa1ef9268f931ab68a445b973fc3f10a7843af27070943c,2024-09-05T12:53:21.110000 CVE-2024-44976,0,0,8c7b930f69a8eac68da6855eedc8b3a97b1051cdf631749b93c2aaf1d2a28ef8,2024-09-05T12:53:21.110000 CVE-2024-44977,0,0,8267c668040f19c89ab2180e788476dee75d30c69bd18b77721b380cd5039fc4,2024-09-05T12:53:21.110000 @@ -259342,7 +259347,7 @@ CVE-2024-45005,0,0,e451b7c2f4add710887224d994f9dffc8ac56adf3dcc9794335f8f3deeed4 CVE-2024-45006,0,0,5452c1a79742ccdebb367ec30c38e9d482e8d0678948443e98ba439908eac48e,2024-09-06T16:26:52.640000 CVE-2024-45007,0,0,9c51cc66379cf576bcd17f9e957329cedbd34ee23634a31bf340e6e230dd369f,2024-09-05T12:53:21.110000 CVE-2024-45008,0,0,37dc0718d2dd8ba9fb7eca159ff733be9b954368896d4dc7e665604ee4c36c7c,2024-09-05T12:53:21.110000 -CVE-2024-45009,0,1,86b4004a8edfe7c22e58929d5f204ac65dd45123e7cd56200f54e8e14b1cbc3d,2024-09-12T12:15:52.183000 +CVE-2024-45009,0,0,86b4004a8edfe7c22e58929d5f204ac65dd45123e7cd56200f54e8e14b1cbc3d,2024-09-12T12:15:52.183000 CVE-2024-4501,0,0,3baebe0a469dd4bf55eae5f370777b6e334d89a3883f98b03d03b2205353433a,2024-06-04T19:20:39.640000 CVE-2024-45010,0,0,81e9c53dd98ff1a6581f42969addac0a00a7463ca8cf095121d947f59bf76847,2024-09-11T16:26:11.920000 CVE-2024-45011,0,0,6df01d5595f2a917dea63248c824a1961c33db696ee158376265b5fce4633397,2024-09-11T16:26:11.920000 @@ -259566,9 +259571,9 @@ CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0 CVE-2024-45527,0,0,0ed4b7876171a991bf7220f1ee96f2007c9fed522b397370892e632e0f15c024,2024-09-03T15:35:13.673000 CVE-2024-45528,0,0,b726a60695697377572ea54be1902b1c537e8da89a7623e441b7aa9130d0fc17,2024-09-03T15:35:14.480000 CVE-2024-4553,0,0,a1e8f5bd1acd4a97b93bbbe85c146f94099965137fad1ebd49acd106c4b8e00a,2024-05-21T12:37:59.687000 -CVE-2024-4554,0,0,85c234588dffa6aadefbdd2ba8b5ecdec9422dc38ba14c37503abe443a7c918c,2024-08-28T12:57:17.117000 -CVE-2024-4555,0,0,2d6c47296afeedb2c6a7f60677f2d88681b96e578cfefc1913928dc16b7bb873,2024-08-28T12:57:17.117000 -CVE-2024-4556,0,0,7d09fa247082252ffb6b7dda6aa600cf3ff3bf7dd0d9af7b07da29fff8c7a6fb,2024-08-28T12:57:17.117000 +CVE-2024-4554,0,1,92f30e92e4fc7deaf96b5e461132de3163a1189a641d3cd890f26d9e64523486,2024-09-12T15:01:12.217000 +CVE-2024-4555,0,1,c6e5ee837600c596327a91768410832a19be004b920151e53620c97a72516b9c,2024-09-12T15:13:25.520000 +CVE-2024-4556,0,1,32422e1a58fd58f5056dd13adba171d2a9e41531acfe1ea2f85efa6ba6a345d7,2024-09-12T15:09:55.107000 CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000 CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e147b,2024-07-30T02:15:08.293000 CVE-2024-45586,0,0,e206a9f9f52d6df31e8745674bc07b4799319b79462f9d7a84cd2e9a2bd105dc,2024-09-04T12:15:05.320000 @@ -259595,7 +259600,7 @@ CVE-2024-45620,0,0,79d0fcf4ffd9e5c58086135dfac2f9737c74cc4ac6ac6ca9de004adbc8816 CVE-2024-45621,0,0,14a519a8f510b3c3b7a6df78c35235d4501d8bcffdb6cf42158adb38aa1e44bd,2024-09-03T12:59:02.453000 CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000 CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000 -CVE-2024-45624,0,1,036c533fdb0de059ed058142700bedf9cefae5b5eb2341c759b752dac70cdd67,2024-09-12T12:35:54.013000 +CVE-2024-45624,0,1,7a0e35c55ac45641bb752e88253516bf9e2f94ec9e17765278ecb76cea70fa1a,2024-09-12T15:35:48.600000 CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44b6a,2024-09-10T11:19:40.113000 CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000 @@ -259626,22 +259631,26 @@ CVE-2024-45790,0,0,bc78a0525fb1c487c69a01d2acc05058c08f308e130aa06c5852c7814b827 CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000 CVE-2024-4581,0,0,87f8fe03f507957c50ab3e12c65c26f01a42761aed681f779ccb3bf731c25cc4,2024-06-04T16:57:41.053000 CVE-2024-4582,0,0,44a298c10fdfe0ab8acf9c943d89720dd7bed9fa14549ad9833d5c0a75c14780,2024-06-04T19:20:42.750000 +CVE-2024-45823,1,1,f13d03868cb026f29630cd792bf573f593ab91c5ce2ad974f966afcbd08cd596,2024-09-12T15:18:22.547000 +CVE-2024-45824,1,1,9f4189ea7a7c8c0c8b8535dc50c0b71c9f56154c000c77147005429a4a6e7ed8,2024-09-12T14:16:06.953000 +CVE-2024-45825,1,1,dcb5296500b63cc6be85906a3b9f3804850d62137628f6063e29b25c9b14d20d,2024-09-12T15:18:23.387000 +CVE-2024-45826,1,1,b3cdb428c266c4a9e5b87979609897020541adf3487c772725f0f8c0555b1655,2024-09-12T15:18:24.287000 CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000 CVE-2024-4584,0,0,4d639afeee5354fec0a7cf3023bb849f2437d78f7cd875e4a49ac03b46b9ec82,2024-06-17T19:15:58.903000 CVE-2024-45845,0,0,4d1151a3b662098d77e53a9c7dae2a157920328f9101b07db6113969fbede812,2024-09-10T14:35:08.550000 -CVE-2024-45846,1,1,b883bbedf716a99559e0615d95d6004e437e627e930e0f87dc77090da1778daa,2024-09-12T13:15:12.920000 -CVE-2024-45847,1,1,f931cc85108fd00d77b46761dd38e026692023d7c82f3ee5fc309cefbfbc1da1,2024-09-12T13:15:13.177000 -CVE-2024-45848,1,1,2d418eb4c2402a8cbae56aeb3c28ddb7aa0b79a243464add7b6f176785afd0f5,2024-09-12T13:15:13.437000 -CVE-2024-45849,1,1,a188cd6fb87cd68990d59de7b8c5a7b8813e0f8a024e3814c978ea080c8ca774,2024-09-12T13:15:13.700000 +CVE-2024-45846,0,0,b883bbedf716a99559e0615d95d6004e437e627e930e0f87dc77090da1778daa,2024-09-12T13:15:12.920000 +CVE-2024-45847,0,0,f931cc85108fd00d77b46761dd38e026692023d7c82f3ee5fc309cefbfbc1da1,2024-09-12T13:15:13.177000 +CVE-2024-45848,0,0,2d418eb4c2402a8cbae56aeb3c28ddb7aa0b79a243464add7b6f176785afd0f5,2024-09-12T13:15:13.437000 +CVE-2024-45849,0,0,a188cd6fb87cd68990d59de7b8c5a7b8813e0f8a024e3814c978ea080c8ca774,2024-09-12T13:15:13.700000 CVE-2024-4585,0,0,de8aae2cc9125c3a9e288fcbd9e609876eec68062d1a138bbd8e80f3513a89cb,2024-06-20T20:15:19.110000 -CVE-2024-45850,1,1,1ad5dc5fd39498621f35547e686025f6ea82f44bde315e6e6c293a6729be8568,2024-09-12T13:15:13.933000 -CVE-2024-45851,1,1,5e2ef28d9cd1b8efdd5a7d42c9a77d9b56280bfe8d2ea16139d136973a031f83,2024-09-12T13:15:14.170000 -CVE-2024-45852,1,1,2e119762c6becd689ab6aa18ffb831d33f9eef1d581c0c322e941bae93cd9c9f,2024-09-12T13:15:14.403000 -CVE-2024-45853,1,1,e82dc2520b5b7f648c11a96de9192da6915517766bea0c110a5ecfbe07bbb390,2024-09-12T13:15:14.643000 -CVE-2024-45854,1,1,1f91acc4c1ad62387ce5b1fec0196218ec3892acd56493a10434bbaec5f6046c,2024-09-12T13:15:14.900000 -CVE-2024-45855,1,1,24d3e8ddaa4be43c095d31f319dbfa1fee1c512408e3c421b02d59df94b79c45,2024-09-12T13:15:15.143000 -CVE-2024-45856,1,1,081e1608c0f05e37926e7d027b3562523c475d95c2895b12caac70912a29e556,2024-09-12T13:15:15.373000 -CVE-2024-45857,1,1,933afbb159f3587327b54ad2382efbb49cf03b5b0d4ff1db3f8b1e8b718e382e,2024-09-12T13:15:16.227000 +CVE-2024-45850,0,0,1ad5dc5fd39498621f35547e686025f6ea82f44bde315e6e6c293a6729be8568,2024-09-12T13:15:13.933000 +CVE-2024-45851,0,0,5e2ef28d9cd1b8efdd5a7d42c9a77d9b56280bfe8d2ea16139d136973a031f83,2024-09-12T13:15:14.170000 +CVE-2024-45852,0,0,2e119762c6becd689ab6aa18ffb831d33f9eef1d581c0c322e941bae93cd9c9f,2024-09-12T13:15:14.403000 +CVE-2024-45853,0,0,e82dc2520b5b7f648c11a96de9192da6915517766bea0c110a5ecfbe07bbb390,2024-09-12T13:15:14.643000 +CVE-2024-45854,0,0,1f91acc4c1ad62387ce5b1fec0196218ec3892acd56493a10434bbaec5f6046c,2024-09-12T13:15:14.900000 +CVE-2024-45855,0,0,24d3e8ddaa4be43c095d31f319dbfa1fee1c512408e3c421b02d59df94b79c45,2024-09-12T13:15:15.143000 +CVE-2024-45856,0,0,081e1608c0f05e37926e7d027b3562523c475d95c2895b12caac70912a29e556,2024-09-12T13:15:15.373000 +CVE-2024-45857,0,0,933afbb159f3587327b54ad2382efbb49cf03b5b0d4ff1db3f8b1e8b718e382e,2024-09-12T13:15:16.227000 CVE-2024-4586,0,0,308ac0f257920a7bf6e50f46839419870b7e733c7917681ea48f64312191a5cb,2024-06-04T19:20:42.953000 CVE-2024-4587,0,0,ccb551f2bab92e34c98709c8a5231b1e8778dd90f0d16bd4ac4c665438d47b6c,2024-06-04T19:20:43.057000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 @@ -260703,7 +260712,7 @@ CVE-2024-5793,0,0,4f7c09f8feed484d3c3bfde7191aecbd9210e86e918c2f39cfc1ec374b1fc0 CVE-2024-5795,0,0,f96bd55511ad8d513f3ec0decf8876ed6554642b2cf81135dc3a93534acc202d,2024-07-17T13:34:20.520000 CVE-2024-5796,0,0,e179556883d33099fab8768b9c3d50a47b2a022b7b46e47f95f4ba7640cc26df,2024-06-28T10:27:00.920000 CVE-2024-5798,0,0,8c4fc55b5a68256010d6e6bfcfe06ef9f209d5a592c838664e8662bbc4a3d762,2024-06-13T18:36:09.010000 -CVE-2024-5799,0,1,e3001040c964b454efdd2f91b1d90a1422c21167246bb877f33ac0cdb2682e40,2024-09-12T12:35:54.013000 +CVE-2024-5799,0,0,e3001040c964b454efdd2f91b1d90a1422c21167246bb877f33ac0cdb2682e40,2024-09-12T12:35:54.013000 CVE-2024-5800,0,0,a1cb578d92a5ce21abf5c6c3a9df30d0f15dec959b83eaaecf5cab603de30571,2024-08-12T13:41:36.517000 CVE-2024-5801,0,0,668584c28d68f34806b15aa23a003fb18ba18cb7fb2d24326345f03f0e3dd0a3,2024-08-12T13:41:36.517000 CVE-2024-5802,0,0,71daebe4bec626c1d71de5756a51cb35bdbb0ec81769b121e428d7e1cc0f8395,2024-07-12T15:20:14.610000 @@ -260879,9 +260888,9 @@ CVE-2024-6013,0,0,dd5aadcad9485c7b63e2c76668a62eba788e1248615fab9fd06bf5aaf41af2 CVE-2024-6014,0,0,6f9e64ff8fbf43e19b3d7e24c13ad8adc071c58e85b8bf9a829322ea55abcf8f,2024-07-19T14:18:17.607000 CVE-2024-6015,0,0,c2460029f18cca819988d11dbd49466b5328ee3d26de8c6ec6e0519debb7ea98,2024-07-19T14:13:10.463000 CVE-2024-6016,0,0,db11fa4e2db5dca1bf67cd82c1ae54777d6d6de86c83abed9806f80a5c1a5385,2024-07-19T14:02:04.600000 -CVE-2024-6017,0,1,8f6c3d25da5f49da32f4c02f57faf473758ab0cf7948f15a03a435ce01047071,2024-09-12T12:35:54.013000 -CVE-2024-6018,0,1,3348e4d67046736f0089f6568ff315546ee690a1d99c47714da86734078d6ed7,2024-09-12T12:35:54.013000 -CVE-2024-6019,0,1,e15dc925f6efdbbda56fc018b84b9b9acb6201366cf8e73779977ca86457c067,2024-09-12T12:35:54.013000 +CVE-2024-6017,0,0,8f6c3d25da5f49da32f4c02f57faf473758ab0cf7948f15a03a435ce01047071,2024-09-12T12:35:54.013000 +CVE-2024-6018,0,0,3348e4d67046736f0089f6568ff315546ee690a1d99c47714da86734078d6ed7,2024-09-12T12:35:54.013000 +CVE-2024-6019,0,0,e15dc925f6efdbbda56fc018b84b9b9acb6201366cf8e73779977ca86457c067,2024-09-12T12:35:54.013000 CVE-2024-6020,0,0,074b02a1424aae1978150f09e7d5889851f8afbaedf8d5213fe33ca18fe17c85,2024-09-04T15:35:25.307000 CVE-2024-6021,0,0,89bc3fbda68691de22c48372ad0a77a2b4849fdf02c26c23812a34a3700d835a,2024-08-01T14:00:08.097000 CVE-2024-6022,0,0,55d2fd1c662113ade487c32b8dfaf0e98bea6d5629f505bd14ff7aba829d2368,2024-08-02T19:46:23.360000 @@ -261149,7 +261158,7 @@ CVE-2024-6328,0,0,1dc9c3c4a448080717651ebabfb2fc281b4a1c036cabba31a96124b6cb4e8c CVE-2024-6329,0,0,86251ab842ffcb900239f67c839645a87676821122e9a881854a92c1e2f082f5,2024-08-23T17:01:34.227000 CVE-2024-6330,0,0,e1243e86845c9ad8bb8e14e862db7cae433088225de72050fd359fe249b90cd8,2024-08-19T16:35:30.907000 CVE-2024-6331,0,0,52c1c6ef5119330812f0b8f9d4c8f908510020273352e90ad354980012c782b6,2024-08-30T16:15:10.710000 -CVE-2024-6332,0,1,6a11035168ec675eca4317d3a76c369854aee1404a3dbc4eab434b7b1210d36b,2024-09-12T12:45:37.917000 +CVE-2024-6332,0,0,6a11035168ec675eca4317d3a76c369854aee1404a3dbc4eab434b7b1210d36b,2024-09-12T12:45:37.917000 CVE-2024-6334,0,0,3daf0dfe09252e7765ca30c739cfcc033a43a657c17c0275e173ac670504522a,2024-07-09T18:19:14.047000 CVE-2024-6336,0,0,1df5fc72f07b093cfd11ea9b65ef147e8130715026fca7ff47fd924988f45532,2024-07-17T13:34:20.520000 CVE-2024-6337,0,0,2e78350836fa8817ff4aec79c82f6f0f98d78739985b39708ec542654e5f48f4,2024-08-21T12:30:33.697000 @@ -261238,8 +261247,8 @@ CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c21 CVE-2024-6445,0,0,4e18706ab2589cd20aaa85711db9c589c570ed71d832abb3de9a8a627170f6bf,2024-09-09T09:15:02.513000 CVE-2024-6447,0,0,45fe1e3b45bb9052a54143ac6931092e1b37ff897cd56aa11e3df59780bc06cb,2024-07-11T13:05:54.930000 CVE-2024-6448,0,0,29c9fba3b86c8e9eb615a2e1f73377ed9eea71e4eb21902a2662b1cd45074970,2024-08-28T12:57:27.610000 -CVE-2024-6449,0,0,21995eacdcc0c8443a9e9f3d4edb41f9e9ea5b155f883c2dcc53c4e74b6c4d69,2024-09-06T13:15:06.110000 -CVE-2024-6450,0,0,df77a962eb8911939efd97340d1702803ad1baf719c452d1d7fa8308fe5c3838,2024-09-06T13:15:06.343000 +CVE-2024-6449,0,1,3f5ac8d5827bd74c021dab1f3c742a29223bd99b31b5ea254ad3baff099e2a5a,2024-09-12T15:32:19.680000 +CVE-2024-6450,0,1,8d55cc6d4f12f29394d3b3a50861abb969afc8594b50e7d3b980816f16d7521e,2024-09-12T15:42:45.430000 CVE-2024-6451,0,0,6a9c0fb65fad3a5f99e557f5250ddd026fdc81cb51b281650e16075ca1a8cd9e,2024-08-19T17:35:23.417000 CVE-2024-6452,0,0,c694c1bdf54902e69172121aae2a54d0747cfc16750499c01d3cf3c9c6ef3263,2024-07-03T12:53:24.977000 CVE-2024-6453,0,0,997e33861988fe67139dbc94cb45099acca0539b377b12d39324c5c718a66e9d,2024-08-21T14:37:10.103000 @@ -261285,6 +261294,7 @@ CVE-2024-6506,0,0,58310ca3e68e3dacb16dafd9b32db187bdf111a88d3da008267c8c84bbec48 CVE-2024-6507,0,0,4e3b24fd61e25de66a6840473e4d19109a713188592b0f05efa1cbb9de33936e,2024-07-08T14:19:21.610000 CVE-2024-6508,0,0,5773cbe3ab2c4eb69c1efc3c03d7ae03bdf5d1ca7c49c5fd875f2b2bd8e08dcb,2024-08-21T12:30:33.697000 CVE-2024-6509,0,0,7eb4fc03788f01fd646b7975c190061926ae41b355a82f9aed0c1fc50ccfb715,2024-09-10T12:09:50.377000 +CVE-2024-6510,1,1,1a7f2b9b3813d26bb892d1d258cbccea18800f922723ddf82973d996fc2807a8,2024-09-12T15:18:26.347000 CVE-2024-6511,0,0,053f3089b06a0cd915df79eb3301836b5db5c9fe4d3ed571ee6923d36f4d1832,2024-07-05T12:55:51.367000 CVE-2024-6513,0,0,bb977a38eaef5aa918756b3907c97d9805111d3bc118dcf2b0096d1bbd202aea,2024-07-04T16:15:03.103000 CVE-2024-6518,0,0,7382529f36b9b37e0acec24889e25676a677588945f854438be53c4cb8bd58b0,2024-08-27T13:15:20.033000 @@ -261397,6 +261407,7 @@ CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555 CVE-2024-6652,0,0,8978a0baa082505b94e778186034022d155714d2d8ee4e86dbb9cc40d29251d6,2024-08-08T16:43:37.053000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6655,0,0,485f585861c9543e180875e8c8a03aa176dd69bb5a21887c98c071d6ec8a6317,2024-07-16T18:00:02.110000 +CVE-2024-6658,1,1,88d4f113ec5158cc5c4cc53e75f426e08a746bd6f63deb6c7f9bed34ce79e989,2024-09-12T15:18:26.543000 CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000 CVE-2024-6663,0,0,7facb2637e12709d4a455340194f194dba2537cb44d31c2262ed1aa6b9ebcf89,2024-07-10T21:15:11.463000 @@ -261422,6 +261433,9 @@ CVE-2024-6694,0,0,7d61bbb6e4266a8c90354c9d0cb6da1ede156f667671ed3e7d5507b5e685e0 CVE-2024-6695,0,0,99ceef595ada6c305df9cf6da95af28747b0bb8e4a9bd8bdcd9193a7cc73001a,2024-08-01T14:00:34.400000 CVE-2024-6698,0,0,89497c4dbd46e9ca69b6c9e20c77840978d4a56c74e425e3a4babf4cd1ed1264,2024-08-01T12:42:36.933000 CVE-2024-6699,0,0,929cadbaac0006065219cd2b58294432166a6b8d9db788d9ac82ec21bf2caeb7,2024-08-23T13:55:41.357000 +CVE-2024-6700,1,1,9cddcbcc5dd8708cfb9526736d117eccdde6e09220af7190cdc4417c727cb02b,2024-09-12T15:18:26.757000 +CVE-2024-6701,1,1,66cafa8df65827722c832b2e483ed7dd2614d803de8c3c0f73c3baa398f2043d,2024-09-12T15:18:26.953000 +CVE-2024-6702,1,1,5bcc988f869becfb1576a0ff22d3a4f9c4a84e9d0e524652bfcc1095813e7a74,2024-09-12T15:18:27.133000 CVE-2024-6703,0,0,58688b231f5fc6deacad90c54b9ce0876a71daf3ee0061b5562a2bcbb8052bf3,2024-07-29T14:12:08.783000 CVE-2024-6704,0,0,32c1d6f59091f2a85229ee95d1e57c685e7e8aed9f15efe17b9f77a5487e60e3,2024-08-02T12:59:43.990000 CVE-2024-6705,0,0,1e166467558902cf3ff2211f8b1aa347feb308f999c65053186e5a13806e8368,2024-07-18T12:28:43.707000 @@ -261542,7 +261556,7 @@ CVE-2024-6883,0,0,17af31f8537d0ebfdcc29735e63f85da6d525c783f08d8df80e6d71ccea2f1 CVE-2024-6884,0,0,02f1ddb5da314dd396e2205aa21249cb1d9497ae10f450ff628522b4f22bdeac,2024-08-08T19:35:22.760000 CVE-2024-6885,0,0,820342a8aad3354940c223afe57157bbf13eee743fbe19265a63d35dde973086,2024-07-24T12:55:13.223000 CVE-2024-6886,0,0,fbca102ce434786c03a8469f687e67e8b7739ad3b6f0519e88d819189fb30d7c,2024-08-06T16:30:24.547000 -CVE-2024-6887,0,1,2902a22022074db25f0b48e8426b606585b735c68b9c3d35db14a3ae7b5475c4,2024-09-12T12:35:54.013000 +CVE-2024-6887,0,0,2902a22022074db25f0b48e8426b606585b735c68b9c3d35db14a3ae7b5475c4,2024-09-12T12:35:54.013000 CVE-2024-6888,0,0,7821f6ad756a40ba9974e9367cfa80ba14bf6ad061fb58534103c07dbd9c83c7,2024-09-04T15:35:25.820000 CVE-2024-6889,0,0,0d71ba8db5d6e12f2200830434e214b33ddf0e478787afb192cd93b07991608f,2024-09-04T15:35:26.040000 CVE-2024-6890,0,0,a4b61d6d84db517405e5620d04c7a39034adaee98aaff7a0c1a327ff7affb43d,2024-08-08T20:53:15.917000 @@ -261582,7 +261596,7 @@ CVE-2024-6925,0,0,a5a12bc5a2ee9232c227f40ad6ea986ccef3d40fedc40c2c7add12df1c65a1 CVE-2024-6926,0,0,8f7a980eaebe48aff3a265873ac088d8aab7ac9e61e313ad47eb901f8ccee0e3,2024-09-04T15:35:26.253000 CVE-2024-6927,0,0,e148b46f63346622a06f6186d016b89227da86b491e3aa4a6ce8be2d756e1768,2024-08-29T20:37:07.310000 CVE-2024-6928,0,0,04e0edb45267f653103b1b4b8ed00c7e0e3fce07f9c3ed23eb9bfbde1bd8f41d,2024-09-10T14:35:09.507000 -CVE-2024-6929,0,0,be8ff54e71c3dae7aaaebdfc2eb64ab807c47924b1857c6816d9c69c8ca6063c,2024-09-05T12:53:21.110000 +CVE-2024-6929,0,1,8bfdfdeee5eedcabcdc8115a8b9e0de4383a4f6cebfda630b8dc6730a4ae0a8c,2024-09-12T14:32:51 CVE-2024-6930,0,0,1339dcde2064efad12400b33b71bb10f58bb3894621d0a104ecb7e997db508bc,2024-08-08T20:06:49.207000 CVE-2024-6932,0,0,b45f238b66342b8a7c2c79c0dddcacbab87276fdb0cd01ae77c1653350b609b3,2024-09-10T20:24:40.790000 CVE-2024-6933,0,0,31e003a378d639e27641dced44e726d35d058acd0301a48a16d76976ef2aa1ee,2024-07-22T13:00:31.330000 @@ -261880,7 +261894,7 @@ CVE-2024-7345,0,0,c89352b78a1b7efddda76024ace56eb1677600f94378ef8d33d34c3c91ac18 CVE-2024-7346,0,0,cef11b112b151333dc0322cebc750df5acd76278a7b270f016213e5f5d953fa0,2024-09-05T14:03:24.040000 CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5f7,2024-08-20T19:25:17.513000 CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000 -CVE-2024-7349,0,1,1654fb20b3d5b8111af7165700d7dd7fc184ee1783ff4e6ae92268a2f53d23f5,2024-09-12T12:43:32.957000 +CVE-2024-7349,0,0,1654fb20b3d5b8111af7165700d7dd7fc184ee1783ff4e6ae92268a2f53d23f5,2024-09-12T12:43:32.957000 CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000 CVE-2024-7351,0,0,46112fbe28a33af24a9aafee0e565b5b19cc9895d9dd5029b9f8903f830d37b0,2024-08-26T12:47:20.187000 CVE-2024-7353,0,0,41679b571aeb0f65d12733ad6909f06c490b83d168f3a79e42cd0098d7b4bdde,2024-08-07T15:17:46.717000 @@ -262062,7 +262076,7 @@ CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198 CVE-2024-7602,0,0,1295ede0549ca488da522cbefe2db5abad88498e69c53af1f38f0ee81eb69b62,2024-08-23T16:36:11.690000 CVE-2024-7603,0,0,026c301c8508bb2890d37936199245036e5a5160d5195c848eb9252477eef559,2024-08-23T16:36:28.327000 CVE-2024-7604,0,0,2ca377c2d37b9340c6f7d1612379ed11f338df19f0e6ffae40ca1da8c016df51,2024-08-23T16:37:09.107000 -CVE-2024-7605,0,0,67c8fd2724983750c2524d5df9b224291891141ea02f33e418eb95d3910d766a,2024-09-05T12:53:21.110000 +CVE-2024-7605,0,1,bc09a75b7c45de231dc015ea353239dfd63eba4bd43fa0fa35326485eaab33fa,2024-09-12T14:24:03.833000 CVE-2024-7606,0,0,d1994339c445d05a7d0516150729b84de3d1d7c8a4d08e8012b40ecbd6deed28,2024-08-30T15:43:41.773000 CVE-2024-7607,0,0,1fc6dc2de47de502ba4dba054f1982731028b52bc9234ef0062aa94d686e06ad,2024-08-30T15:41:02.407000 CVE-2024-7608,0,0,b8872988f702757177432eab77e95a14e7cc629ce3c064dd49371a09c8fc5a16,2024-08-28T12:15:06.900000 @@ -262184,7 +262198,7 @@ CVE-2024-7752,0,0,a2329e23410b1feec53d6ea38469016e280edd824b17c574fc21bf18179470 CVE-2024-7753,0,0,8d87f0b2095698ec5201c016f27ad170e6b85d6a83cdb1acca64ef97e59384ac,2024-08-19T17:47:49.083000 CVE-2024-7754,0,0,aa642088260d14c06ef027c5ebe72633a842f86ac8e6448a2c0c42d526be8fa5,2024-08-19T17:48:15.203000 CVE-2024-7757,0,0,ca7d079474a8e4f4b2f55e1721105da3a15a9e1d63f2bd4356eaaa03e8d55f39,2024-08-21T09:15:04.973000 -CVE-2024-7766,0,1,3af547d42cb8a27ce57aba08e78a0c65441accdbcc20c0743127f4e29afe7fc4,2024-09-12T12:35:54.013000 +CVE-2024-7766,0,0,3af547d42cb8a27ce57aba08e78a0c65441accdbcc20c0743127f4e29afe7fc4,2024-09-12T12:35:54.013000 CVE-2024-7770,0,0,050ca25dc9f9b4d1ecb0313871198cecedaeb8fddc305a81bf31aa56f8757cc5,2024-09-10T12:09:50.377000 CVE-2024-7775,0,0,e75f99322bf942cd40c2d94981e16e48a8ebca7abec8ba8da6e02adea2112f97,2024-08-26T18:18:22.887000 CVE-2024-7777,0,0,4a2d78b8605a3d4db2907c7fe28bc447e2c0379246d7b81936de12aa55ddf523,2024-08-26T18:19:19.507000 @@ -262212,12 +262226,12 @@ CVE-2024-7812,0,0,7d23c7651a18766135526d086e05755f7342e9775f0f39e533e1590484eb2e CVE-2024-7813,0,0,660725c7439a0ec1a8a527e4f36d939d7005bd8e1713b07e4bd27cf3728c3f7f,2024-08-19T18:16:48.327000 CVE-2024-7814,0,0,77d672b90a1329b486901cf23b6e584004769dc821cc49b3c03fcd61d7b51c38,2024-08-19T18:31:16.473000 CVE-2024-7815,0,0,414a9ddc4da9ca2a40da2f6f1d9c0348a16eb40238a0ca5a655b1ae9bc8cc665,2024-08-19T18:32:00.617000 -CVE-2024-7816,0,1,f3a2f0da9ea057f90571f04d56c9bd3246fc6e5117e8b50039b214ab2df1b797,2024-09-12T12:35:54.013000 -CVE-2024-7817,0,1,c064504630f563e0e2b1287bd60ed27f3e652f99efc490ca30fe1e4d6d24bfcc,2024-09-12T12:35:54.013000 -CVE-2024-7818,0,1,00719acc68e1341396382176c388371c4a5019b1eef4519a282cad5638ee8950,2024-09-12T12:35:54.013000 -CVE-2024-7820,0,1,9d0bc9ccd06741f10ffc91551224f2e44e9275cd3c9bce0eb0afdc6e00f568ef,2024-09-12T12:35:54.013000 +CVE-2024-7816,0,1,9bbdc6d3b66b6f672d49ba4a67f36364b89c37cffb4ca5a35dc1298dbac2cf28,2024-09-12T14:35:15.873000 +CVE-2024-7817,0,1,05db7239cf0d9449e8a908421caed43ff0a27fd4a5864d6e460eaeeafce59522,2024-09-12T14:35:16.087000 +CVE-2024-7818,0,1,3d9e002b3cacb59291792ccb3901427c448dbca6f4632cfbe55bd76f7812334f,2024-09-12T14:35:16.877000 +CVE-2024-7820,0,1,edc132d96b3e34e547f2b473b9f16032278da6025751b3ece4954d1d1dab7e87,2024-09-12T14:35:17.657000 CVE-2024-7821,0,0,a6cbf4229b3ac9caad2c13358d94e9d25b2f946f0353199ff2ed2717953ff2a4,2024-09-04T10:15:03.553000 -CVE-2024-7822,0,1,51d602c0f95d98d3009340198af1ac746870274dbb69c6bb7c3fc736cbfe4364,2024-09-12T12:35:54.013000 +CVE-2024-7822,0,1,86171139f93ec13a09ebceea06c77303b50df913b56e35d49321070793f7d6c6,2024-09-12T14:35:18.437000 CVE-2024-7827,0,0,20afe3aa4a313fb97b1d97a1cbf5257a0701f273bd3d99d4148b86bfbef51981,2024-08-20T15:44:20.567000 CVE-2024-7828,0,0,e3115575bb7dae7cb27cdf5edd1f5d03fa0744cba105509a33368f4e132d9ca7,2024-08-19T18:33:17.583000 CVE-2024-7829,0,0,3634da4931045efa2221e4dd20ed9805c5f347e47423b6602d3467d4b2db62e9,2024-08-19T18:34:00.040000 @@ -262244,10 +262258,10 @@ CVE-2024-7854,0,0,c7d42abb2b322c04201a8af34648ccfdb0ede7da24776e4c0b3ca238a25bf3 CVE-2024-7856,0,0,4c18a2db12636b3d9ab7f571b553f307088acfa3032a3727cdd03791c5b56b45,2024-08-29T13:25:27.537000 CVE-2024-7857,0,0,b74961afa7dd10dda782bf64e146bf5117eb37327cdce5dd6f430c037eea52b1,2024-08-29T13:25:27.537000 CVE-2024-7858,0,0,dbe22e1f02da632a108fdb9c096b7008488e7f6cd1024c2ca6a33d2456cc067c,2024-09-03T14:34:09.017000 -CVE-2024-7859,0,1,1c867fced67de8fed0485cd9b7b6e7b933a2105ee5541a1547408f447e010e3d,2024-09-12T12:35:54.013000 -CVE-2024-7860,0,1,1e30355b789569ad082dff1a604deb8d5b7095edb85139f6a62419ca334d2bc2,2024-09-12T12:35:54.013000 -CVE-2024-7861,0,1,938a9941277226c2b1637ea23f0e73c2f737e3c74aeedd4967b0b1574b9079ca,2024-09-12T12:35:54.013000 -CVE-2024-7862,0,1,f010c4214ce8f4c2d746d16d746a721d57fa72cbfc2ee7786acfe1f97058706c,2024-09-12T12:35:54.013000 +CVE-2024-7859,0,1,2e9efdc14165216e115d44a68371c6f167a605d4d7db791f71b61c4268679b75,2024-09-12T14:35:19.213000 +CVE-2024-7860,0,1,6478691d52b931fe14a87d864f1defb31ceb3c959fc542786a5c247463eccd66,2024-09-12T14:35:19.980000 +CVE-2024-7861,0,1,7dc841d67f7cbf14766a683bac9706b93075a04167273c804ada991b965813f0,2024-09-12T14:35:20.767000 +CVE-2024-7862,0,1,ab3213803d3b49b6ac19aa8c58cc004e989e60ff7f240b01de14d09685981992,2024-09-12T14:35:21.530000 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000 CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000 @@ -262257,8 +262271,8 @@ CVE-2024-7884,0,0,d8621415c0cf625afb3ac55046a75308d0baca8fd0aad75f2a11bb7d29e7d0 CVE-2024-7885,0,0,8ccead187965a5f1c2abb39b48c133d9f576a21859dc9731309caf892f9de5e4,2024-09-09T23:15:10.350000 CVE-2024-7886,0,0,b8c1f856b8479c6982faa8a2fc4a6d8b2480e045b8b096d9bd3b8640a06eb6f3,2024-08-19T13:00:23.117000 CVE-2024-7887,0,0,ba2ac28c88e5c856e9fa78c00b11f37e0df98a3508bf609dc9edbaa04a8fdb8e,2024-08-19T12:59:59.177000 -CVE-2024-7889,0,1,0c7c33437bec0235d44235714053c0dff80cc4be025d2065fb73eaf578af8760,2024-09-12T12:35:54.013000 -CVE-2024-7890,0,1,5fc68443350e0746efaf8c3dba6c4db079dc957ebe4b2494b265529339aeb537,2024-09-12T12:35:54.013000 +CVE-2024-7889,0,0,0c7c33437bec0235d44235714053c0dff80cc4be025d2065fb73eaf578af8760,2024-09-12T12:35:54.013000 +CVE-2024-7890,0,0,5fc68443350e0746efaf8c3dba6c4db079dc957ebe4b2494b265529339aeb537,2024-09-12T12:35:54.013000 CVE-2024-7891,0,0,b35e39542ebc28a16519078ca6c1d7a0075a682efbdea597aee8b4a4f1fa51d3,2024-09-10T12:09:50.377000 CVE-2024-7895,0,0,dcdb1275a611703d85517bf5428cb1020917dec1da8e46a89dfea7f9bd6d1daa,2024-08-29T13:25:27.537000 CVE-2024-7896,0,0,d80047a3d1d6cdcff2bc1adb680d3fdbda8db4b01c807c4a42d25c13d72803dc,2024-08-19T17:15:11.543000 @@ -262359,8 +262373,8 @@ CVE-2024-8041,0,0,d1a08eb64fa9104259a4b82950c39baccb3cd8ac76a0f9fe28938628a68983 CVE-2024-8042,0,0,fe11fe06852bd8872b8038bbdb1b59f9abf17559f4fd0139db22bc4b00f3a1bd,2024-09-09T18:30:12.050000 CVE-2024-8045,0,0,05d36d75d042c2c9517546223100d3f67299fb6baf521e764ed39ac43e964a74,2024-09-11T16:26:11.920000 CVE-2024-8046,0,0,b737fce0801d82db74076beb4b2a2085f8323b47e71780060f37f6f5c3050f1a,2024-08-27T13:01:37.913000 -CVE-2024-8054,0,1,af4e4cf28fb1d8b32e9814351f501557f20cad7e8215836b974ca1512101e91d,2024-09-12T12:35:54.013000 -CVE-2024-8056,0,1,5fb88a6ca250e6ff67f8a1ef0c841abbb4c8f2529c05613c2143403e703e96cb,2024-09-12T13:35:23.340000 +CVE-2024-8054,0,1,cd3f21fbab232193f2e1023cd4fdcf2e5fe80aa9a017de7b992adfbc243b258d,2024-09-12T14:35:22.300000 +CVE-2024-8056,0,0,5fb88a6ca250e6ff67f8a1ef0c841abbb4c8f2529c05613c2143403e703e96cb,2024-09-12T13:35:23.340000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000 @@ -262379,7 +262393,7 @@ CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b87 CVE-2024-8088,0,0,8ddda94d9e5d462484d35576871f82a931bed67f85a71db29ea75a996b1d19a4,2024-09-04T23:15:13.100000 CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000 CVE-2024-8096,0,0,33268897f7f8b2273839db6d4e75fbc8fdf5f760a220b507e80b08e690a9edf4,2024-09-11T16:26:11.920000 -CVE-2024-8097,0,1,9eb75255abcd069d744af59bd7e8120e62794401b3e1be4e7c495de1066a7b41,2024-09-12T12:35:54.013000 +CVE-2024-8097,0,0,9eb75255abcd069d744af59bd7e8120e62794401b3e1be4e7c495de1066a7b41,2024-09-12T12:35:54.013000 CVE-2024-8102,0,0,59b268e27a6763219f51e9e55e73ae4276fd3b992bf79726ec1ccd845c10f5f9,2024-09-05T13:28:54.747000 CVE-2024-8104,0,0,e0dd7af2b8170ad0cb122178cc67d0512cc1eb1562d671a3c4e0173a78c8b550,2024-09-05T13:28:06.817000 CVE-2024-8105,0,0,fdab1a8bdde46d997c9a9800b483d676df23e449425d94531660960b3c42e376,2024-09-09T21:35:17.320000 @@ -262417,7 +262431,7 @@ CVE-2024-8151,0,0,26d8e3379a0c527fc4fb8a6574b59e528f30af25daf5368f41a4697b5bf405 CVE-2024-8152,0,0,350ecc2662ea6e2f0a0b8c353a724e0be97d6a7cef572290d778d858183d515b,2024-08-26T19:06:30.997000 CVE-2024-8153,0,0,69cd0592bf629221292de38c6438be13b3b81f232de24197a8eaf71ccdf025f1,2024-08-26T19:04:44.310000 CVE-2024-8154,0,0,fbb17f9dd590ac994870ad751b395ff693888a574100db6420d6e8a3b3d34acf,2024-08-26T19:06:34.983000 -CVE-2024-8155,0,1,104526467feb0428b2a45114df171b7d6e09efac9bca1bd2f2048b3b33875369,2024-09-12T13:53:23.827000 +CVE-2024-8155,0,0,104526467feb0428b2a45114df171b7d6e09efac9bca1bd2f2048b3b33875369,2024-09-12T13:53:23.827000 CVE-2024-8158,0,0,8ac397614ea8bcd3bd2bf49698f88ba96c85aeae3c3edb7c31f4b63e73c01d66,2024-08-26T12:47:20.187000 CVE-2024-8161,0,0,b695c0171728397a80eb00146225c0169779aabf8de6c566aa00c71a077959b1,2024-08-26T12:47:20.187000 CVE-2024-8162,0,0,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000 @@ -262487,7 +262501,7 @@ CVE-2024-8276,0,0,33cf21b53b41316bc2e568f752afa4e96bbe73b4ee966f9832ffdb8137ffcc CVE-2024-8277,0,0,927cb844bbeb99202846ea688baa5f560a39fb495f1767a0a934290c2ae10e58,2024-09-11T16:26:11.920000 CVE-2024-8285,0,0,44d06284adb5d71c65e8f3277866d5d546f57dcd495152060c7216923cd6bd07,2024-09-03T12:59:02.453000 CVE-2024-8289,0,0,900bfbd861154484ed59254bdbec992d28a9742381ab830cf631e50b7fa985ab,2024-09-05T17:41:58.350000 -CVE-2024-8292,0,1,ddba0ea03a741b8e444eb2158f82b5461df4d19adfc58fb2639bbcaaaadf6349,2024-09-12T12:37:18.380000 +CVE-2024-8292,0,0,ddba0ea03a741b8e444eb2158f82b5461df4d19adfc58fb2639bbcaaaadf6349,2024-09-12T12:37:18.380000 CVE-2024-8294,0,0,76cafe7a1838d9cd0244706a299f12cd4ba69ef653952654db2fa070ca07bd0d,2024-08-30T15:38:13.437000 CVE-2024-8295,0,0,907331a3a97a6618443e3aff92f4e758c3135b25ca0d9fb01d74d067e9cd6716,2024-08-30T15:37:41.510000 CVE-2024-8296,0,0,e31c225486c181d770097ee2f86386b9a5d776a033c8c4a5860d3ba550c9de51,2024-08-30T15:36:36.383000 @@ -262589,13 +262603,13 @@ CVE-2024-8473,0,0,0d318dfea88475fed5cabdbe761e188358c3ae35cd6d226ef3fe46f2f9041c CVE-2024-8478,0,0,e333806b3f124cdccad931974c458d04f248d7fe56143afacc5e05746f5f352e,2024-09-10T12:09:50.377000 CVE-2024-8480,0,0,6f63c0c2b913be669f1e72f74bb0555ea9046fdf00f5eabae51a6bc6bb95358b,2024-09-06T12:08:04.550000 CVE-2024-8503,0,0,9f803200a857fcdb413b5557fdfb30066c33963fff9f6132df8887c5f7ded0b9,2024-09-11T16:26:11.920000 -CVE-2024-8504,0,0,e3d0352d19d0c9df25b7281c4df070771b7e9095eb887ab8e1eb94f72060aa4b,2024-09-11T16:26:11.920000 +CVE-2024-8504,0,1,8357da8291f04353fac31874868f2eb40b31e26be1555ef771437bf9554e80e3,2024-09-12T14:35:23.173000 CVE-2024-8509,0,0,72b678ade46a23d1db65e1dfb65526568e7875d83752ef0a47b4a7edfeaf5ddf,2024-09-09T19:15:14.837000 CVE-2024-8517,0,0,3800f6b128aab40f688c971c9a9e47c0b6a42cbdd5c8d94b7cf3eaf620f48fad,2024-09-09T16:15:03.053000 CVE-2024-8521,0,0,65485edaf907369f60ded6330bfa86fc3cb4b0554a8f781a990c000b1998cccb,2024-09-09T13:03:38.303000 -CVE-2024-8522,0,1,a02eddcbfb56d3eca8dc20e4829cc3624dd6425770f1480bf7bc7f40e3b417d6,2024-09-12T12:35:54.013000 +CVE-2024-8522,0,0,a02eddcbfb56d3eca8dc20e4829cc3624dd6425770f1480bf7bc7f40e3b417d6,2024-09-12T12:35:54.013000 CVE-2024-8523,0,0,97cab60ebb5ec07bfc3fbe69bde3146d8e6846c5d869fc10534b5a2c3c29806e,2024-09-09T13:03:38.303000 -CVE-2024-8529,0,1,84b9e8f726248c5d8d3d385d0fa5af871c598cb8728f8d246222a151dca0946d,2024-09-12T12:35:54.013000 +CVE-2024-8529,0,0,84b9e8f726248c5d8d3d385d0fa5af871c598cb8728f8d246222a151dca0946d,2024-09-12T12:35:54.013000 CVE-2024-8538,0,0,cdc95bc68a4038527ba5cf51b0a8358b05e3a1650fc8124f586021fbca5ad9b3,2024-09-09T13:03:38.303000 CVE-2024-8543,0,0,e190cfdf6def9f928d16ce7c20119d5fac7745c9206ec7d9500145321b367e4b,2024-09-10T12:09:50.377000 CVE-2024-8554,0,0,46c32adbe15332664cfc930fe8c32bff96db8190902ab789492b593fa03348f1,2024-09-10T13:52:23.250000 @@ -262634,31 +262648,31 @@ CVE-2024-8604,0,0,011a82fa33d28627d93910a4b1b240e8b61f649834230335b18a4a93ce8a99 CVE-2024-8605,0,0,05de9fb886966e208a1d4ea135c5ccec7205233c650e87f0027c612a99575815,2024-09-09T18:30:12.050000 CVE-2024-8610,0,0,473e0782947d4bb5808f93b8ea2243b42a4e82997b690a69a9a95368e1eef9c1,2024-09-10T12:09:50.377000 CVE-2024-8611,0,0,a2b44027b2072954b313d2459899e49857f8f44440a8eb23f45a13a7d9867cef,2024-09-10T12:09:50.377000 -CVE-2024-8622,0,1,8c0d8566c114d14578f376fb46a83dd09ecfc9aef59b4f73eead49a6f9d03ae6,2024-09-12T12:35:54.013000 -CVE-2024-8636,0,1,1fce08eacd28ea201b49c51bbbe6640d913856ecc862b2d4d147e1ce65553f9b,2024-09-12T13:35:12.283000 -CVE-2024-8637,0,1,ac92961bb4ed2faff9b7ef10f0821d9ddbc9ee1668c3f32d4b8d09b16b66238f,2024-09-12T13:35:17.667000 -CVE-2024-8638,0,1,6660ce0c8303b28e97b2338846b62bf9e59e68569fb97659fa18a1f737cc3bbe,2024-09-12T13:35:04.660000 -CVE-2024-8639,0,1,627e02193a00a5e3c929cb67718006d1c4138ffc299ed37a7b4aab2c7edb9fd8,2024-09-12T13:35:02.863000 +CVE-2024-8622,0,0,8c0d8566c114d14578f376fb46a83dd09ecfc9aef59b4f73eead49a6f9d03ae6,2024-09-12T12:35:54.013000 +CVE-2024-8636,0,0,1fce08eacd28ea201b49c51bbbe6640d913856ecc862b2d4d147e1ce65553f9b,2024-09-12T13:35:12.283000 +CVE-2024-8637,0,0,ac92961bb4ed2faff9b7ef10f0821d9ddbc9ee1668c3f32d4b8d09b16b66238f,2024-09-12T13:35:17.667000 +CVE-2024-8638,0,0,6660ce0c8303b28e97b2338846b62bf9e59e68569fb97659fa18a1f737cc3bbe,2024-09-12T13:35:04.660000 +CVE-2024-8639,0,0,627e02193a00a5e3c929cb67718006d1c4138ffc299ed37a7b4aab2c7edb9fd8,2024-09-12T13:35:02.863000 CVE-2024-8642,0,0,0d7698e3a321d872dd4620edf9b803daeb8e08e2d186a2da501f5948a83a77e6,2024-09-11T16:26:11.920000 CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 CVE-2024-8646,0,0,19fa9f650168d587e83426e12fdaf58fb8d99e18fbbdb4568c4c398d745e4ed2,2024-09-11T16:26:11.920000 CVE-2024-8654,0,0,9ff4197fc4fa3acdeeaabf5d042cf9151def7011df3ee9c1e3c9b932ce455541,2024-09-10T15:50:57.713000 CVE-2024-8655,0,0,ae8f7bc5241b7c169a5dccbcccc728c3b8a01d5ae62a1e846fce72d64496b2eb,2024-09-11T16:26:11.920000 -CVE-2024-8686,0,1,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000 -CVE-2024-8687,0,1,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000 -CVE-2024-8688,0,1,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000 -CVE-2024-8689,0,1,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000 -CVE-2024-8690,0,1,022b7ea05a808ad29fd8fdcc9b7bd5a433e6ed83d980c7e85b26d897eef446a5,2024-09-12T12:35:54.013000 -CVE-2024-8691,0,1,f96faf45862018fb84a309de389ab9aa82dfec00eb8b1dbabab5ce1078a13abe,2024-09-12T12:35:54.013000 -CVE-2024-8692,0,1,fc7230ea52522c1382cd2778bd035ebb51a5f5590d81f2d6091d7cfcb1f83b3f,2024-09-12T12:35:54.013000 -CVE-2024-8693,0,1,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000 -CVE-2024-8694,0,1,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000 -CVE-2024-8705,0,1,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000 -CVE-2024-8706,0,1,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000 -CVE-2024-8707,0,1,fc669ae1fa6a0db8efe4caf5b18b876c49de472c52ca05ee52f992c36e2b2140,2024-09-12T12:35:54.013000 -CVE-2024-8708,0,1,5ef2b50614a0df8bc885350592e6748544bb35fd26cfadc248f257341a211827,2024-09-12T12:35:54.013000 -CVE-2024-8709,0,1,002b3fdc4504e3a8e90cfb73cfd92235f00c2180db683f0a52dbc2dfe0eff62b,2024-09-12T12:35:54.013000 -CVE-2024-8710,0,1,5201612712a005197694d95d57304261dfb33fc9c18e66babb635a0037176679,2024-09-12T12:35:54.013000 -CVE-2024-8711,0,1,b7bac1cd180aad7dc32fae997a12eb16b0ac91bf4702c25ed2514ca60e9a05c4,2024-09-12T12:35:54.013000 -CVE-2024-8749,1,1,6c300bdfd0775f414e5e2003c3bfef67fe867038e6f1a0c3495f0a7e6012e1de,2024-09-12T12:35:54.013000 -CVE-2024-8750,1,1,418fabeb18e7b297a31252c3e8fef09ccda76bf14212f7478abfd99c5bae6ae6,2024-09-12T12:35:54.013000 +CVE-2024-8686,0,0,ede88dcdbc0e792bd803e1f16895e5a739a1631453b49ef7e6a4fb82c32bd0dd,2024-09-12T12:35:54.013000 +CVE-2024-8687,0,0,113cfff3abfee2dabf4872656a1085a998928e6c5f0a4785deb63af7b2621db8,2024-09-12T12:35:54.013000 +CVE-2024-8688,0,0,622feee60e16c8839b74efa94c0181d710fda4c1e7dbcb6de36b0dc3a1f1b61b,2024-09-12T12:35:54.013000 +CVE-2024-8689,0,0,311be2bcbec5a47aa4a45b9bafa6c2540f9b63e228c7b676dc3b423a0ce88bb8,2024-09-12T12:35:54.013000 +CVE-2024-8690,0,0,022b7ea05a808ad29fd8fdcc9b7bd5a433e6ed83d980c7e85b26d897eef446a5,2024-09-12T12:35:54.013000 +CVE-2024-8691,0,0,f96faf45862018fb84a309de389ab9aa82dfec00eb8b1dbabab5ce1078a13abe,2024-09-12T12:35:54.013000 +CVE-2024-8692,0,0,fc7230ea52522c1382cd2778bd035ebb51a5f5590d81f2d6091d7cfcb1f83b3f,2024-09-12T12:35:54.013000 +CVE-2024-8693,0,0,0bf9bf9fae22897a2e08c32b35e067d4cd5332929319ef0efd3cac78490daee3,2024-09-12T12:35:54.013000 +CVE-2024-8694,0,0,2e1993ee271c7157fceb04bc71a63e2f464fbf1cced51f76c6346163fc12348e,2024-09-12T12:35:54.013000 +CVE-2024-8705,0,0,cb97dc5a896b102e020f4c6f7ce9db0475b1546a38609fc8cb74768e11db5694,2024-09-12T12:35:54.013000 +CVE-2024-8706,0,0,6f71e5876a7dec7ae56fc457ee5142cb7cf0075ec2e95d2e16cb7162a3c7da96,2024-09-12T12:35:54.013000 +CVE-2024-8707,0,1,53b8f536d953dccbee27f563b6dc5109a4e216dbbeb04b8d1e78c2b9c947dcb4,2024-09-12T15:18:27.333000 +CVE-2024-8708,0,0,5ef2b50614a0df8bc885350592e6748544bb35fd26cfadc248f257341a211827,2024-09-12T12:35:54.013000 +CVE-2024-8709,0,0,002b3fdc4504e3a8e90cfb73cfd92235f00c2180db683f0a52dbc2dfe0eff62b,2024-09-12T12:35:54.013000 +CVE-2024-8710,0,0,5201612712a005197694d95d57304261dfb33fc9c18e66babb635a0037176679,2024-09-12T12:35:54.013000 +CVE-2024-8711,0,0,b7bac1cd180aad7dc32fae997a12eb16b0ac91bf4702c25ed2514ca60e9a05c4,2024-09-12T12:35:54.013000 +CVE-2024-8749,0,0,6c300bdfd0775f414e5e2003c3bfef67fe867038e6f1a0c3495f0a7e6012e1de,2024-09-12T12:35:54.013000 +CVE-2024-8750,0,0,418fabeb18e7b297a31252c3e8fef09ccda76bf14212f7478abfd99c5bae6ae6,2024-09-12T12:35:54.013000