diff --git a/CVE-2018/CVE-2018-88xx/CVE-2018-8863.json b/CVE-2018/CVE-2018-88xx/CVE-2018-8863.json index f3e28a02800..c05be847174 100644 --- a/CVE-2018/CVE-2018-88xx/CVE-2018-8863.json +++ b/CVE-2018/CVE-2018-88xx/CVE-2018-8863.json @@ -2,8 +2,8 @@ "id": "CVE-2018-8863", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-11-09T23:15:08.740", - "lastModified": "2023-11-17T18:05:28.717", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:00.770", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-457xx/CVE-2022-45781.json b/CVE-2022/CVE-2022-457xx/CVE-2022-45781.json index 995f74726d8..21213621c0a 100644 --- a/CVE-2022/CVE-2022-457xx/CVE-2022-45781.json +++ b/CVE-2022/CVE-2022-457xx/CVE-2022-45781.json @@ -2,8 +2,8 @@ "id": "CVE-2022-45781", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-14T22:15:28.483", - "lastModified": "2023-11-20T20:38:43.463", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:01.533", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-486xx/CVE-2022-48619.json b/CVE-2022/CVE-2022-486xx/CVE-2022-48619.json index a730be4e952..d9ad68b2beb 100644 --- a/CVE-2022/CVE-2022-486xx/CVE-2022-48619.json +++ b/CVE-2022/CVE-2022-486xx/CVE-2022-48619.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48619", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T03:15:08.633", - "lastModified": "2024-01-19T15:27:59.073", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:01.357", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28134.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28134.json index 893bd5467da..13345b451cb 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28134.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28134.json @@ -2,8 +2,8 @@ "id": "CVE-2023-28134", "sourceIdentifier": "cve@checkpoint.com", "published": "2023-11-12T23:15:09.313", - "lastModified": "2023-11-17T20:14:54.230", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:02.300", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32602.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32602.json index 81d51c19bb7..b280a41fa98 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32602.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32602.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32602", "sourceIdentifier": "audit@patchstack.com", "published": "2023-11-09T21:15:24.180", - "lastModified": "2023-11-15T18:49:21.803", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:03.480", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-371xx/CVE-2023-37117.json b/CVE-2023/CVE-2023-371xx/CVE-2023-37117.json index fb9456541b1..d6c1076ae56 100644 --- a/CVE-2023/CVE-2023-371xx/CVE-2023-37117.json +++ b/CVE-2023/CVE-2023-371xx/CVE-2023-37117.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37117", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-12T07:15:12.077", - "lastModified": "2024-01-19T01:57:04.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:04.220", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-451xx/CVE-2023-45167.json b/CVE-2023/CVE-2023-451xx/CVE-2023-45167.json index b3687be4604..f680bf94966 100644 --- a/CVE-2023/CVE-2023-451xx/CVE-2023-45167.json +++ b/CVE-2023/CVE-2023-451xx/CVE-2023-45167.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45167", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-11-10T04:15:07.070", - "lastModified": "2023-11-16T19:15:25.573", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:04.040", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -79,6 +79,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45284.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45284.json index 799d8e6c1c7..59e684e88ef 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45284.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45284.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45284", "sourceIdentifier": "security@golang.org", "published": "2023-11-09T17:15:08.813", - "lastModified": "2023-11-17T16:39:27.450", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:05.593", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-473xx/CVE-2023-47384.json b/CVE-2023/CVE-2023-473xx/CVE-2023-47384.json index 3fe8b084bd7..da58a4a65d8 100644 --- a/CVE-2023/CVE-2023-473xx/CVE-2023-47384.json +++ b/CVE-2023/CVE-2023-473xx/CVE-2023-47384.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47384", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-14T20:15:08.417", - "lastModified": "2023-11-21T19:58:59.553", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:05.747", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json index 80cc8f4ea6b..16994b74f65 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48058.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48058", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-13T16:15:28.080", - "lastModified": "2023-11-16T17:34:52.187", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:06.833", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json b/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json index 7108d0050b2..3e0f85ab5e0 100644 --- a/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json +++ b/CVE-2023/CVE-2023-480xx/CVE-2023-48060.json @@ -2,8 +2,8 @@ "id": "CVE-2023-48060", "sourceIdentifier": "cve@mitre.org", "published": "2023-11-13T16:15:28.150", - "lastModified": "2023-11-16T17:35:04.087", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:07.643", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-492xx/CVE-2023-49233.json b/CVE-2023/CVE-2023-492xx/CVE-2023-49233.json index 9146cd9a7d3..cbb329ec8b8 100644 --- a/CVE-2023/CVE-2023-492xx/CVE-2023-49233.json +++ b/CVE-2023/CVE-2023-492xx/CVE-2023-49233.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49233", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-03T17:15:14.400", - "lastModified": "2024-09-03T17:15:14.400", - "vulnStatus": "Received", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50124.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50124.json index b513f62978a..39684a03923 100644 --- a/CVE-2023/CVE-2023-501xx/CVE-2023-50124.json +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50124.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50124", "sourceIdentifier": "cve@mitre.org", "published": "2024-01-11T21:15:10.630", - "lastModified": "2024-01-19T14:42:04.497", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:08.537", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json index 38f14aab928..ed721507c5b 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24790.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24790", "sourceIdentifier": "security@golang.org", "published": "2024-06-05T16:15:10.560", - "lastModified": "2024-06-18T17:59:12.547", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:07.483", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27729.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27729.json index 77ce5d50cee..c9f53c2e890 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27729.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27729.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27729", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T19:15:18.573", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:35:07.920", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": " La vulnerabilidad de Cross Site Scripting en Friendica v.2023.12 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro location de la funci\u00f3n de eventos del calendario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/friendica/friendica/pull/13927", diff --git a/CVE-2024/CVE-2024-337xx/CVE-2024-33773.json b/CVE-2024/CVE-2024-337xx/CVE-2024-33773.json index 7654b5fd5aa..dc017389398 100644 --- a/CVE-2024/CVE-2024-337xx/CVE-2024-33773.json +++ b/CVE-2024/CVE-2024-337xx/CVE-2024-33773.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33773", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:05.627", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-09-03T19:35:11.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de desbordamiento de b\u00fafer en /bin/boa en D-Link DIR-619L Rev.B 2.06B1 a trav\u00e9s de formWlanGuestSetup permite a usuarios remotos autenticados activar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s del par\u00e1metro \"p\u00e1gina web\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/YuboZhaoo/IoT/blob/main/D-Link/DIR-619L/20240424.md", diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33892.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33892.json index a0a47dd91dc..b1bf27d8171 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33892.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33892.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33892", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T18:16:18.637", - "lastModified": "2024-08-12T16:15:14.720", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-03T19:18:42.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,98 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.0s0", + "versionEndExcluding": "21.2s10", + "matchCriteriaId": "04E2B00A-5F5D-455D-84DA-4ABFA82A1863" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.0s0", + "versionEndExcluding": "22.1s3", + "matchCriteriaId": "1873C613-5DB5-4BFB-A538-860E1BF6555B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.hms-networks.com/cyber-security", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33893.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33893.json index ca45bdea2e8..fdc74da876e 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33893.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33893.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33893", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T18:16:18.743", - "lastModified": "2024-08-12T16:15:14.830", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-03T19:02:35.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,135 @@ "value": "Los dispositivos Cosy+ que ejecutan un firmware 21.x inferior a 21.2s10 o un firmware 22.x inferior a 22.1s3 son vulnerables a XSS cuando muestran los registros debido a una sanitizaci\u00f3n de entrada inadecuada. Esto se solucion\u00f3 en las versiones 21.2s10 y 22.1s3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.0", + "versionEndIncluding": "21.2s10", + "matchCriteriaId": "0D2D5C2F-AA95-47DF-BD24-8A2C355BBEC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.0", + "versionEndIncluding": "22.1s3", + "matchCriteriaId": "9048EBCA-4083-4C50-8499-A6FA6346AAA0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.hms-networks.com/cyber-security", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33895.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33895.json index 0d06ddb9ffc..4cb783af33f 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33895.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33895.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33895", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T18:16:18.933", - "lastModified": "2024-08-12T16:15:15.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-03T19:02:31.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,134 @@ "value": "Los dispositivos Cosy+ que ejecutan un firmware 21.x inferior a 21.2s10 o un firmware 22.x inferior a 22.1s3 utilizan una clave \u00fanica para cifrar los par\u00e1metros de configuraci\u00f3n. Esto se solucion\u00f3 en las versiones 21.2s10 y 22.1s3, la clave ahora es \u00fanica por dispositivo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.0", + "versionEndIncluding": "21.2s10", + "matchCriteriaId": "0D2D5C2F-AA95-47DF-BD24-8A2C355BBEC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.0", + "versionEndIncluding": "22.1s3", + "matchCriteriaId": "9048EBCA-4083-4C50-8499-A6FA6346AAA0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.hms-networks.com/cyber-security", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33896.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33896.json index e762a696f9e..37b21212f19 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33896.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33896.json @@ -2,8 +2,8 @@ "id": "CVE-2024-33896", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-02T18:16:19.023", - "lastModified": "2024-08-12T16:15:15.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-03T19:02:37.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,134 @@ "value": "Los dispositivos Cosy+ que ejecutan un firmware 21.x inferior a 21.2s10 o un firmware 22.x inferior a 22.1s3 son vulnerables a la inyecci\u00f3n de c\u00f3digo debido a una lista negra de par\u00e1metros incorrecta. Esto se solucion\u00f3 en las versiones 21.2s10 y 22.1s3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "21.0", + "versionEndIncluding": "21.2s10", + "matchCriteriaId": "0D2D5C2F-AA95-47DF-BD24-8A2C355BBEC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:hms-networks:ewon_cosy\\+_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "22.0", + "versionEndIncluding": "22.1s3", + "matchCriteriaId": "9048EBCA-4083-4C50-8499-A6FA6346AAA0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_apac:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26AE4359-63AD-4451-AACD-D621B9D422C7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_eu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95A7AEB3-53A0-4B77-8DFB-8E92E4B24462" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_jp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0C2B08D-D645-4C04-B010-4FF85642F7B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_4g_na:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B85678D5-71F7-47EA-A21F-272BA9C02B33" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_ethernet:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F5917C5-AD12-4FB3-9DBB-D757DC053427" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:hms-networks:ewon_cosy\\+_wifi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1475F50-11AB-4290-8D1D-FFCA2245B0B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.syss.com/posts/hacking-a-secure-industrial-remote-access-gateway/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/cybersecurity/security-advisory/hms-security-advisory-2024-07-29-001--ewon-several-cosy--vulnerabilities.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.ewon.biz/products/cosy/ewon-cosy-wifi", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://www.hms-networks.com/cyber-security", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json index e1cd9645e06..6f38201379e 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34224.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34224", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.660", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-09-03T19:35:12.227", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en /php-lms/classes/Users.php?f=save en Computer Laboratory Management System usando PHP y MySQL 1.0 permite a atacantes remotos inyectar script web o HTML de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros de nombre, segundo nombre y apellido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/dovankha/CVE-2024-34224", diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38456.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38456.json new file mode 100644 index 00000000000..d1691f20900 --- /dev/null +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38456.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-38456", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-03T18:15:08.260", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HIGH-LEIT V05.08.01.03 and HIGH-LEIT V04.25.00.00 to 4.25.01.01 for Windows from Vivavis contain an insecure file and folder permissions vulnerability in prunsrv.exe. A regular user (non-admin) can exploit the weak folder and file permissions to escalate privileges and execute arbitrary code in the context of NT AUTHORITY\\SYSTEM." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.schutzwerk.com/blog/schutzwerk-sa-2024-001/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.vivavis.com/en/solution/scada-en/high-leit/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.vivavis.com/en/vivavis-high-leit-rce-vulnerability-cve-2024-38456/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-386xx/CVE-2024-38661.json b/CVE-2024/CVE-2024-386xx/CVE-2024-38661.json index 6850827f783..e9f1db0b637 100644 --- a/CVE-2024/CVE-2024-386xx/CVE-2024-38661.json +++ b/CVE-2024/CVE-2024-386xx/CVE-2024-38661.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38661", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:13.630", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:03:36.033", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,158 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: s390/ap: Se corrigi\u00f3 el fallo en la funci\u00f3n interna del AP modificar_bitmap() Un fallo del sistema como este Direcci\u00f3n de error: 200000cb7df6f000 TEID: 200000cb7df6f403 Fallo en el modo de espacio de inicio al usar el kernel ASCE. AS:00000002d71bc007 R3:00000003fe5b8007 S:000000011a446000 P:000000015660c13d Ups: 0038 ilc:3 [#1] M\u00f3dulos SMP PREEMPT vinculados en: mlx5_ib... CPU: 8 PID: 7556 Comm: bash No contaminado 6.9.0-rc7 #8 Nombre de hardware: IBM 3931 A01 704 (LPAR) Krnl PSW: 0704e00180000000 0000014b75e7b606 (ap_parse_bitmap_str+0x10e/0x1f8) R:0 T:1 IO:1 EX:1 Clave:0 M:1 W:0 P:0 AS:3 CC :2 PM:0 RI:0 EA:3 Krnl GPRS: 0000000000000001 ffffffffffffffc0 000000000000001 00000048f96b75d3 000000cb00000100 ffffffffffffffff ffffffffffffffff 000000cb7 df6fce0 000000cb7df6fce0 00000000ffffffff 000000000000002b 00000048ffffffff 000003ff9b2dbc80 200000cb7df6fcd8 0000014bffffffc0 000000cb7df6fbc8 K C\u00f3digo rnl: 0000014b75e7b5fc: a7840047 brc 8,0000014b75e7b68a 0000014b75e7b600: 18b2 lr %r11,%r2 # 0000014b75e7b602: a7f4000a brc 15,0000014b75e7b616 >0000014b75e7b606: eb22d00000e6 laog %r2,%r2,0(%r13) 0000014b75e7b60c: a7680001 l hola %r6,1 0000014b75e7b610: 187b lr %r7,%r11 0000014b75e7b612: 84960021 brxh %r9,%r6, 0000014b75e7b654 0000014b75e7b616: 18e9 lr %r14,%r9 Seguimiento de llamadas: [<0000014b75e7b606>] ap_parse_bitmap_str+0x10e/0x1f8 ([<0000014b75e7b5dc>] bitmap_str+0xe4/0x1f8) [<0000014b75e7b758>] apmask_store+0x68/0x140 [<0000014b75679196>] kernfs_fop_write_iter+0x14e/0x1e8 [<0000014b75598524>] vfs_write+0x1b4/0x448 [<0000014b7559894c>] ksys_write+0x74/0x100 [<0000014b7618a440>] syscall+0x268/0x328 [<0000014b761a3558>] system_call+0x70/0x98 INFORMACI\u00d3N: lockdep est\u00e1 activado apagado. \u00daltima direcci\u00f3n del \u00faltimo evento de \u00faltima hora: [<0000014b75e7b636>] ap_parse_bitmap_str+0x13e/0x1f8 P\u00e1nico del kernel: no se sincroniza: Excepci\u00f3n fatal: p\u00e1nico_on_oops ocurri\u00f3 cuando /sys/bus/ap/a[pq]mask se actualiz\u00f3 con un valor de m\u00e1scara relativo (como +0x10-0x12,+60,-90) con uno de los valores num\u00e9ricos que excede INT_MAX. La soluci\u00f3n es simple: use valores largos sin signo para las variables internas. Las comprobaciones correctas ya est\u00e1n implementadas en la funci\u00f3n, pero se us\u00f3 un int simple para las variables internas con posibilidad de desbordamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.316", + "matchCriteriaId": "86D353F1-8F3A-45CF-8A7A-0DB46F77D2BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.94", + "matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2062e3f1f2374102f8014d7ca286b9aa527bd558", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4c0bfb4e867c1ec6616a5049bd3618021e127056", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/67011123453b91ec03671d40712fa213e94a01b9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7360cef95aa1ea2b5efb7b5e2ed32e941664e1f0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7c72af16abf2ec7520407098360bbba312289e05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7dabe54a016defe11bb2a278cd9f1ff6db3feba6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c5f5911c1b13170d3404eb992c6a0deaa8d81ad", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/d4f9d5a99a3fd1b1c691b7a1a6f8f3f25f4116c9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3886.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3886.json index b5e030dbbe8..de0456cf026 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3886.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3886.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3886", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-31T05:15:13.353", - "lastModified": "2024-09-03T12:59:02.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:48:14.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tagdiv:tagdiv_composer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.1", + "matchCriteriaId": "FED1C33B-12BC-4681-9EBF-E7E4AB59ED46" + } + ] + } + ] + } + ], "references": [ { "url": "https://tagdiv.com/newspaper/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ed9db9c1-c6b5-459e-9820-ec4ee47b244e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39301.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39301.json index 1eb4fdec19a..d5332b61845 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39301.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39301", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:14.240", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:06:28.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,164 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/9p: corrige el valor uninit en p9_client_rpc() Syzbot con la ayuda de KMSAN inform\u00f3 el siguiente error: ERROR: KMSAN: valor uninit en trace_9p_client_res include/trace/events/ 9p.h:146 [en l\u00ednea] ERROR: KMSAN: valor uninit en p9_client_rpc+0x1314/0x1340 net/9p/client.c:754 trace_9p_client_res include/trace/events/9p.h:146 [en l\u00ednea] p9_client_rpc+0x1314/0x1340 net/9p/client.c:754 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031 v9fs_session_init+0x1b9/0x28e0 fs/9p/v9fs.c:410 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c: 122 Legacy_get_tree+0x114/0x290 fs/fs_context.c:662 vfs_get_tree+0xa7/0x570 fs/super.c:1797 do_new_mount+0x71f/0x15e0 fs/namespace.c:3352 path_mount+0x742/0x1f20 fs/namespace.c:3679 montar fs/namespace.c:3692 [en l\u00ednea] __do_sys_mount fs/namespace.c:3898 [en l\u00ednea] __se_sys_mount+0x725/0x810 fs/namespace.c:3875 __x64_sys_mount+0xe4/0x150 fs/namespace.c:3875 do_syscall_64+0xd5/ 0x1f0 Entry_SYSCALL_64_after_hwframe+0x6d/0x75 Uninit se cre\u00f3 en: __alloc_pages+0x9d6/0xe70 mm/page_alloc.c:4598 __alloc_pages_node include/linux/gfp.h:238 [en l\u00ednea] alloc_pages_node include/linux/gfp.h:261 [en l\u00ednea] p\u00e1gina mm /slub.c:2175 [en l\u00ednea] allocate_slab mm/slub.c:2338 [en l\u00ednea] new_slab+0x2de/0x1400 mm/slub.c:2391 ___slab_alloc+0x1184/0x33d0 mm/slub.c:3525 __slab_alloc mm/slub.c :3610 [en l\u00ednea] __slab_alloc_node mm/slub.c:3663 [en l\u00ednea] slab_alloc_node mm/slub.c:3835 [en l\u00ednea] kmem_cache_alloc+0x6d3/0xbe0 mm/slub.c:3852 p9_tag_alloc net/9p/client.c:278 [ en l\u00ednea] p9_client_prepare_req+0x20a/0x1770 net/9p/client.c:641 p9_client_rpc+0x27e/0x1340 net/9p/client.c:688 p9_client_create+0x1551/0x1ff0 net/9p/client.c:1031 1b9/0x28e0fs /9p/v9fs.c:410 v9fs_mount+0xe2/0x12b0 fs/9p/vfs_super.c:122 Legacy_get_tree+0x114/0x290 fs/fs_context.c:662 vfs_get_tree+0xa7/0x570 fs/super.c:1797 do_new_mount+0x71f/ 0x15e0 fs/namespace.c:3352 path_mount+0x742/0x1f20 fs/namespace.c:3679 do_mount fs/namespace.c:3692 [en l\u00ednea] __do_sys_mount fs/namespace.c:3898 [en l\u00ednea] __se_sys_mount+0x725/0x810 fs/namespace .c: 3875 __x64_sys_mount+0xe4/0x150 fs/namespace.c: 3875 do_syscall_64+0xd5/0x1f0 entry_syscall_64_after_hwframe+0x6d/0x75 if p9_check_errors () fails en p9_client no se inicialice correctamente. Sin embargo, trace_9p_client_res() termina intentando imprimirlo de todos modos antes de que finalice p9_client_rpc(). Solucione este problema asignando valores predeterminados a los campos p9_fcall como 'etiqueta' y (en caso de que KMSAN descubra algo nuevo) 'id' durante la etapa de asignaci\u00f3n de etiquetas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndExcluding": "4.19.316", + "matchCriteriaId": "CCF5D1C7-721B-4F6D-A174-0C49C221A367" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "7FDBF235-DA18-49A1-8690-6C7272FD0701" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.94", + "matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/124947855564572713d705a13be7d0c9dae16a17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2101901dd58c6da4924bc5efb217a1d83436290b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/25460d6f39024cc3b8241b14c7ccf0d6f11a736a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6c1791130b781c843572fb6391c4a4c5d857ab17", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72c5d8e416ecc46af370a1340b3db5ff0b0cc867", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/89969ffbeb948ffc159d19252e7469490103011b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ca71f204711ad24113e8b344dc5bb8b0385f5672", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fe5c604053c36c62af24eee8a76407d026ea5163", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39461.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39461.json index fd232afc0d1..7f5b5ac9729 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39461.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39461.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39461", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:14.500", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:12:22.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,89 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: bcm: rpi: Assign ->num before accessing ->hws Commit f316cdff8d67 (\"clk: Annotate struct clk_hw_onecell_data with __counted_by\") anot\u00f3 el miembro hws de 'struct clk_hw_onecell_data' con __counted_by, que informa al sanitizante de los l\u00edmites sobre la cantidad de elementos en hws, para que pueda advertir cuando se accede a hws fuera de los l\u00edmites. Como se se\u00f1al\u00f3 en ese cambio, el miembro __counted_by debe inicializarse con la cantidad de elementos antes de que ocurra el primer acceso a la matriz; de lo contrario, habr\u00e1 una advertencia de cada acceso antes de la inicializaci\u00f3n porque la cantidad de elementos es cero. Esto ocurre en raspberrypi_discover_clocks() debido a que ->num se asigna despu\u00e9s de que se haya accedido a ->hws: UBSAN: array-index-out-of-bounds in drivers/clk/bcm/clk-raspberrypi.c:374:4 index 3 est\u00e1 fuera del rango para el tipo 'struct clk_hw *[] __counted_by(num)' (tambi\u00e9n conocido como 'struct clk_hw *[]') Mueva la inicializaci\u00f3n ->num antes del primer acceso de ->hws, lo que borra la advertencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "AC0C6E24-8240-425A-BD1A-F78E6D3A67FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/6dc445c1905096b2ed4db1a84570375b4e00cc0f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9562dbe5cdbb16ac887d27ef6f179980bb99193c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cdf9c7871d58d3df59d2775982e3533adb8ec920", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39468.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39468.json index d829926b12a..38dbc200831 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39468.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39468", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:15.270", - "lastModified": "2024-07-05T08:15:03.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:14:51.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,140 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: smb: cliente: soluciona el punto muerto en smb2_find_smb_tcon() Desbloquea cifs_tcp_ses_lock antes de llamar a cifs_put_smb_ses() para evitar dicho punto muerto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-667" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.221", + "matchCriteriaId": "C6FAA8A5-3F50-4B9F-9EEA-8430F59C03AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.162", + "matchCriteriaId": "10A39ACC-3005-40E8-875C-98A372D1FFD5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.94", + "matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", + "matchCriteriaId": "2EBB4392-5FA6-4DA9-9772-8F9C750109FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", + "matchCriteriaId": "331C2F14-12C7-45D5-893D-8C52EE38EA10" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/02c418774f76a0a36a6195c9dbf8971eb4130a15", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/21f5dd36e655d25a7b45b61c1e537198b671f720", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/225de871ddf994f69a57f035709cad9c0ab8615a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d0f5f1ccf675454a833a573c53830a49b7d1a47", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b055752675cd1d1db4ac9c2750db3dc3e89ea261", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b09b556e48968317887a11243a5331a7bc00ece5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-394xx/CVE-2024-39471.json b/CVE-2024/CVE-2024-394xx/CVE-2024-39471.json index 3ecee41cc75..953dd45b558 100644 --- a/CVE-2024/CVE-2024-394xx/CVE-2024-39471.json +++ b/CVE-2024/CVE-2024-394xx/CVE-2024-39471.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39471", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-25T15:15:15.490", - "lastModified": "2024-06-25T18:50:42.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:16:01.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,144 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amdgpu: agregue un controlador de error para evitar lecturas fuera de los l\u00edmites si sdma_v4_0_irq_id_to_seq devuelve -EINVAL, el proceso debe detenerse para evitar lecturas fuera de los l\u00edmites, por lo que debe regresar directamente -EINVAL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.4.278", + "matchCriteriaId": "2B755DA3-6492-4165-BE2F-55FB23D6D019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.219", + "matchCriteriaId": "E9063AF3-D593-43B7-810D-58B87F82F9F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.161", + "matchCriteriaId": "31130639-53FE-4726-8986-434EE2528CB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.94", + "matchCriteriaId": "9D20DE32-76F8-4E4C-A8DF-5B53082D18E5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.34", + "matchCriteriaId": "6BD9DCFD-0342-4039-B8CE-70F26DB7173B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.9.5", + "matchCriteriaId": "8366481F-770F-4850-9D0F-2977BD97D5C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/011552f29f20842c9a7a21bffe1f6a2d6457ba46", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/0964c84b93db7fbf74f357c1e20957850e092db3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5594971e02764aa1c8210ffb838cb4e7897716e8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5b0a3dc3e87821acb80e841b464d335aff242691", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8112fa72b7f139052843ff484130d6f97e9f052f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8b2faf1a4f3b6c748c0da36cda865a226534d520", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ea906e9ac61e3152bef63597f2d9f4a812fc346a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40473.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40473.json index 240838001e5..8835a5024e1 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40473.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40473.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40473", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T13:38:28.373", - "lastModified": "2024-08-15T13:39:29.240", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:13.383", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-412xx/CVE-2024-41241.json b/CVE-2024/CVE-2024-412xx/CVE-2024-41241.json index 7a80149c23f..6e6cc62551d 100644 --- a/CVE-2024/CVE-2024-412xx/CVE-2024-41241.json +++ b/CVE-2024/CVE-2024-412xx/CVE-2024-41241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41241", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-07T18:15:37.703", - "lastModified": "2024-08-08T15:21:29.210", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:14.190", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41435.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41435.json new file mode 100644 index 00000000000..1475173172e --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41435.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41435", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-03T19:15:14.340", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "YugabyteDB v2.21.1.0 was discovered to contain a buffer overflow via the \"insert into\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/ycybfhb/1427881e7db911786837d32b0669e06b", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yugabyte/yugabyte-db/issues/22967", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-414xx/CVE-2024-41436.json b/CVE-2024/CVE-2024-414xx/CVE-2024-41436.json new file mode 100644 index 00000000000..6faa5696cf5 --- /dev/null +++ b/CVE-2024/CVE-2024-414xx/CVE-2024-41436.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-41436", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-03T19:15:14.460", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ClickHouse v24.3.3.102 was discovered to contain a buffer overflow via the component DB::evaluateConstantExpressionImpl." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/ycybfhb/db127ae9d105a4d20edc9f010a959016", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/ClickHouse/ClickHouse/issues/65520", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json index bca6cea3cdb..ed4c33a5d91 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41700.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41700", "sourceIdentifier": "cna@cyber.gov.il", "published": "2024-08-20T12:15:07.143", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-03T19:37:12.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@cyber.gov.il", "type": "Secondary", @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:barix:sip_client_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EEBDE9E-57D1-4C54-8675-9C521938F0D7" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.gov.il/en/Departments/faq/cve_advisories", - "source": "cna@cyber.gov.il" + "source": "cna@cyber.gov.il", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42005.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42005.json index 77b6900c858..bd05e1c162d 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42005.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42005.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42005", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-07T15:15:56.220", - "lastModified": "2024-08-07T20:48:00.083", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:10.293", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json index 84f77b14227..1722175acfd 100644 --- a/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json +++ b/CVE-2024/CVE-2024-425xx/CVE-2024-42568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42568", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-20T13:15:07.643", - "lastModified": "2024-08-21T13:46:29.497", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:11.160", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42901.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42901.json new file mode 100644 index 00000000000..d7b605bb175 --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42901.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-42901", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-03T18:15:08.507", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A CSV injection vulnerability in Lime Survey v6.5.12 allows attackers to execute arbitrary code via uploading a crafted CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/LimeSurvey/LimeSurvey/pull/3884", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42901", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42902.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42902.json new file mode 100644 index 00000000000..69b0cea86dd --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42902.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-42902", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-03T18:15:08.583", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the js_localize.php function of LimeSurvey v6.6.2 and before allows attackers to execute arbitrary code via injecting a crafted payload into the lng parameter of the js_localize.php function" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://bugs.limesurvey.org/view.php?id=19639", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LimeSurvey/LimeSurvey/blob/6434b12ded1c4b6516200c453441d0896e11eee0/vendor/kcfinder/js_localize.php#L19", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42902", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42903.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42903.json new file mode 100644 index 00000000000..4e620bc1eaf --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42903.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-42903", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-03T18:15:08.663", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Host header injection vulnerability in the password reset function of LimeSurvey v.6.6.1+240806 and before allows attackers to send users a crafted password reset link that will direct victims to a malicious domain." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/LimeSurvey/LimeSurvey/compare/6.6.0+240729...6.6.1+240806", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/LimeSurvey/LimeSurvey/pull/3920", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42903", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42904.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42904.json new file mode 100644 index 00000000000..4501dd8636c --- /dev/null +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42904.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-42904", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-03T18:15:08.740", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in SysPass 3.2.x allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name parameter at /Controllers/ClientController.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nuxsmin/sysPass/blob/9d0e169d2163897238877fb65130db47fe1ddcfa/app/modules/api/Controllers/ClientController.php#L89", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/nuxsmin/sysPass/blob/master/lib/SP/DataModel/ClientData.php#L98", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42904", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42940.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42940.json index fea3b421691..7e97641e7e3 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42940.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42940.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42940", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:18.500", - "lastModified": "2024-08-15T19:33:37.670", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:15.163", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42941.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42941.json index b3dffb12b93..b47ea2ed2c9 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42941.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42941.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42941", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:18.603", - "lastModified": "2024-08-15T19:33:07.637", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T19:35:15.967", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42948.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42948.json index 05f34dd51b0..821e5619b28 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42948.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42948.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42948", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:19.287", - "lastModified": "2024-08-15T19:31:38.217", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:12.773", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42978.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42978.json index 42c98d85f8e..bf201a19bd4 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42978.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42978", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:20.960", - "lastModified": "2024-08-16T13:30:54.670", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:13.590", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42987.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42987.json index c1c0fc59d83..355622b4d91 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42987.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42987.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42987", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T17:15:21.820", - "lastModified": "2024-08-16T13:26:27.123", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-03T18:35:13.793", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42991.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42991.json index 445f18f4905..147d61efc73 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42991.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42991", "sourceIdentifier": "cve@mitre.org", "published": "2024-09-03T16:15:06.910", - "lastModified": "2024-09-03T16:35:06.743", - "vulnStatus": "Received", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json index 9e504b84f08..f7b6f6b1068 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43396.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43396", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-20T21:15:14.897", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:19:33.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:khoj:khoj:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.15.0", + "matchCriteriaId": "0590C0BC-7CF8-48D9-B353-ABF6BB2CCE04" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/khoj-ai/khoj/commit/1c7a562880eeb7354325545d2cf6c5d1d1134812", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/khoj-ai/khoj/commit/55be90cdd2f9d6a09c8bf9ceea52fc36b9201626", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/khoj-ai/khoj/security/advisories/GHSA-cf72-vg59-4j4h", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43412.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43412.json index d7d6093ed98..7e108c06e19 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43412.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43412.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43412", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-03T17:15:14.680", - "lastModified": "2024-09-03T17:15:14.680", - "vulnStatus": "Received", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43413.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43413.json new file mode 100644 index 00000000000..a7fe1b77bfb --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43413.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-43413", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-03T19:15:14.590", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Xibo is an open source digital signage platform with a web content management system (CMS). Prior to version 4.1.0, a cross-site scripting vulnerability in Xibo CMS allows authorized users to execute JavaScript via the DataSet functionality. Users can design a DataSet with a HTML column which contains JavaScript, which is intended functionality. The JavaScript gets executed on the Data Entry page and in any Layouts which reference it. This behavior has been changed in 4.1.0 to show HTML/CSS/JS as code on the Data Entry page. There are no workarounds for this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/xibosignage/xibo-cms/commit/009527855d8bfd0ffb95f5c88ed72b7b5bdebfa1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/xibosignage/xibo-cms/security/advisories/GHSA-pfxp-vxh7-2h9f", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43803.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43803.json new file mode 100644 index 00000000000..02b6c22cc57 --- /dev/null +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43803.json @@ -0,0 +1,84 @@ +{ + "id": "CVE-2024-43803", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-03T19:15:14.800", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Bare Metal Operator (BMO) implements a Kubernetes API for managing bare metal hosts in Metal3. The `BareMetalHost` (BMH) CRD allows the `userData`, `metaData`, and `networkData` for the provisioned host to be specified as links to Kubernetes Secrets. There are fields for both the `Name` and `Namespace` of the Secret, meaning that versions of the baremetal-operator prior to 0.8.0, 0.6.2, and 0.5.2 will read a `Secret` from any namespace. A user with access to create or edit a `BareMetalHost` can thus exfiltrate a `Secret` from another namespace by using it as e.g. the `userData` for provisioning some host (note that this need not be a real host, it could be a VM somewhere).\n\nBMO will only read a key with the name `value` (or `userData`, `metaData`, or `networkData`), so that limits the exposure somewhat. `value` is probably a pretty common key though. Secrets used by _other_ `BareMetalHost`s in different namespaces are always vulnerable. It is probably relatively unusual for anyone other than cluster administrators to have RBAC access to create/edit a `BareMetalHost`. This vulnerability is only meaningful, if the cluster has users other than administrators and users' privileges are limited to their respective namespaces.\n\nThe patch prevents BMO from accepting links to Secrets from other namespaces as BMH input. Any BMH configuration is only read from the same namespace only. The problem is patched in BMO releases v0.7.0, v0.6.2 and v0.5.2 and users should upgrade to those versions. Prior upgrading, duplicate the BMC Secrets to the namespace where the corresponding BMH is. After upgrade, remove the old Secrets. As a workaround, an operator can configure BMO RBAC to be namespace scoped for Secrets, instead of cluster scoped, to prevent BMO from accessing Secrets from other namespaces." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-653" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/metal3-io/baremetal-operator/commit/3af4882e9c5fadc1a7550f53daea21dccd271f74", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metal3-io/baremetal-operator/commit/bedae7b997d16f36e772806681569bb8eb4dadbb", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metal3-io/baremetal-operator/commit/c2b5a557641bc273367635124047d6c958aa15f7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metal3-io/baremetal-operator/pull/1929", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metal3-io/baremetal-operator/pull/1930", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metal3-io/baremetal-operator/pull/1931", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/metal3-io/baremetal-operator/security/advisories/GHSA-pqfh-xh7w-7h3p", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43964.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43964.json index fc8a7ee28cf..0d07723e7fd 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43964.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43964.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43964", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-29T18:15:13.930", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:30:23.437", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dsgvo-for-wp:dsgvo_all_in_one_for_wp:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.5", + "matchCriteriaId": "7B90D1E6-0272-49A7-97AA-07705C3FC33D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/dsgvo-all-in-one-for-wp/wordpress-dsgvo-all-in-one-for-wp-plugin-4-5-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44716.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44716.json index 6be108d66d7..202678398f9 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44716.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44716.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44716", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T18:15:14.200", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:32:45.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,73 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en DedeBIZ v6.3.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedebiz:dedebiz:6.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9DFDC21D-6CC8-4EA7-A41D-E9D7F1B667DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/DedeBIZ/DedeV6/releases/tag/6.3.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/Jingyi-u/DedeBIZ", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44717.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44717.json index 51a67c20068..44b414529a6 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44717.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44717.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44717", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T18:15:14.333", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:32:54.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,73 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en DedeBIZ v6.3.0 permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dedebiz:dedebiz:6.3.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9DFDC21D-6CC8-4EA7-A41D-E9D7F1B667DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/DedeBIZ/DedeV6/releases/tag/6.3.0", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/Jingyi-u/DedeBIZ2", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44776.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44776.json index 5ead7282f81..1a69f5e81a0 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44776.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44776.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44776", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T18:15:14.440", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:33:26.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "Una vulnerabilidad de redirecci\u00f3n abierta en el par\u00e1metro de p\u00e1gina de vTiger CRM v7.4.0 permite a los atacantes redirigir a los usuarios a un sitio malicioso a trav\u00e9s de una URL creada espec\u00edficamente para ello." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606" + } + ] + } + ] + } + ], "references": [ { "url": "http://vtiger.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/180461/vTiger-CRM-7.4.0-Open-Redirection.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44777.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44777.json index 5ba55edf72c..6477ed9e905 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44777.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44777.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44777", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T18:15:14.540", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:33:38.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606" + } + ] + } + ] + } + ], "references": [ { "url": "http://vtiger.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44778.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44778.json index 1d873f53efb..333483f2173 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44778.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44778.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44778", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T18:15:14.633", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:34:36.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606" + } + ] + } + ] + } + ], "references": [ { "url": "http://vtiger.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44779.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44779.json index fbd0f8cfcf3..26b9b5e9080 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44779.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44779", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T18:15:14.730", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T18:33:51.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.6, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vtiger:vtiger_crm:7.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3929CDEE-B429-4C81-B70A-1AC975979606" + } + ] + } + ] + } + ], "references": [ { "url": "http://vtiger.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://packetstormsecurity.com/files/180462/vTiger-CRM-7.4.0-Cross-Site-Scripting.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45307.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45307.json new file mode 100644 index 00000000000..885e732a1be --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45307.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-45307", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-03T19:15:15.033", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SudoBot, a Discord moderation bot, is vulnerable to privilege escalation and exploit of the `-config` command in versions prior to 9.26.7. Anyone is theoretically able to update any configuration of the bot and potentially gain control over the bot's settings. Every version of v9 before v9.26.7 is affected. Other versions (e.g. v8) are not affected. Users should upgrade to version 9.26.7 to receive a patch. A workaround would be to create a command permission overwrite in the Database. A SQL statement provided in the GitHub Security Advisor can be executed to create a overwrite that disallows users without `ManageGuild` permission to run the `-config` command. Run the SQL statement for every server the bot is in, and replace `` with the appropriate Guild ID each time." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/onesoft-sudo/sudobot/commit/ef46ca98562f3c1abef4ff7dd94d8f7b8155ee50", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/onesoft-sudo/sudobot/security/advisories/GHSA-crgg-w3rr-r9h4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45310.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45310.json new file mode 100644 index 00000000000..3ff64683fba --- /dev/null +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45310.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-45310", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-09-03T19:15:15.243", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3.\n\nSome workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual\nuser on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.6, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-363" + }, + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/opencontainers/runc/commit/63c2908164f3a1daea455bf5bcd8d363d70328c7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/opencontainers/runc/commit/8781993968fd964ac723ff5f360b6f259e809a3e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/opencontainers/runc/commit/f0b652ea61ff6750a8fcc69865d45a7abf37accf", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/opencontainers/runc/pull/4359", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/opencontainers/runc/security/advisories/GHSA-jfvp-7x6p-h2pv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45440.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45440.json index 9bfd2812d60..4c5c8d020db 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45440.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45440.json @@ -2,17 +2,25 @@ "id": "CVE-2024-45440", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T11:15:27.083", - "lastModified": "2024-08-29T13:25:27.537", + "lastModified": "2024-09-03T18:15:08.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "core/authorize.php in Drupal 11.x-dev allows Full Path Disclosure (even when error logging is None) if the value of hash_salt is file_get_contents of a file that does not exist." + }, + { + "lang": "es", + "value": "core/authorize.php en Drupal 11.x-dev permite la divulgaci\u00f3n de ruta completa (incluso cuando el registro de errores es Ninguno) si el valor de hash_salt es file_get_contents de un archivo que no existe." } ], "metrics": {}, "references": [ + { + "url": "https://senscybersecurity.nl/CVE-2024-45440-Explained/", + "source": "cve@mitre.org" + }, { "url": "https://www.drupal.org/project/drupal/issues/3457781", "source": "cve@mitre.org" diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45586.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45586.json index fddd0ae0435..8fec2687149 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45586.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45586", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-03T10:15:06.180", - "lastModified": "2024-09-03T12:59:02.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T19:55:47.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,9 +55,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -69,10 +101,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:symphonyfintech:xts_mobile_trader:2.0.0.1:p160:*:*:*:*:*:*", + "matchCriteriaId": "F9A70A22-6504-4FA0-B578-42CAAAFBBB3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1:p160:*:*:*:*:*:*", + "matchCriteriaId": "8D137712-15D9-4AD6-BFC3-D0B7584C208A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0281", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45587.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45587.json index e2560cd3f4a..04bbb1c96bc 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45587.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45587", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-03T10:15:06.373", - "lastModified": "2024-09-03T12:59:02.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T19:55:46.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,9 +55,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -69,10 +101,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:symphonyfintech:xts_mobile_trader:2.0.0.1:p160:*:*:*:*:*:*", + "matchCriteriaId": "F9A70A22-6504-4FA0-B578-42CAAAFBBB3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1:p160:*:*:*:*:*:*", + "matchCriteriaId": "8D137712-15D9-4AD6-BFC3-D0B7584C208A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0281", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45588.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45588.json index b37d809c498..fe812cb3541 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45588.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45588.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45588", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-09-03T11:15:15.333", - "lastModified": "2024-09-03T12:59:02.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-03T19:46:35.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -55,9 +55,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "vdisclose@cert-in.org.in", "type": "Secondary", @@ -69,10 +101,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:symphonyfintech:xts_mobile_trader:2.0.0.1:p160:*:*:*:*:*:*", + "matchCriteriaId": "F9A70A22-6504-4FA0-B578-42CAAAFBBB3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:symphonyfintech:xts_web_trader:2.0.0.1:p160:*:*:*:*:*:*", + "matchCriteriaId": "8D137712-15D9-4AD6-BFC3-D0B7584C208A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0281", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json index 83b9a6a72c5..51b81ebe0f4 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6119", "sourceIdentifier": "openssl-security@openssl.org", "published": "2024-09-03T16:15:07.177", - "lastModified": "2024-09-03T16:15:07.177", - "vulnStatus": "Received", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7345.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7345.json index 14784db4869..1b479465a7e 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7345.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7345.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7345", "sourceIdentifier": "security@progress.com", "published": "2024-09-03T15:15:16.707", - "lastModified": "2024-09-03T15:15:16.707", - "vulnStatus": "Received", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7346.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7346.json index dd16df8d9fb..04ea75b055f 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7346.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7346.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7346", "sourceIdentifier": "security@progress.com", "published": "2024-09-03T15:15:16.913", - "lastModified": "2024-09-03T15:15:16.913", - "vulnStatus": "Received", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7592.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7592.json index 3e36df82583..605a67ed9ab 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7592.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7592.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7592", "sourceIdentifier": "cna@python.org", "published": "2024-08-19T19:15:08.180", - "lastModified": "2024-09-03T15:15:17.127", + "lastModified": "2024-09-03T18:35:15.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7619.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7619.json new file mode 100644 index 00000000000..118fea90fa6 --- /dev/null +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7619.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-7619", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-03T18:15:09.223", + "lastModified": "2024-09-03T18:15:09.223", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7654.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7654.json index c4cf4db6522..950e5933627 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7654.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7654.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7654", "sourceIdentifier": "security@progress.com", "published": "2024-09-03T15:15:17.223", - "lastModified": "2024-09-03T15:15:17.223", - "vulnStatus": "Received", + "lastModified": "2024-09-03T19:40:46.783", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/README.md b/README.md index a0dbb858854..0ca74199b1a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-03T18:00:16.937452+00:00 +2024-09-03T20:00:17.780747+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-03T17:59:27.440000+00:00 +2024-09-03T19:55:47.997000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -261762 +261774 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `12` -- [CVE-2023-49233](CVE-2023/CVE-2023-492xx/CVE-2023-49233.json) (`2024-09-03T17:15:14.400`) -- [CVE-2024-42991](CVE-2024/CVE-2024-429xx/CVE-2024-42991.json) (`2024-09-03T16:15:06.910`) -- [CVE-2024-43412](CVE-2024/CVE-2024-434xx/CVE-2024-43412.json) (`2024-09-03T17:15:14.680`) -- [CVE-2024-6119](CVE-2024/CVE-2024-61xx/CVE-2024-6119.json) (`2024-09-03T16:15:07.177`) +- [CVE-2024-38456](CVE-2024/CVE-2024-384xx/CVE-2024-38456.json) (`2024-09-03T18:15:08.260`) +- [CVE-2024-41435](CVE-2024/CVE-2024-414xx/CVE-2024-41435.json) (`2024-09-03T19:15:14.340`) +- [CVE-2024-41436](CVE-2024/CVE-2024-414xx/CVE-2024-41436.json) (`2024-09-03T19:15:14.460`) +- [CVE-2024-42901](CVE-2024/CVE-2024-429xx/CVE-2024-42901.json) (`2024-09-03T18:15:08.507`) +- [CVE-2024-42902](CVE-2024/CVE-2024-429xx/CVE-2024-42902.json) (`2024-09-03T18:15:08.583`) +- [CVE-2024-42903](CVE-2024/CVE-2024-429xx/CVE-2024-42903.json) (`2024-09-03T18:15:08.663`) +- [CVE-2024-42904](CVE-2024/CVE-2024-429xx/CVE-2024-42904.json) (`2024-09-03T18:15:08.740`) +- [CVE-2024-43413](CVE-2024/CVE-2024-434xx/CVE-2024-43413.json) (`2024-09-03T19:15:14.590`) +- [CVE-2024-43803](CVE-2024/CVE-2024-438xx/CVE-2024-43803.json) (`2024-09-03T19:15:14.800`) +- [CVE-2024-45307](CVE-2024/CVE-2024-453xx/CVE-2024-45307.json) (`2024-09-03T19:15:15.033`) +- [CVE-2024-45310](CVE-2024/CVE-2024-453xx/CVE-2024-45310.json) (`2024-09-03T19:15:15.243`) +- [CVE-2024-7619](CVE-2024/CVE-2024-76xx/CVE-2024-7619.json) (`2024-09-03T18:15:09.223`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `56` -- [CVE-2022-48772](CVE-2022/CVE-2022-487xx/CVE-2022-48772.json) (`2024-09-03T17:51:34.200`) -- [CVE-2023-43901](CVE-2023/CVE-2023-439xx/CVE-2023-43901.json) (`2024-09-03T16:35:01.500`) -- [CVE-2023-45560](CVE-2023/CVE-2023-455xx/CVE-2023-45560.json) (`2024-09-03T16:35:02.247`) -- [CVE-2023-5992](CVE-2023/CVE-2023-59xx/CVE-2023-5992.json) (`2024-09-03T17:15:14.487`) -- [CVE-2024-38385](CVE-2024/CVE-2024-383xx/CVE-2024-38385.json) (`2024-09-03T17:59:27.440`) -- [CVE-2024-42311](CVE-2024/CVE-2024-423xx/CVE-2024-42311.json) (`2024-09-03T17:38:24.210`) -- [CVE-2024-43817](CVE-2024/CVE-2024-438xx/CVE-2024-43817.json) (`2024-09-03T17:41:46.407`) -- [CVE-2024-43818](CVE-2024/CVE-2024-438xx/CVE-2024-43818.json) (`2024-09-03T17:45:30.000`) -- [CVE-2024-43819](CVE-2024/CVE-2024-438xx/CVE-2024-43819.json) (`2024-09-03T17:47:10.540`) -- [CVE-2024-43821](CVE-2024/CVE-2024-438xx/CVE-2024-43821.json) (`2024-09-03T17:49:54.280`) -- [CVE-2024-43822](CVE-2024/CVE-2024-438xx/CVE-2024-43822.json) (`2024-09-03T17:49:33.007`) -- [CVE-2024-43823](CVE-2024/CVE-2024-438xx/CVE-2024-43823.json) (`2024-09-03T17:49:03.910`) -- [CVE-2024-43824](CVE-2024/CVE-2024-438xx/CVE-2024-43824.json) (`2024-09-03T17:48:39.160`) -- [CVE-2024-44920](CVE-2024/CVE-2024-449xx/CVE-2024-44920.json) (`2024-09-03T16:35:07.800`) -- [CVE-2024-44921](CVE-2024/CVE-2024-449xx/CVE-2024-44921.json) (`2024-09-03T17:35:01.983`) -- [CVE-2024-45435](CVE-2024/CVE-2024-454xx/CVE-2024-45435.json) (`2024-09-03T17:23:36.073`) -- [CVE-2024-45622](CVE-2024/CVE-2024-456xx/CVE-2024-45622.json) (`2024-09-03T16:35:09.647`) -- [CVE-2024-7691](CVE-2024/CVE-2024-76xx/CVE-2024-7691.json) (`2024-09-03T16:35:11.383`) -- [CVE-2024-7692](CVE-2024/CVE-2024-76xx/CVE-2024-7692.json) (`2024-09-03T16:35:12.363`) -- [CVE-2024-8088](CVE-2024/CVE-2024-80xx/CVE-2024-8088.json) (`2024-09-03T16:15:07.343`) -- [CVE-2024-8381](CVE-2024/CVE-2024-83xx/CVE-2024-8381.json) (`2024-09-03T16:35:13.350`) -- [CVE-2024-8384](CVE-2024/CVE-2024-83xx/CVE-2024-8384.json) (`2024-09-03T16:35:14.610`) -- [CVE-2024-8385](CVE-2024/CVE-2024-83xx/CVE-2024-8385.json) (`2024-09-03T16:35:15.653`) -- [CVE-2024-8387](CVE-2024/CVE-2024-83xx/CVE-2024-8387.json) (`2024-09-03T16:35:16.810`) -- [CVE-2024-8389](CVE-2024/CVE-2024-83xx/CVE-2024-8389.json) (`2024-09-03T16:35:17.947`) +- [CVE-2024-42568](CVE-2024/CVE-2024-425xx/CVE-2024-42568.json) (`2024-09-03T18:35:11.160`) +- [CVE-2024-42940](CVE-2024/CVE-2024-429xx/CVE-2024-42940.json) (`2024-09-03T19:35:15.163`) +- [CVE-2024-42941](CVE-2024/CVE-2024-429xx/CVE-2024-42941.json) (`2024-09-03T19:35:15.967`) +- [CVE-2024-42948](CVE-2024/CVE-2024-429xx/CVE-2024-42948.json) (`2024-09-03T18:35:12.773`) +- [CVE-2024-42978](CVE-2024/CVE-2024-429xx/CVE-2024-42978.json) (`2024-09-03T18:35:13.590`) +- [CVE-2024-42987](CVE-2024/CVE-2024-429xx/CVE-2024-42987.json) (`2024-09-03T18:35:13.793`) +- [CVE-2024-42991](CVE-2024/CVE-2024-429xx/CVE-2024-42991.json) (`2024-09-03T19:40:46.783`) +- [CVE-2024-43396](CVE-2024/CVE-2024-433xx/CVE-2024-43396.json) (`2024-09-03T18:19:33.167`) +- [CVE-2024-43412](CVE-2024/CVE-2024-434xx/CVE-2024-43412.json) (`2024-09-03T19:40:46.783`) +- [CVE-2024-43964](CVE-2024/CVE-2024-439xx/CVE-2024-43964.json) (`2024-09-03T18:30:23.437`) +- [CVE-2024-44716](CVE-2024/CVE-2024-447xx/CVE-2024-44716.json) (`2024-09-03T18:32:45.427`) +- [CVE-2024-44717](CVE-2024/CVE-2024-447xx/CVE-2024-44717.json) (`2024-09-03T18:32:54.357`) +- [CVE-2024-44776](CVE-2024/CVE-2024-447xx/CVE-2024-44776.json) (`2024-09-03T18:33:26.287`) +- [CVE-2024-44777](CVE-2024/CVE-2024-447xx/CVE-2024-44777.json) (`2024-09-03T18:33:38.413`) +- [CVE-2024-44778](CVE-2024/CVE-2024-447xx/CVE-2024-44778.json) (`2024-09-03T18:34:36.987`) +- [CVE-2024-44779](CVE-2024/CVE-2024-447xx/CVE-2024-44779.json) (`2024-09-03T18:33:51.297`) +- [CVE-2024-45440](CVE-2024/CVE-2024-454xx/CVE-2024-45440.json) (`2024-09-03T18:15:08.967`) +- [CVE-2024-45586](CVE-2024/CVE-2024-455xx/CVE-2024-45586.json) (`2024-09-03T19:55:47.997`) +- [CVE-2024-45587](CVE-2024/CVE-2024-455xx/CVE-2024-45587.json) (`2024-09-03T19:55:46.413`) +- [CVE-2024-45588](CVE-2024/CVE-2024-455xx/CVE-2024-45588.json) (`2024-09-03T19:46:35.080`) +- [CVE-2024-6119](CVE-2024/CVE-2024-61xx/CVE-2024-6119.json) (`2024-09-03T19:40:46.783`) +- [CVE-2024-7345](CVE-2024/CVE-2024-73xx/CVE-2024-7345.json) (`2024-09-03T19:40:46.783`) +- [CVE-2024-7346](CVE-2024/CVE-2024-73xx/CVE-2024-7346.json) (`2024-09-03T19:40:46.783`) +- [CVE-2024-7592](CVE-2024/CVE-2024-75xx/CVE-2024-7592.json) (`2024-09-03T18:35:15.763`) +- [CVE-2024-7654](CVE-2024/CVE-2024-76xx/CVE-2024-7654.json) (`2024-09-03T19:40:46.783`) ## Download and Usage diff --git a/_state.csv b/_state.csv index acedd2f5aa6..1a822c90250 100644 --- a/_state.csv +++ b/_state.csv @@ -126497,7 +126497,7 @@ CVE-2018-8859,0,0,3f2c108d04b0e2409d8592bb97f5817e167c3c0c4d60dd9de0e61445122f44 CVE-2018-8860,0,0,b0ccb5112d48d5cfc4ac532d641687bb8c27f2de032ccae36e11c7aadd86a8f7,2018-06-13T13:09:31.863000 CVE-2018-8861,0,0,c8f9c83b5a25be5af9c29541b61b0c1691ea62a6790c814a20c716a472e3a3c1,2019-10-09T23:42:58.380000 CVE-2018-8862,0,0,38f645de00c79d4faab41a457d903578b05346eed4fcd0b695b7c436258036ef,2019-10-09T23:42:58.520000 -CVE-2018-8863,0,0,87f618f9b73763ee6073d913ab2c363b3758c0aa01062dff6f0d16a2ff437ec4,2023-11-17T18:05:28.717000 +CVE-2018-8863,0,1,1ffa2735c70c4c643d7e2657fb29695855cd7ba825a3509dac39cbea0e9e93e5,2024-09-03T18:35:00.770000 CVE-2018-8864,0,0,a65012defa6a7f67eab1b342715f2ee30ddf3ea5343b9417fd54d82d6bfc02e6,2019-10-09T23:42:58.677000 CVE-2018-8865,0,0,eb9955ab4a6b7b90ca79100f0c997638467adfe161b0353ac06f39abad4881d1,2020-09-29T19:11:13.863000 CVE-2018-8866,0,0,4d7da105aa6635fbcb2017ddfdaab70790ec8154a8ddb0c5120b0f2e17df3401,2019-10-03T00:03:26.223000 @@ -210215,7 +210215,7 @@ CVE-2022-45770,0,0,830adc34ed7593d9c2a98a380d91aee283cf4be891ade5e674d6dc02b5ccf CVE-2022-45771,0,0,f57e11996df680d36d6ee15297678c1626a529867f59888f6666ef95cd0412c0,2022-12-06T20:12:52.217000 CVE-2022-45778,0,0,2a24bcaca554e03cd441cdd71a1faeaafcb1f99d1037b48c68ca1f9e5f08d4ff,2023-08-08T14:21:49.707000 CVE-2022-4578,0,0,aa6c106534bfa13ee28380b3434820a0de580f23343a4401bab8223bee9a469f,2023-11-07T03:58:12.600000 -CVE-2022-45781,0,0,58d254bd82a4e476ad98b32763d76177d02f1f0b6c31232ca967ed865e268687,2023-11-20T20:38:43.463000 +CVE-2022-45781,0,1,da84c01ebfb1c03b3506dc072e517289535c28e545ac728a29eac2026d4477ff,2024-09-03T18:35:01.533000 CVE-2022-45782,0,0,dd561fff23d74b93b7359a0d88729353306bce64e4c1833f5f9a95892d6f22ea,2023-08-08T14:22:24.967000 CVE-2022-45783,0,0,7df6e5d9ac3a3dbeabd2aa93b48ca5fec43a263ffb99f2c8b4ef908c80e7ec96,2023-02-14T14:19:45.407000 CVE-2022-45786,0,0,979e99f4d51053bca01ffbdd38ac2307b003bb479adf9243e1cefb7355476ba3,2023-11-07T03:54:49.353000 @@ -212126,7 +212126,7 @@ CVE-2022-48614,0,0,7f61c334e19e5fb35649c6bfdc4f21b8639cb0bab20190138981aaf8437a5 CVE-2022-48615,0,0,75bfc14f9a191ab8c781255b295d8ffd7a4c2678de5994a763d2ea2c9a94b86f,2023-12-15T15:02:28.517000 CVE-2022-48616,0,0,afb900d120cd7b289f2194cbaf2576a6e84f1b1e2bbe110d7b98c720789806c4,2023-12-15T15:27:11.247000 CVE-2022-48618,0,0,a6eef9a5f4b698c3f9f4220d3055015e15fce5a5eb3c7a14f2b80748deaf545c,2024-08-14T15:22:47.173000 -CVE-2022-48619,0,0,2928b772c1aeee7ee52ae396b86a77a24d733dd9768a530500eee761c2aaa44a,2024-01-19T15:27:59.073000 +CVE-2022-48619,0,1,f26c39736beb7aa7b0647551e799c08b4224ce3618497e170167759683b4f6cb,2024-09-03T19:35:01.357000 CVE-2022-4862,0,0,2553413418f6ad24271b84c4b6265dbfaea53531b172d691e897d8db042ae05f,2024-08-28T11:15:13.723000 CVE-2022-48620,0,0,5698c281f8e8068516c8dfe700ee9a98bc0bfd9312d73b253920c8e72d6c9959,2024-03-23T03:15:08.797000 CVE-2022-48621,0,0,1cd5ad66125265477c8dc07522592260d4eec4c99a5ef37987104225c1fc205f,2024-02-20T19:50:53.960000 @@ -212290,7 +212290,7 @@ CVE-2022-48769,0,0,9da3594b688f3419de5209099af92b325945b83e31f6492d68a0030e2619b CVE-2022-4877,0,0,7be088f764e81f3d159b624bbe89e382d534c3a5b5b12bd3cddcbca9b765980c,2024-05-17T02:17:00.577000 CVE-2022-48770,0,0,c1d7d83fd1642cff8a855525ca26bcc6079d73fb16b8d7f896bc8d7f51eac629,2024-06-20T12:43:25.663000 CVE-2022-48771,0,0,a8deacbe046a73aa8a794ce68776d42685618f7346517abbe96cfaf42a525dde,2024-06-20T12:43:25.663000 -CVE-2022-48772,0,1,2e22416ee24a4aec0baa61bfdfa55464132f154c9e7fba592c8c6e7aae8a9b41,2024-09-03T17:51:34.200000 +CVE-2022-48772,0,0,2e22416ee24a4aec0baa61bfdfa55464132f154c9e7fba592c8c6e7aae8a9b41,2024-09-03T17:51:34.200000 CVE-2022-48773,0,0,dc19342bce35f737a0d55bbca86132f56db1115e6627671efed3de2bb7534729,2024-08-21T17:45:26.867000 CVE-2022-48774,0,0,da71c85f24cdf9bc921c3d339b713f4ee60d227e6dab069d48721a29377e0e3f,2024-07-16T13:43:58.773000 CVE-2022-48775,0,0,2acb46b961b5a6a98400ee899a0271b90d0006fde257656a51a219503be9ebd4,2024-08-21T17:47:10.263000 @@ -221110,7 +221110,7 @@ CVE-2023-2813,0,0,15b671f64d453b6daaa812c86c38b923ee0306238dd8226b785e08cf284b16 CVE-2023-28130,0,0,9e5c7d68ae781e4702faa4741f6c9ca91d4a375561cb250199a4cac75ccf8499,2024-08-23T15:35:02.097000 CVE-2023-28131,0,0,6a261341302567d63924e06d70096cab1d12ecabad3196aa7a98114485ed515a,2023-05-25T21:15:09.067000 CVE-2023-28133,0,0,430d71b69bc3693074f1df1c4d893c1b989573e5502f986f209e8ebd775e7532,2023-08-01T16:44:44.847000 -CVE-2023-28134,0,0,c626b84e230219bdaa3f37a3b0fb442c69d155af0679eb523091db837c6ad9b4,2023-11-17T20:14:54.230000 +CVE-2023-28134,0,1,576f6af660a0ee3aa38c70c3503252de88efa9a953963e8f36a68afea7fd081f,2024-09-03T19:35:02.300000 CVE-2023-2814,0,0,76e99b83570fd43fb0ee384d6b32871ce348dd67e3390997d401f82a906008fe,2024-05-17T02:23:16.980000 CVE-2023-28140,0,0,9af84c63583f551c116bcdf29edadf97cdb2c443daf0cb135661f79446c2521e,2023-04-28T13:52:12.577000 CVE-2023-28141,0,0,9109dd65b1c93e1472bf6a0875f5cbc021d2f4ce4a03097c958653f63a02f9d0,2023-04-28T14:04:12.760000 @@ -224578,7 +224578,7 @@ CVE-2023-32597,0,0,f5c385d4202ec198d55d06078f193ff67984c8b0aab3bad6005dfbe5766c3 CVE-2023-32598,0,0,ee67ecc8f000425bd4fc9221a5d2535cb74d789ab00701a7071eb095dcb60756,2023-08-28T13:34:58.463000 CVE-2023-3260,0,0,d099d470e2515faaf7f6f21e1288cd362ba1c0dc705b69ccdaebfbc6bd6e4b59,2023-08-25T05:15:45.643000 CVE-2023-32600,0,0,b74c37bc6766e5b02ae672b3be92a3956792de245d267c6631747005c77e3ae1,2023-08-10T15:56:31.620000 -CVE-2023-32602,0,0,8fecee7123c04b6885f8c9eeb44d10648d04a37c9ac73fdc57d70148a45d7974,2023-11-15T18:49:21.803000 +CVE-2023-32602,0,1,bb9495336223c4b7880dc9d9dc917746491de4a4e0a7f06d1a0dc660325b73ef,2024-09-03T18:35:03.480000 CVE-2023-32603,0,0,e6c2101de13708b2218f921e975bb8e177ada382bd14ad0dd289abc7fa18a7f8,2023-08-28T13:35:12.593000 CVE-2023-32604,0,0,a1ce5f5676767b9d9f5996dc0ed8720625976a5ab9982b86de1600ca3557208c,2023-06-30T17:59:30.717000 CVE-2023-32605,0,0,31686f94a815477c36a8ab56be80207c20556009c92c6df898706d77476742c2,2023-06-30T17:59:17.467000 @@ -227814,7 +227814,7 @@ CVE-2023-3708,0,0,87ff8f6499e91a0522ae67a0f594b23c6bd308f05529249ff2cefd5b4a4d4b CVE-2023-3709,0,0,967acb8dbc18a4f447000860ce0f40e7a092c029be384db85324aab766bf7ff8,2023-11-07T04:19:26.107000 CVE-2023-3710,0,0,3b0c58a2706c12ae381777fcbd272f01a4a4f84b15e106ef047aa505a4056566,2023-09-19T20:42:18.100000 CVE-2023-3711,0,0,d1e752d0e305079185ef97fb2cc21361b799d80c6c099ca50bea92b0ed898042,2023-09-19T20:35:35.727000 -CVE-2023-37117,0,0,ccccc641d561a508929ec5640368f5d1761d489e8d69feabc5a6218c7f136a1c,2024-01-19T01:57:04.067000 +CVE-2023-37117,0,1,dfd63ed6bc45d360c57dc494d52d2dc24d569198a6f5f30ee67431e404e0e855,2024-09-03T19:35:04.220000 CVE-2023-3712,0,0,1c90126a89a75a9cba5fc7ceb6d3e4f302a535a7d30910619abb0b09c71197d8,2023-09-19T19:58:56.997000 CVE-2023-37122,0,0,aac1fd525e3cda650b1b3dc25fff146d36b274c3b0747922655307edfad33459,2023-07-11T13:30:38.823000 CVE-2023-37124,0,0,5745a4015beefa9048d60cd83867218fc0bc045a848321276fdddf4f802d7512,2023-07-11T13:30:53.563000 @@ -233027,7 +233027,7 @@ CVE-2023-43898,0,0,65ee5d2edb55a6599b1cc66bd6446e03ba8a186ed62b80594b82ae9097cb1 CVE-2023-43899,0,0,9026560185610b5e4371b1de060312db36c04226bc6c17e3fc124750fda34ae2,2023-10-11T19:43:22.707000 CVE-2023-4390,0,0,4289c3520f599e07f344a7e17cd6139c8fc4ad9a1fe36fe7420cafc9dea389db,2023-11-08T17:28:21.687000 CVE-2023-43900,0,0,93180892ae45688fb322ce9133dd15e7a7bc4790bc6404142999fe19892415b5,2023-11-17T19:36:27.767000 -CVE-2023-43901,0,1,e4fed9eed0ea5ac0d5aef5039e597450c679c098eab40cc146878f3f3282a4e4,2024-09-03T16:35:01.500000 +CVE-2023-43901,0,0,e4fed9eed0ea5ac0d5aef5039e597450c679c098eab40cc146878f3f3282a4e4,2024-09-03T16:35:01.500000 CVE-2023-43902,0,0,7594a5857fd2a9221428fa0769e34c4a914bec98b194b7b812487f1c843e0cb0,2023-11-17T22:07:30.403000 CVE-2023-43905,0,0,2628cf6cc6fc8b5fbf15ea4bf2dbbaf2b65181744bbfddb569d0b223dc3aefb7,2023-11-03T18:07:46.893000 CVE-2023-43906,0,0,ff14d8a22a132aecd242d338700d98c93de3c23cabb88a79d907b46e4d330c6a,2023-11-03T18:02:02.433000 @@ -233765,7 +233765,7 @@ CVE-2023-45162,0,0,9c680a1575cb70c8538ecd1d5918efb41f21ed490aef5e184babc8e2fd8e0 CVE-2023-45163,0,0,2ec6cd3dc9cf0f531f432ea3be4e54b5a409cdb3500106a8471383465f57f3fe,2023-11-21T18:15:08.543000 CVE-2023-45165,0,0,4fdb9b80923feed65143bdf1c9ee9ba277c4339f142333eb4fad2caa4c4e7593,2023-12-29T05:54:59.177000 CVE-2023-45166,0,0,6f9b228eee7d5aa51c16c459d9e93450b3f6829caf90bf06fcbc2c4c3e01c972,2023-12-19T02:19:16.323000 -CVE-2023-45167,0,0,865aef81082afc34fa02161a4589d9e67ff1de5b7f0c8601f2a70ffb726dd3cf,2023-11-16T19:15:25.573000 +CVE-2023-45167,0,1,2032728e037a8ae9e4dfab10a703c6b206ae43090f8a4324f98a5789bf66f3ec,2024-09-03T18:35:04.040000 CVE-2023-45168,0,0,c4cd2d6b1328fd03ef244d75623f3c9f75b2f00ba203e342cef61b0bf83e8852,2023-12-06T18:58:31.920000 CVE-2023-45169,0,0,d8a6de384e4221c2a4a8e9a24e129aac664abcdbff5ecc9038dc84e4d6d33565,2024-01-16T21:23:19.303000 CVE-2023-4517,0,0,8906d4181dd8649eb496d0ff364adad537c1af5b7515ca17a4f195b856313118,2023-10-17T16:10:09.867000 @@ -233865,7 +233865,7 @@ CVE-2023-45280,0,0,587e5e1ce24b098e3665aa207a0ea7ded3e3371b3bf4c75269401122fcd38 CVE-2023-45281,0,0,cd0978c74ba2a3ae2f0cd409990a0511bfb93e86139e2ad7fb10f6ba5d1be143,2023-10-25T14:47:01.093000 CVE-2023-45282,0,0,6ed2c2cc801c83a19d22a9f4cb86f11cebdf6066eee12a34876ad1251c661720,2023-11-02T01:23:35.490000 CVE-2023-45283,0,0,cd5d279d60eb7cff2b94547ec8e6d00135f36cff01f6563cfb3f789184507d96,2023-12-14T10:15:07.947000 -CVE-2023-45284,0,0,296a8e74a018b740721ec9a08fbed9da9cca9f8197890454d7b831817e9fc7d6,2023-11-17T16:39:27.450000 +CVE-2023-45284,0,1,73d119dc77c426359595c7c8f0829890e7bf623858b010da63a96abc58828085,2024-09-03T19:35:05.593000 CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a300d,2024-01-20T04:15:08.013000 CVE-2023-45286,0,0,d44939332093de0621571dd50fbbf72433dd32913bd42846a1498c4ee2848685,2024-01-04T19:15:08.737000 CVE-2023-45287,0,0,d2da2c58b3609253e3286b1b93fa0d97abe9bcd02db4f7cc4811b975b121f7c4,2024-01-12T14:15:48.310000 @@ -234002,7 +234002,7 @@ CVE-2023-45556,0,0,db85ed98aeb416cea9488882d45fed885a8812d949c883fc9c4f62e114ac2 CVE-2023-45558,0,0,d6708e681a02b48a0789b7c9d32fbd2a11333c3cfe882523b9ab3d88137cba62,2023-11-17T16:16:58.577000 CVE-2023-45559,0,0,720f8b84c0f7c56dc9144358c5610b670d7113ae5edca03b6ed0b37249523ad6,2024-01-10T14:31:19.180000 CVE-2023-4556,0,0,5748749c8f599409eef990839edc42760a57148e868c649fa3a4cccdfc0802a0,2024-05-17T02:31:39.290000 -CVE-2023-45560,0,1,df7c39ec288278203e2f002c283cfce071944984c49c0d6b60874c92f1430d3e,2024-09-03T16:35:02.247000 +CVE-2023-45560,0,0,df7c39ec288278203e2f002c283cfce071944984c49c0d6b60874c92f1430d3e,2024-09-03T16:35:02.247000 CVE-2023-45561,0,0,0d0d372219ce69780a8216cca3f10434818ded1d45225f97d1b5059604c443c0,2024-01-08T19:32:10.703000 CVE-2023-4557,0,0,c682f8e4cb27add8ecc058eea7cc020afa90b141a50536741e3282b5edbb2ad8,2024-05-17T02:31:39.397000 CVE-2023-45572,0,0,9b6409a61d21cb9278322e7d00148b13379cd12429eaac8256cf576a20169172,2024-02-20T21:16:22.087000 @@ -235386,7 +235386,7 @@ CVE-2023-47373,0,0,cda1e4e15d83f26b4fce6ff8231d6eea3e8308c2435831cd2070a7da1d31d CVE-2023-47379,0,0,1aec4ee6764d65d3c988c851e88f5069da5bd36b1cb0e4532b604d5894479238,2023-11-15T20:12:54.297000 CVE-2023-4738,0,0,6abeb04a69b804afc44b4202944aa2be3ce2ddf99d2684401ef9ab8a1fe3df99,2024-02-01T16:16:44.740000 CVE-2023-47380,0,0,01f205c3ec26967cc7a7e2481e73ba781e302cc4db36594b8dfee4c61d179e15,2023-12-01T03:47:35.237000 -CVE-2023-47384,0,0,80257a9d9f854140b8c11a6271f8ebae1616f2ae93aa4cf598179d59bdadfdf9,2023-11-21T19:58:59.553000 +CVE-2023-47384,0,1,f53877456ef98dcd66880bc9c5a1e668557e8211c704f37b483df002f3e72c1e,2024-09-03T18:35:05.747000 CVE-2023-4739,0,0,8851a68677861bec2b126daf75f53ab3e185ad3fb3a686a7030f9ac4276c4b04,2024-05-17T02:31:45.320000 CVE-2023-47390,0,0,5322fa306207ec35d8a46e7de27b115b3db41955e4e039012f9d154cf8568383,2023-11-17T21:40:14.553000 CVE-2023-47392,0,0,26ac41735ed28fbcc150c48595dbf9fc5abb546c9bfe683e1b0ead875fd6abbd,2024-08-29T20:35:27.427000 @@ -235785,9 +235785,9 @@ CVE-2023-48053,0,0,7ec37396133ed7de03fa459f52f6097f430a3ce32b93058cad45305b88f0f CVE-2023-48054,0,0,12620e1b4db7763e3da8696511c7c7e82e9b979089e3eabc8b343308cc2f07fe,2023-11-22T00:07:20.520000 CVE-2023-48055,0,0,cc9dcb360f502f61075ff20bdfefe47ca6c0d0de5f56b135a3b6569c143e732a,2023-11-22T18:24:27.087000 CVE-2023-48056,0,0,fe6114272a3c54e063b5388803e03861eade9425a11a38623d660b07560034ba,2023-11-22T18:24:16.740000 -CVE-2023-48058,0,0,5985c18602ad2b555b91533d15426eea053d74c22bcaaa0c9ab71b7e746799d2,2023-11-16T17:34:52.187000 +CVE-2023-48058,0,1,66a3f1c862eb603d80fc54e7a1e65fd7bae1169a45a4ed88a0a8ad90c45dfdf8,2024-09-03T19:35:06.833000 CVE-2023-4806,0,0,2685e58a5764c5bf1daaca3b07c5ebfffafb62401c0066519d32269bcd1cae48,2024-01-25T14:15:26.360000 -CVE-2023-48060,0,0,e6c127144a812f85454ba28504cbe75b4613f3cf0939a0d68422bd9aa4dc8e15,2023-11-16T17:35:04.087000 +CVE-2023-48060,0,1,fea1d282cced2562e6c31897934f5482f80df5de60fcee98c3efce46bed4f5cd,2024-09-03T19:35:07.643000 CVE-2023-48063,0,0,ea9189f47de248a9b67965af3b522898bbda97ce156221191808cdec464e23d4,2023-11-16T17:35:21.507000 CVE-2023-48068,0,0,d2ed6581af62c4b74ef3f8171b12ae6e16910b36aa9ccf062a942fd093c09c13,2023-11-16T17:35:37.623000 CVE-2023-4807,0,0,e5b936a23ade66145c3fbb6cbefd83803816607bf8eb550b768975f024d1305a,2023-09-21T17:15:24.233000 @@ -236733,7 +236733,7 @@ CVE-2023-4923,0,0,ce7fc500dde57469ac63f0d59e3b430b03bd8f45530b68eebb245625ccf8cf CVE-2023-49230,0,0,4ac429fff5dad6e7c2619e17899b81d72294b4ca67a40312f774f6a762a4a586,2024-01-04T17:17:22.257000 CVE-2023-49231,0,0,c62fd1865f2eec72e7e6740f19af9d0cb475298622080bf6c81c19f47c897674,2024-08-27T19:35:08.170000 CVE-2023-49232,0,0,9ca3b1a982e1c7a2ec1772835ea21cbd9593765c02546da72550a094ad870e5e,2024-08-01T13:45:09.797000 -CVE-2023-49233,1,1,b8871d85d8cfe318194f49ff7d4b394ec2bcc0803f44dfaabffd4f7a1520435a,2024-09-03T17:15:14.400000 +CVE-2023-49233,0,1,2e130d2c980caae3bf40de63030574ce330b6edff6713c81b9bccb3d4e623d38,2024-09-03T19:40:46.783000 CVE-2023-49234,0,0,42b8e485b1c2a4cac6ef6d6ad94acb217368faece94ca890be93bbb463698a19,2024-04-05T17:15:07.690000 CVE-2023-49235,0,0,251e067594908fcdc9ea0af907df30c24f21af889b96692ba9e2877adfcb0e54,2024-01-12T19:51:24.593000 CVE-2023-49236,0,0,043e2d596773c1427321050092baafadbd74f95bf10543e717d7f7b30af8f0a7,2024-01-12T20:39:27.197000 @@ -237316,7 +237316,7 @@ CVE-2023-5012,0,0,cc6b17889699d89afa9974863a8fa3d641d17e5c4ed13ad8d9d87523a80516 CVE-2023-50120,0,0,a0048914c501d3b30ef6d95d580e483b46f28ea55ef806ed5f695b803f715459,2024-01-18T17:18:05.327000 CVE-2023-50121,0,0,6977dae472ab17b7dd7b318a6578effe58002d82624512798beb33ccb3a64bb7,2024-01-12T18:47:56.143000 CVE-2023-50123,0,0,77f556a56634a71e12af296beaee07922e7cce417dad451881dd404e1e10de9e,2024-01-19T15:10:06.827000 -CVE-2023-50124,0,0,5e91b5d714cc8d6172a3d6e5e2d92e50ae1aa81c97d14d919c7dc6443e2eb357,2024-01-19T14:42:04.497000 +CVE-2023-50124,0,1,e3bbcab3533bf8a1b10ced859399675c101bb190b06004d3105691e24c62e35b,2024-09-03T19:35:08.537000 CVE-2023-50125,0,0,464bf8d9ef4a6bdc55a67c9e3bf419a70ceb0201a26d328aae7bde66c83a57ff,2024-01-19T15:32:56.977000 CVE-2023-50126,0,0,b54bf68e65ede75fbcef7411e1b0eef3f487f5aad8b1b823fdcb2f5426f2cd25,2024-01-19T14:33:53.067000 CVE-2023-50127,0,0,cbe7b5b587d374c958dafad2ac56ad946c76785410982b4d771312bc50878719,2024-01-18T20:21:22.963000 @@ -240004,7 +240004,7 @@ CVE-2023-5988,0,0,e8870fe285335fc9ce27fd61b5356b88284d0d9de295811057ae9832cb67e1 CVE-2023-5989,0,0,f8509da0ba0d97be9b7e7d1f7b5f79dd1d2578aa08df6f41d5225f6bb32f42c1,2024-01-04T14:40:49.677000 CVE-2023-5990,0,0,15ce5aec00c7b53e458575c1bf06462b3643079b31aca67ca329b5e17aebb001,2023-12-08T14:32:27.447000 CVE-2023-5991,0,0,53ad6ba66617388676db7532ed8835e282a5dd8dfff15947bac31665750497dd,2024-01-02T20:49:50.667000 -CVE-2023-5992,0,1,42591a947f24e572e31b88a1db5a60b5564db5e1b2ac1c3acbfe08f65a33df6e,2024-09-03T17:15:14.487000 +CVE-2023-5992,0,0,42591a947f24e572e31b88a1db5a60b5564db5e1b2ac1c3acbfe08f65a33df6e,2024-09-03T17:15:14.487000 CVE-2023-5993,0,0,e89bca2c7b548c3aac923b412136cfbbc334d9d5a4c9f1dbaa71ffb351f185cc,2024-02-27T14:19:41.650000 CVE-2023-5995,0,0,49ebc12e173e36ba429d419d7bb5a81e25257494b22e8bb07655f1b6b93c344b,2023-12-06T18:52:42.327000 CVE-2023-5996,0,0,a39512b4e26586438bfe4d642c83b3e78017d2d0d5d7007b3e44874f38592e9c,2024-01-31T17:15:22.350000 @@ -246081,7 +246081,7 @@ CVE-2024-24787,0,0,d01b1be209abf6a135a8c9ff38f241150f7e8624b3b2cb4fb60d5dab36912 CVE-2024-24788,0,0,50cca427c738d8b849be7f4d8278b66e2ec62c8bbcec404a7069521daaae7bf3,2024-06-14T13:15:50.670000 CVE-2024-24789,0,0,fd6a5b95d991b0dab3309c11b164e4c1e60de61b7d4a99fed36d8b88b927fd59,2024-07-03T01:48:25.510000 CVE-2024-2479,0,0,cb8d87b601d3415108e34edcc0a0f20a1a33c04cebcd204ba7867f3afc9f8e4e,2024-05-17T02:38:14.640000 -CVE-2024-24790,0,0,af83ae6b0946a22f5ed087cd11baba620114297a30c56195a078e322298023bd,2024-06-18T17:59:12.547000 +CVE-2024-24790,0,1,40e64c7b168c7e144a991720d8feb3de39d1142cc802b1d1c2ed9288c202a88b,2024-09-03T18:35:07.483000 CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73f89,2024-07-08T14:17:39.083000 CVE-2024-24792,0,0,fc8d65092f6cca5efb8fd01d1ad855c18addacabc045b62e3e589a869025923e,2024-08-01T13:47:30.627000 CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000 @@ -248333,7 +248333,7 @@ CVE-2024-27718,0,0,beb42594b734cb0048140d2e82ce6fc0ea6e9f180fe4b67058b308a104f4f CVE-2024-27719,0,0,fe8b836b0fe7e61cc41cd2c649b06140ddc642945672fc471d8dbd746e0bc2f0,2024-08-27T19:35:19.763000 CVE-2024-2772,0,0,4f628774d2d7059c1b5e8149bfb8c52f3d89a27d409bd2ff21a4dab1c3e0c74d,2024-05-20T13:00:34.807000 CVE-2024-27728,0,0,60809830dda72755597fa9fd74cfe701dd5e424bcaf4e985376fe34c8dec441f,2024-08-20T14:35:06.747000 -CVE-2024-27729,0,0,ebfc21812e929fc7a4596a0d8e7f868174feb579c24c8114e70bb1b1da144d44,2024-08-19T13:00:23.117000 +CVE-2024-27729,0,1,d1492c51fda05770345f2ce2e1508f8053d02a9a73adc923b5df8f5cf5b590e6,2024-09-03T18:35:07.920000 CVE-2024-2773,0,0,33c85832b0bc105a89445abc4897cecb571d3be80bbcd7cdf96b1db070b9a733,2024-05-17T02:38:29.487000 CVE-2024-27730,0,0,82b96d0d6f0f9b69196bf99ad3fe2d0ba16b7f0a2b1ba49b6b00d0024d7b68bc,2024-08-19T13:00:23.117000 CVE-2024-27731,0,0,39540f54488b2cd9d6b926f43bbb09e055458695dd05a9252673e688d8667c7e,2024-08-19T13:00:23.117000 @@ -252485,7 +252485,7 @@ CVE-2024-33768,0,0,b1c48e63fb04c842ea9858e17e5e39e3ff9e03db9d53c98333b940714f472 CVE-2024-3377,0,0,1510516d64045a935995422c6fdaee7a2e23965b26ec5e4515131d4dcc176720,2024-05-17T02:39:53.543000 CVE-2024-33771,0,0,de5d2b98d044b2716ef74c05bc54a011b73685f9a10e074c8f5b2d8fa561dceb,2024-08-08T19:35:19.960000 CVE-2024-33772,0,0,f0b993d69416991d779357f1c269614dbca746050b50a37f5428d607eb22cb25,2024-07-03T01:58:42.817000 -CVE-2024-33773,0,0,c7722b551c6505584361864d25c2fc2534d918de5122176041a5bccbc9806e89,2024-05-14T16:12:23.490000 +CVE-2024-33773,0,1,b68e4febd1be5ec4f91df7fa5f28d779b0ea17026f88ecba55746c94ee35ee34,2024-09-03T19:35:11.330000 CVE-2024-33774,0,0,6f292020d7adae9637fe533dad1837a596af7348622d3ee140dd37eaf1c8cffe,2024-08-20T19:35:03.870000 CVE-2024-33775,0,0,7ea36af513c1579a89db448065ac36bc3c10f0e65b879ce7520d408ffbf766c8,2024-07-03T01:58:43.587000 CVE-2024-3378,0,0,8befaa6be8f3b8c8430cad46a1e49c322e7c667fd428df502463d5be35761acf,2024-06-06T19:43:40.377000 @@ -252564,11 +252564,11 @@ CVE-2024-33880,0,0,bcb151ac36e10d12c5d5d00d4ca8fc6bf0944d42e8b79463d3142d311e312 CVE-2024-33881,0,0,e4d10f61fc565fc8bb5fef52d9f0697958357e8d77d4357eec47a5d0b1ff7b9d,2024-07-03T01:59:07.727000 CVE-2024-33883,0,0,17dc0e905e19f7ba35c55f2bf6a3e6826331627411f3c0ad10d5ffc69e46f693,2024-08-01T13:52:11.050000 CVE-2024-33891,0,0,1989e665b70cca966ca59362172b98f189cf8e652408c4337ef1f2abce15995f,2024-07-03T01:59:08.507000 -CVE-2024-33892,0,0,189463f5e7e1fcc5e379cdcec3aefd3aae7806780e4de5a419e93d582d98828a,2024-08-12T16:15:14.720000 -CVE-2024-33893,0,0,902aa9dc4b0ad003daa325fa26889b8d8f7f9f59dc293c25a22d686159cf27f5,2024-08-12T16:15:14.830000 +CVE-2024-33892,0,1,13c12d3664e3054f13810a03bd12f2139d46feac6c1a8ac65e5f95255e3aa312,2024-09-03T19:18:42.870000 +CVE-2024-33893,0,1,9523a63f2160daa4396893e9738a838b95fb9bca89b2f42f5488b776825034c3,2024-09-03T19:02:35.070000 CVE-2024-33894,0,0,2185bbeec74aacc0192ac4c0f14cc0154df27885b0566a150aabe2fcb3f08630,2024-08-12T16:15:14.917000 -CVE-2024-33895,0,0,beca9895974ff19a7b4105e1a15064a0a2f0cded488095072a7e89d76a867d1a,2024-08-12T16:15:15.007000 -CVE-2024-33896,0,0,b92e2b9e6fde660d20dc6a8719f4518b562cf4907b8ce3bf4482dce33af0a466,2024-08-12T16:15:15.090000 +CVE-2024-33895,0,1,04ba0b007ee4b02eaf9ac803d97de9384b439a729983817e69ee63aaf5768dba,2024-09-03T19:02:31.517000 +CVE-2024-33896,0,1,8d1d8374b6336dd7da119946080ba4c57ec39623b8d4b7ec76ee16ffac44a26f,2024-09-03T19:02:37.870000 CVE-2024-33897,0,0,5f29caf40c34fce30a3d5fc99dcad4918a565b17d95f7f797317cd61579a00f5,2024-08-12T16:15:15.177000 CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363225,2024-08-01T13:52:11.823000 CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000 @@ -252841,7 +252841,7 @@ CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe803144809139 CVE-2024-34221,0,0,b1a1df4238383ced5339c3a2ec6ba475623284464666a2d2287a54d486b49638,2024-07-03T01:59:41.290000 CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000 -CVE-2024-34224,0,0,f4b792085c33fe751ba37a69e3ef609b6c4267fa901657944ebf702e373cd8dc,2024-05-14T16:12:23.490000 +CVE-2024-34224,0,1,bc6821e7a1a1197e8806ef37396dfb61f1b6fcbd255743a94622a514f32eb2a4,2024-09-03T19:35:12.227000 CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000 CVE-2024-34226,0,0,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000 CVE-2024-3423,0,0,5df33203eaf14342db1ae141cfe06e52884cff2f7dfa5b3fcca2ff4c13d5eebb,2024-05-17T02:39:54.990000 @@ -255628,7 +255628,7 @@ CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d0 CVE-2024-38381,0,0,ee33917db8774af9612c5adf177e6b2737bf00c90dedbbd650da44274e8d8882,2024-07-15T07:15:07.803000 CVE-2024-38382,0,0,3919dacb5e73c6be5ccd3007a5a8da0df1d9f75f4778e95ad3c0cd3b2e76ba9e,2024-09-03T12:59:02.453000 CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000 -CVE-2024-38385,0,1,ad39ce50ee10d7c4352abf70f77a4305b91c93b47f7bafc6237b8077dda885d1,2024-09-03T17:59:27.440000 +CVE-2024-38385,0,0,ad39ce50ee10d7c4352abf70f77a4305b91c93b47f7bafc6237b8077dda885d1,2024-09-03T17:59:27.440000 CVE-2024-38386,0,0,fc460a6e3c0a24bed380a1dc8c133e1fa8ff78082345d759f996f921c6748798,2024-09-03T12:59:02.453000 CVE-2024-38388,0,0,59d748481b79bef641da29fa14283366526c194312c93d8df5bfc773a451913c,2024-06-21T11:22:01.687000 CVE-2024-3839,0,0,7c6a8e24e8992e3cadc889bd78886524b88f88c58f4f3536293ab700e2d6e3b8,2024-07-03T02:06:38.637000 @@ -255666,6 +255666,7 @@ CVE-2024-38449,0,0,8da6f80ac88bb7ae3e1140e6ee8382a2d6cd1d0a7f86d02f23b41c1048f2d CVE-2024-3845,0,0,a979e2b537f528e4ac50f6006d078d735fa62fe4b7376a25443b79e4c194cadd,2024-07-03T02:06:42.887000 CVE-2024-38453,0,0,08958525d96155b2873daad7721dd5cb57bde45d4e8e94a2b3e4a3f3b7e8c89f,2024-07-09T16:22:44.900000 CVE-2024-38454,0,0,72d14562f500903ed20ecf4e44aff777a96cc5f26825831fa62629cb8dc6e476,2024-07-26T14:11:13.043000 +CVE-2024-38456,1,1,1b9fc43ec0dd3fb4a99002253870cd7dfa854df82800b27c29dab4a5273dbe01,2024-09-03T19:40:46.783000 CVE-2024-38457,0,0,ac67632609b8fd7c3fbda3f9db3be7abc7196581c8bf10f0e9bce6b0ade96067,2024-08-01T13:54:51.367000 CVE-2024-38458,0,0,28915f52712031b6bb83554d3c73faadc4da0723052fb8d5b29167854742690d,2024-08-20T17:35:10.187000 CVE-2024-38459,0,0,4ef78a4d5c93482a3188b8be60d5fc2896531e30b015b11c8a864501b9d2680f,2024-07-03T02:05:04.377000 @@ -255856,7 +255857,7 @@ CVE-2024-3865,0,0,d6f5dd3766d85f1a043ebf5d3172442b73d2c19e5b446b7220941e0632bb3f CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000 CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 -CVE-2024-38661,0,0,b032ab35a3535059aadbe94298691231b9c402b611efa81b633478c3528450c0,2024-06-25T18:50:42.040000 +CVE-2024-38661,0,1,b3548dc9d015869558d5e6ce591bb61c7302091308e2952841787fdc0fd16368,2024-09-03T18:03:36.033000 CVE-2024-38662,0,0,587269b0aade9b66f2b27453b59929a1dd57dcfa88975eb87dd718f6e7386b22,2024-06-24T18:34:17.547000 CVE-2024-38663,0,0,76edf2df49fecd967d78d8fa91a81453e6903492924f9f2a65b88c7cc552bf4f,2024-06-24T19:26:47.037000 CVE-2024-38664,0,0,418ee48bd44d13024e4f172458676dafa0328cf20a417e7f77e8ce1f228430db,2024-06-26T13:52:23.033000 @@ -255976,7 +255977,7 @@ CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 CVE-2024-38858,0,0,2f858b37341b9cd82cec2df6dc84acb547b815109da6bbf39427e4186c1a6ff3,2024-09-03T12:59:02.453000 CVE-2024-38859,0,0,593edb58800c759df69d81e4c4902db80ed6954e27fabcb131a77e637ddeaf57,2024-08-26T15:15:23.727000 -CVE-2024-3886,0,0,c9781270684dfecde05d4dd03c06ac2c50e99ad99e90851ac263b22a77ac880f,2024-09-03T12:59:02.453000 +CVE-2024-3886,0,1,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000 CVE-2024-38867,0,0,0587553b0e73bb3d7fb83caa644dbd7ff748ca26af84fce237e8ae38fe20168b,2024-08-13T08:15:10.817000 CVE-2024-38868,0,0,20a1c9841ff14ff70d00fe853dbcc813a462591f801cc93dbb4fe7d6525275ca,2024-09-03T12:59:02.453000 CVE-2024-38869,0,0,c0f887639cd5f8290b163362347e9df211e2de0bfae6dfee57ed54004469d16e,2024-08-30T18:15:07.150000 @@ -256166,7 +256167,7 @@ CVE-2024-39296,0,0,1505e8dd09a63330ec5436e9f86022e9b63137e3bb41d294e6c4ca091f2e0 CVE-2024-39298,0,0,ebc8c1ac57b6c8432c32f877ad1093e868a3d2381cb98ee4d7cf51055258ad60,2024-06-25T18:50:42.040000 CVE-2024-3930,0,0,54b8e4aa07087aa149fa9bad599c7a18dec56c1b93dd2d2499327bc3c7940bbd,2024-07-31T12:57:02.300000 CVE-2024-39300,0,0,06c907e887f3a9a49c8c034a570476f82ab0d4832c162f4aa9ed409176b9d3d3,2024-09-03T14:57:54.137000 -CVE-2024-39301,0,0,72934b8f63bc52924fc16a3afe1a18dbebdfa8998d51203c594a2fbcffcac42e,2024-06-25T18:50:42.040000 +CVE-2024-39301,0,1,05ede2147c0414ce0c80c5aedca5b458241dd00889546d94391bc82da8555dc6,2024-09-03T18:06:28.743000 CVE-2024-39302,0,0,946c3f23cfe199dda1010c0ea47b1d5e32454ef20b5307dfd8e2dc92485c1baa,2024-07-01T12:37:24.220000 CVE-2024-39303,0,0,e1d113aa825245b6d1e52862ebbf0ca8379af72327c1818fa556c736e7b07e25,2024-08-21T15:54:35.650000 CVE-2024-39304,0,0,b5f772f01b3427664c53f2fa0501efa536f799b20c5d68d0936fe6db6ed2d717,2024-07-29T14:12:08.783000 @@ -256278,18 +256279,18 @@ CVE-2024-39458,0,0,057d26d6064abe38c6844996c076741573b3fb5797f6e26a9cfc5dd443dbc CVE-2024-39459,0,0,a2d4a360bea52f929e9e67b789c87ad1cf52c7054f238a5096a4acbd8cc22855,2024-06-27T12:47:19.847000 CVE-2024-3946,0,0,ab824b4f2a8403c27b100f5c3d6e7f8d9dd1c20c9aa138888e04631941f166f6,2024-05-30T13:15:41.297000 CVE-2024-39460,0,0,4f78962312c460642ba8951e77b013301d272c348dd713c542bd0b2b628a69cf,2024-06-27T12:47:19.847000 -CVE-2024-39461,0,0,cecb9bb9a4945e2f0e4a10c8862685b90a08a104cc3bac781d0de62df1e3d355,2024-06-25T18:50:42.040000 +CVE-2024-39461,0,1,bf1816ecd185e36f42cd6844b143d10650e3a0c645cde3f5c825da5e93746f58,2024-09-03T18:12:22.633000 CVE-2024-39462,0,0,d6fa49df9f42ed202e5a3cc2f250dce01e83d58a2dd9514f13116e83ffa785aa,2024-07-03T02:05:49.283000 CVE-2024-39463,0,0,713b50bfe2837ba8a6b7f130ffd09bd30c780ec37cdb812163048776185cb1be,2024-08-19T21:01:55.557000 CVE-2024-39464,0,0,1645ce9c2dd695016de0c94e603fefd07a2e7caabc24d8ebfab3af1a26f6b184,2024-08-19T21:02:16.113000 CVE-2024-39465,0,0,b6ba07e557ee2621a86675b0febc6290289dae6bc23b121747f5f8e006230695,2024-08-19T21:04:27.467000 CVE-2024-39466,0,0,4ace459e94329b49137143c03c0ecc682c63ce5f8628b924663a1f0d72bdb734,2024-08-19T20:59:54.867000 CVE-2024-39467,0,0,24b2e918bb6f2bd61687825dd13d0cc0cecac046d19a687da10524a29da67531,2024-06-25T18:50:42.040000 -CVE-2024-39468,0,0,ae6a017e6c367f752286f52d1aab45d1166b4dcdd4ca3930857e995f1f6e7677,2024-07-05T08:15:03.410000 +CVE-2024-39468,0,1,fe65e5461a178671b63563fed452cd3d149a6d1ea9a2f482096f102a32ce8219,2024-09-03T18:14:51.117000 CVE-2024-39469,0,0,4f76bc2884fab99f2e647535e4f5ff6741622700979dba4d1d6ae85a7edb0f27,2024-07-05T08:15:03.467000 CVE-2024-3947,0,0,5ac97013084fcc39672b6ea95b043d5a77dd21abc36167b8c6988b355b186d2c,2024-05-30T13:15:41.297000 CVE-2024-39470,0,0,bacd3945ff873a25d6e7500de402ec7a7623e0c3a8a8e559c02c703a2cb142fc,2024-08-19T20:58:03.040000 -CVE-2024-39471,0,0,89f000b418cb95dfd2a08e65629c84af8b993dbc826d3e812ee14f26f967887b,2024-06-25T18:50:42.040000 +CVE-2024-39471,0,1,9d8fa05e51e1d625e09bf60c0276da56fc90de0e15a591ededbd50b323972684,2024-09-03T18:16:01.660000 CVE-2024-39472,0,0,88e3c5b4d425f11a9fb34fa56b701a01ea58f8b9e68aad9de5a6d814a13d9eb6,2024-08-19T05:15:06.543000 CVE-2024-39473,0,0,b24af8dffbe76f90c2262850990b3e2af991f249a99e7e85721ef205ffeb0fd3,2024-07-08T17:12:06.610000 CVE-2024-39474,0,0,a491eba0634050f6f37acc391f292160897c8af5129613d2334d2af2784daa7e,2024-07-08T17:11:56.177000 @@ -256741,7 +256742,7 @@ CVE-2024-4046,0,0,b162bb54ae31ac06a54238ce430265f513a39f78ee0aa36d5d6ff941168dcd CVE-2024-40464,0,0,566a84364894c87cd293e303f1f3b91278da64a57babcc563f0c2d0eca7b55aa,2024-08-15T13:02:33 CVE-2024-40465,0,0,d1f805e9dd9512e63091b4cd71cf57cffa5f52934bb1bfd71a75623426707138,2024-08-15T13:11:07.570000 CVE-2024-40472,0,0,7d325ed778605ea62befe2fe23f0c336d0e6ecc42db2791564a81ce5488761f0,2024-08-15T13:25:05.657000 -CVE-2024-40473,0,0,fae125d6208bbe8cec385e28019f920962566f6a2e33ffb0f8e49b21974c8449,2024-08-15T13:39:29.240000 +CVE-2024-40473,0,1,05b96087c5a9fe5e093777523be442d4ad8d581754f0f27097948b56347b12ef,2024-09-03T19:35:13.383000 CVE-2024-40474,0,0,608fb1da7112466987ad716b155df271639c9ca00e9a1670f54e4e537b829b18,2024-08-15T13:40:01.357000 CVE-2024-40475,0,0,6162a5c8d3daa8216ee02133ff4675036e80bfee4a81755e45213e41dccbebda,2024-08-15T13:40:54.810000 CVE-2024-40476,0,0,f9287e4de79741df61fb3063574b5ffbc3a40e7aba2a9ae7b1c9a4ed2d244203,2024-08-15T13:43:32.047000 @@ -257237,7 +257238,7 @@ CVE-2024-41238,0,0,f705e2f0b1f5d028406d99f056a8ab6c4a04267fa568b3aa67b3ab220a8ce CVE-2024-41239,0,0,131b357876f7631347cb4a7eac6921190f3c4ad817f4e0a0fd5e6c6c0d9100d6,2024-08-08T19:04:43.380000 CVE-2024-4124,0,0,a8707e0967c681f9085483c77f4dbcbac39e7eb8e57f061d5b5c7f920dc545dd,2024-06-04T19:20:30.760000 CVE-2024-41240,0,0,d3e33d561272d83576d26975ab2c3d7593213b6e30b5373619538759272a67a5,2024-08-13T15:35:13.190000 -CVE-2024-41241,0,0,d3115bbab1f881af8427f99f6eb7c6163ef887cc6ec86ad36953f85328b14c55,2024-08-08T15:21:29.210000 +CVE-2024-41241,0,1,bc10aae1d0c7fd20afd007314cc92399fc76bd43827bb6f9d631dff7290876ee,2024-09-03T19:35:14.190000 CVE-2024-41242,0,0,136c7b7d22b080b31a334ec64795d2be9a741e5bc601d37387485bacabb32da5,2024-08-08T15:21:56.590000 CVE-2024-41243,0,0,952dd949cd58ac35f0a1a9ee0037ce6943213f0d14c4ea16f43a084423f1a4c5,2024-08-08T15:19:38.640000 CVE-2024-41244,0,0,892fb6545cc28ccf50cd66c9f6ebdecb8c20baeba0848d57269be31999372da5,2024-08-08T15:20:24.533000 @@ -257318,6 +257319,8 @@ CVE-2024-4141,0,0,6345d107b3806446cb477db17841c2bd741df862ff110a2cbbd3d3a9945eb2 CVE-2024-4142,0,0,15f953d52654601c03ad89c9ea21867b549a2aa12635e109fbf9627466e8a212,2024-05-02T13:27:25.103000 CVE-2024-4143,0,0,3e703fdfd0a07e589cb7985eb968c1c228e0bf41a25245c7c0c730d1481e87d2,2024-08-01T13:59:25.697000 CVE-2024-41432,0,0,8f4c9c137a73ce4492827c5d064849c429a9c8bcf4d56d4aa0a1d934e4b0578d,2024-08-08T15:02:52.647000 +CVE-2024-41435,1,1,b44f33459c0d46f6ba6f988258f34a3a8021bbe3d1d02a80725880c11c119a2f,2024-09-03T19:40:46.783000 +CVE-2024-41436,1,1,9e4876534ed421e264e6d8fe5b43e57a8803d90194cf75f0ee0c2a6c74e55693,2024-09-03T19:40:46.783000 CVE-2024-41437,0,0,fef9bc933390244a77d828781007c83a4899c964ddf0b6340d9dcc001af583ec,2024-08-23T02:07:29.513000 CVE-2024-41438,0,0,996a6cc02fa9447bba099c45bfb4b15a572a20ecb18cd6121c0e71f3f9fd5f1a,2024-08-01T13:58:40.670000 CVE-2024-41439,0,0,7b3c1664f9930e6509340f8cc42233a6bb9a46e8c57c131a2fcdb17cb5a1f1dc,2024-08-23T02:06:11.380000 @@ -257435,7 +257438,7 @@ CVE-2024-41697,0,0,0540803de9a680c67310f1ae9b5e7c398a016eeccd46a222f00e008911dbb CVE-2024-41698,0,0,44626727d5dcc01685c4add2e1a257537f9fb95333df311d84fbe8f994e63279,2024-08-20T15:44:20.567000 CVE-2024-41699,0,0,b59b81f7c7e454dc4b7e36e478993fab56e5c5855897af1d1b83794370bf6551,2024-08-20T15:44:20.567000 CVE-2024-4170,0,0,62435f89f96f29247c44c5e589e7b97688efd61a202de53db89b1fe5fd4975dc,2024-06-04T19:20:31.883000 -CVE-2024-41700,0,0,a7f9e7305f1d2e8075673e7b110cc5ea52c2a8fbb033df0ca15600a098e40c3d,2024-08-20T15:44:20.567000 +CVE-2024-41700,0,1,7aa2a27b900bb08294b1d245c649acf058cd8fd4d113148ed5a31104a453bba9,2024-09-03T19:37:12.273000 CVE-2024-41701,0,0,dd24aefcbab2e7aed118f6b42dbe2e651c1bc0fc56ceb2d95afa6932def1c843,2024-07-30T13:32:45.943000 CVE-2024-41702,0,0,f2f834cb62e19913572ef56e0684de02f9402451a44fa1f9eb0dac16f09c6db8,2024-08-08T20:31:10.510000 CVE-2024-41703,0,0,29901ab4cabc93049b48fd8098e657030eabcae692264b06be359724aef180d8,2024-08-23T21:35:07.573000 @@ -257611,7 +257614,7 @@ CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b9079070 CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000 -CVE-2024-42005,0,0,a7f5615408f39d5455fecdacdea4974d1dedbdfa4135e3f25797c09478531f93,2024-08-07T20:48:00.083000 +CVE-2024-42005,0,1,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000 CVE-2024-42006,0,0,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000 CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000 CVE-2024-42008,0,0,54c5efe7cc13cbb13be4a33dc9811a7d441226bfd6f8fc26ec0019f7ccb6db29,2024-08-06T16:30:24.547000 @@ -257864,7 +257867,7 @@ CVE-2024-42308,0,0,6d17eb1d30ed4c277ed040e1cbcd780b2faf7a8a39bdbdb95054b558731ed CVE-2024-42309,0,0,620e4db2a37ec65908b26f0c89994589b6187d0cfe5ed9c47a2f3dc54d759d19,2024-08-22T16:01:29.287000 CVE-2024-4231,0,0,c87a42b4dfede9046d13b34e260c0c7ec4e51f68f0fbfb8755010b78e39f405d,2024-08-01T13:59:28.843000 CVE-2024-42310,0,0,400c9cfae2eb45fa11efe161bf5c79e5b421ec2976855d764d0806127b25caf0,2024-08-22T16:01:46.263000 -CVE-2024-42311,0,1,eb71587cbf92c585852c3f2bf1b53b5b14ac311404c1605c56f92f75f9539278,2024-09-03T17:38:24.210000 +CVE-2024-42311,0,0,eb71587cbf92c585852c3f2bf1b53b5b14ac311404c1605c56f92f75f9539278,2024-09-03T17:38:24.210000 CVE-2024-42312,0,0,8419f66ad6ae63296361d79f9dacef9b878e08f5aec63988a53ec2b285c951e4,2024-08-19T12:59:59.177000 CVE-2024-42313,0,0,9c1d5c48d055f58f1d9db953b1d9df536df6f372c5b4c034423cf0ca1e8ccaa9,2024-08-22T16:01:59.467000 CVE-2024-42314,0,0,89c58dc7b3cd8b2fd3f960c13bee9362713642d22d4898076c0acf86c2564d4a,2024-08-22T15:50:47.437000 @@ -258015,7 +258018,7 @@ CVE-2024-42564,0,0,9221095140948579dd9be97bef335789b409d7edd1ec30ff0fce26ad8aad5 CVE-2024-42565,0,0,9f6b7c0014c65509d2d4abc5ba1e001f285093a2f06d33550336698e6b8fe8e4,2024-08-20T21:35:05.227000 CVE-2024-42566,0,0,98ae4d4c54aadbbb33d8445750ac45a5fb4d45d2ba72f710ffd19034073726bc,2024-08-21T13:47:05.013000 CVE-2024-42567,0,0,fa925fac4049dc81680b6b86d83a2403e69ca3e4e76faf0a9fa11845b2f9f031,2024-08-21T13:46:48.087000 -CVE-2024-42568,0,0,6e34876cdb41f52a18fce2fc511397baae5d2ee6e14fed378e5f6f52ff4bd0ea,2024-08-21T13:46:29.497000 +CVE-2024-42568,0,1,d91dc12709eff1532e9284d095e7e1ef97d6afce18657a0eb3bd95d416d93e8a,2024-09-03T18:35:11.160000 CVE-2024-42569,0,0,5026f067debe788e67d575992a3e55ef859cbe857db320c1377c114f0c0171d4,2024-08-20T16:35:27.333000 CVE-2024-4257,0,0,e0d599f1bfc48408556261adebbc05066e8b6b86cdfabfa8d99484b6710fdc92,2024-05-17T02:40:21.330000 CVE-2024-42570,0,0,f4fb85a858f58c2f291542defe868101fdd651787665eab2245b6ac99f2a7d38,2024-08-21T13:46:00.837000 @@ -258168,6 +258171,10 @@ CVE-2024-4288,0,0,98dba4b61502f5abd6b75fde706ee82a9bae31a5b0be7db458ed8cfdf0d8bf CVE-2024-4289,0,0,00867bfd0f1ec036543766f70ad029cfafef69b68de16bba7569db7276222c78,2024-05-21T12:37:59.687000 CVE-2024-4290,0,0,96468cd9b26f589eaa99a2991d568962f6532fbc65b02b2950965134d65bb1ac,2024-08-01T13:59:30.177000 CVE-2024-42900,0,0,a581afacf971ea3c7e1f415a11d8d3e50a8cfeb83f82ad9071f65c9958d77bb9,2024-08-29T13:25:27.537000 +CVE-2024-42901,1,1,7dacdc4e16b128e226d8724cc8388a6439f86e9530d858a1607a786607115b81,2024-09-03T19:40:46.783000 +CVE-2024-42902,1,1,9ec33f56abfe4faabb7d9151ffea5254b69b33ec55994f59970b2e00b31fd2df,2024-09-03T19:40:46.783000 +CVE-2024-42903,1,1,f8ec8d0a5ac73bcf3e6980f24f76b67bb3854cedda63f18407522c17dba84153,2024-09-03T19:40:46.783000 +CVE-2024-42904,1,1,53fb99804779cbe86bb4482b4fae924f3c061640de033d1aa2634bf0cf1cab4d,2024-09-03T19:40:46.783000 CVE-2024-42905,0,0,ddc067821c332a4c26091e24326b09fd2b356b1e4a19dc86f0c28846472da9f5,2024-08-29T13:25:27.537000 CVE-2024-42906,0,0,83be373189250265e4f12ae408fac34eb129a889121f0ce4e7f0836727cd3453,2024-08-27T13:02:05.683000 CVE-2024-4291,0,0,3555454673f17bb302e51e81ea2fe7cd049aabde203c094d5792666ddbcea9c8,2024-07-03T02:07:20.773000 @@ -258180,15 +258187,15 @@ CVE-2024-4292,0,0,3da8afef6eac3f0e74c17cae2760dab77b8f6d77627214b0783fc9bf5f2f59 CVE-2024-4293,0,0,32ea35cbc5ba91cf83ff71be9c2b19347dd1b3b0949ec88573415a66fabe3aec,2024-06-04T19:20:35.203000 CVE-2024-42939,0,0,de039fed771097613977a1859b988b285b10e3afaa2ac25fdead7645e1c3a33c,2024-08-31T02:58:34.660000 CVE-2024-4294,0,0,0a6adde2b8f93d4c8d3c3070f48f62e5ef1709fd02553117d08b35488342d14f,2024-06-04T19:20:35.300000 -CVE-2024-42940,0,0,097785b0d8b1a2c5e9dc9f93304a2dd55a9659adb94f015efea3fb7466159ea6,2024-08-15T19:33:37.670000 -CVE-2024-42941,0,0,4823e4e899032fc94bff489b9cbadb70ea6c991fd28db39b71d862913b0d21ef,2024-08-15T19:33:07.637000 +CVE-2024-42940,0,1,460809cfcb551dcde52417163d4e7b810c2b7db0714b9f924b6035176c36051d,2024-09-03T19:35:15.163000 +CVE-2024-42941,0,1,8ce54d238969d552867802791c81f341612243d1f64f9ec3fd8ed6c6d4e193fd,2024-09-03T19:35:15.967000 CVE-2024-42942,0,0,0d379d2b330ef368d2233a2c22bd7b9b2e9ba76c6efe50a78c36eca466e50821,2024-08-16T18:15:40.017000 CVE-2024-42943,0,0,65be748316e28c3e012b02c07cb2acdc9089785ab234cef5a5ac32b87966aa45,2024-08-16T18:35:13.570000 CVE-2024-42944,0,0,f6c484d3a149f0abfd628917712128d294643148c09cc797b6deeefa656227a8,2024-08-15T19:35:13.737000 CVE-2024-42945,0,0,527c2acfc2ac79e3ae4484bb113cde41f1a0c19bbf139705416ac7d653f09941,2024-08-16T18:15:36.950000 CVE-2024-42946,0,0,d0f7e8d7d1788119449618db3b1da4ffbfa720ab07647edae28d1ada00373d08,2024-08-16T17:35:08.227000 CVE-2024-42947,0,0,e7d01f7003d2f409e61d4e637f7500689fb65c07673a6b4b02e4e7886d96fafe,2024-08-16T13:32:05.103000 -CVE-2024-42948,0,0,2167f79bb14301e7998438c80225da1d9af3750f4b140d069a0f87d1b1360383,2024-08-15T19:31:38.217000 +CVE-2024-42948,0,1,4727dd22a0403edbc3fcca21716cc1b2ada4ce207acf040c2c79859709e837d9,2024-09-03T18:35:12.773000 CVE-2024-42949,0,0,44c6441194e695d5a683578273dc6ba440e5cf17bcd806ba53209d34b464cf71,2024-08-16T18:15:30.507000 CVE-2024-4295,0,0,848d1af2676088d8bdb79c5f7e3bd4f81684dc40347bc492c56560372b53041d,2024-06-11T17:15:18.997000 CVE-2024-42950,0,0,eb11eb812b7cc23c3e2677512c793bb40fc92f136b1df58b0cc1f22b415bf06e,2024-08-21T17:35:04.793000 @@ -258207,7 +258214,7 @@ CVE-2024-42973,0,0,ea510c6d08cc16bdb4d726fb68ca476e64ed97e5805f96a8d49cb53ef02d8 CVE-2024-42974,0,0,938719a5c39f954ba2ac313637062853a8371b455f4b682f3eb1a2aeb5004821,2024-08-16T18:11:47.980000 CVE-2024-42976,0,0,b55ce95834b0b84d45bcbcea47b22be13c2eeb921a6b297cd9c701de5bff705f,2024-08-16T17:35:09.687000 CVE-2024-42977,0,0,284c1cb74b11c8add0a4a2fd16aa0430e19948019ec5006358de30f607388a3a,2024-08-19T20:35:17.330000 -CVE-2024-42978,0,0,b1f4d5128465b01f205b47353b8c0b280ab205530bf41f8f4bc128c131592e31,2024-08-16T13:30:54.670000 +CVE-2024-42978,0,1,7f0bf0c687f04da83ed3192c78fe85643b350fb1ecb2a064e81c90dfb54e9756,2024-09-03T18:35:13.590000 CVE-2024-42979,0,0,8fe829910a5c801caddb18b0a08003433bde998168b919898eba6ac640ceb18a,2024-08-16T18:11:41.197000 CVE-2024-4298,0,0,56c11c4140998e5277d32b17cd52d40fe299fce95de1be0aa962947b44aa372d,2024-07-03T21:15:04.183000 CVE-2024-42980,0,0,7e801fbf565a01d89dabe5f7d87c75f44f68a5184d751fb7293ca24dd403d821,2024-08-16T18:35:15.747000 @@ -258217,9 +258224,9 @@ CVE-2024-42983,0,0,c725dcbfb5bb576199cbbf3ee9c5a740bda0a1873727d4ce4b2ca1e69a43a CVE-2024-42984,0,0,2fd3b2ae263fff500fb556980428a38b378e10c4993fb651d635c225d8b2007e,2024-08-16T18:10:53.680000 CVE-2024-42985,0,0,fd3e2b3b518908e52ebda25c2cfe8cc913346bb2192127a6006d7d26017d6a7d,2024-08-16T17:35:10.400000 CVE-2024-42986,0,0,0b2d204ff26f9eb28ce17ac6820e07d93d61424a006dadbf321ab643bf7229ed,2024-08-19T21:35:07.937000 -CVE-2024-42987,0,0,be14eefacd9f282e13e394cb1aeefe62ea3c84389f7783546c46d3192df9881f,2024-08-16T13:26:27.123000 +CVE-2024-42987,0,1,78d20dcc8dedb262666f57c924ed05a38397e8611300fdadb69763919f535881,2024-09-03T18:35:13.793000 CVE-2024-4299,0,0,2eb1fe754d25d4fca4f14435247c4dce7f2aa132c3677595429d39db730cdde4,2024-07-03T21:15:04.313000 -CVE-2024-42991,1,1,4edb5a96c13b47031d1b0e0b2d74de2d9bffafbaa5d3081a778649ad0036cf72,2024-09-03T16:35:06.743000 +CVE-2024-42991,0,1,d97d29613811bcdf88ecdfccb97b5b151211b69eda2b0841143da106c3926182,2024-09-03T19:40:46.783000 CVE-2024-42992,0,0,922ec86108ffde155b16bab8bce05d736126b3c84831d9a4ac12e72887280de3,2024-08-26T15:15:08.593000 CVE-2024-42994,0,0,46088bee324f9fb8a88606d17f14c9f666ebd59ae6a0d59deea5611547b28ba5,2024-08-19T13:00:23.117000 CVE-2024-42995,0,0,5fe3b52ce312f2adad41265b1d44f25534179e7b5138e6f382ca4cb8e97a4739,2024-08-19T13:00:23.117000 @@ -258447,7 +258454,7 @@ CVE-2024-43380,0,0,3bb4c505eaa2eb4e3ea37c153951df14b4a7ccb63e07a242ed00a1ab77df3 CVE-2024-43381,0,0,a01674578db7c1648bbba4f532305ea57cf2109d65478c5f7b839cc278dc42fc,2024-08-19T13:00:23.117000 CVE-2024-4339,0,0,240ed7230e0a6e458ae0cd6534f1dc024d6c16f3537e0357643e823e6aa09596,2024-05-14T16:11:39.510000 CVE-2024-43395,0,0,e2392bf6475b12db51f31adf2ecd9f40f62cf7ccf326ac732a93b8b209786a49,2024-08-19T13:00:23.117000 -CVE-2024-43396,0,0,72cb7f8de5e6cc0fddf41576db9b3a5c979441bdbeba09448d4bb5c685d81cca,2024-08-21T12:30:33.697000 +CVE-2024-43396,0,1,d3e4db1d56053a512790a84d8c3ae6e21035877ac8c09fe39077f7231484b09e,2024-09-03T18:19:33.167000 CVE-2024-43397,0,0,5caa94926889523c153ff1aaf47669fe6c71771da877710063b3b97c2bc5d0dc,2024-08-26T18:28:42.230000 CVE-2024-43398,0,0,4d6e82045f81d26be52a0544b93b6b51c3a3ff0c00d0592d874e8bb80bdcc430,2024-08-23T16:18:28.547000 CVE-2024-43399,0,0,72972aa8210630cb7e9ed019395b1964574a7b9fdb0cdecaf47d033016a56fac,2024-08-20T16:21:22.747000 @@ -258463,7 +258470,8 @@ CVE-2024-43409,0,0,a42b7406eee825ee22fc12b5886825141398e49597504678e6e46efb8ce72 CVE-2024-4341,0,0,c1be2299b8a85166f5701f470f8a0c3853c6b802dab3cad3703461b748b378a9,2024-08-30T15:44:26.727000 CVE-2024-43410,0,0,34c0de7d3aba2e2bf754c89b4a746899ed92baa2a863da3cba07091015a18558,2024-08-21T17:25:08.560000 CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c5063c5,2024-08-21T17:25:08.560000 -CVE-2024-43412,1,1,8c4e1dbccd1de9460cafe6981d506bab83348c1ebd68f975624ba29cff54163a,2024-09-03T17:15:14.680000 +CVE-2024-43412,0,1,813a1099bb9533a185d77877cc77ab41d88b24364f9ceed8819b5c32492baff2,2024-09-03T19:40:46.783000 +CVE-2024-43413,1,1,d4eedb3f93b9f281936d112b8853232f3d6b5962ec3d27ce866c075648b941e7,2024-09-03T19:40:46.783000 CVE-2024-43414,0,0,480c6b9e5d15f4492b80d223686b068600d65271b741c851d7e1d6b64a6b2b74,2024-08-27T18:33:14.247000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 @@ -258528,6 +258536,7 @@ CVE-2024-43797,0,0,03970116fb7b7c3797102be1254e62f5745cf667f63b1b76b355e49508846 CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de574,2024-08-27T13:01:37.913000 CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000 CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000 +CVE-2024-43803,1,1,d39ec93af35560ca8e8a0de326d7fde6d56bf46a552a9709abae1dbb94d4c159,2024-09-03T19:40:46.783000 CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000 CVE-2024-43805,0,0,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000 CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000 @@ -258539,15 +258548,15 @@ CVE-2024-43810,0,0,3423aa76d2322965ee6b2f07b882867425d31c3e78ec55c0a16ed8dcb25e9 CVE-2024-43813,0,0,0eeebfc2e52232a1c410e398d59e84b3ed93d69c2f86a7c29afdb248f4d5f622,2024-08-23T15:35:12.617000 CVE-2024-43815,0,0,982a00e3a03355b9c82b813d4044e6da96d5259d4a40715b1b2b57e8056ddfef,2024-08-19T12:59:59.177000 CVE-2024-43816,0,0,44d0571961b52b51ae89fc464c69e8f5e9bafc93420d249ab2ac48cf3e8eb3af,2024-08-19T12:59:59.177000 -CVE-2024-43817,0,1,40ac22692ed786254f5ec48928bcf93ac877c29f85c735a88d69b269b19e064f,2024-09-03T17:41:46.407000 -CVE-2024-43818,0,1,35c2bdbf6b44331bfad13ba292b1bcff385bce9bcaa39838af608c0ac2a399e6,2024-09-03T17:45:30 -CVE-2024-43819,0,1,c540ec24ae72694a69ea632607cf72344d3776889a3cd4d93490f0cee277e9c2,2024-09-03T17:47:10.540000 +CVE-2024-43817,0,0,40ac22692ed786254f5ec48928bcf93ac877c29f85c735a88d69b269b19e064f,2024-09-03T17:41:46.407000 +CVE-2024-43818,0,0,35c2bdbf6b44331bfad13ba292b1bcff385bce9bcaa39838af608c0ac2a399e6,2024-09-03T17:45:30 +CVE-2024-43819,0,0,c540ec24ae72694a69ea632607cf72344d3776889a3cd4d93490f0cee277e9c2,2024-09-03T17:47:10.540000 CVE-2024-4382,0,0,f0af8887b52c70037c2b23db1dd5fba9df47b870975ecf7200df960162cfbaf4,2024-07-17T02:56:01.750000 CVE-2024-43820,0,0,e42a9e25f8870accab8ab9292be15932a2243b27a055b186da94f91a1ed606d5,2024-08-19T12:59:59.177000 -CVE-2024-43821,0,1,6b0e9cb35a5b6e032d8dc153d9b81ba7d6475c202a42151c153b72b7503122ed,2024-09-03T17:49:54.280000 -CVE-2024-43822,0,1,4b30c97c59fde25edad2ddef4aadc560c3590e445036e23d418a5d9b0009bfe3,2024-09-03T17:49:33.007000 -CVE-2024-43823,0,1,415804e4f8eed1337d29cbbb761efe6861f75ea20f4e23a3083e452f5f4746c1,2024-09-03T17:49:03.910000 -CVE-2024-43824,0,1,96ac4b3d40968a435b003b39f652f4b72c5c89619f936eca147dfa5683737ac9,2024-09-03T17:48:39.160000 +CVE-2024-43821,0,0,6b0e9cb35a5b6e032d8dc153d9b81ba7d6475c202a42151c153b72b7503122ed,2024-09-03T17:49:54.280000 +CVE-2024-43822,0,0,4b30c97c59fde25edad2ddef4aadc560c3590e445036e23d418a5d9b0009bfe3,2024-09-03T17:49:33.007000 +CVE-2024-43823,0,0,415804e4f8eed1337d29cbbb761efe6861f75ea20f4e23a3083e452f5f4746c1,2024-09-03T17:49:03.910000 +CVE-2024-43824,0,0,96ac4b3d40968a435b003b39f652f4b72c5c89619f936eca147dfa5683737ac9,2024-09-03T17:48:39.160000 CVE-2024-43825,0,0,130af7d96288110e02aee1e7600bdbf8c5cd66dfe2f98ab074c672e68f4722cd,2024-08-19T12:59:59.177000 CVE-2024-43826,0,0,a71e01ef1f7bf0e81ff2e96aa2e3536879a0a625a8e0f17873ad3f06283b51ad,2024-08-19T12:59:59.177000 CVE-2024-43827,0,0,cf65368434e7a2b682a9d717038e50932b650d5aee79f4ae380ff9863f20dec9,2024-08-19T12:59:59.177000 @@ -258683,7 +258692,7 @@ CVE-2024-43958,0,0,3f3bf4212bc2e74c074c138fa03eac2a971b658d4caf8d2e0f7172d721ab1 CVE-2024-43960,0,0,980e57c6c61444ba89ee403d9dc5147321c211af37703070f5947ad7256ca9de,2024-08-30T16:12:24.113000 CVE-2024-43961,0,0,fc0c25e77def1081886110717c1745e96221babc8d9d376dd02221e26610d343,2024-08-30T13:00:05.390000 CVE-2024-43963,0,0,8cafba6a4e67df3e09626ea7dfefbf7e4a0c7f737e6ec03304fa7b4223f26fb3,2024-08-30T16:10:16.647000 -CVE-2024-43964,0,0,bc32f4a153e6dcf4e86584279d8891537ac8aafde77ba6c4ee6c0bc4b7914cd2,2024-08-30T13:00:05.390000 +CVE-2024-43964,0,1,a296e79bf666a02822318fa0afa97e1b25cabc20d3cd08936c2b6152e8d8f9a3,2024-09-03T18:30:23.437000 CVE-2024-43965,0,0,08b6ad4a1a4b1ffdd93dbbd7fa720075997c0aeeaa32e6ecff18f58a8c42dd84,2024-08-30T13:00:05.390000 CVE-2024-43966,0,0,cd3d16dd9709908a4a64e6a13b6fef840bd6c4e6049b114619dc3ea375d7306a,2024-08-26T15:15:23.727000 CVE-2024-43967,0,0,dd198820d01657feb4461b4126ff9f2ed88f09f4d5c22ed753dc2e0d9ac5168d,2024-08-26T19:10:09.607000 @@ -258780,18 +258789,18 @@ CVE-2024-44684,0,0,4cb0a872cb69ba898ae81494ba96c9916273701b152177e4d724930be877a CVE-2024-4469,0,0,8f4eafe1629cfec30e07bc480cd9bd60074526e695dc3e7699a9034cc841795d,2024-05-31T13:01:46.727000 CVE-2024-4470,0,0,3c0fcce343f2a1d09f74dfb9be1570b18bd3555368134445c358e736dab037c4,2024-05-21T12:37:59.687000 CVE-2024-4471,0,0,44899070168831f8c9dbf9959b26f4abead5dc804569bf5f22dbe3807408cb0d,2024-05-24T01:15:30.977000 -CVE-2024-44716,0,0,02e3d7babc62c8f42dbca2c8825df8517009101b3d1d6afa8e0e3e2356687be3,2024-08-30T13:00:05.390000 -CVE-2024-44717,0,0,dee9b73c7e1050c45e1039cf251f198a0d3363f43b50bb034142fe420de59848,2024-08-30T13:00:05.390000 +CVE-2024-44716,0,1,063e41b42ec84a26fe3901d267f8097e94d2443a9dc25f00cc37c917e4db50e7,2024-09-03T18:32:45.427000 +CVE-2024-44717,0,1,4633d8ec58d1349f11ca257535d78e1a19dae6e8b84c1661ccc3922a9791eefb,2024-09-03T18:32:54.357000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000 CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000 CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000 -CVE-2024-44776,0,0,28ae5db6f882f425142c0c1059cbd5a1c8ad65f7a4cfef3ef61dc0e39bea3c2e,2024-08-30T13:00:05.390000 -CVE-2024-44777,0,0,cde3cdcf6f920db7b620a51993a8b22bac61a970df2497f8ed04c8a930b1d684,2024-08-30T13:00:05.390000 -CVE-2024-44778,0,0,b9a70f6baf6650c2b46a06a0e800c00e23e3974e584b00056b1edabec019ca8a,2024-08-30T13:00:05.390000 -CVE-2024-44779,0,0,d8dca58f9573a9e3148ac3bd2a234855a27b46badb233b8d9f53c3bb1a39ecbc,2024-08-30T13:00:05.390000 +CVE-2024-44776,0,1,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000 +CVE-2024-44777,0,1,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93cf1a,2024-09-03T18:33:38.413000 +CVE-2024-44778,0,1,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000 +CVE-2024-44779,0,1,8defc64818470b86a1ed4aeff7b1d178fe09f0b4135b6d31847cdbae6f118693,2024-09-03T18:33:51.297000 CVE-2024-4478,0,0,df092e6d564da1ba274f237ab38d20f4d3626835a8920b1b768f819806d6fce1,2024-05-16T13:03:05.353000 CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000 CVE-2024-44793,0,0,2168e0c02c7a858cbaff9cee44bb5e6a195abfb08b3b31876bea7f6d43977fff,2024-08-27T13:02:05.683000 @@ -258818,8 +258827,8 @@ CVE-2024-44916,0,0,268f2c861c0c259cfc6a8f5831922421cd3f20b464855cae3b767189bdeba CVE-2024-44918,0,0,3a0c5f40de5f64cdd7c350975f1e36ef79f8fc6234af40bbc8a6ef2e7aab0507,2024-09-03T12:59:02.453000 CVE-2024-44919,0,0,4ce1b96ddb0a7c15b96ca851eaf197d01501859f99507e5fc4c267c2fc748b54,2024-08-30T16:15:09.720000 CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000 -CVE-2024-44920,0,1,84638f3c3ee39bcd12288ad180ed29f9fae2d4198dab0d886510f94c084ef06d,2024-09-03T16:35:07.800000 -CVE-2024-44921,0,1,06f254602a1eef462ffbe3a380ba0f268b83e51110a6f26504911783cb01b895,2024-09-03T17:35:01.983000 +CVE-2024-44920,0,0,84638f3c3ee39bcd12288ad180ed29f9fae2d4198dab0d886510f94c084ef06d,2024-09-03T16:35:07.800000 +CVE-2024-44921,0,0,06f254602a1eef462ffbe3a380ba0f268b83e51110a6f26504911783cb01b895,2024-09-03T17:35:01.983000 CVE-2024-4493,0,0,890374eb1d5a1051bad1d8c630ec03ea130ffcf654be5d03c4d1c85a0ebc3c87,2024-06-04T19:20:39.143000 CVE-2024-44930,0,0,7742e471af6d813844c83bc1edc4d2c34bd92450c44640698d5e16549d2fbbfc,2024-08-30T13:00:05.390000 CVE-2024-44931,0,0,a811432be893129eec1153f2a1f5cf79e00f6cda4409f2898f7f29e87e49d41f,2024-08-26T12:47:20.187000 @@ -258925,8 +258934,10 @@ CVE-2024-45302,0,0,81d543b8058ec9a64648a785b7fa014c697fce5846d6cc78b75fe051c3ed2 CVE-2024-45304,0,0,1414ce8fe9746c46bc2063f6428cc45402e10f1afbb5a5e378e238c2ed3a1fbe,2024-09-03T12:59:02.453000 CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a873,2024-09-03T12:59:02.453000 CVE-2024-45306,0,0,2089f2b015e15041c3f3807cc6f2c8eb1cf893208c28e4b1ca171ff53a3a8feb,2024-09-03T12:59:02.453000 +CVE-2024-45307,1,1,e801e49c6c50ed1fcc6ff63385ec5286c080c9a6dd9686a6fd9413b8c4e80206,2024-09-03T19:40:46.783000 CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 +CVE-2024-45310,1,1,cf559c2fb608db5e942d7bd154cefbc5964353e2198d862886f1fbdd9c82a973,2024-09-03T19:40:46.783000 CVE-2024-45311,0,0,f2b6c9c3379c0b3e8f8cccd4dc03bdd41e4b0a8129b775b47dd7144af13cbd61,2024-09-03T12:59:02.453000 CVE-2024-45312,0,0,3ab127ae457c159e255763a9cac499b257dedfb3025d06ab78788175895c278c,2024-09-03T12:59:02.453000 CVE-2024-45313,0,0,7f2c32db2a1d116c11ba8b1d5ff95be26c7a6f4c5dba7ff892eb13c5baf4c8a1,2024-09-03T12:59:02.453000 @@ -258945,10 +258956,10 @@ CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b91 CVE-2024-4541,0,0,3195b1a81526d9da93cf28b1e1f763238ece2897561011f493b9a3c77f12398c,2024-06-20T12:44:01.637000 CVE-2024-4542,0,0,188546ca483f93e7131261a5bd57b93b03491de5e62247759ac8c05b93c8f51b,2024-05-16T14:15:08.980000 CVE-2024-4543,0,0,cda17786b919b03cc3eee3c735d905916723b9b88a929a8c3a419843d78bdd6c,2024-07-03T18:23:54.237000 -CVE-2024-45435,0,1,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000 +CVE-2024-45435,0,0,927041b8e7c5f8f0713d2961d74ba13597912bf3d79d8a6803fd6f88a7797c28,2024-09-03T17:23:36.073000 CVE-2024-45436,0,0,285ce8c7d8a1a73359dbcdd8ed12fdef35f675e020b230adf62e4aee88352a8c,2024-08-30T16:08:54.840000 CVE-2024-4544,0,0,15f8e020f3ae5b19c85909c1ae8a806386c0b6da2837ebed60d92355c70c1564,2024-05-24T13:03:11.993000 -CVE-2024-45440,0,0,48f137caa1abb077b1075de2faba6a6806a147fc385fe9803d57e1539cd03295,2024-08-29T13:25:27.537000 +CVE-2024-45440,0,1,9239656ddb6aeda0c2c6efeace5c8dd620d5a27bf71f1e1bdb521249d601edd3,2024-09-03T18:15:08.967000 CVE-2024-4545,0,0,864a22773c6eaa7a20fdb4cf4c4b7a2709a2c8e64cfe98132d05364d67e97af4,2024-05-14T16:11:39.510000 CVE-2024-4546,0,0,da973c82a9042d639d29e7a0c2ffb48d440dea200e6df21027887041c43a68db,2024-05-16T13:03:05.353000 CVE-2024-4547,0,0,e03413ba2a3d643e986abd6a70d4989a4412faae98e55cc280c4859673ba647d,2024-05-06T16:00:59.253000 @@ -258971,15 +258982,15 @@ CVE-2024-4555,0,0,2d6c47296afeedb2c6a7f60677f2d88681b96e578cfefc1913928dc16b7bb8 CVE-2024-4556,0,0,7d09fa247082252ffb6b7dda6aa600cf3ff3bf7dd0d9af7b07da29fff8c7a6fb,2024-08-28T12:57:17.117000 CVE-2024-4557,0,0,66c84ceab02c8adff7c7e309e3c388a17800860cf81ce53b59e1c60dda9ffb15,2024-06-28T13:19:24.767000 CVE-2024-4558,0,0,f33120bad100499bf0c3c5e20b119cff8d6ade1c8324fe8cac904ff1ff2e147b,2024-07-30T02:15:08.293000 -CVE-2024-45586,0,0,b8ce1496f42f310fc06dda19fe6806cc42bc567bbac86c9dad77a5e8a4e1a8a3,2024-09-03T12:59:02.453000 -CVE-2024-45587,0,0,c4a9778ef4ee9816c403430d16b2806e32ead26df3172aecb7ac4e291c3286d5,2024-09-03T12:59:02.453000 -CVE-2024-45588,0,0,0ffd9eefdcf3d7feb480c3bca8c40ca444611aa8a2be4a24eb029adcb6854f63,2024-09-03T12:59:02.453000 +CVE-2024-45586,0,1,253f3929c9559f666d167aab4975b63db8e2ad8bdf18b88e44b362bb2cf83eda,2024-09-03T19:55:47.997000 +CVE-2024-45587,0,1,f81a3d1e32cfab4a3904b18a9c45828659a1f3efbee3c4d2c9d6c663d5201cf7,2024-09-03T19:55:46.413000 +CVE-2024-45588,0,1,67f6c95f1a9b044787da66a3c815c562847f160833229ff27d23d876e7dd3a1a,2024-09-03T19:46:35.080000 CVE-2024-4559,0,0,bf46d9d7302afe42ee4323175537eeb1eb701f6d945f2b96b5e6acc4bfa04589,2024-07-03T02:07:46.003000 CVE-2024-4560,0,0,3d2b06b4cd5ab2760bd3f364e15c96b4f7456a14baec47a1cd857fe992686648,2024-05-14T16:11:39.510000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 CVE-2024-4562,0,0,e0a783b0d1c16da234e0fe3d351cbae7a089d075739ba22ec0641c397b879b0f,2024-05-15T16:40:19.330000 CVE-2024-45621,0,0,b1d8555717f8cc1664b959fa6eacae6272c01d212d833a21d986fc1607f3d4e8,2024-09-03T12:59:02.453000 -CVE-2024-45622,0,1,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000 +CVE-2024-45622,0,0,a33339926b8b20e966e52f22a13007f367a7fdd9b0655040e29ed073b9b76629,2024-09-03T16:35:09.647000 CVE-2024-45623,0,0,6e76d49f362c221a481237923ca3f07ce122524ae0700d93b755e69d33328599,2024-09-03T15:35:15.360000 CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000 @@ -260310,7 +260321,7 @@ CVE-2024-6115,0,0,15dd6157449ec10d31fd4366fb8ca14f8fe35af7e4b7d4c1bf3f3f7159a1a6 CVE-2024-6116,0,0,f2ada37f40e94dafdc5d43df86df5904a49741c82bcc90227e41dbb655a1d08c,2024-08-23T02:19:51.723000 CVE-2024-6117,0,0,d5912ee8b7e4ddbb2a8f1ef197795383d392b808369f9562b5d5244a004a10d9,2024-08-30T17:41:50.753000 CVE-2024-6118,0,0,1a4b8c8391abe6767f17dfe565807cd043bd462cdba8832490fc6733cc9b8f4a,2024-08-30T17:44:20.537000 -CVE-2024-6119,1,1,5139386c00935bf2ac969420dc9b85c8911cd08ed4139f0e2f838370dff41cdd,2024-09-03T16:15:07.177000 +CVE-2024-6119,0,1,2304fd67a37a6bd7def45cb507d7047dd0d656047e08a67f5c9499fa04745f71,2024-09-03T19:40:46.783000 CVE-2024-6120,0,0,887a4e2aeba7d554804c74306237ee98da6982710d9ab44cbcf47e59767187c6,2024-06-24T20:03:04.363000 CVE-2024-6121,0,0,ca3a4df866c04d91a8299ec9d7d3d482d90a57c7a8dc29a6fa55ffef02eccb66,2024-07-24T12:55:13.223000 CVE-2024-6122,0,0,c8077cf11281a520f9cddc1bada37060f1a2aaa357eb2389fb60e2b645640b0c,2024-07-24T12:55:13.223000 @@ -261180,8 +261191,8 @@ CVE-2024-7339,0,0,57ec1e872e2326d7636a6cda3d278abfe9440d76240320c6c9e4335e8a9416 CVE-2024-7340,0,0,a3f98c82759b3c1463da2160a8c456e9c18de4cdd89227049824622069589bfd,2024-08-01T14:01:07.677000 CVE-2024-7342,0,0,92ad1e6857e9b0cace198602fda8e3b1ec6edbf7f40f7b078718810def4495b5,2024-08-15T18:40:22.537000 CVE-2024-7343,0,0,b6b73fa45089899a04dcf5d8ab6e4cd843be4b35e1b528d7d577722e09cd2c25,2024-08-15T18:40:52.707000 -CVE-2024-7345,0,0,a5eaa19ca53f5d0b57b22b36c84d07e072c5cc9572a36e49d9c06c1da1ca69db,2024-09-03T15:15:16.707000 -CVE-2024-7346,0,0,f770afc67134ec2034e59f159f66e8a5984a271b07a7194247a0b4b3b1e5d3c2,2024-09-03T15:15:16.913000 +CVE-2024-7345,0,1,ccfa03705386d8f7bae9ad7f21044a239b8248d01b7db311bd409a35a072ecd6,2024-09-03T19:40:46.783000 +CVE-2024-7346,0,1,1950683ea95df19f4a455da83d9415fa0612844b0d2a8d2ce9d42ed9292f5758,2024-09-03T19:40:46.783000 CVE-2024-7347,0,0,bf8562cb670939d7931c5691727a53bfc7fe78942e30ee3ed14dd0e17a8cc5f7,2024-08-20T19:25:17.513000 CVE-2024-7348,0,0,3d1228f3ad08ea7cfe68d4df8a31a5ae3b9df9b86e858b3756b13b4b2c220a8e,2024-08-12T15:54:52.320000 CVE-2024-7350,0,0,d4174556ac92d5e9a2a8dc8d5eec461477866543996df72c5d41b5df846ab0dc,2024-08-08T13:04:18.753000 @@ -261352,7 +261363,7 @@ CVE-2024-7585,0,0,5e2ff565ca20d01ef68f8422fbeb35a8929478e27cc3f0f142481fee7317e6 CVE-2024-7588,0,0,5a601951792deb0c1a10bd51703f1f9beff37d3a9397ce091c3662d925878616,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e49665270,2024-08-13T16:58:08.793000 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 -CVE-2024-7592,0,0,5f1d5f4650e90138279fca5841fce1bfd247e68df66e0a4d15fc694fc47d170d,2024-09-03T15:15:17.127000 +CVE-2024-7592,0,1,d502cd413fcc1f77d45b4f7c5165989a71f5beed854dec165a878dd54a330ae9,2024-09-03T18:35:15.763000 CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000 @@ -261367,6 +261378,7 @@ CVE-2024-7613,0,0,595ae1d3f56b81eeb34ef1e184ddf7962f3a8fbfc042ff77a8fcf0bd3f10f2 CVE-2024-7614,0,0,70ea68e630891f9909a0a8afd3fe5566dad840edc8df033b5c308064cf074a69,2024-08-21T18:48:47.273000 CVE-2024-7615,0,0,bdb4e2a47bb0b635ad5424e7dee382fdbc667ab1983b9e7b4b79b80817773efa,2024-08-21T18:48:19.590000 CVE-2024-7616,0,0,240142a7cf93711d379b14c2a6284d004fd0a2d1c674fc02d32efdd57aa3e2bd,2024-08-13T16:59:39.517000 +CVE-2024-7619,1,1,52e157835f9b49014d03653876a6177ba54feacc6eb580f7a52506ce1aa54bb3,2024-09-03T18:15:09.223000 CVE-2024-7621,0,0,07161284faa2eb0637370b6ff462e631787a37850cefb6ac5fa6750545dd7050,2024-08-12T13:41:36.517000 CVE-2024-7624,0,0,c87cdcd90fb34d1c79e4bedcfe521cd45a7c97d88fc176665ac59544b2fffb63,2024-08-15T13:01:10.150000 CVE-2024-7625,0,0,cf7951ec684c41cac7f2f6e12b1507a1eac20d5a4914135abea68670c2031228,2024-08-15T13:01:10.150000 @@ -261391,7 +261403,7 @@ CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1 CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000 CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000 CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000 -CVE-2024-7654,0,0,d2682b299edf95c6658ad8c9301b586518797bfa6c71489de67e4567d5625c69,2024-09-03T15:15:17.223000 +CVE-2024-7654,0,1,48e372226ddbdad2b2169e3b27af2de6c8634648c09e2ca3ab2c1c166ee3bf55,2024-09-03T19:40:46.783000 CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000 CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000 CVE-2024-7658,0,0,832a65f53a452b2fa1561cdaae82b94e5ac7d59bc491a09b3cdc773f704d8588,2024-08-13T17:00:19.800000 @@ -261417,8 +261429,8 @@ CVE-2024-7684,0,0,d5d03d6072e24fe97ebcaeddd6f0cfafbf610fe9d74f716df9c156507bb771 CVE-2024-7685,0,0,ef97cee3c3f9504d8f3d2a571167ba3304a1e5ad3165b46e778fa46938b19988,2024-08-20T13:53:51.947000 CVE-2024-7686,0,0,f064743866c554c4f2e90ed0b10058d3ac9c7fa057a74b3ddc10388a40d22334,2024-08-20T14:03:12.533000 CVE-2024-7690,0,0,d641c397b389582990875041f83e3f7cf4b821780cef851109280aeeabb26909,2024-09-03T14:35:08.507000 -CVE-2024-7691,0,1,be3e7969d66daef31c8f4d2ca08f6fc545d3ce4a9f5e0f354c807322de787fd3,2024-09-03T16:35:11.383000 -CVE-2024-7692,0,1,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b483,2024-09-03T16:35:12.363000 +CVE-2024-7691,0,0,be3e7969d66daef31c8f4d2ca08f6fc545d3ce4a9f5e0f354c807322de787fd3,2024-09-03T16:35:11.383000 +CVE-2024-7692,0,0,53a3a528e0e26eebc3a24b8375fbb7b9fd52b7aeb81816897422b7295867b483,2024-09-03T16:35:12.363000 CVE-2024-7693,0,0,f2cd1103366bcfd179be09779784b86ac2f98679921c4f629dd8dbd0c14eefbf,2024-08-12T13:41:36.517000 CVE-2024-7694,0,0,7ad6784b26040f06619a4364e66ebaeeebc13317865a5794a53c5e6dcb080aaf,2024-08-12T13:41:36.517000 CVE-2024-7697,0,0,ec740217e8324af4933e81b05285aef1954371b3c254be0eabb50b05e6bbef72,2024-08-21T06:15:13.187000 @@ -261622,7 +261634,7 @@ CVE-2024-8083,0,0,132ff33ed62a0570cfdbcc24775ef89bd874f9ae2d6b782cd1fd9309d1bcaa CVE-2024-8084,0,0,800f6f0fe2093be3327a671bc62389e5ecd680550a19025f92dbb7c739b52793,2024-08-27T16:11:11.460000 CVE-2024-8086,0,0,1db8fbbbc3b8bbc355402aca80f0447c54000b25360ca3b1fa582aada4800dfb,2024-08-27T13:17:34.187000 CVE-2024-8087,0,0,9e47ad2dfed1c8a4045274b6d757cb5a75d1e05917b45ee6f1489b72f67b871b,2024-08-27T13:19:35.530000 -CVE-2024-8088,0,1,0e34ecb2e337ae3a8395dc18d49e45879b242135953d92e92bf685b3a17972e3,2024-09-03T16:15:07.343000 +CVE-2024-8088,0,0,0e34ecb2e337ae3a8395dc18d49e45879b242135953d92e92bf685b3a17972e3,2024-09-03T16:15:07.343000 CVE-2024-8089,0,0,e6e12db9d845890df3284b8f9ed104fa7a1183d91532c3c72d090f8235aedb4e,2024-08-27T13:21:22.927000 CVE-2024-8105,0,0,6cd123057443a6d5affcf89562c6f3c6a2170e0a192f0587b00965446f3cfd3c,2024-08-30T21:15:14.577000 CVE-2024-8108,0,0,60015ebbd181aea00918abf3b3af4bc88fba5109d0b4aa167c5902152afce1db,2024-09-03T12:59:02.453000 @@ -261752,12 +261764,12 @@ CVE-2024-8370,0,0,64120d391bac6f64ab186b0c09a7545128a19dc5df44f367c6d51bbce7b58a CVE-2024-8371,0,0,7b748619aff48ca851aaa4522abab6772c72472a7e35dd23e50368b3e3907681,2024-09-03T13:15:05.500000 CVE-2024-8374,0,0,4f80f55becbb7c7a1bdcff55c8c8caebb4200525c557f5f15c3a81de804dfdac,2024-09-03T12:59:02.453000 CVE-2024-8380,0,0,50231b6cf68aafd45090da0e392d43e9cc47c26432970ae1967b30772bd6b092,2024-09-03T12:59:02.453000 -CVE-2024-8381,0,1,e7a1bf0fa21e3d466a6fe92dcf40cfe4bc9e0605365847dc55036f65d031a9b8,2024-09-03T16:35:13.350000 +CVE-2024-8381,0,0,e7a1bf0fa21e3d466a6fe92dcf40cfe4bc9e0605365847dc55036f65d031a9b8,2024-09-03T16:35:13.350000 CVE-2024-8382,0,0,efd4d504583c7fd076b33c9f6fec5965d98116cc01276bd9e89c0d8d9e8a8b82,2024-09-03T15:12:16.467000 CVE-2024-8383,0,0,3b3d2bcfdb78cbde0419304113974833c25c316d6ce2ddd82d4ef47afd00074a,2024-09-03T15:12:16.467000 -CVE-2024-8384,0,1,5362a6ace2b158a32cc1b8122c1c95d212b2ab5fdc71dfd06d7a76d1a9880d06,2024-09-03T16:35:14.610000 -CVE-2024-8385,0,1,3eda89923dec7f419638dbbbda1a0bd1a1d6a52329ca274edcb6c542c6f6acdb,2024-09-03T16:35:15.653000 +CVE-2024-8384,0,0,5362a6ace2b158a32cc1b8122c1c95d212b2ab5fdc71dfd06d7a76d1a9880d06,2024-09-03T16:35:14.610000 +CVE-2024-8385,0,0,3eda89923dec7f419638dbbbda1a0bd1a1d6a52329ca274edcb6c542c6f6acdb,2024-09-03T16:35:15.653000 CVE-2024-8386,0,0,dda2399ada658560d8a6dac1ee98f2a881d2fb65f5accf10b74309695e1e8264,2024-09-03T15:12:16.467000 -CVE-2024-8387,0,1,a3a4ffd386669c751e51534334429c7aa7719b496d6c236587ca9f3124ab594b,2024-09-03T16:35:16.810000 +CVE-2024-8387,0,0,a3a4ffd386669c751e51534334429c7aa7719b496d6c236587ca9f3124ab594b,2024-09-03T16:35:16.810000 CVE-2024-8388,0,0,fe5700fbfa44251541892935d34e117d24a52d265fc210840d61b4c99ed842ff,2024-09-03T15:12:16.467000 -CVE-2024-8389,0,1,2a0ca530b7b6eb915d2e5cb6434892ad982bd6d94765b32fce372846982f2195,2024-09-03T16:35:17.947000 +CVE-2024-8389,0,0,2a0ca530b7b6eb915d2e5cb6434892ad982bd6d94765b32fce372846982f2195,2024-09-03T16:35:17.947000