From fd5e1c265f2534903d78f18608400cf58daacf26 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 6 Sep 2024 23:58:15 +0000 Subject: [PATCH] Auto-Update: 2024-09-06T23:55:17.220319+00:00 --- CVE-2023/CVE-2023-263xx/CVE-2023-26315.json | 76 +++++++- CVE-2023/CVE-2023-525xx/CVE-2023-52535.json | 39 +++- CVE-2024/CVE-2024-308xx/CVE-2024-30802.json | 39 +++- CVE-2024/CVE-2024-309xx/CVE-2024-30939.json | 39 +++- CVE-2024/CVE-2024-316xx/CVE-2024-31680.json | 39 +++- CVE-2024/CVE-2024-329xx/CVE-2024-32911.json | 34 +++- CVE-2024/CVE-2024-339xx/CVE-2024-33903.json | 39 +++- CVE-2024/CVE-2024-351xx/CVE-2024-35133.json | 62 +++++- CVE-2024/CVE-2024-38xx/CVE-2024-3865.json | 39 +++- CVE-2024/CVE-2024-419xx/CVE-2024-41964.json | 97 +++++++++- CVE-2024/CVE-2024-437xx/CVE-2024-43700.json | 71 ++++++- CVE-2024/CVE-2024-438xx/CVE-2024-43804.json | 57 +++++- CVE-2024/CVE-2024-447xx/CVE-2024-44796.json | 104 +++++++++- CVE-2024/CVE-2024-447xx/CVE-2024-44797.json | 67 ++++++- CVE-2024/CVE-2024-448xx/CVE-2024-44838.json | 21 +++ CVE-2024/CVE-2024-448xx/CVE-2024-44839.json | 21 +++ CVE-2024/CVE-2024-449xx/CVE-2024-44919.json | 61 +++++- CVE-2024/CVE-2024-453xx/CVE-2024-45321.json | 69 ++++++- CVE-2024/CVE-2024-457xx/CVE-2024-45771.json | 21 +++ CVE-2024/CVE-2024-48xx/CVE-2024-4883.json | 62 +++++- CVE-2024/CVE-2024-48xx/CVE-2024-4884.json | 62 +++++- CVE-2024/CVE-2024-48xx/CVE-2024-4885.json | 62 +++++- CVE-2024/CVE-2024-50xx/CVE-2024-5008.json | 62 +++++- CVE-2024/CVE-2024-50xx/CVE-2024-5009.json | 62 +++++- CVE-2024/CVE-2024-50xx/CVE-2024-5010.json | 67 ++++++- CVE-2024/CVE-2024-50xx/CVE-2024-5011.json | 67 ++++++- CVE-2024/CVE-2024-59xx/CVE-2024-5991.json | 67 ++++++- CVE-2024/CVE-2024-67xx/CVE-2024-6789.json | 65 ++++++- CVE-2024/CVE-2024-75xx/CVE-2024-7593.json | 83 +++++++- CVE-2024/CVE-2024-77xx/CVE-2024-7720.json | 56 +++++- CVE-2024/CVE-2024-81xx/CVE-2024-8163.json | 67 ++++++- CVE-2024/CVE-2024-81xx/CVE-2024-8164.json | 67 ++++++- CVE-2024/CVE-2024-81xx/CVE-2024-8165.json | 66 ++++++- CVE-2024/CVE-2024-82xx/CVE-2024-8255.json | 50 ++++- CVE-2024/CVE-2024-84xx/CVE-2024-8439.json | 16 ++ README.md | 69 ++++--- _state.csv | 198 ++++++++++---------- 37 files changed, 1994 insertions(+), 249 deletions(-) create mode 100644 CVE-2024/CVE-2024-448xx/CVE-2024-44838.json create mode 100644 CVE-2024/CVE-2024-448xx/CVE-2024-44839.json create mode 100644 CVE-2024/CVE-2024-457xx/CVE-2024-45771.json create mode 100644 CVE-2024/CVE-2024-84xx/CVE-2024-8439.json diff --git a/CVE-2023/CVE-2023-263xx/CVE-2023-26315.json b/CVE-2023/CVE-2023-263xx/CVE-2023-26315.json index ca5fe3829e1..26065052e70 100644 --- a/CVE-2023/CVE-2023-263xx/CVE-2023-26315.json +++ b/CVE-2023/CVE-2023-263xx/CVE-2023-26315.json @@ -2,17 +2,41 @@ "id": "CVE-2023-26315", "sourceIdentifier": "security@xiaomi.com", "published": "2024-08-26T12:15:05.387", - "lastModified": "2024-08-26T12:47:20.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:25:54.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Xiaomi router AX9000 has a post-authentication command injection vulnerability. This vulnerability is caused by the lack of input filtering, allowing an attacker to exploit it to obtain root access to the device." + }, + { + "lang": "es", + "value": "El enrutador Xiaomi AX9000 tiene una vulnerabilidad de inyecci\u00f3n de comando posterior a la autenticaci\u00f3n. Esta vulnerabilidad se debe a la falta de filtrado de entrada, lo que permite a un atacante aprovecharla para obtener acceso ra\u00edz al dispositivo." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@xiaomi.com", "type": "Secondary", @@ -35,10 +59,56 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mi:ax9000_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.0.0", + "versionEndExcluding": "1.0.174", + "matchCriteriaId": "5A0CFBA2-2F5A-48AD-BD76-3AE1B9BE45DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mi:ax9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5F71A5A-A7D4-4218-B371-25BE040BB320" + } + ] + } + ] + } + ], "references": [ { "url": "https://trust.mi.com/zh-CN/misrc/bulletins/advisory?cveId=546", - "source": "security@xiaomi.com" + "source": "security@xiaomi.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-525xx/CVE-2023-52535.json b/CVE-2023/CVE-2023-525xx/CVE-2023-52535.json index 9182171ea74..80bc9478d89 100644 --- a/CVE-2023/CVE-2023-525xx/CVE-2023-52535.json +++ b/CVE-2023/CVE-2023-525xx/CVE-2023-52535.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52535", "sourceIdentifier": "security@unisoc.com", "published": "2024-04-08T03:15:08.923", - "lastModified": "2024-04-08T18:48:40.217", + "lastModified": "2024-09-06T22:35:00.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el controlador vsp, es posible que falte una entrada incorrecta de verificaci\u00f3n. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], "references": [ { "url": "https://www.unisoc.com/en_us/secy/announcementDetail/1777148475750809602", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30802.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30802.json index f61db86f185..98db0085001 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30802.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30802.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30802", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:23:53.007", - "lastModified": "2024-05-14T16:13:02.773", + "lastModified": "2024-09-06T23:35:00.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en Vehicle Management System 7.31.0.3_20230412 permite a un atacante escalar privilegios a trav\u00e9s del componente login.html." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1393" + } + ] + } + ], "references": [ { "url": "https://github.com/WarmBrew/web_vul/blob/main/TTX.md", diff --git a/CVE-2024/CVE-2024-309xx/CVE-2024-30939.json b/CVE-2024/CVE-2024-309xx/CVE-2024-30939.json index 2ad3a5fa33a..3476b46aad4 100644 --- a/CVE-2024/CVE-2024-309xx/CVE-2024-30939.json +++ b/CVE-2024/CVE-2024-309xx/CVE-2024-30939.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30939", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T19:15:49.970", - "lastModified": "2024-04-26T12:58:17.720", + "lastModified": "2024-09-06T23:35:01.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en Yealink VP59 Teams Editions con la versi\u00f3n de firmware 91.15.0.118 permite que un atacante f\u00edsicamente cercano obtenga el control de una cuenta a trav\u00e9s de una falla en el procedimiento de restablecimiento de f\u00e1brica." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], "references": [ { "url": "https://medium.com/%40deepsahu1/yealink-ip-phone-account-take-over-9bf9e7b847c0?source=friends_link&sk=b0d664dd5b3aad5b758e4934aca997ad", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31680.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31680.json index bcbcf24fdaa..0430a36d13c 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31680.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31680.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31680", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-17T00:15:07.293", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-09-06T22:35:01.557", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de carga de archivos en Shibang Communications Co., Ltd. IP network intercom broadcasting system v.1.0 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente my_parser.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/heidashuai5588/cve/blob/main/upload.md", diff --git a/CVE-2024/CVE-2024-329xx/CVE-2024-32911.json b/CVE-2024/CVE-2024-329xx/CVE-2024-32911.json index a80f5fedbc5..6a5fefbf360 100644 --- a/CVE-2024/CVE-2024-329xx/CVE-2024-32911.json +++ b/CVE-2024/CVE-2024-329xx/CVE-2024-32911.json @@ -2,8 +2,8 @@ "id": "CVE-2024-32911", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-06-13T21:15:55.173", - "lastModified": "2024-07-16T14:57:13.803", - "vulnStatus": "Analyzed", + "lastModified": "2024-09-06T23:35:02.557", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-327" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-339xx/CVE-2024-33903.json b/CVE-2024/CVE-2024-339xx/CVE-2024-33903.json index a0b984b54fe..d2c7d90819b 100644 --- a/CVE-2024/CVE-2024-339xx/CVE-2024-33903.json +++ b/CVE-2024/CVE-2024-339xx/CVE-2024-33903.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33903", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T01:15:09.600", - "lastModified": "2024-04-29T12:42:03.667", + "lastModified": "2024-09-06T23:35:03.347", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En CARLA hasta 0.9.15.2, el sensor de colisi\u00f3n maneja mal algunas situaciones que involucran a peatones o bicicletas, en parte porque la funci\u00f3n del sensor de colisi\u00f3n no est\u00e1 expuesta a la librer\u00eda Blueprint." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], "references": [ { "url": "https://github.com/carla-simulator/carla/blob/60bd026b4822b4edb8a68cc17b9119866f303853/Docs/core_concepts.md", diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json index 2156a4a9c61..681c154179d 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35133.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35133", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-08-29T17:15:07.250", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:55:33.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@us.ibm.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + }, + { + "source": "psirt@us.ibm.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", @@ -51,14 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndIncluding": "10.0.8", + "matchCriteriaId": "64518F40-55CF-4DC8-A15E-AAACCC38BAD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.0.0", + "versionEndIncluding": "10.0.8", + "matchCriteriaId": "7CE089A7-24AA-4AC4-A630-D787E4BD4F0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/291026", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7166712", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3865.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3865.json index ba19f2e9fe9..25f4dab1db0 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3865.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3865.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3865", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.957", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-09-06T22:35:02.500", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Errores de seguridad de la memoria presentes en Firefox 124. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de la memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 125." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1881076%2C1884887%2C1885359%2C1889049", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41964.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41964.json index 98d70fa0f0f..6c108315271 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41964.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41964.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41964", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-29T17:15:07.980", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:56:18.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.6.6.6", + "matchCriteriaId": "FB5113F1-0EAB-408F-9574-7A9545905C52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.7.0", + "versionEndExcluding": "3.7.5.5", + "matchCriteriaId": "8A9E85FE-0FC5-41C1-99EB-6CEE106864E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.8.0", + "versionEndExcluding": "3.8.4.4", + "matchCriteriaId": "DC6DA7E2-7EA2-4F0B-BECD-0481489E1A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.9.0", + "versionEndExcluding": "3.9.8.2", + "matchCriteriaId": "815FC984-F946-463C-8CDC-2923BF51D85D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.10.0", + "versionEndExcluding": "3.10.1.1", + "matchCriteriaId": "A359C0A7-92E0-428B-A3D1-32B43929EC6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.3.1", + "matchCriteriaId": "45D93D8F-70F6-4E50-A7A7-511593473868" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/getkirby/kirby/commit/ab95d172667c3cd529917c2bc94d3c7969706d23", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-jm9m-rqr3-wfmh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43700.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43700.json index 936e4ca9a13..69e02feb9f1 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43700.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43700.json @@ -2,17 +2,41 @@ "id": "CVE-2024-43700", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-08-29T11:15:26.757", - "lastModified": "2024-08-29T20:36:51.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:52:41.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "xfpt versions prior to 1.01 fails to handle appropriately some parameters inside the input data, resulting in a stack-based buffer overflow vulnerability. When a user of the affected product is tricked to process a specially crafted file, arbitrary code may be executed on the user's environment." + }, + { + "lang": "es", + "value": "Las versiones de xfpt anteriores a la 1.01 no pueden manejar adecuadamente algunos par\u00e1metros dentro de los datos de entrada, lo que genera una vulnerabilidad de desbordamiento de b\u00fafer en la pila. Cuando se enga\u00f1a a un usuario del producto afectado para que procese un archivo especialmente manipulado, se puede ejecutar c\u00f3digo arbitrario en el entorno del usuario." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:philiphazel:xfpt:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.01", + "matchCriteriaId": "9F8826E7-454A-427E-8472-3A45AAD6B730" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/PhilipHazel/xfpt", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Product" + ] }, { "url": "https://github.com/PhilipHazel/xfpt/commit/a690304bbd3fd19e9dfdad50dcc87ad829f744e4", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Patch" + ] }, { "url": "https://jvn.jp/en/vu/JVNVU96498690/", - "source": "vultures@jpcert.or.jp" + "source": "vultures@jpcert.or.jp", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-438xx/CVE-2024-43804.json b/CVE-2024/CVE-2024-438xx/CVE-2024-43804.json index 141db00b20e..985442cd47f 100644 --- a/CVE-2024/CVE-2024-438xx/CVE-2024-43804.json +++ b/CVE-2024/CVE-2024-438xx/CVE-2024-43804.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43804", "sourceIdentifier": "security-advisories@github.com", "published": "2024-08-29T17:15:08.193", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:57:01.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:roxy-wi:roxy-wi:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E92EACAF-6384-4331-8F22-5CF3B2EB4B5E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-qc52-vwwj-5585", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44796.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44796.json index 676fc08671b..940d72b0439 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44796.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44796.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44796", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:08.200", - "lastModified": "2024-08-27T13:02:05.683", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T23:35:04.340", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -15,19 +15,111 @@ "value": "Una vulnerabilidad de cross-site scripting (XSS) en el componente /auth/AzureRedirect.php de el commit de PicUploader fcf82ea permite a los atacantes ejecutar scripts web o HTML arbitrarios a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro error_description." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xiebruce:picuploader:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-02-13", + "matchCriteriaId": "C6938C89-B864-4B8D-A87B-5EF1F9912A0F" + } + ] + } + ] + } + ], "references": [ { "url": "http://picuploader.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/xiebruce/PicUploader", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/xiebruce/PicUploader/issues/90", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44797.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44797.json index de43fbaedc2..0710fdb48aa 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44797.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44797.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44797", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-26T20:15:08.257", - "lastModified": "2024-08-27T15:35:18.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:27:16.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gazelle_project:gazelle:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2016-11-08", + "matchCriteriaId": "032237DC-F7F0-436E-8AE6-00709E76A3A4" + } + ] + } + ] + } + ], "references": [ { "url": "http://gazelle.com", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Not Applicable" + ] }, { "url": "https://github.com/WhatCD/Gazelle", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] }, { "url": "https://github.com/WhatCD/Gazelle/issues/130", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44838.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44838.json new file mode 100644 index 00000000000..b038762156f --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44838.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44838", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-06T22:15:02.147", + "lastModified": "2024-09-06T22:15:02.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the username parameter at /resource/runlogin.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OpenRapid/rapidcms/issues/17", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-448xx/CVE-2024-44839.json b/CVE-2024/CVE-2024-448xx/CVE-2024-44839.json new file mode 100644 index 00000000000..bc0dbcd9ec8 --- /dev/null +++ b/CVE-2024/CVE-2024-448xx/CVE-2024-44839.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-44839", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-06T22:15:02.210", + "lastModified": "2024-09-06T22:15:02.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the articleid parameter at /default/article.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OpenRapid/rapidcms/issues/18", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-449xx/CVE-2024-44919.json b/CVE-2024/CVE-2024-449xx/CVE-2024-44919.json index c1ef7ba5d18..1959bc056f7 100644 --- a/CVE-2024/CVE-2024-449xx/CVE-2024-44919.json +++ b/CVE-2024/CVE-2024-449xx/CVE-2024-44919.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44919", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-29T17:15:08.670", - "lastModified": "2024-08-30T16:15:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:54:56.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seacms:seacms:12.9:*:*:*:*:*:*:*", + "matchCriteriaId": "5A52C0BF-703A-4BF0-A5A9-E3995C30FE0D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nn0nkey/nn0nkey/blob/main/CVE-2024-44919.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/nn0nkey/nn0nkey/blob/main/second.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json index 8d4dcac3217..27b4ad5d1aa 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45321", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-27T04:15:09.010", - "lastModified": "2024-09-06T14:35:13.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T22:30:19.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:app\\:\\:cpanminus_project:app\\:\\:cpanminus:*:*:*:*:*:perl:*:*", + "versionEndIncluding": "1.7047", + "matchCriteriaId": "E7633BA7-2A2E-45A8-9A0F-69E1E35D0D2A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/miyagawa/cpanminus/issues/611", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/miyagawa/cpanminus/pull/674", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking", + "Patch" + ] }, { "url": "https://security.metacpan.org/2024/08/26/cpanminus-downloads-code-using-insecure-http.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45771.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45771.json new file mode 100644 index 00000000000..7e74e9a9537 --- /dev/null +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45771.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-45771", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-09-06T22:15:02.267", + "lastModified": "2024-09-06T22:15:02.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RapidCMS v1.3.1 was discovered to contain a SQL injection vulnerability via the password parameter at /resource/runlogin.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/OpenRapid/rapidcms/issues/17", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4883.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4883.json index 869ab91585f..9be4cf7f53a 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4883.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4883.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4883", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:12.320", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:46:17.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -59,14 +89,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4884.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4884.json index a1b04f7e719..76a6378aeba 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4884.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4884.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4884", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:12.547", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:45:59.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -59,14 +89,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json index 02a4e9168d4..ea501cdb51d 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4885.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4885", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:12.970", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:44:27.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5008.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5008.json index 675d3e585c1..8d4572d5863 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5008.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5008", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:13.173", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:43:49.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5009.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5009.json index 24111dfbbec..d6aa527ca8c 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5009.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5009", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:13.427", - "lastModified": "2024-06-26T12:44:29.693", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:43:04.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5010.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5010.json index 06677c8248d..9bc7b7e1988 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5010.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5010", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:13.617", - "lastModified": "2024-06-26T14:15:11.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:42:39.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1933", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5011.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5011.json index baa9d0a3e94..377e443cc13 100644 --- a/CVE-2024/CVE-2024-50xx/CVE-2024-5011.json +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5011", "sourceIdentifier": "security@progress.com", "published": "2024-06-25T20:15:13.810", - "lastModified": "2024-06-26T14:15:11.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:41:46.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security@progress.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + }, { "source": "security@progress.com", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "C22487E3-6723-40C7-86A0-764EBAA37A55" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-June-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1934", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5991.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5991.json index a573720d53c..95ca2ab97c5 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5991.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5991", "sourceIdentifier": "facts@wolfssl.com", "published": "2024-08-27T19:15:18.080", - "lastModified": "2024-08-28T12:57:39.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:51:41.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "facts@wolfssl.com", "type": "Secondary", @@ -73,10 +105,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wolfssl:wolfssl:*:*:*:*:*:*:*:*", + "versionEndIncluding": "5.7.0", + "matchCriteriaId": "68EDAD3E-B3D4-44BA-8F48-44DF39F1842C" + } + ] + } + ] + } + ], "references": [ + { + "url": "https://github.com/wolfSSL/wolfssl/pull/7604", + "source": "nvd@nist.gov", + "tags": [ + "Issue Tracking", + "Patch" + ] + }, { "url": "https://https://github.com/wolfSSL/wolfssl/pull/7604", - "source": "facts@wolfssl.com" + "source": "facts@wolfssl.com", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-67xx/CVE-2024-6789.json b/CVE-2024/CVE-2024-67xx/CVE-2024-6789.json index df860e99d16..7a341864651 100644 --- a/CVE-2024/CVE-2024-67xx/CVE-2024-6789.json +++ b/CVE-2024/CVE-2024-67xx/CVE-2024-6789.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6789", "sourceIdentifier": "security@m-files.com", "published": "2024-08-27T10:15:05.460", - "lastModified": "2024-08-27T13:01:37.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:31:04.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "security@m-files.com", "type": "Secondary", @@ -73,10 +105,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:m-files:m-files_server:*:*:*:*:lts:*:*:*", + "versionEndExcluding": "24.2.13421.15", + "matchCriteriaId": "CE8AAF74-E9A5-4E11-BE98-651E76D8F29C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:m-files:m-files_server:*:*:*:*:-:*:*:*", + "versionEndExcluding": "24.8.13981.0", + "matchCriteriaId": "E75C928B-8D24-4B22-A20D-41C2ACD44795" + } + ] + } + ] + } + ], "references": [ { "url": "https://product.m-files.com/security-advisories/cve-2024-6789/", - "source": "security@m-files.com" + "source": "security@m-files.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7593.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7593.json index cbfa1a87e31..442d2377d4b 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7593.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7593.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7593", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2024-08-13T19:15:16.940", - "lastModified": "2024-08-14T02:07:05.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:13:21.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + }, { "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "type": "Secondary", @@ -55,10 +85,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D5652006-FA06-419F-90DB-B23195E1383C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "63BF5D63-D156-4BEB-9F7B-35AF9DEABDAD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "8F23C040-4451-4CBF-B9A8-741C404121D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.5:r1:*:*:*:*:*:*", + "matchCriteriaId": "0A4F948D-F3AE-451A-A68A-013900133B83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.6:r1:*:*:*:*:*:*", + "matchCriteriaId": "32931B52-335D-4887-9B2B-4DE42589496D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:virtual_traffic_management:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "4F1CCCDD-05F4-430A-979B-B050E75FE3B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Virtual-Traffic-Manager-vTM-CVE-2024-7593", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Mitigation", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json b/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json index 5d354070f00..a357e25d409 100644 --- a/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json +++ b/CVE-2024/CVE-2024-77xx/CVE-2024-7720.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7720", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2024-08-27T18:15:15.840", - "lastModified": "2024-08-28T14:35:14.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-09-06T22:33:30.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hp:security_manager:3.11:*:*:*:*:*:*:*", + "matchCriteriaId": "2A3433EC-7F52-43BA-9BBC-4141EBF57495" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/", - "source": "hp-security-alert@hp.com" + "source": "hp-security-alert@hp.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8163.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8163.json index 90aa6ddafdd..b69c52cc920 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8163.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8163.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8163", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-26T13:15:06.670", - "lastModified": "2024-08-26T15:15:23.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:18:19.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this vulnerability is the function destroyFiles of the file /admin/file_manager/files. The manipulation of the argument files leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como cr\u00edtica. La funci\u00f3n destroyFiles del archivo /admin/file_manager/files es afectada por esta vulnerabilidad. La manipulaci\u00f3n de los archivos de argumentos conduce a un path traversal. El ataque se puede lanzar de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.5.5", + "matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275761", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275761", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.393374", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8164.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8164.json index 567cfe5022a..45bf0a8d060 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8164.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8164.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8164", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-26T14:15:08.063", - "lastModified": "2024-08-26T15:15:23.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:19:53.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, has been found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. Affected by this issue is the function rename of the file /Admin/Http/Controllers/FileManagerController.php. The manipulation of the argument new_name leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como cr\u00edtica. La funci\u00f3n rename del archivo /Admin/Http/Controllers/FileManagerController.php es afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento nuevo_nombre conduce a una carga sin restricciones. El ataque puede lanzarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.5.5", + "matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/zzz/blob/main/CVE4-2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.275762", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275762", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.393375", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-81xx/CVE-2024-8165.json b/CVE-2024/CVE-2024-81xx/CVE-2024-8165.json index ff898117409..8056b5653d7 100644 --- a/CVE-2024/CVE-2024-81xx/CVE-2024-8165.json +++ b/CVE-2024/CVE-2024-81xx/CVE-2024-8165.json @@ -2,13 +2,17 @@ "id": "CVE-2024-8165", "sourceIdentifier": "cna@vuldb.com", "published": "2024-08-26T14:15:08.337", - "lastModified": "2024-08-26T15:15:23.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:20:41.553", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, was found in Chengdu Everbrite Network Technology BeikeShop up to 1.5.5. This affects the function exportZip of the file /admin/file_manager/export. The manipulation of the argument path leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Una vulnerabilidad fue encontrada en Chengdu Everbrite Network Technology BeikeShop hasta 1.5.5 y clasificada como problem\u00e1tica. Esto afecta a la funci\u00f3n exportZip del archivo /admin/file_manager/export. La manipulaci\u00f3n del camino del argumento conduce al path traversal. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse. NOTA: Se contact\u00f3 primeramente con el proveedor sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:beikeshop:beikeshop:*:*:*:*:*:*:*:*", + "versionEndIncluding": "1.5.5", + "matchCriteriaId": "E3C84BC9-CE90-429D-BA39-B61A6E9BC17C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/DeepMountains/Mirage/blob/main/CVE18-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.275763", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.275763", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.393376", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8255.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8255.json index 2f492189b92..219cb2d4295 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8255.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8255", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-08-29T16:15:10.140", - "lastModified": "2024-08-30T13:00:05.390", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-09-06T22:53:34.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:dtn_soft:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.0.1", + "matchCriteriaId": "D098FC76-914E-4871-AD27-E67CA85CC7F8" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-242-02", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8439.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8439.json new file mode 100644 index 00000000000..dab7f660495 --- /dev/null +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8439.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-8439", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-09-06T22:15:02.320", + "lastModified": "2024-09-06T22:15:02.320", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that the issue does not pose a security risk as it falls within the expected functionality and security controls of the application." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/README.md b/README.md index bb146f7cf77..732362e612f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-09-06T22:00:17.582193+00:00 +2024-09-06T23:55:17.220319+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-09-06T21:59:00.830000+00:00 +2024-09-06T23:35:04.340000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -262108 +262112 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `4` -- [CVE-2024-34155](CVE-2024/CVE-2024-341xx/CVE-2024-34155.json) (`2024-09-06T21:15:11.947`) -- [CVE-2024-34156](CVE-2024/CVE-2024-341xx/CVE-2024-34156.json) (`2024-09-06T21:15:12.020`) -- [CVE-2024-34158](CVE-2024/CVE-2024-341xx/CVE-2024-34158.json) (`2024-09-06T21:15:12.083`) -- [CVE-2024-44844](CVE-2024/CVE-2024-448xx/CVE-2024-44844.json) (`2024-09-06T21:15:12.160`) -- [CVE-2024-44845](CVE-2024/CVE-2024-448xx/CVE-2024-44845.json) (`2024-09-06T21:15:12.217`) +- [CVE-2024-44838](CVE-2024/CVE-2024-448xx/CVE-2024-44838.json) (`2024-09-06T22:15:02.147`) +- [CVE-2024-44839](CVE-2024/CVE-2024-448xx/CVE-2024-44839.json) (`2024-09-06T22:15:02.210`) +- [CVE-2024-45771](CVE-2024/CVE-2024-457xx/CVE-2024-45771.json) (`2024-09-06T22:15:02.267`) +- [CVE-2024-8439](CVE-2024/CVE-2024-84xx/CVE-2024-8439.json) (`2024-09-06T22:15:02.320`) ### CVEs modified in the last Commit -Recently modified CVEs: `61` +Recently modified CVEs: `31` -- [CVE-2024-37898](CVE-2024/CVE-2024-378xx/CVE-2024-37898.json) (`2024-09-06T21:16:55.600`) -- [CVE-2024-37900](CVE-2024/CVE-2024-379xx/CVE-2024-37900.json) (`2024-09-06T21:06:34.223`) -- [CVE-2024-37901](CVE-2024/CVE-2024-379xx/CVE-2024-37901.json) (`2024-09-06T20:54:20.857`) -- [CVE-2024-38429](CVE-2024/CVE-2024-384xx/CVE-2024-38429.json) (`2024-09-06T21:38:04.370`) -- [CVE-2024-38430](CVE-2024/CVE-2024-384xx/CVE-2024-38430.json) (`2024-09-06T21:39:15.287`) -- [CVE-2024-38431](CVE-2024/CVE-2024-384xx/CVE-2024-38431.json) (`2024-09-06T21:41:43.017`) -- [CVE-2024-38432](CVE-2024/CVE-2024-384xx/CVE-2024-38432.json) (`2024-09-06T21:43:36.463`) -- [CVE-2024-39568](CVE-2024/CVE-2024-395xx/CVE-2024-39568.json) (`2024-09-06T21:26:14.400`) -- [CVE-2024-39569](CVE-2024/CVE-2024-395xx/CVE-2024-39569.json) (`2024-09-06T21:26:49.890`) -- [CVE-2024-39570](CVE-2024/CVE-2024-395xx/CVE-2024-39570.json) (`2024-09-06T21:20:26.347`) -- [CVE-2024-39571](CVE-2024/CVE-2024-395xx/CVE-2024-39571.json) (`2024-09-06T21:20:00.153`) -- [CVE-2024-41819](CVE-2024/CVE-2024-418xx/CVE-2024-41819.json) (`2024-09-06T21:34:29.067`) -- [CVE-2024-41947](CVE-2024/CVE-2024-419xx/CVE-2024-41947.json) (`2024-09-06T20:46:01.477`) -- [CVE-2024-42008](CVE-2024/CVE-2024-420xx/CVE-2024-42008.json) (`2024-09-06T21:48:31.597`) -- [CVE-2024-42009](CVE-2024/CVE-2024-420xx/CVE-2024-42009.json) (`2024-09-06T21:50:47.813`) -- [CVE-2024-44401](CVE-2024/CVE-2024-444xx/CVE-2024-44401.json) (`2024-09-06T21:35:13.733`) -- [CVE-2024-44402](CVE-2024/CVE-2024-444xx/CVE-2024-44402.json) (`2024-09-06T21:35:15.770`) -- [CVE-2024-44408](CVE-2024/CVE-2024-444xx/CVE-2024-44408.json) (`2024-09-06T21:35:17.720`) -- [CVE-2024-45057](CVE-2024/CVE-2024-450xx/CVE-2024-45057.json) (`2024-09-06T20:15:04.443`) -- [CVE-2024-45058](CVE-2024/CVE-2024-450xx/CVE-2024-45058.json) (`2024-09-06T20:15:04.547`) -- [CVE-2024-45059](CVE-2024/CVE-2024-450xx/CVE-2024-45059.json) (`2024-09-06T20:15:04.637`) -- [CVE-2024-5138](CVE-2024/CVE-2024-51xx/CVE-2024-5138.json) (`2024-09-06T20:35:18.950`) -- [CVE-2024-7569](CVE-2024/CVE-2024-75xx/CVE-2024-7569.json) (`2024-09-06T21:57:23.037`) -- [CVE-2024-7570](CVE-2024/CVE-2024-75xx/CVE-2024-7570.json) (`2024-09-06T21:59:00.830`) -- [CVE-2024-7652](CVE-2024/CVE-2024-76xx/CVE-2024-7652.json) (`2024-09-06T21:35:19.660`) +- [CVE-2024-33903](CVE-2024/CVE-2024-339xx/CVE-2024-33903.json) (`2024-09-06T23:35:03.347`) +- [CVE-2024-35133](CVE-2024/CVE-2024-351xx/CVE-2024-35133.json) (`2024-09-06T22:55:33.543`) +- [CVE-2024-3865](CVE-2024/CVE-2024-38xx/CVE-2024-3865.json) (`2024-09-06T22:35:02.500`) +- [CVE-2024-41964](CVE-2024/CVE-2024-419xx/CVE-2024-41964.json) (`2024-09-06T22:56:18.010`) +- [CVE-2024-43700](CVE-2024/CVE-2024-437xx/CVE-2024-43700.json) (`2024-09-06T22:52:41.727`) +- [CVE-2024-43804](CVE-2024/CVE-2024-438xx/CVE-2024-43804.json) (`2024-09-06T22:57:01.697`) +- [CVE-2024-44796](CVE-2024/CVE-2024-447xx/CVE-2024-44796.json) (`2024-09-06T23:35:04.340`) +- [CVE-2024-44797](CVE-2024/CVE-2024-447xx/CVE-2024-44797.json) (`2024-09-06T22:27:16.177`) +- [CVE-2024-44919](CVE-2024/CVE-2024-449xx/CVE-2024-44919.json) (`2024-09-06T22:54:56.927`) +- [CVE-2024-45321](CVE-2024/CVE-2024-453xx/CVE-2024-45321.json) (`2024-09-06T22:30:19.337`) +- [CVE-2024-4883](CVE-2024/CVE-2024-48xx/CVE-2024-4883.json) (`2024-09-06T22:46:17.103`) +- [CVE-2024-4884](CVE-2024/CVE-2024-48xx/CVE-2024-4884.json) (`2024-09-06T22:45:59.233`) +- [CVE-2024-4885](CVE-2024/CVE-2024-48xx/CVE-2024-4885.json) (`2024-09-06T22:44:27.840`) +- [CVE-2024-5008](CVE-2024/CVE-2024-50xx/CVE-2024-5008.json) (`2024-09-06T22:43:49.557`) +- [CVE-2024-5009](CVE-2024/CVE-2024-50xx/CVE-2024-5009.json) (`2024-09-06T22:43:04.747`) +- [CVE-2024-5010](CVE-2024/CVE-2024-50xx/CVE-2024-5010.json) (`2024-09-06T22:42:39.017`) +- [CVE-2024-5011](CVE-2024/CVE-2024-50xx/CVE-2024-5011.json) (`2024-09-06T22:41:46.253`) +- [CVE-2024-5991](CVE-2024/CVE-2024-59xx/CVE-2024-5991.json) (`2024-09-06T22:51:41.470`) +- [CVE-2024-6789](CVE-2024/CVE-2024-67xx/CVE-2024-6789.json) (`2024-09-06T22:31:04.833`) +- [CVE-2024-7593](CVE-2024/CVE-2024-75xx/CVE-2024-7593.json) (`2024-09-06T22:13:21.197`) +- [CVE-2024-7720](CVE-2024/CVE-2024-77xx/CVE-2024-7720.json) (`2024-09-06T22:33:30.767`) +- [CVE-2024-8163](CVE-2024/CVE-2024-81xx/CVE-2024-8163.json) (`2024-09-06T22:18:19.283`) +- [CVE-2024-8164](CVE-2024/CVE-2024-81xx/CVE-2024-8164.json) (`2024-09-06T22:19:53.907`) +- [CVE-2024-8165](CVE-2024/CVE-2024-81xx/CVE-2024-8165.json) (`2024-09-06T22:20:41.553`) +- [CVE-2024-8255](CVE-2024/CVE-2024-82xx/CVE-2024-8255.json) (`2024-09-06T22:53:34.187`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5782b96a388..127fb701358 100644 --- a/_state.csv +++ b/_state.csv @@ -93922,7 +93922,7 @@ CVE-2017-1000249,0,0,3140698e470efa540827b2fcefa473861882638ae3d9d2c44ca64cf092a CVE-2017-1000250,0,0,21cccbdb024260a84237111cb83289e4c7e8c636b7b840bf370bab1c371ee906,2018-02-17T02:29:02.283000 CVE-2017-1000251,0,0,e83929b0cc760c5c9618969d4ee424f2ddfc5bd92a9caca156ec7f5d6fbb8de6,2023-01-19T15:53:39.780000 CVE-2017-1000252,0,0,9eea6472d04eeaf32df8b8fd22d143af69543d35d1254252d432260f2ebb8018,2019-10-03T00:03:26.223000 -CVE-2017-1000253,0,1,da1948e215774ef80914a0fafba29848ebdc16a771bd399481a88c671b7c5d60,2024-09-06T20:35:00.883000 +CVE-2017-1000253,0,0,da1948e215774ef80914a0fafba29848ebdc16a771bd399481a88c671b7c5d60,2024-09-06T20:35:00.883000 CVE-2017-1000254,0,0,2c437201d4072ed57e29421c399393b6fc19b110c7cd6c9df970aa004560ef63,2023-11-07T02:37:56.077000 CVE-2017-1000255,0,0,64c86fde651745d2a520f25af2dd721f03cb9d4867f5aedc3c0057d889738a48,2018-04-11T01:29:00.540000 CVE-2017-1000256,0,0,1ba938b667acbbdb5a5a82ad18f7e44094d40463d59112d0f41ca2b5aa05b499,2023-11-07T02:37:56.177000 @@ -181710,7 +181710,7 @@ CVE-2021-39807,0,0,62ccf7edd8dc9caf624d578e63be70c237f0b3c84eb56d1f3452785739662 CVE-2021-39808,0,0,6552244cfbacfabe118545b3b68ffc69cdaa6de85cab59066cf773dfb9d9ea67,2022-07-12T17:42:04.277000 CVE-2021-39809,0,0,43281f2921fea01353739d0535437439d176201a8f946531369994f6ee661147,2022-04-20T15:01:56.223000 CVE-2021-3981,0,0,36d9a95398596799dc6304ee5061e93b29dbfcf63034bda831574908a1d5af51,2024-01-16T01:15:34.110000 -CVE-2021-39810,0,1,98b7425db0b6c22241a2482c95a6c202d7e527d598b20d9e3eed1f9bb9c30b70,2024-09-06T21:35:00.760000 +CVE-2021-39810,0,0,98b7425db0b6c22241a2482c95a6c202d7e527d598b20d9e3eed1f9bb9c30b70,2024-09-06T21:35:00.760000 CVE-2021-39812,0,0,a8c6b6992203023cbbb031e0a6d712046b550b001a0c24137ec5c45dc58d28f2,2022-04-20T14:56:48.470000 CVE-2021-39814,0,0,24197212b38ccf6945c124fc47a9c545d376fb1514a80a146c80e1765ccc4917,2022-04-20T15:12:01.263000 CVE-2021-39815,0,0,2590baf73ac20d5dd9ea8519c94ffc40753b833417e22f46e4d6fe53264c2d08,2022-08-29T01:03:24.013000 @@ -210199,7 +210199,7 @@ CVE-2022-45724,0,0,a56acbec26c12264b64394fe5ff676fdb1ede46f6330e3ed427ce8a775b03 CVE-2022-45725,0,0,7d19bf373e5f37884d5838049c5244ece7b33402c2dde8efee79801c39e51747,2023-08-08T14:21:49.707000 CVE-2022-45728,0,0,232c0f6c81afdd6419bc760d2cff9446824707eddce45f26dc4ab06a7d2086a9,2023-11-14T20:28:42.417000 CVE-2022-45729,0,0,7a4f183504886c3fae369b096edd9121121fb7a91cd48a17ea06746536032ed2,2023-11-14T20:28:42.417000 -CVE-2022-4573,0,1,cfbce652698239b68cd5fe182f30b9c511ec35e276576ae09b9021d4fe49f003,2024-09-06T21:35:01.913000 +CVE-2022-4573,0,0,cfbce652698239b68cd5fe182f30b9c511ec35e276576ae09b9021d4fe49f003,2024-09-06T21:35:01.913000 CVE-2022-45730,0,0,8fcd028cc7daa4573e32d7069b9029ec2a4bc3d503ea3ef7002d074dfb0d949d,2023-11-14T20:28:42.417000 CVE-2022-4574,0,0,99ebe8cbe281a8699b19c2a6ad0c35ccacdec0cb0796b1f58967307d7342b6c8,2023-11-08T00:24:33.087000 CVE-2022-45748,0,0,17934955b2a8e030ad347f76eb1a3ab533d6cf7f18388292068553d79a6577e9,2023-01-28T03:38:19.033000 @@ -215539,7 +215539,7 @@ CVE-2023-21294,0,0,ea0c41050220ecdbee05caac36ee7c5e3f1205dc47b2cd8ced9b5f5736c33 CVE-2023-21295,0,0,bbbaac0f428f9007dd95a9d7f835154513a18e5f6b1c73f8d63d73088b0032c9,2023-11-07T00:45:33.037000 CVE-2023-21296,0,0,6a66e33a6f06eae6279202129d38e6e1cfbc6f7bfb3d569e81468b2c49d3d321,2023-11-06T17:29:14.137000 CVE-2023-21297,0,0,2f94743ac68abeafa4648e486337856f981434cffdb6c03ef499bfa7fe09d7e0,2023-11-06T17:36:33.883000 -CVE-2023-21298,0,1,718baa41571aebbb7b14fdaf458aa93bf02bcf1453fbdb57b03a4e590188e682,2024-09-06T21:35:03.240000 +CVE-2023-21298,0,0,718baa41571aebbb7b14fdaf458aa93bf02bcf1453fbdb57b03a4e590188e682,2024-09-06T21:35:03.240000 CVE-2023-21299,0,0,0d74a4cef1230479428525e07442bae2d424015921d2845d41022d6e154d24ce,2023-11-06T17:45:22.607000 CVE-2023-2130,0,0,49235d8db8cac3bb3cf8bd76e90ec4bef70a1ec47f724ede82c3f69aca9fb1bf,2024-05-17T02:22:41.240000 CVE-2023-21300,0,0,27b0bd25448b1107e304a4af276ce9e24c341140ec54c25cc9d82b9281eca70d,2023-11-06T17:45:39.737000 @@ -215567,7 +215567,7 @@ CVE-2023-2132,0,0,63d2413c9f97227792af21b2461b99b4deee7861989a9f9808c25ea23f4d2e CVE-2023-21320,0,0,bf5c27a898752221d2d16e07d30c8abb763d6f13f92b26c620916650d964815f,2023-11-06T17:57:55.523000 CVE-2023-21321,0,0,b8f716c502ea85352702b7a43c185f78a5bc6a5ea81a610fc1d92193697e623f,2023-11-06T17:58:03.540000 CVE-2023-21323,0,0,58f5817ca18173e3ddbf2e2ef2721d47264154dcc4681a9a7b828ff1d0b7df4a,2023-11-06T17:58:14.793000 -CVE-2023-21324,0,1,0cbf889a70484b73e615c989f44bfdbffdab03f74b65bb057393b5dd088c6ddb,2024-09-06T21:35:06.720000 +CVE-2023-21324,0,0,0cbf889a70484b73e615c989f44bfdbffdab03f74b65bb057393b5dd088c6ddb,2024-09-06T21:35:06.720000 CVE-2023-21325,0,0,2850018837c69988dcb2e8c6470fc88f7e0a38abfb0e896a7ab3270c619a0d23,2023-11-06T17:58:39.620000 CVE-2023-21326,0,0,e1f704547b8f50cf3e1f2abb0d4712b58178cdc74d57543f75565f7e4d61ad59,2023-11-06T17:58:57.733000 CVE-2023-21327,0,0,098143c627d33cef9785e28ec02a457bd1764a72f9fc19e2d0a8077fc74f4a10,2023-11-06T14:47:48.253000 @@ -215581,14 +215581,14 @@ CVE-2023-21333,0,0,2bd340646917ee8db81d1bc53d5dacab1c6d3d813843378b576c024f4e8cd CVE-2023-21334,0,0,2cc37bab2271647904cb54a26d33818b191a3d06b78cf0922aa6fded48d1f987,2023-11-07T00:47:46.253000 CVE-2023-21335,0,0,6b060136a8d4a1fee04e45ed9223ac2c6708a69864a5acc47a736978514aff62,2023-11-07T00:47:27.993000 CVE-2023-21336,0,0,eaf33d454d2c59c75139c93882d35fc70353c0db9db44565bbaf0a0c90e671d0,2023-11-07T00:49:26.617000 -CVE-2023-21337,0,1,01e35811c40a074d28fda226e12f20e78d13dec463a0fe08c95cbc3cca4d54cd,2024-09-06T21:35:08.387000 +CVE-2023-21337,0,0,01e35811c40a074d28fda226e12f20e78d13dec463a0fe08c95cbc3cca4d54cd,2024-09-06T21:35:08.387000 CVE-2023-21338,0,0,d384ab97d80ddbf1863be82befd5791882b5f4c4cb9a7f682bf1606e3b227266,2023-11-07T00:45:00.197000 -CVE-2023-21339,0,1,1c44beceb91e47365aba3d7ea7677347711a15b45b2e1dac9fb3d80baa451fae,2024-09-06T20:35:03.200000 +CVE-2023-21339,0,0,1c44beceb91e47365aba3d7ea7677347711a15b45b2e1dac9fb3d80baa451fae,2024-09-06T20:35:03.200000 CVE-2023-2134,0,0,f95c0539485b1029697642f141b2454db420355fbc02afabf37920a9e2632a00,2023-10-20T20:52:47.177000 CVE-2023-21340,0,0,fa3723c0de9d38e33a3c0b88fcba4d992c6bcc380ec3b5bc2a208a8f051a56b0,2023-11-07T00:43:23.113000 -CVE-2023-21341,0,1,415218b88af663eae42f3dac04320f26520144012c5c630963f8109ce2ca2b17,2024-09-06T20:35:04.047000 -CVE-2023-21342,0,1,259d320ebc6127c0f9f077addcaf10a8bbabb7d10b865c76456eace3d9761e7f,2024-09-06T20:35:04.803000 -CVE-2023-21343,0,1,13741f341d1d55dbf27e9d2e0b06b69b24148b378c3bc2085421fdd842e89ede,2024-09-06T20:35:04.997000 +CVE-2023-21341,0,0,415218b88af663eae42f3dac04320f26520144012c5c630963f8109ce2ca2b17,2024-09-06T20:35:04.047000 +CVE-2023-21342,0,0,259d320ebc6127c0f9f077addcaf10a8bbabb7d10b865c76456eace3d9761e7f,2024-09-06T20:35:04.803000 +CVE-2023-21343,0,0,13741f341d1d55dbf27e9d2e0b06b69b24148b378c3bc2085421fdd842e89ede,2024-09-06T20:35:04.997000 CVE-2023-21344,0,0,ae51061e7d5645c5b031bbea62d5f7626337dc20eb02a252711830635f230b87,2023-11-07T00:48:46.480000 CVE-2023-21345,0,0,bab68c716db33ae153b7eb2d386a1148f26b18d98fefbc595add6ef7e8627123,2023-11-03T17:42:55.850000 CVE-2023-21346,0,0,bcf1122126b368329b090e48ca2a189a8ecb47c37497af9cf9d246505a426f9a,2023-11-03T19:00:13.137000 @@ -215621,7 +215621,7 @@ CVE-2023-21370,0,0,1ea830b517da6b3468465f72f71e3f55c4b359489447cb706691f4e78846b CVE-2023-21371,0,0,a50c87f04b064b1ccfea6d98517fb1cb2a06b280de61319201f0da671fec7686,2023-11-02T20:38:18.707000 CVE-2023-21372,0,0,b61b4e995b6aa37e0af794ae07b3d2accbed06caa351af145000f3aec59b4f8e,2023-11-03T18:58:47.933000 CVE-2023-21373,0,0,020e4f0c50c15664024dd5b1dec72961e522f5bd221a1355a36e4cd491987d52,2023-11-04T03:22:52.047000 -CVE-2023-21374,0,1,8758b35a1bed546fdf23d6d929b49c3443c5b59bcca91512d34a2db049e9666e,2024-09-06T20:35:06.647000 +CVE-2023-21374,0,0,8758b35a1bed546fdf23d6d929b49c3443c5b59bcca91512d34a2db049e9666e,2024-09-06T20:35:06.647000 CVE-2023-21375,0,0,7a3fac506500bca24b016a29c0c3dd3c1420c5883471807aacb26ffa1e20b5b6,2023-11-03T19:02:57.213000 CVE-2023-21376,0,0,7725402cf736eb8f5dc7bd1d88c3035355c431f9c8db0fa0103f053ca3e4c709,2023-11-03T19:03:06.437000 CVE-2023-21377,0,0,e5fe5639f10e7519c5dcc3edfa374c24d92a1d7ebb461a3be9df3fa722e0ca98,2023-11-03T19:03:15.883000 @@ -218668,7 +218668,7 @@ CVE-2023-25043,0,0,80f871cbfee4f26fcdbd3bd11f18d19d5bb1f330e0eae2b05061f16904356 CVE-2023-25044,0,0,3838d1c27051c58e78ea9b745ca07ee80c87451a22a17801992dc973ebb054e3,2023-09-01T20:47:45.390000 CVE-2023-25045,0,0,0332882a5d673fd95f16007677ce5037d5202788000eeb4e1a21e51347e40919,2023-11-08T02:18:12.263000 CVE-2023-25046,0,0,6f1bf0a6e1e58854a145ce77355b6108a8401123830999ac21bce886e3de6766,2023-11-07T04:08:48.917000 -CVE-2023-25047,0,1,155b129990fc27f2e9ce424091e4b892e3c9440273a5503426b4135a7b38dc89,2024-09-06T20:35:07.623000 +CVE-2023-25047,0,0,155b129990fc27f2e9ce424091e4b892e3c9440273a5503426b4135a7b38dc89,2024-09-06T20:35:07.623000 CVE-2023-25049,0,0,99209e68ded4b17aee5a6af088e791275b9d6cc10832f8adc40dcbd238eed48a,2023-11-07T04:08:49 CVE-2023-2505,0,0,6efcf779f35194644d77f093cc0fa0dbddee637b5633c00604d8702797eb7312,2023-05-31T14:01:22.207000 CVE-2023-25050,0,0,daef4eb557ea0d6701f0b52307e0f8410263dad34fe5d6af987a12eda68bb363,2024-05-17T18:36:05.263000 @@ -219709,7 +219709,7 @@ CVE-2023-2631,0,0,4bd445bd2bec8da6a2695046ad2eabb2eb9ea9d2f819ee1d12353b574204d9 CVE-2023-26310,0,0,3bfe9588574a5466dd4da975adc93003243eae95ce6e16603dac925823abfd9a,2023-08-14T13:38:48.893000 CVE-2023-26311,0,0,a53302d4b1bc0fe51715261bd00ff42e22fc0ce6f61dd99c4e9bea1fdf7a9e70,2023-08-15T18:59:47.580000 CVE-2023-26314,0,0,6effb9b6980e0bc6f3ed2f4a9c1dd25114a29ad0ef15b8bc6dd364afeaa586ec,2023-03-02T20:03:30.170000 -CVE-2023-26315,0,0,fbd02cf24034f691d1cabd0fe46af320ab6c0d1abc32b9fbeda3b01ea3198c63,2024-08-26T12:47:20.187000 +CVE-2023-26315,0,1,7e3ab4d47f5232ab5703d804bcec5bfd7f9220cde67501bbc57773ca3ee6bedd,2024-09-06T22:25:54.637000 CVE-2023-26316,0,0,b25055cc7c5cea8ff22d07e70ae7c2d4333af8a0444497a6d65e59a6b9965ec0,2023-08-07T18:01:47.890000 CVE-2023-26317,0,0,4436e84cd6ff81a4e8afb76597369a2fd42bffc02b7acdc50dcdee19196a2376,2023-08-07T16:18:22.053000 CVE-2023-26318,0,0,d49830620df46f2dde3da449a5ab4d59351f38e41e437bccf559cb5c96c8a3d5,2023-10-16T19:00:41.267000 @@ -229599,7 +229599,7 @@ CVE-2023-39277,0,0,ba1a506de93531243b1a6840927d3d5ce9ac7cde2d3aa11edc7f0d5f21e31 CVE-2023-39278,0,0,51f0307dfb979d2053bc04773faeed7c8885e53af279fab9559ab2a2eec93b7c,2023-10-19T16:44:45.767000 CVE-2023-39279,0,0,fac9fdc9f09ef37ef90e8e828c858c7233aab9273c23f45c53d69d06ba06aeca,2023-10-19T16:44:41.193000 CVE-2023-39280,0,0,f66c01ff590a5a33540c5b722d4caadbcd584ceb11eb4eb0993b46f0de37246a,2023-10-19T16:44:36.887000 -CVE-2023-39281,0,1,1874434dc4ec2eaf4186681608efa6a16522c7873635fa24daa4a6f44da1496f,2024-09-06T20:35:07.887000 +CVE-2023-39281,0,0,1874434dc4ec2eaf4186681608efa6a16522c7873635fa24daa4a6f44da1496f,2024-09-06T20:35:07.887000 CVE-2023-39283,0,0,33a7ba02530f9e8db4ad9f607c0258167ffb4c1905d4e9170764e0a5bf1db2a2,2023-11-10T04:12:27.713000 CVE-2023-39284,0,0,dbfd936d99a876c85f63e2e96d78f73333cf4937bda6310a3f3095ec3afb155a,2023-11-15T20:32:55.707000 CVE-2023-39285,0,0,96545ecda21d95bf4f40d74afea6ae328a7b9d29d6eb613dd7475e1a1a0c840a,2023-09-19T18:00:45.343000 @@ -234729,7 +234729,7 @@ CVE-2023-46480,0,0,e61260dcb44a3f60a5f4e1ec1c5341f4b741c38331825c54396f7541beaf7 CVE-2023-46482,0,0,630ab76a1654184009f2c4141ee3045c1657f81f20ef48b367a71e569dd8a4ff,2023-11-09T00:56:40.200000 CVE-2023-46483,0,0,a6b08a99a462418e2e5e3dfea60dc526a39e77684187df959a66ed804fa72e51,2024-09-03T20:35:03.777000 CVE-2023-46484,0,0,1f8d63c7ddfe1eaa7ca1ffc9345766611214634a0c3a30ee307a44b4e8203940,2024-09-06T19:35:07.997000 -CVE-2023-46485,0,1,9801d9696802c8efc10f03c7b8cea0a738062f388bd2c085b548d2aa36166388,2024-09-06T20:35:09.900000 +CVE-2023-46485,0,0,9801d9696802c8efc10f03c7b8cea0a738062f388bd2c085b548d2aa36166388,2024-09-06T20:35:09.900000 CVE-2023-4649,0,0,5746162f6fcba997b2a90f73734098878aa9162b445b6437a5e3725ea805bb35,2023-09-01T14:37:08.443000 CVE-2023-46490,0,0,7572faf27c14631dc567fd10b90d8b8da5fa9678b69c09f03d211428cc7ea703,2023-11-13T14:30:41.820000 CVE-2023-46491,0,0,59e819e8800151e51f1f82f3c48345bc286d5502f13a3e02ae0077f28fc2c091,2023-11-03T20:23:49.313000 @@ -235094,10 +235094,10 @@ CVE-2023-46964,0,0,0d7def73494b6867df0b91db2d842e5c633f4a9bb171d96b528d1e1045602 CVE-2023-46967,0,0,8e0dc51372022fead7ea238ca0342fb708c07b5a138f4ce2e8f8fcb4db9359c9,2024-08-06T17:35:01.070000 CVE-2023-4697,0,0,5cd6e03e2cabe495720e6ef9b63c46f9baf3a0316a8b4b482e402bc10576e126,2023-09-01T13:07:07.767000 CVE-2023-46974,0,0,0b604dc4e986a27c2206d301607504c33793e4001240929900dcff4d61e041ee,2023-12-09T04:51:31.277000 -CVE-2023-46976,0,1,3b32e217954a43183a3da831b4e8da9b146568c9a89ac458ec88563772adf972,2024-09-06T20:35:10.803000 -CVE-2023-46977,0,1,43f7688072581fa12cf48597f3669a381013f7206f3ad1a6cb54258132aaa8ff,2024-09-06T20:35:11.550000 -CVE-2023-46978,0,1,a4fc554a62aeb85604d3256754afbbeb9a8b11fd08d3f484459b6520d26968c0,2024-09-06T20:35:12.317000 -CVE-2023-46979,0,1,6a36e4406edd653e24fafa4b26e51f2757f62ad2690f05fb13c8cf8e7a6bd8c7,2024-09-06T20:35:13.130000 +CVE-2023-46976,0,0,3b32e217954a43183a3da831b4e8da9b146568c9a89ac458ec88563772adf972,2024-09-06T20:35:10.803000 +CVE-2023-46977,0,0,43f7688072581fa12cf48597f3669a381013f7206f3ad1a6cb54258132aaa8ff,2024-09-06T20:35:11.550000 +CVE-2023-46978,0,0,a4fc554a62aeb85604d3256754afbbeb9a8b11fd08d3f484459b6520d26968c0,2024-09-06T20:35:12.317000 +CVE-2023-46979,0,0,6a36e4406edd653e24fafa4b26e51f2757f62ad2690f05fb13c8cf8e7a6bd8c7,2024-09-06T20:35:13.130000 CVE-2023-4698,0,0,f67219d933e95e412da2b616588dd9f7b8818435fbd1498ccb40e5f4049ed99a,2023-09-01T13:07:30.360000 CVE-2023-46980,0,0,cc67874b097e0fe762ff091e7672831ece4fc0faa50aca2caad3a6a3a1cb63e5,2024-09-06T14:35:08.953000 CVE-2023-46981,0,0,865ec0b7ef3df7198714d9479b263e54d44d5181af5d1cf0172c63bfd8768173,2023-11-13T19:37:07.107000 @@ -235105,8 +235105,8 @@ CVE-2023-46987,0,0,374b064ecd125c9b3c77e3133bffffe989aa2b01517a094fbc764346da32f CVE-2023-46989,0,0,fd52fc2c8815b71d6a3aa76a5b70a3b0954c93b4887d037a1f94f52ffb7b26c9,2024-01-04T17:14:27.397000 CVE-2023-4699,0,0,d7688971433e3a13914d674e0541b168882cd0e762c29ec4bad4b4f1236c3109,2023-11-14T19:10:18.253000 CVE-2023-46990,0,0,ce43f0fc3bb795f8d83320e9a48981a22398e3c8dcf2800cd3722d82e4112167,2023-11-28T21:59:25.917000 -CVE-2023-46992,0,1,d215b6f8d4c730393fd9a8c7825d0c451c3046c57aecea0ee0af590c2c4eca07,2024-09-06T20:35:14.107000 -CVE-2023-46993,0,1,345b57a0f6b34073fa8800603bdf10a7fd580e2443040efea05347af1d1b5306,2024-09-06T20:35:14.960000 +CVE-2023-46992,0,0,d215b6f8d4c730393fd9a8c7825d0c451c3046c57aecea0ee0af590c2c4eca07,2024-09-06T20:35:14.107000 +CVE-2023-46993,0,0,345b57a0f6b34073fa8800603bdf10a7fd580e2443040efea05347af1d1b5306,2024-09-06T20:35:14.960000 CVE-2023-46998,0,0,6e25fd61c866543a07d01980630aaacdfbd481c71dfffbe0cc0eec62842e2dce,2023-12-20T20:09:44.320000 CVE-2023-4700,0,0,54f537d8bd565ac9e7043f20cc4db7f0e44d4a83a7ddcc004638adf6277a6d5a,2023-11-14T20:00:25.203000 CVE-2023-47003,0,0,3bceaa921e377ee6166234257569cfbd597868e87e0fb9bbf1a2f34b3fce5f8b,2024-08-14T19:35:11.287000 @@ -238946,7 +238946,7 @@ CVE-2023-52531,0,0,139c545d33ba10eb3343fe2ebed8bb6f85f222cd821926b67d690a1cf30ff CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbfcfe,2024-03-04T13:58:23.447000 CVE-2023-52533,0,0,87288d9acffdcc3f04e0528abc716d93f9a78d72735b2ac13e2dfefa20c9889c,2024-08-26T18:35:02.780000 CVE-2023-52534,0,0,561b04782ad233f3a992132df8769a7ea9cca6fb96df63b18027307d5770e0c6,2024-04-08T18:48:40.217000 -CVE-2023-52535,0,0,fe6b3187a44c437c26ab3318b1139c9091f6bec389d5c218d94a801b45cfd652,2024-04-08T18:48:40.217000 +CVE-2023-52535,0,1,a8b46149ce833cf00e265bd878fbc4e9f6f9152b7344f1759d13bc7224de07eb,2024-09-06T22:35:00.460000 CVE-2023-52536,0,0,31a4fc764ec17dfd98dd3f2041aa9cf3362d0496d5ba27ab57e1ac620a9f85cd,2024-04-08T18:48:40.217000 CVE-2023-52537,0,0,2559d90b1b1794296f22fc0badef4074c5581bcf37f52502d595b11857600810,2024-08-01T14:35:02.953000 CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000 @@ -245331,7 +245331,7 @@ CVE-2024-23494,0,0,1761cecf4d1aa42fc2142275287576a82851a4af1416d215b879da20539b4 CVE-2024-23495,0,0,3343f5ee522cdf1bf3831719df667c337f0dd432d4bf69c58d9e4b3f2cc7f568,2024-08-31T03:38:43.080000 CVE-2024-23496,0,0,c3856130b65624b5767002912c0501b965e2549e4b94367c7a809441839aa00b,2024-02-26T18:15:07.580000 CVE-2024-23497,0,0,7141d52f3f16ac03f06f3ea37af329ea1f4b81b12e27f099e14cb8aa990ac67b,2024-08-14T17:49:14.177000 -CVE-2024-23499,0,1,351ed9c1ca3148c2c989549db13cddbea86ce2f99d15546ec7ae8fbdde1e39ca,2024-09-06T20:43:04.353000 +CVE-2024-23499,0,0,351ed9c1ca3148c2c989549db13cddbea86ce2f99d15546ec7ae8fbdde1e39ca,2024-09-06T20:43:04.353000 CVE-2024-2350,0,0,b224bf65ace6a631c4679b3350fe7c7082c8e455c9408f918ff58e10f6a6fd6a,2024-07-25T12:57:24.040000 CVE-2024-23500,0,0,9f0ca72522aa1768710bac3d52af84b3704000817095134026ac1a86c6c1c178,2024-03-28T12:42:56.150000 CVE-2024-23501,0,0,e5aebbfbd9d9417005e3d705da6a35d8860fa8db7dc1ef11a82d27e4462980c8,2024-02-29T13:49:29.390000 @@ -245692,9 +245692,9 @@ CVE-2024-23902,0,0,23fa1c3089afd507b048db06e4ea2ffdd19863f614f27f719de97ada3a6cc CVE-2024-23903,0,0,46f92003a51fde0f978d2b6023e8270332b2634481c35191ff5ffb1ffce33c63,2024-08-29T20:36:08.670000 CVE-2024-23904,0,0,a951ec872dbe283943db2cda1f329d6103f39dc8a3dbbab6b3bff9a6b9e2af38,2024-01-29T19:26:29.770000 CVE-2024-23905,0,0,a35e7dacddd2c1f3b32033e91045b0ad026e0a51c2fa232b2e0b46787dc2be1c,2024-01-29T19:26:11.517000 -CVE-2024-23907,0,1,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e80090fc,2024-09-06T20:38:29.490000 +CVE-2024-23907,0,0,0cc1665330e952366866888dfdc7237aa87fdcd95bb20538ca6e0b49e80090fc,2024-09-06T20:38:29.490000 CVE-2024-23908,0,0,8bfe961f2cd2fcb2503f4aff8306f89c58f7b0b3f54719b8f5407f1616c019ad,2024-08-14T17:49:14.177000 -CVE-2024-23909,0,1,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000 +CVE-2024-23909,0,0,553111dd06cef2fea922046bd97385fac9dc9e02c030684ae1bbf37bf08d132e,2024-09-06T20:33:05.670000 CVE-2024-2391,0,0,60da3844b5911777951235a640805c94e8dc2cfa119cea41ed5149fa8aa45d94,2024-05-17T02:38:12.397000 CVE-2024-23910,0,0,21defb9e6d6dbf8d0f521ec76503d783a0a5ec9ee34bb29da0316f9a979d5f65,2024-08-01T13:47:21.280000 CVE-2024-23911,0,0,fdddcb19f4466c54e569787b1df836a5978efd401f095a2d3642663fd0df94ef,2024-07-03T01:48:10 @@ -245724,7 +245724,7 @@ CVE-2024-23978,0,0,b11564d73d018e8762d289ccbaa0f5f641bc89f2639fd60e4b0e0ef314e8b CVE-2024-23979,0,0,6fdd5509f38519be7582661a9525c018d02e080bbc0d3ec491dc3a617317722d,2024-02-14T18:04:45.380000 CVE-2024-2398,0,0,1df50a613e2f34671ada45040fb8ddc3d4f8857a9d7670bf2946d253e5c24780,2024-07-30T02:15:05.450000 CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000 -CVE-2024-23981,0,1,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000 +CVE-2024-23981,0,0,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000 CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000 CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000 CVE-2024-2399,0,0,6767e789c5e7e80586d75b3b6704c8a0508ed89afe73da734c95859ddd63a842,2024-03-15T12:53:06.423000 @@ -246292,7 +246292,7 @@ CVE-2024-24978,0,0,b182fc4dea5fb8dabebc670a8efcee22aa4dd4621b4f7e4a6eb2d8d06cf52 CVE-2024-24980,0,0,3fdf73457b919755fcf59939500686a4e764152c575eabbdfb315f29409758ab,2024-08-14T17:49:14.177000 CVE-2024-24981,0,0,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000 CVE-2024-24983,0,0,e552e4af213b0ab57adb4ba19aeb0c4530827148e23a2e1c19c3f213b7957135,2024-08-14T17:49:14.177000 -CVE-2024-24986,0,1,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000 +CVE-2024-24986,0,0,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000 CVE-2024-24988,0,0,9e4f6f88273498e8474a945212f722bcba31b159d34f99737f4277d72dd9fb6e,2024-02-29T13:49:29.390000 CVE-2024-24989,0,0,81a2a87b35bcbca4ec34d5e22214bdf976ca0d87c889c16ca05e31de151ff5e5,2024-06-10T17:16:21.607000 CVE-2024-2499,0,0,8ffef5ee2ad79ac60ba3298cecf691939796c05eb8a23e6745e9e8cfbf777b2d,2024-04-08T18:49:25.863000 @@ -246644,7 +246644,7 @@ CVE-2024-2557,0,0,dc8b54b171bbdaa8e41888d89825f630dc10d84a726786b12c4c722ec5ac93 CVE-2024-25572,0,0,a19a9cf36c077c05dc278f38e37ca145a9759fc24272e685a0d3f0ff41385f00,2024-07-03T01:49:10.700000 CVE-2024-25574,0,0,65726bda902fec4a9a49461993a5b1f1f19b916c575dd539bf5599a6d815d8df,2024-04-02T12:50:42.233000 CVE-2024-25575,0,0,2e4887ee13b995216d77350689726b7532b0325e739fa8baefbe39600a3f9674,2024-04-30T17:52:35.057000 -CVE-2024-25576,0,1,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000 +CVE-2024-25576,0,0,240625f6b8a88df530eb19373f437c5caaffca27a3660adad03735e0e821105e,2024-09-06T20:17:14.003000 CVE-2024-25578,0,0,0d1f2ffd4e03b50b29ccf39cdb2058ba91ae7a7cb01bdc49fe129aadbabc71e4,2024-03-01T14:04:26.010000 CVE-2024-25579,0,0,e18a976cb7cc873665c4cde29595232519ed1d6333d6b865b6ffed467db01627,2024-08-28T16:35:14.267000 CVE-2024-2558,0,0,4df4f161b02ab0ee082928d86d735f9684058e2b58c51335b3ee6abb912b22ce,2024-05-17T02:38:18.947000 @@ -246970,7 +246970,7 @@ CVE-2024-26018,0,0,504335bbc761c181e6e0e6311b5c9a67674f4d2e194452a2b54f2b4e56156 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 CVE-2024-26020,0,0,c3af68fd4e405a95ac1ee216ac5199ad392060554e72b2c1dedcf9e863dfab9a,2024-07-24T12:55:13.223000 -CVE-2024-26022,0,1,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000 +CVE-2024-26022,0,0,a26ae471637132c4dd9ca0e595e7538384876862971be53dda4b80cd7b3fdc6d,2024-09-06T20:16:27.330000 CVE-2024-26023,0,0,edcfd807fdc96925d4b0905ae74cd6e42a43795e1d81a6569987258b521eef13,2024-08-01T13:47:58.927000 CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4ac8a,2024-05-29T13:02:09.280000 CVE-2024-26025,0,0,3352cb4bf9ea0c839d1741e6282396ec44178b4e8d69bb56155c91bf1b50fdf8,2024-09-06T18:54:37.007000 @@ -249033,7 +249033,7 @@ CVE-2024-28751,0,0,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3 CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e95ca,2024-08-01T13:49:17.413000 CVE-2024-28753,0,0,9b7534424fcafcef08233e24d8609288fcd5326b5da35fb8ff9f88b8b46d19e0,2024-03-11T01:32:39.697000 CVE-2024-28754,0,0,b825517ec09be0ea62da6389e64d9784f7fd2758d87d7ecb524c18a858c8d2f8,2024-03-11T01:32:39.697000 -CVE-2024-28755,0,1,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000 +CVE-2024-28755,0,0,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000 CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000 CVE-2024-28757,0,0,38e35916340cc7b59636f71fd12bb6c865345cd709ec2ad97abfbd0121697391,2024-05-01T19:15:22.567000 CVE-2024-28759,0,0,dcdc9bf6250fc5bc69b9326038bec864cb143a6aab76dd04534ae889181ed6fb,2024-05-14T16:13:02.773000 @@ -250546,7 +250546,7 @@ CVE-2024-30799,0,0,d0be2d0f006d2c4f92e204846e2ae37ca4e292273d3e14437b5fe8a98380d CVE-2024-3080,0,0,6986301309c9922bc02fa19392bc6067c49e953b2f624eb66756f4ffea7fbe9a,2024-06-17T12:43:31.090000 CVE-2024-30800,0,0,c159abf1d20ef9221dca0ce07749c41b848d269f6d72d244107e748c6895169d,2024-08-01T13:50:26.523000 CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008219,2024-08-15T17:35:05.230000 -CVE-2024-30802,0,0,37683b49f88fa426fcec7397572b9c76113c55e23f5ab472e56f33731e38df96,2024-05-14T16:13:02.773000 +CVE-2024-30802,0,1,1376f3b4e3d1d6ed6e73bef87767a1a17df2d57663c8be14203281e52f5ae9c3,2024-09-06T23:35:00.597000 CVE-2024-30804,0,0,0f43430d25009eadae7caa97b23b35ddd86648f9eae82b9b828a91f9ed0e4773,2024-08-22T19:35:22.260000 CVE-2024-30806,0,0,d64ba375e8a4aee4aa1348cdd3ca4e1493d138147be36aa2ff70b6291ff84259,2024-09-04T16:35:07.870000 CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000 @@ -250610,7 +250610,7 @@ CVE-2024-30929,0,0,7150ed17033c783d22cb10cc7e29801b4cdbd11e710f0261447b2fe790494 CVE-2024-3093,0,0,fe746195c4e2001fde57b14e03afb6f54529d797bc86f2aa9c4028e9fadd8f82,2024-05-07T13:15:48.260000 CVE-2024-30931,0,0,1c68d82180e73b8514f26d33f19b69f95be31480b9f9d1b6b39915134b180669,2024-07-03T01:54:23.343000 CVE-2024-30938,0,0,29b8e40617dee21c8890e6dc6801cc20a4d0cd635b3d627aba79e0fa49cbd6d1,2024-07-03T01:54:24.137000 -CVE-2024-30939,0,0,533ddd8e3c3323adc4540b47a20f0ad2914d0e15fa0a4366e01edaff34cffd58,2024-04-26T12:58:17.720000 +CVE-2024-30939,0,1,4fde734a2c1073b7ace1dcb3955f64c312d3d3cb950014608581b57b7c19af95,2024-09-06T23:35:01.567000 CVE-2024-3094,0,0,98d623c51c3718f594d063257facb535556f13c6eb9aedf81f112b165abed8fb,2024-05-01T19:15:27.340000 CVE-2024-30946,0,0,7c64f57becf760e1029c7f17f5554dd3b55e452eafcf4a611ce8a9042ae36380,2024-07-03T01:54:24.920000 CVE-2024-30949,0,0,202e32279483c8a9ccf9bc2c69e9e5054a0d5627a3e5e9f84dfb1934bcd5644c,2024-08-21T15:48:31.937000 @@ -250652,7 +250652,7 @@ CVE-2024-31012,0,0,ad29bbd0b94faf76dc619f91628d5426bf4af8e806ebef2aed88b1cbb982c CVE-2024-31013,0,0,bb000ff328032a4f208d94fb503825f394fb805157b8cf8e3eb34f87d47ca3d9,2024-08-01T13:50:40.203000 CVE-2024-3102,0,0,b23588dfddb3d82632a71207907da6ef98bd35bc4bfa522f8686e7f4473229c0,2024-06-07T14:56:05.647000 CVE-2024-31022,0,0,c7e2196fc2144529ae779b7c6081e3f8d64391691f708665471ce7a0ce765e5a,2024-08-01T13:50:40.970000 -CVE-2024-31025,0,1,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000 +CVE-2024-31025,0,0,266f5a8ff7b60cbaf297d43ee22e31a9e1b96dfba0c06978e4170eac2ee8bd02,2024-09-06T21:35:12.560000 CVE-2024-31030,0,0,55e23e64b3707eab4de6e94c5df81025e4c96cb6796b4cba9a4e287691f568e8,2024-08-01T13:50:41.730000 CVE-2024-31031,0,0,22dbfc8ddbe94926f4450ce3680a694e3a6be4ac1b04af44fb2aad33642532ec,2024-07-03T01:54:34.620000 CVE-2024-31032,0,0,9dc46c99afa3eb3462c2c2bb3d13abfc32da42b12a1aa1cfc0db0d7d5a534d98,2024-08-22T19:35:23.210000 @@ -251115,7 +251115,7 @@ CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000 CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000 CVE-2024-3168,0,0,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000 -CVE-2024-31680,0,0,7e1908b87f42141dc482d017d5b62a6782bb8342605d50fe2c839034d8e94921,2024-04-17T12:48:07.510000 +CVE-2024-31680,0,1,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187619,2024-09-06T22:35:01.557000 CVE-2024-31682,0,0,80a6fa070deb0370560504b4fbd6eefe7a627d5dbcf4ad67176d2e92301ec450,2024-08-01T13:51:05.133000 CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 @@ -252022,7 +252022,7 @@ CVE-2024-32908,0,0,f22243bdf03341c4f49fe8c95d52c9746f5d3123ec78466cf58d8b7d93534 CVE-2024-32909,0,0,1747a0b48751800c2e7098eeab32f86aca7912a949dd3414617c820a86f62b03,2024-07-11T15:05:52.807000 CVE-2024-3291,0,0,1fc26be05fd4e8c0c75776f8dbce085d67ae03152f1c480f017ccf6b064046b2,2024-05-17T18:35:35.070000 CVE-2024-32910,0,0,96fa2d9d7d031cd1f9c1fc15158945931873ec9256f8a9c2c7692b992096082b,2024-07-16T14:56:46.903000 -CVE-2024-32911,0,0,27d438335c273d9cab85185e9356d83b9e09719cfc0b2be8a5561f1c5c77b7f4,2024-07-16T14:57:13.803000 +CVE-2024-32911,0,1,3a0fef0abd5eab29360573b4c903482bbebef01629598c289909e1af8d4e6f74,2024-09-06T23:35:02.557000 CVE-2024-32912,0,0,fd994f36adaadcf11decff8c54cb9ed9dfd2529041b080833bc870baeef2b9e7,2024-07-16T14:56:26.787000 CVE-2024-32913,0,0,996f6595bdd5fe8c40fd4536473f9753d8a3be1f0d10e2434d28fb6144612388,2024-08-19T14:35:08.433000 CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c36e,2024-06-17T12:43:31.090000 @@ -252614,7 +252614,7 @@ CVE-2024-33898,0,0,d8c3e8424b1aff6ae8a0fcc91c86b5228f2623afdea66b8b7db25938bc363 CVE-2024-33899,0,0,215d012a0aeed617e9223e785f340f85e2514c39cf4a2326738c4b3613b1edd0,2024-07-03T01:59:09.200000 CVE-2024-33900,0,0,269cc21c173c9c584795c12f1ce91d2738b696474fbebedc5c423a95f8259b67,2024-08-02T03:15:33.783000 CVE-2024-33901,0,0,a1f0948d73a23ff6210c02030912794a258b1439fa01bfbefd0ef5985673396e,2024-08-02T03:15:33.887000 -CVE-2024-33903,0,0,66fa6f18457541069e9742d7224c491d6b0a223ce231b54f3cf8ba6c6e111733,2024-04-29T12:42:03.667000 +CVE-2024-33903,0,1,86a5cd54828614b1e7bfc3cb006bb1bc8de68743de80985523a5471be5cea7ae,2024-09-06T23:35:03.347000 CVE-2024-33904,0,0,7f612cc39cf5cffef556560adbc4e6bcc771b421fa11cf86490b14ea4a43c0ba,2024-08-22T20:35:09.343000 CVE-2024-33905,0,0,8733ae06a94637e7c1c0ff0f997c7e4ea1263aeaf349b0ccb59c2d115d8380be,2024-07-03T01:59:10.763000 CVE-2024-33907,0,0,51edf1f50248f36c9e87b8d73ea1cc5abed4f93b57bba096b80e73be40374db3,2024-05-07T13:39:32.710000 @@ -252844,9 +252844,9 @@ CVE-2024-34148,0,0,39bc79113db1a4cb24c1e032d2832991ff9777a6aea1f2d179dc9afdce78b CVE-2024-34149,0,0,bc997c41063649e77025e7b523e84ecd9251e3e152bcf881c50ffb65d253004a,2024-08-02T03:15:37.863000 CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000 CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000 -CVE-2024-34155,1,1,16098580cbaff82b0c7090020256093dd240c2791e1babd972e5fb3d4ddc876e,2024-09-06T21:15:11.947000 -CVE-2024-34156,1,1,4ee5acde94d8bbc56dbdd2bde22f7f0d38dd09dd279009b64e363bf2a2a5d13c,2024-09-06T21:15:12.020000 -CVE-2024-34158,1,1,b5aaa917cff7ef86bde2c94b409b7991426ecb9453d606928df88e2bb83fb707,2024-09-06T21:15:12.083000 +CVE-2024-34155,0,0,16098580cbaff82b0c7090020256093dd240c2791e1babd972e5fb3d4ddc876e,2024-09-06T21:15:11.947000 +CVE-2024-34156,0,0,4ee5acde94d8bbc56dbdd2bde22f7f0d38dd09dd279009b64e363bf2a2a5d13c,2024-09-06T21:15:12.020000 +CVE-2024-34158,0,0,b5aaa917cff7ef86bde2c94b409b7991426ecb9453d606928df88e2bb83fb707,2024-09-06T21:15:12.083000 CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000 CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000 CVE-2024-34163,0,0,0359aa2bf9352c87fe65864c9b7813550ee369295a4e0ccc20c368017d1c80c6,2024-08-14T17:49:14.177000 @@ -253462,7 +253462,7 @@ CVE-2024-35119,0,0,0e35a45c77b11b12852790cdf89b3d7024286bc6ab2025f024aa0adc87ff1 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 CVE-2024-35124,0,0,934ed896994f221011d9d1e9fbaaa9455cb54cf4e40c6476e9a006a5cb4b67ea,2024-08-22T13:31:16.353000 CVE-2024-3513,0,0,6ae7ede11126213bb060be770e97c10b68188b12ba1d1172b48d8935fa9e965c,2024-07-05T14:25:33.193000 -CVE-2024-35133,0,0,e6e600efbe6019a46042b8497356765bfde6faebef1427fb84fa89f43d45b975,2024-08-30T13:00:05.390000 +CVE-2024-35133,0,1,94682ccdd5820af4bb9202a3fe7f8708ae8d6add58e631948e27e68678fff48d,2024-09-06T22:55:33.543000 CVE-2024-35136,0,0,3020783d3d271d3fdae4d9e8c7d963280063bef97bcec52f880461e4f52c833a,2024-08-23T19:08:06.993000 CVE-2024-35137,0,0,77d476f5836ab7384f0bcce22116f35eb05878c239523b7719df59e2f7ac06d3,2024-07-31T20:48:10.727000 CVE-2024-35139,0,0,b5d718d7cbc653a303c73da7348779dc88225aa141c22d6520f3ad7270cc6a42,2024-08-01T17:27:13.030000 @@ -255144,12 +255144,12 @@ CVE-2024-37484,0,0,5aa19fbeade225427f8be4047b53cf5aa423ef4d4466f797804f490d4e5cd CVE-2024-37485,0,0,a28d87feb836359698fd84c975d93a2c25e461c295a0332494f41ca668e6a305,2024-07-25T15:51:09.387000 CVE-2024-37486,0,0,cf55487adcabeafd4a4ef78235d46e39d7a0cbef985b2f1b50f1d6c8b1afa29e,2024-08-02T20:35:14.243000 CVE-2024-37487,0,0,326134cd41feff5ec6f404851524659a0bcd77d5c05096f40d7b132ca0985100,2024-08-30T21:19:20.460000 -CVE-2024-37488,0,1,fad03ef288403ea21b704ba7e4e89b6d9c5a40fb2c82414d8c2526d0c9547477,2024-09-06T21:24:24.240000 -CVE-2024-37489,0,1,7d67184809360fa706b40329dd6fff480ab2c0356505cffc07cc81b386b2f5df,2024-09-06T21:25:14.303000 +CVE-2024-37488,0,0,fad03ef288403ea21b704ba7e4e89b6d9c5a40fb2c82414d8c2526d0c9547477,2024-09-06T21:24:24.240000 +CVE-2024-37489,0,0,7d67184809360fa706b40329dd6fff480ab2c0356505cffc07cc81b386b2f5df,2024-09-06T21:25:14.303000 CVE-2024-3749,0,0,b3391f40e1bcbcef1a08d3c4874bc14a907340ab4c3bf6aac04f7b2d59e58359,2024-07-03T02:06:31.950000 CVE-2024-37492,0,0,f3971a670c66fc0fbc6bcf86ec5f1638cfe5a7702343a7218c60024704d58bab,2024-07-22T13:00:31.330000 CVE-2024-37494,0,0,bb1430912d6aa0321558ee1d9d4f0c8cb5896005bedfb50082e08532d4e67d5c,2024-08-02T20:32:21.170000 -CVE-2024-37495,0,1,04aecffbaafcf85a77c5bcc572ea18dc4705b2313de79edcab2cafcd3fe72fda,2024-09-06T21:25:56.120000 +CVE-2024-37495,0,0,04aecffbaafcf85a77c5bcc572ea18dc4705b2313de79edcab2cafcd3fe72fda,2024-09-06T21:25:56.120000 CVE-2024-37497,0,0,a5e078ff0e5f137ef0821d3799d044ca0d639a06d66db12953c2763c25fbc8d3,2024-07-09T18:19:14.047000 CVE-2024-37498,0,0,3906b98c498ae3be512e51b42c4fa048b310c8a030ff54a6e9ec3a0bdb0a209a,2024-07-11T13:05:54.930000 CVE-2024-37499,0,0,33077733cf962ec7124fd968ab822e83cb89a629fa94472ef274e5c155a1765b,2024-07-09T18:19:14.047000 @@ -255163,13 +255163,13 @@ CVE-2024-37509,0,0,f9e93ade29c9918317e48d188ce4960d290a72c7e104c763985255a9648c8 CVE-2024-3751,0,0,ba887ac321a2bfaf7155c820936f84a156f9ef9329c91d46297abdea58a2350b,2024-08-01T13:56:40.890000 CVE-2024-37512,0,0,b154a0241cfb0d8ca130eab910ec84648220c774892017c20117684126ece261,2024-07-22T13:00:31.330000 CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6cdb,2024-08-16T14:30:47.543000 -CVE-2024-37514,0,1,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000 +CVE-2024-37514,0,0,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000 CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000 -CVE-2024-37519,0,1,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000 +CVE-2024-37519,0,0,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000 CVE-2024-3752,0,0,239ab2a4fa8a03a6a793fd7bad6c5508294cfd1be75f4ce013e63852e68d9c42,2024-05-06T12:44:56.377000 CVE-2024-37520,0,0,1cad459c20e2d875630bdc07513eda15868aad6421fe450388baf16c360c4642,2024-08-29T18:39:02.407000 -CVE-2024-37521,0,1,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000 -CVE-2024-37522,0,1,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000 +CVE-2024-37521,0,0,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000 +CVE-2024-37522,0,0,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000 CVE-2024-37523,0,0,95e87c6e9b764d7f190ed1df123d3a1fe4f39f3cc605d9d4771329a8df3befb4,2024-08-30T20:24:32.837000 CVE-2024-37528,0,0,9c6980ff0d1442c5b7fd4f5e3f8ba4ae579879f3db1ec83280b9bd21a4726381,2024-07-11T14:49:28.177000 CVE-2024-37529,0,0,f9accff698127aa01ca28b864c7fa6ff8749b3c683fd8343d39e26a6d0d3d7fd,2024-08-23T18:55:48.257000 @@ -255350,11 +255350,11 @@ CVE-2024-37894,0,0,5c3e1c011e44e5c8bcf6a6398118ad2efcba003a19994815d77c769e906a4 CVE-2024-37895,0,0,83fc999b914f31ef5377ea2f4739df1f86727e09c7234e6711ade849e83102e2,2024-06-20T12:44:22.977000 CVE-2024-37896,0,0,accc5cd71320f643f30fd3c58fb4ef952e3edd98e66520b2d1ebf95954392e5e,2024-06-20T12:44:22.977000 CVE-2024-37897,0,0,eb358c8b4bf1d804a542a3de3cc644f3b57f51c972b900353c845858b20c9acf,2024-06-21T11:22:01.687000 -CVE-2024-37898,0,1,48ad19e1b9c6ab72c2a55d0111d8350370696bdef2f1e15844074d6b677b7bd6,2024-09-06T21:16:55.600000 +CVE-2024-37898,0,0,48ad19e1b9c6ab72c2a55d0111d8350370696bdef2f1e15844074d6b677b7bd6,2024-09-06T21:16:55.600000 CVE-2024-37899,0,0,b15b2f0659684c15abe8d3b9fc90e954532acfe6178361a33640834566aa7b12,2024-06-21T11:22:01.687000 CVE-2024-3790,0,0,54ff85acf33b27347b60794a0d91a04db9e5fdd7b0bb2899aaf68ff18e5328b6,2024-05-14T16:11:39.510000 -CVE-2024-37900,0,1,2fd5dd44fe4c1400ec72d3a6e323496bfc14e747150e8c52ec70fb9c5004f180,2024-09-06T21:06:34.223000 -CVE-2024-37901,0,1,7ba4e42556021b302fdecc554777630628b083580b29d09ee281a6a95b82f20b,2024-09-06T20:54:20.857000 +CVE-2024-37900,0,0,2fd5dd44fe4c1400ec72d3a6e323496bfc14e747150e8c52ec70fb9c5004f180,2024-09-06T21:06:34.223000 +CVE-2024-37901,0,0,7ba4e42556021b302fdecc554777630628b083580b29d09ee281a6a95b82f20b,2024-09-06T20:54:20.857000 CVE-2024-37902,0,0,914ec46cc1273d7c21c7b2dab73f39d6c3f01e86944529e46279ac98efc57a11,2024-06-20T12:44:22.977000 CVE-2024-37903,0,0,886576036d4d085b682af52548aacb4c341112369e14bf61e8ca80c2c202d58c,2024-07-08T15:49:22.437000 CVE-2024-37904,0,0,4a1838bfa872e93babcec91edc2a58b1f777ff60512a3a43aa04f02c821270dc,2024-06-20T12:44:01.637000 @@ -255711,11 +255711,11 @@ CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41 CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,e2b97f9d317b8a26d270b75eac229588c12ed4682b78a7b49e325a0c7069f57c,2024-08-08T15:05:30.617000 -CVE-2024-38429,0,1,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000 +CVE-2024-38429,0,0,c10e8ced8854fd8685412c45d492895eff59703298cb77e7d0526108d5505667,2024-09-06T21:38:04.370000 CVE-2024-3843,0,0,f8304581ad62be18ba48d40e0abaf62c4d0e638c53e769e55d87254b71de405d,2024-07-03T02:06:41.770000 -CVE-2024-38430,0,1,1a296d96b0261a37f7877ae5b1666dcd3db3faea9a2a0f9613e8491365987413,2024-09-06T21:39:15.287000 -CVE-2024-38431,0,1,14b4403defebccfd4ffe89c9743c48305830cc6a4e2ac2bbc3e0ac4651e7fb53,2024-09-06T21:41:43.017000 -CVE-2024-38432,0,1,a57fb5b473d87c3852d9d382c609d40f396cea8b1e958d16b82eaf9758ceff8b,2024-09-06T21:43:36.463000 +CVE-2024-38430,0,0,1a296d96b0261a37f7877ae5b1666dcd3db3faea9a2a0f9613e8491365987413,2024-09-06T21:39:15.287000 +CVE-2024-38431,0,0,14b4403defebccfd4ffe89c9743c48305830cc6a4e2ac2bbc3e0ac4651e7fb53,2024-09-06T21:41:43.017000 +CVE-2024-38432,0,0,a57fb5b473d87c3852d9d382c609d40f396cea8b1e958d16b82eaf9758ceff8b,2024-09-06T21:43:36.463000 CVE-2024-38433,0,0,f67092b0476b56495430d5a0a2004ef9f8edcc22248756a4bc924265edccd9ea,2024-07-15T18:26:30.693000 CVE-2024-38434,0,0,4a8e238d88d3486572dfa29923d4eb1c064ff172ae0f1ad768133acfd895c782,2024-07-22T13:00:31.330000 CVE-2024-38435,0,0,f20d01d49eebbc5ac4d21ace173944062cbdc481675d02e13da68c525504eca1,2024-08-30T20:59:05.307000 @@ -255925,7 +255925,7 @@ CVE-2024-3864,0,0,c7c600ab2d47995fde4727e677425dc294b0dc7019ce4f56ba3ea3d46f02c4 CVE-2024-38640,0,0,0a9cd90ebfbe37ad1e2182183348d7a0f69130cdae9c1211d208c9fcc20b6758,2024-09-06T17:15:16.443000 CVE-2024-38641,0,0,911194a65196a2372b31f65b46b0030ec8684f073af8b9dde60a51379b15a532,2024-09-06T17:15:16.550000 CVE-2024-38642,0,0,0bad981e037cb7c53782d01ba764ae7638d3436cd6e0adf410e8b18a9609bdb3,2024-09-06T17:15:16.677000 -CVE-2024-3865,0,0,d6f5dd3766d85f1a043ebf5d3172442b73d2c19e5b446b7220941e0632bb3f23,2024-04-17T12:48:31.863000 +CVE-2024-3865,0,1,08b246bd9fb312136589a057fec6244b70e79a37ab7aa9f79462f36bc0eb0f7e,2024-09-06T22:35:02.500000 CVE-2024-38652,0,0,c09b7df399ce36bfa6f99e496912789d409fa436d96980e8d3bf3eedfe5b5878,2024-08-15T17:32:39.067000 CVE-2024-38653,0,0,c8ed77058a52701b560001b5f44bd7270c8687b6c4890948d6b9eaf03edfd74d,2024-08-15T17:32:57.587000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 @@ -256455,11 +256455,11 @@ CVE-2024-39561,0,0,2d6669fd46e5f06a296436c07948ef96b496b18cd802d54459b89b3379cbc CVE-2024-39562,0,0,e28be33d8ed9a3514708585e09c3a2a79edf6f92ad582e3763ed1e2ed2b7847b,2024-07-11T13:05:54.930000 CVE-2024-39565,0,0,67e95ad66ccb875a343c94a008ae24e95d194b8d007cd8f237d44ba36352b116,2024-07-11T13:05:54.930000 CVE-2024-39567,0,0,4a57ded9184af902b793d10964e38343dbe75d3e891132b111e62e60ba12ed7c,2024-07-09T18:19:14.047000 -CVE-2024-39568,0,1,f8994573b47195905c9ccbf8be81e7fc1ac765b7d83d3cc49f6dd1813186217f,2024-09-06T21:26:14.400000 -CVE-2024-39569,0,1,687e396635e4f2901591254e1b6191c3e6e1f055a04ea6bddeeda6b72621c623,2024-09-06T21:26:49.890000 +CVE-2024-39568,0,0,f8994573b47195905c9ccbf8be81e7fc1ac765b7d83d3cc49f6dd1813186217f,2024-09-06T21:26:14.400000 +CVE-2024-39569,0,0,687e396635e4f2901591254e1b6191c3e6e1f055a04ea6bddeeda6b72621c623,2024-09-06T21:26:49.890000 CVE-2024-3957,0,0,6be73190d0db646071e408d26fd6054938440e63fb695d16249857bd78064902,2024-05-02T18:00:37.360000 -CVE-2024-39570,0,1,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000 -CVE-2024-39571,0,1,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000 +CVE-2024-39570,0,0,795cf07324f2cb8c6a570190fa22ff6767cfc3ce2b0050380d11d95a41e2ca40,2024-09-06T21:20:26.347000 +CVE-2024-39571,0,0,b35a4f00350faa538c88f4f6d224a7df8752eca1297d346f418e4963a4c09a43,2024-09-06T21:20:00.153000 CVE-2024-39573,0,0,66fc7feceb0e35a8b2e536fb0fe145ff47c70fa679791c05a2dafe67c9ad9e6e,2024-07-12T14:15:16.400000 CVE-2024-39576,0,0,b954c37b27403600557da0d261dd953de929a61b04f025c8697cd0d77090d715,2024-08-22T12:48:02.790000 CVE-2024-39578,0,0,c57c67d60ebbfbb439cb464fedeceb835967a7da09b4f182842457f0862047f9,2024-09-03T20:56:11.277000 @@ -257572,7 +257572,7 @@ CVE-2024-41815,0,0,ba208e21e1cc4072b07e7947a406e2fc77ed18be9dcff08d15af01e0491d3 CVE-2024-41816,0,0,ea0d789cdda6a3667e1a691465b22123d04bdab2604543ab9a518a3e01d84f0a,2024-08-06T16:30:24.547000 CVE-2024-41817,0,0,c3e50103d6a8f469b4238c3f312796b0087815956d0c470348037696e81257f6,2024-07-29T16:21:52.517000 CVE-2024-41818,0,0,4db2007d5d263ef00adddd9e1d74cef5ae3a3c480a8569b96e9fc77a6bc18e63,2024-08-02T20:17:01.807000 -CVE-2024-41819,0,1,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000 +CVE-2024-41819,0,0,1459cdf8f115364bd9f6605edf7c3ea9c16cff5892a2c1184e2ecde33d04039b,2024-09-06T21:34:29.067000 CVE-2024-4182,0,0,0d8f83951a03e7673897d4b6402c0de2918a0bc9490e2ea7f1f32823e0e2921f,2024-04-26T12:58:17.720000 CVE-2024-41820,0,0,66761f44932ba996701075032b581c0ebc2041a25ba2c4f14ccc68178ac408dd,2024-08-06T16:30:24.547000 CVE-2024-41824,0,0,566dbbd1161c5c39870de656941ff3b3b11969b1e888b31722918c2b50080cfa,2024-08-07T20:46:14.917000 @@ -257662,7 +257662,7 @@ CVE-2024-41943,0,0,e9522f5ef1fc490dfac21cbf940a07ce3841f4fb783f1339fe71b8d4141a6 CVE-2024-41944,0,0,135d3dced80bc39762656a548dac91a6dee89920c44affdb521ffafdd868d70c,2024-07-31T12:57:02.300000 CVE-2024-41945,0,0,58045736441484d7b962c82a633dc9fabe3d1461c0f6ea954d229d59ebf06f9d,2024-07-31T12:57:02.300000 CVE-2024-41946,0,0,0c8984641c723ad5c183e5dd0f3ccca9c504d7530b3c6a092508aec5b06adaf1,2024-09-05T16:09:45.503000 -CVE-2024-41947,0,1,0778bf62cfd1d78df175ba8432cda918a6d31369bf275494698802504a895693,2024-09-06T20:46:01.477000 +CVE-2024-41947,0,0,0778bf62cfd1d78df175ba8432cda918a6d31369bf275494698802504a895693,2024-09-06T20:46:01.477000 CVE-2024-41948,0,0,95b8e7bd495b369e148a4aee32aaebfe7255dd0e1bf38771c2e96e2af8f6ed4e,2024-08-09T18:38:47.533000 CVE-2024-41949,0,0,ca775db8fe7ff2b3f65a9b7415410183458d660652f7e7a24514bfd892cb0821,2024-08-09T18:32:53.153000 CVE-2024-4195,0,0,1b874e811f63a88fe0e5040c0bc90d160eaa072aa139296a2fc692655a3d77a9,2024-04-26T12:58:17.720000 @@ -257680,7 +257680,7 @@ CVE-2024-4196,0,0,2bee927395e72028cfccdf65300c6a2b8979e20b943a96185278ab936245f1 CVE-2024-41960,0,0,c90236af24fb252306d67097fab9fe370c116a0fe898aae960bb109a3075d5cd,2024-08-06T16:30:24.547000 CVE-2024-41961,0,0,3c3cbde88cd825de8bae83de9e23bceebed48c0b620332721ebe0297499b9cbf,2024-08-01T16:45:25.400000 CVE-2024-41962,0,0,db50354a8566471f488ea803a7a6894035b73491a2359165637f817d330c25eb,2024-08-16T16:34:48.873000 -CVE-2024-41964,0,0,00845ae65bb3534784c9b8fbbb60096d7620e97ac61d54d3b5042120c50027b6,2024-08-30T13:00:05.390000 +CVE-2024-41964,0,1,54621a6adee825c0636e7afd8773c219e1650b44db222dda2ec93364b11574bb,2024-09-06T22:56:18.010000 CVE-2024-41965,0,0,2d1c3b12d760b98aa2eaba7bc040a10a4b90c52e44f9dfa32fdcb4160559d799,2024-08-09T14:09:32.507000 CVE-2024-4197,0,0,45da0b07f911473fe59b939894a184bd20b4010bb74cc514ccd6533e9d15c77b,2024-06-25T12:24:17.873000 CVE-2024-41976,0,0,28d622db4b0702423d465fd5f760fc3d4baf285e2f7024720bdb5fee42ef0c33,2024-08-23T18:40:16.173000 @@ -257698,8 +257698,8 @@ CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb CVE-2024-42005,0,0,31c6234f3daaff960ef384b4b5b21fd451482162fcdfabf6e4368a5912d0c3b9,2024-09-03T18:35:10.293000 CVE-2024-42006,0,0,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000 CVE-2024-42007,0,0,e1546757cdc0e5c84d17bb4943631a838464f4ec8f81323b11df4d863b67b3f8,2024-08-01T13:59:16.630000 -CVE-2024-42008,0,1,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e2c4,2024-09-06T21:48:31.597000 -CVE-2024-42009,0,1,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 +CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e2c4,2024-09-06T21:48:31.597000 +CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 @@ -258598,7 +258598,7 @@ CVE-2024-4368,0,0,ebedd608e412600f3409256680729c82fcf5015495435afd7648389243e696 CVE-2024-43688,0,0,f39d1b1cd29869db949f77b65b174936ed5c42e4fb24c070ceb5bc7ef518b2eb,2024-08-26T14:35:06.680000 CVE-2024-4369,0,0,9bcc319f475d5802b53d6dedcfa6ead4761cbf7c42adde8daf6f3ff8c0c17af2,2024-06-19T18:15:11.820000 CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000 -CVE-2024-43700,0,0,fca232fae54c235f85f645739c5bbda87608d8ad0ce7d2e114cc15b4fe70f6e0,2024-08-29T20:36:51.570000 +CVE-2024-43700,0,1,7d9ad3bdf541499d627305e5fd2f4d5ebf1292f98ea79760d8a63eda3d4aed15,2024-09-06T22:52:41.727000 CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000 CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000 CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000 @@ -258628,7 +258628,7 @@ CVE-2024-43798,0,0,0f4c51b4b2459096a21f79a4c43df1119a11b4e9a3f2bc6fda3ce5410f7de CVE-2024-43801,0,0,3057bc3523c59b7a2ce3a49766bca817655c19ea20647a6ae5a515942f4aa7c4,2024-09-03T12:59:02.453000 CVE-2024-43802,0,0,e6e6b0823c543afdd24537863512362b0ca92682a64b51ee319640612d5e52b9,2024-08-27T13:02:05.683000 CVE-2024-43803,0,0,d39ec93af35560ca8e8a0de326d7fde6d56bf46a552a9709abae1dbb94d4c159,2024-09-03T19:40:46.783000 -CVE-2024-43804,0,0,cbb7ec4946a5d9c01d82297dcb2398ad33b946487bfc0cd1cf2a7bd29341d9b7,2024-08-30T13:00:05.390000 +CVE-2024-43804,0,1,dfcc6bb057a0133a6590fad8e3f17989c092b880dfeea4c7e4ce29f3c77ba4ff,2024-09-06T22:57:01.697000 CVE-2024-43805,0,0,8cc69a52f61e705cc1b61f3c5982ec9f82234c4fd7aecf6c96d7c935acee4e24,2024-08-30T15:56:16.477000 CVE-2024-43806,0,0,541f1dd38cc99ea47f0a1d3247e689afdaff86c352817f08eb0b94af02655385,2024-08-27T13:02:05.683000 CVE-2024-43807,0,0,3f91dd87019f53cf891d3a83100dd5c601626acd9f1336f0bde904afb8c4caa9,2024-08-19T21:09:42.313000 @@ -258841,9 +258841,9 @@ CVE-2024-4439,0,0,18d544a04352d4558f54a1793cd800ab605d9132c8464460d2f7ebbde183ef CVE-2024-44390,0,0,6367b383b322d2f53bd8e6d4e8d76904ca1c75a20fddee8fd1295aedac6b8243,2024-08-27T14:48:18.393000 CVE-2024-4440,0,0,32e49728cdc055a1dbfbd90b8e03664859c56d56e36afdc46644ff6b145c71da,2024-05-14T19:17:55.627000 CVE-2024-44400,0,0,46cca54dff368c30e19e4d79a9e5fc6607a7b0ccd1e0fdcd2b02aab471f7abd6,2024-09-06T16:15:03.030000 -CVE-2024-44401,0,1,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f41ae,2024-09-06T21:35:13.733000 -CVE-2024-44402,0,1,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000 -CVE-2024-44408,0,1,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000 +CVE-2024-44401,0,0,ee2c4a2267c2b730b2023e7d052b9b36658db4f1e83370dcd2c9795a645f41ae,2024-09-06T21:35:13.733000 +CVE-2024-44402,0,0,b38946a6f0e5c6bfd13c5f46b6835ff57cc45dc65dbcc124685a3fc4210d5d2e,2024-09-06T21:35:15.770000 +CVE-2024-44408,0,0,79e6da73dfd60da300e8d621dc4645956a3af34e4d3870aab752a63a7e02ecfa,2024-09-06T21:35:17.720000 CVE-2024-4441,0,0,ac0779300bad801b6c25a6a11418596c16f707acafd8505b85edf037d6de9dc4,2024-05-14T16:11:39.510000 CVE-2024-4442,0,0,9c1eda6fa3435f8c4d08218c5481ff931fe1467531bf106c3f2c1021638ef5a8,2024-05-21T12:37:59.687000 CVE-2024-4443,0,0,844cc6ae76fc91b0a9b2c7cc836e7c7382ecc4895f252d76709d68a22aac17cb,2024-05-22T12:46:53.887000 @@ -258907,8 +258907,8 @@ CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe3 CVE-2024-44793,0,0,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000 CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000 CVE-2024-44795,0,0,2459dd83721718e1502976fd61ac15b289981ba6005e92e7c41d33d2e6b740f8,2024-09-05T18:26:41.490000 -CVE-2024-44796,0,0,ea2f83fd317230dba37a019c6df79333d03496931fcac69fc846f82ae10f3010,2024-08-27T13:02:05.683000 -CVE-2024-44797,0,0,7bc801096aef27df0c5244f5a3c761f34dc19dd9fff98d1b382da189467f2dbf,2024-08-27T15:35:18.880000 +CVE-2024-44796,0,1,2932c57e25f9e35c74ce36b128d46acb3231e7bd610d9d98769e690ee695d3eb,2024-09-06T23:35:04.340000 +CVE-2024-44797,0,1,045624a726ff5e1b8db30d7af17e11b2221f6b7d4bdca61ca2fe7511b3f6e808,2024-09-06T22:27:16.177000 CVE-2024-4480,0,0,046ee1f51773a8c0ac4a6c81ddd78c147b0ada165d730df7b9b8d85146172347,2024-06-17T12:42:04.623000 CVE-2024-44808,0,0,53ee5f88da9d15aa3ffd696fc5703153aab92dbb219aaccde4dc48186abdbb68,2024-09-05T12:53:21.110000 CVE-2024-44809,0,0,424c650381a963ac60378eaa5a7cd36fd86829e33f994f3d0227dc416ec44e82,2024-09-04T14:35:12.707000 @@ -258921,9 +258921,11 @@ CVE-2024-44820,0,0,f15637d2ac032c543e5fcbbe9f5d1cb1b7c83c8e990be9337cf6d7655fcc3 CVE-2024-44821,0,0,ff3428c7064f35632ec8516d4f1ffbf8326fb53cbc8ff73f0451f03ff4bad1c7,2024-09-05T12:53:21.110000 CVE-2024-4483,0,0,d9fadea227cf106e149715592d31bb2d237147d959617b97c9049a0f6f95d28f,2024-08-01T13:59:31.397000 CVE-2024-44837,0,0,253c4b98d471b14a46b3f3274bda3284d342567e55e989a3afe5e23485326395,2024-09-06T16:46:26.830000 +CVE-2024-44838,1,1,2159668e53931421004ef7f63efc6eecd8f2ac02a40ae2dabff642d324a59a36,2024-09-06T22:15:02.147000 +CVE-2024-44839,1,1,959d94abeeeaec1d019ee96b4425b53b7c7bad4a88fdd78dbb6e75a39d39b095,2024-09-06T22:15:02.210000 CVE-2024-4484,0,0,f8c7c7a90ad9fb2504d28a2d6c05b973f8e6ce86f54104c89b314d37b71fcc46,2024-05-24T13:03:05.093000 -CVE-2024-44844,1,1,d5b523a8978a6ebedf01d85cd10b0ccea4097d23e938547b9d6c495c6f14e8c4,2024-09-06T21:15:12.160000 -CVE-2024-44845,1,1,ff18ab52379dc0931d16896a3679392539e78d16852233be39538265b14e027f,2024-09-06T21:15:12.217000 +CVE-2024-44844,0,0,d5b523a8978a6ebedf01d85cd10b0ccea4097d23e938547b9d6c495c6f14e8c4,2024-09-06T21:15:12.160000 +CVE-2024-44845,0,0,ff18ab52379dc0931d16896a3679392539e78d16852233be39538265b14e027f,2024-09-06T21:15:12.217000 CVE-2024-4485,0,0,a27e77eb6786137f1ff33a4e5e44b17657a4b120ca60b51b6c6a25a52d6e7411,2024-05-24T13:03:05.093000 CVE-2024-44859,0,0,361e21bdfe4afccedd32d666cb901903834fe5ed28d7a4a2b19923a7bb2e90ef,2024-09-05T12:53:21.110000 CVE-2024-4486,0,0,ae6967e9ce7769ae98c2cf87c0bc0fbb14e19b3005ed8a961bec51e7089d074a,2024-05-24T01:15:30.977000 @@ -258937,7 +258939,7 @@ CVE-2024-44914,0,0,874292f6168813ddf8fc9647fc65bfb40df31b19e1ea4a9fdcd89de1a66d4 CVE-2024-44915,0,0,599d20f62f376d9c9860ebd338604a632ba16d7b9219c3aadc9555ff97ab4b9e,2024-08-30T16:01:10.753000 CVE-2024-44916,0,0,268f2c861c0c259cfc6a8f5831922421cd3f20b464855cae3b767189bdeba765,2024-09-03T12:59:02.453000 CVE-2024-44918,0,0,3a0c5f40de5f64cdd7c350975f1e36ef79f8fc6234af40bbc8a6ef2e7aab0507,2024-09-03T12:59:02.453000 -CVE-2024-44919,0,0,4ce1b96ddb0a7c15b96ca851eaf197d01501859f99507e5fc4c267c2fc748b54,2024-08-30T16:15:09.720000 +CVE-2024-44919,0,1,ec1497e018c6f806f08d6bb2e463ee45aec94409b9fec3dcd0eb96daadbf42bc,2024-09-06T22:54:56.927000 CVE-2024-4492,0,0,0237cea7742a82f916a95c7121fd101b19e30a52d4f326fc68f5db785a621a29,2024-06-04T19:20:39.047000 CVE-2024-44920,0,0,12f1b6eb8fb8d99f08a0b224eeeb570d2ee08178391a3e25e8980965db9b7928,2024-09-04T14:59:58.250000 CVE-2024-44921,0,0,b581e2c2532137589de006c20122d6cbe14e56f4b907946bd0416f760b5174f5,2024-09-04T15:00:15.103000 @@ -259049,9 +259051,9 @@ CVE-2024-45052,0,0,8b5354ce3732be9a4ec5c7e0d7652b2053216fa0d00ab80b71e08b5337152 CVE-2024-45053,0,0,f91ffa38b1f1473a6604647a2be1fa377450e287db4b7cdb71eb6f698ce9f726,2024-09-06T18:20:35.430000 CVE-2024-45054,0,0,b9a631b4140dc3b625193d3b302c7a5fbf5e7defa5c6f149bad3cc57b44dfb5d,2024-08-29T13:25:27.537000 CVE-2024-45056,0,0,691057e2a8bd235b7cec2ff9d1864de57863221b46b0db10be9809732ea41217,2024-09-03T15:14:54.877000 -CVE-2024-45057,0,1,103b6de50ea8c78a895eccb4e8970b15e6d1e5c072b0541da4b181b9fbcee5a8,2024-09-06T20:15:04.443000 -CVE-2024-45058,0,1,e14ae7cd8c630ee9558396031b963ae5f55888ff4a83970664d1742bc54c6950,2024-09-06T20:15:04.547000 -CVE-2024-45059,0,1,bce3ec1c940acbe142fa600c9622c1e0772acc8cfb265273dae2266b40c101ce,2024-09-06T20:15:04.637000 +CVE-2024-45057,0,0,103b6de50ea8c78a895eccb4e8970b15e6d1e5c072b0541da4b181b9fbcee5a8,2024-09-06T20:15:04.443000 +CVE-2024-45058,0,0,e14ae7cd8c630ee9558396031b963ae5f55888ff4a83970664d1742bc54c6950,2024-09-06T20:15:04.547000 +CVE-2024-45059,0,0,bce3ec1c940acbe142fa600c9622c1e0772acc8cfb265273dae2266b40c101ce,2024-09-06T20:15:04.637000 CVE-2024-4506,0,0,ddf6bfe33c9fb68b792eae19c37cbcf6030ec7e8a9a0c1f6ead94d2f62170a3f,2024-06-04T19:20:40.150000 CVE-2024-45063,0,0,33e08634550506363c06b675c8eebdf6582cbbe73548148f8e40aee753dad000,2024-09-06T17:35:18.370000 CVE-2024-4507,0,0,feffcf27ced8e6be5fca9d21b321343c494624929485135b513ee1c93a346051,2024-06-04T19:20:40.250000 @@ -259149,7 +259151,7 @@ CVE-2024-45312,0,0,3ab127ae457c159e255763a9cac499b257dedfb3025d06ab78788175895c2 CVE-2024-45313,0,0,7f2c32db2a1d116c11ba8b1d5ff95be26c7a6f4c5dba7ff892eb13c5baf4c8a1,2024-09-03T12:59:02.453000 CVE-2024-45314,0,0,b63eb7e37a749fb3c308d5e710eb140bbcfefc4e3df4519b3385c13ecabef564,2024-09-05T12:53:21.110000 CVE-2024-4532,0,0,4fd2f02f0358f1c611846b77f1b0e80bcb1985e07f23fa6a21a71cc25593500a,2024-05-28T12:39:28.377000 -CVE-2024-45321,0,0,fb18f1dc20e468dc3e9b1a9f0b38a9a704b0b668d302eb3f364e6f7d26aab3c7,2024-09-06T14:35:13.113000 +CVE-2024-45321,0,1,385b3d1e3bf54e8ae2af5d5796ef0b1ffaf17d58c18e0fbe7542c0dcea09b2e4,2024-09-06T22:30:19.337000 CVE-2024-4533,0,0,aca3a412ead1ce1343d6f498450801be5e059db6302d74881039b5fe75fb6c09,2024-05-28T12:39:28.377000 CVE-2024-4534,0,0,527a3127a7586bdf18d80cd2b5b17fe74ac5ed6a2aa4ee562148173cc1d9d3e9,2024-08-09T19:35:09.923000 CVE-2024-45346,0,0,2f7f906fa8e830e09f5dc1994b30102df77aeab36a86b7c31755a212ce377dbe,2024-08-29T03:15:05.247000 @@ -259247,6 +259249,7 @@ CVE-2024-45751,0,0,9d644b0c14d0d0ef7e1334ce6c40fff034d24fd661ea8076c5e0aad911a46 CVE-2024-45758,0,0,2ae57583ed5e6b6b71b00c8e123d728a65162c35712be784f078e8924fe4539a,2024-09-06T18:35:13.043000 CVE-2024-4576,0,0,bef0c1eb81bb0f4c3eef72c993d9a673f04f17bc2d954741979507814d4ccd99,2024-07-02T14:41:30.777000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 +CVE-2024-45771,1,1,0d2b8d62b7e1308dc88774abe963b85bc32e41e5383eb66497d67169d507de0c,2024-09-06T22:15:02.267000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 CVE-2024-4579,0,0,b44e5adee861e75c9f2de9111724b513cf79b7a7dcd7134192d107fac1782253,2024-05-14T15:44:07.607000 CVE-2024-4580,0,0,975d7d3fa65fc4746aeff6882996f0991cc57002c73b964b5a97c9777b6d66f5,2024-05-16T13:03:05.353000 @@ -259517,9 +259520,9 @@ CVE-2024-4876,0,0,6c7ef7cd93a9d659be2199330000de11a6027348fd6a9308e40ba12083e70d CVE-2024-4879,0,0,49a8b41ea605df8bd1da4063a7058b50435504f1dbecb0dc4bcc8efa8c8e8867,2024-07-30T15:13:39.720000 CVE-2024-4881,0,0,e010a6d611a1aff52f8425d30778d000b18cd2245ae12a3254f16e5b16421da7,2024-06-07T14:56:05.647000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 -CVE-2024-4883,0,0,2ff7450efd44772325cada3b845290dfe574175b9b5b8d8937e9a22721054fd1,2024-06-26T12:44:29.693000 -CVE-2024-4884,0,0,5b0f6d7b32ac809bc696cd47d1022d1d849f4d05ea4a666b656adcd11fde616b,2024-06-26T12:44:29.693000 -CVE-2024-4885,0,0,5f57649506bc0f86a710ae8ff86e41b417f875a376c5869cfc82708c69a60b8f,2024-06-26T12:44:29.693000 +CVE-2024-4883,0,1,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000 +CVE-2024-4884,0,1,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000 +CVE-2024-4885,0,1,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000 CVE-2024-4888,0,0,fec1e03b9425eafa3abf9c794b417e5dd9f4ec5c0ccb57ecd621528833d262c0,2024-06-07T14:56:05.647000 @@ -259622,10 +259625,10 @@ CVE-2024-5002,0,0,28b740bd033d1abfd76c98a370fcc8a1a0efc6df8c7198f0eedf8751902072 CVE-2024-5003,0,0,657f01af6ae4ffebd5508957e0a4ee664437c9c42d64fc0c4eaff54aefed6593,2024-07-18T16:18:33.020000 CVE-2024-5004,0,0,dbb46916d3eaa00ba190ac36848b4f73f0fcf9ebf3415c8f81f52119cf8e2d54,2024-08-01T13:59:37.913000 CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24 -CVE-2024-5008,0,0,f3aaf1b56a85696455021e99c44b023e10f5e30320f1c5f1ff29548a21b19bae,2024-06-26T12:44:29.693000 -CVE-2024-5009,0,0,e5007830320ec10d10aee0ad37c5a929e2247f2929e9cd3c875dca917cc302ee,2024-06-26T12:44:29.693000 -CVE-2024-5010,0,0,af35128cc9db48220726dcddff7a65b4ed403a9dff49a9c43e67e875bed0adc1,2024-06-26T14:15:11.250000 -CVE-2024-5011,0,0,3893ac733a665090571cbc9b1d86bf3eb7381b999fcc8d59c6d135913d8c6665,2024-06-26T14:15:11.350000 +CVE-2024-5008,0,1,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000 +CVE-2024-5009,0,1,4fd7bfd86519955de695550b550ff6287bae2637bb330aab0edb8e0b318761f0,2024-09-06T22:43:04.747000 +CVE-2024-5010,0,1,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 +CVE-2024-5011,0,1,4026c0ac2cac7aea5c94096b029296404a58ceafdfae2ce6d40eb650db37ee86,2024-09-06T22:41:46.253000 CVE-2024-5012,0,0,5697b5fa6ba20e1501d7704fc1f19cf57893d5f71753b80662113f567a057a81,2024-08-21T13:34:41.107000 CVE-2024-5013,0,0,2b6e46c5c558997322ab16e56ac5bd13f8f3890cf64227402cfe38f28e8502bf,2024-08-21T13:35:28.750000 CVE-2024-5014,0,0,a159cfb950f4667dfac650da1dbd95c7b0726154dc655b46619c19dd5e035fa0,2024-08-21T13:36:06.417000 @@ -259740,7 +259743,7 @@ CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 -CVE-2024-5138,0,1,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 +CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 CVE-2024-5143,0,0,e21a987518c06589a6da36e0d35257f005aa787fff502677dfeaefae4b228c17,2024-05-24T01:15:30.977000 @@ -260465,7 +260468,7 @@ CVE-2024-5987,0,0,59ef1dd47c3a32e79663e3d46a9f8e7914697e67936dad31245855d212c4b5 CVE-2024-5988,0,0,6a93e103554a4b2cea7532bb149420b2c5e22d63c1fab23818b5950d94f50a5e,2024-06-25T18:50:42.040000 CVE-2024-5989,0,0,5b8da9d53fdfd0fd3971e8489f4ae4ce0e952b56f28f99337bb24ad669904afb,2024-06-25T18:50:42.040000 CVE-2024-5990,0,0,815ffdec6ed9055e0c29635260b790d8ae8601700cacf3380cde4c3f20ff7240,2024-06-25T18:50:42.040000 -CVE-2024-5991,0,0,e082a26a3412cd6203ddcff1c59506086c1e6d36fa06530b6a36731be74810dd,2024-08-28T12:57:39.090000 +CVE-2024-5991,0,1,fe91480125318e1887501309371643eaea8c60c621bd042cca787c9779dab434,2024-09-06T22:51:41.470000 CVE-2024-5992,0,0,71d2329832d35306ba58326f8edc972973ae3f2f48367fcc1028f4ed5d9fb912,2024-07-09T18:19:14.047000 CVE-2024-5993,0,0,b45a0ae570b278a2a66647d60174ec8036c753d27cba9d6e9660698bbc3fa2d6,2024-07-09T18:19:14.047000 CVE-2024-5994,0,0,c1974f8e417911883c192155213f25e6e809cb75c20fd828172f5e744b8258d3,2024-06-17T12:42:04.623000 @@ -261086,7 +261089,7 @@ CVE-2024-6781,0,0,678fc4d6db3dccbbb40576923dc15e296dd0a3cca23bbb526dd93d0dbc8a0c CVE-2024-6782,0,0,623508ea52e56d6a6e227168366ca2cd7770a1a0850e95e080f5f12fc915b728,2024-08-06T16:30:24.547000 CVE-2024-6783,0,0,6f1f4a0fa578d50da4a4853fdfd24c63ba19a8604300ab142edf0f6cb8d9a812,2024-08-30T15:15:18.623000 CVE-2024-6788,0,0,55fb0d510962e755b83a0ccc2efad4312001b246df777a622c08f48560e29a88,2024-08-13T17:11:53.553000 -CVE-2024-6789,0,0,231bd77c8db40b763ff18cdedd6d2a472872c681c24ea5a4e63b0563b010d2cc,2024-08-27T13:01:37.913000 +CVE-2024-6789,0,1,ea44c6537868ea4b0c5464bf7cf774ec36644f14fa858df1a024d527f74ea7b8,2024-09-06T22:31:04.833000 CVE-2024-6791,0,0,530a9e011d938f884a817484b487117900f43c2f83e7c51084019bfb404fc80f,2024-07-24T12:55:13.223000 CVE-2024-6792,0,0,e783451886045e1eac6661fbc4d3996b753ddb1f8514839a73a972f104f2ef73,2024-09-06T13:35:02.020000 CVE-2024-6793,0,0,d3b7076c1491770aa57006b0fda0ca29233a316fd768110e179dab36334b145c,2024-07-24T12:55:13.223000 @@ -261614,8 +261617,8 @@ CVE-2024-7561,0,0,4f145ac8bff9e09f18481f098864cf0c68d07bfaa0facd60438519477eaf9c CVE-2024-7564,0,0,9647575e3fbd33f04dc9f7112e25f0abbbf3e6266c5fe28f9ec18868dfbd0106,2024-08-07T19:59:36.240000 CVE-2024-7567,0,0,8d84928fabcffd92f0ffc65ee27fdbbaa4428b293e351afb4071fd1cdbd8dfa6,2024-08-14T02:07:05.410000 CVE-2024-7568,0,0,d240e1c33af9e03c75feb4937b0ddf33906a854d9c30167cff3fa79482350e46,2024-08-26T12:47:20.187000 -CVE-2024-7569,0,1,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000 -CVE-2024-7570,0,1,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000 +CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000 +CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000 CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 CVE-2024-7578,0,0,fafe75f6c08f3db49e42d74dbc7c12d20ded3ec028530cd367a8cd3d9bc7695e,2024-08-28T18:27:18.510000 @@ -261631,7 +261634,7 @@ CVE-2024-7589,0,0,aa1647eb6c306ec7b876b5795f9775a883f5cc7b06ae7ba418ac0c8e496652 CVE-2024-7590,0,0,7c97d5aae327ca695e1cd419af58bc8aaacb7517411055405e5e64d98b0261a2,2024-08-13T12:58:25.437000 CVE-2024-7591,0,0,93e76a9c527669096be2abfdb6462a0311db24e202fd8d23d80d88ff40dd1ed7,2024-09-06T12:08:21.290000 CVE-2024-7592,0,0,af44aafcb14e521ee1ae85082a6a487c5d017e994f40b59b2c958cad447a75f0,2024-09-04T21:15:14.643000 -CVE-2024-7593,0,0,2efb8857fe8e314338e0788060f0e22f0d56642d5618c3e3d62e70b5e7e24bac,2024-08-14T02:07:05.410000 +CVE-2024-7593,0,1,4da85e7ccbdae09b92bad5968b875ba9d0537591e39a68c4cb01282a2ce99145,2024-09-06T22:13:21.197000 CVE-2024-7599,0,0,a956cdc05d3339353d73900769844a6746f6caba229f81de6c9855b66ed02e8f,2024-09-06T16:46:26.830000 CVE-2024-7600,0,0,456ca552c9a809b72d1cc9f2b35e12282778424a2ecdfd82d7e98a6e39cd97fa,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,db9958425836572eda0b52c7e651aff0e41e4dc47ec55ea348bc5752e1b198d2,2024-08-23T16:35:52.383000 @@ -261675,7 +261678,7 @@ CVE-2024-7647,0,0,c2417bbd838d2a2a494407e7a47e50a82d7e6b69bb49e726beca72fa9570b1 CVE-2024-7648,0,0,2049ae7cbf0cab301bb3d8a4c000a0971cbb2a1bb7b1a04dd9face1c419d935f,2024-08-12T13:41:36.517000 CVE-2024-7649,0,0,3d0b3905ac20943345a47479273aed49759614ef3fae3b2688335294d499ed3d,2024-08-12T13:41:36.517000 CVE-2024-7651,0,0,386a7bb7aa0b4a32ced6fe813025ac2a231789f032ca2ee2a42adaaefdd20a30,2024-08-31T03:28:02.947000 -CVE-2024-7652,0,1,00323b94c746cc0f49a6bcca986d645cd4d56dd1a84ab67f71ac3f07744c2c1f,2024-09-06T21:35:19.660000 +CVE-2024-7652,0,0,00323b94c746cc0f49a6bcca986d645cd4d56dd1a84ab67f71ac3f07744c2c1f,2024-09-06T21:35:19.660000 CVE-2024-7654,0,0,49383a5796e66ab6802124ac3212336a9fa34e97b446554c0840904b1dbfce6f,2024-09-05T13:53:16.540000 CVE-2024-7656,0,0,54bddf4f1c99f206f2f263928ecdc7b2851230b8a0f25d44b79aae993350ca70,2024-08-26T12:47:20.187000 CVE-2024-7657,0,0,b71ee6cae903ac873f30f4d097ac987c873f0095983bc9620eda1ffab659d5b8,2024-08-15T17:48:20.920000 @@ -261719,7 +261722,7 @@ CVE-2024-7711,0,0,d162b2aa52f460525a4de3c665dffbe11ff5ad157026981df71b9201129fde CVE-2024-7712,0,0,0b5a8e9c5ba36af8bef340cc5ae017c9fa1ba3b9186fddf3fda3dcc554ec2462,2024-08-30T16:15:11.050000 CVE-2024-7715,0,0,cce2a99e52ea07f4f42d2501434c3e0483cd57d931341a557261d628f3236d39,2024-08-15T15:15:22.690000 CVE-2024-7717,0,0,7bb6c5f4c19977a1c62bcb7f56c31a10a8375a822d55bfe8140c9d2426ca6889,2024-09-03T12:59:02.453000 -CVE-2024-7720,0,0,ddf81bc4df03ac1e2d7b5b61581e0a5dc6cc3f46e57542a631155ffde48ea5ad,2024-08-28T14:35:14.160000 +CVE-2024-7720,0,1,71f1c1973f29e2c7c1373dd24daaa52398594a70072a570fc445a13cbea904ba,2024-09-06T22:33:30.767000 CVE-2024-7722,0,0,dd34a6c6fa187cfdff62390c6b38a3b9bbf49b761e6117c420a823ed09401edf,2024-08-21T17:24:59.627000 CVE-2024-7723,0,0,0bdf76bf964a28a97b4d4d8ab086a048836c54fd8be0e41d26426907a661be8a,2024-08-21T17:24:59.627000 CVE-2024-7724,0,0,fd9d5d4a5cde684cb1f23cf1c101e9cac57afdf61c2e095e3e5cfe8dee5c7260,2024-08-21T17:24:59.627000 @@ -261958,9 +261961,9 @@ CVE-2024-8155,0,0,fe38ccfd4767b6e01bc47bbf13a366f64470ea038445dcb6f48d6c1a6380c4 CVE-2024-8158,0,0,8ac397614ea8bcd3bd2bf49698f88ba96c85aeae3c3edb7c31f4b63e73c01d66,2024-08-26T12:47:20.187000 CVE-2024-8161,0,0,cd13a3f8a1d31274c9ab84b7ce8fd24ad13e50be7d970e595f1245741eba1677,2024-08-26T12:47:20.187000 CVE-2024-8162,0,0,2f15be70d7b9e402b643053e8cc2849077cf4472f134c84060c0898ffb295f28,2024-08-27T14:28:46.927000 -CVE-2024-8163,0,0,2b33aa12e9b5396511ceeb0ddb5c09644e462e2419cefa1d9405e7869864efad,2024-08-26T15:15:23.727000 -CVE-2024-8164,0,0,b4e3e587ad2686dce20b95e66c72594ce4762348dc65ff48827050c2ee56b3f9,2024-08-26T15:15:23.727000 -CVE-2024-8165,0,0,f43afc9fcf1c1e78bc7ea9af37222216d3925e3673d7d3cab857085af5387f07,2024-08-26T15:15:23.727000 +CVE-2024-8163,0,1,34076faaf51f1e489aa58346c56061ee9718b828b5ae0365e6c357cdf31c941d,2024-09-06T22:18:19.283000 +CVE-2024-8164,0,1,f532add158f51f094ffe0f96bd30c0edbc06f69a220e37f850c6546174add3a7,2024-09-06T22:19:53.907000 +CVE-2024-8165,0,1,30af74acf30a50149c9aea2035b59ab295b6f97042636173e519627288075fcf,2024-09-06T22:20:41.553000 CVE-2024-8166,0,0,f12f4299a569f15901062ca88855adc385daab485a9c5a1ac8234fa6d74f6eec,2024-08-27T13:03:38.227000 CVE-2024-8167,0,0,e1d76d41e7f83c83df1202942336f7e4e5679c0385cffbe5279207329dff3a19,2024-08-26T18:45:44.287000 CVE-2024-8168,0,0,9955e844b80349a9eb3954506e8959a22faf2c7afd6ad4972803d0a2ade5036e,2024-08-26T18:45:02.637000 @@ -262010,7 +262013,7 @@ CVE-2024-8235,0,0,d5aa509f85958c98e1ad9dcfec5d574bff6f5e3781d6d0bbdba4997de15951 CVE-2024-8247,0,0,5202f9f70242e6e766f5bf4ee04774da230414090293c913b32ce2eadeefe661,2024-09-06T12:08:04.550000 CVE-2024-8250,0,0,9b93a65d8c7dcee06e07a2e2b390d716b51503d05b493ec48aa5a8756ae94b8c,2024-08-30T16:32:16.917000 CVE-2024-8252,0,0,36e1aa114a02ff2bf925a636a4ed4135ae0e6011078bf9fd8b3aff586823c205,2024-09-03T14:31:27.243000 -CVE-2024-8255,0,0,6c498c108684434305256b803e17a8c75dfbb80191f87c9993edaaba373ae570,2024-08-30T13:00:05.390000 +CVE-2024-8255,0,1,c6874ac38c80acc73ad7edcdfa1b6810f24be9f578842829800024511d128d5a,2024-09-06T22:53:34.187000 CVE-2024-8260,0,0,80de48284b9b1f60542ccd162f62ac34372df44b6034ef82705622d907f32295,2024-09-03T12:59:02.453000 CVE-2024-8274,0,0,81f15088246893eaf3249a3304ee5d5199071263c8883a7f9f22c293a16a376a,2024-09-03T14:28:06.853000 CVE-2024-8276,0,0,6d091b531458424cc4635f6e051f410dabbe91d1101fd761130b66815a93f34d,2024-09-03T12:59:02.453000 @@ -262089,6 +262092,7 @@ CVE-2024-8417,0,0,a9619e26c595954087d9c9b458e78703071fbd5bf87ff4a22ec6d8ecc7076f CVE-2024-8418,0,0,f7342b1aaf36f471815aa50c659bed6ce97deba1a8dc8297ac025dec31c9e421,2024-09-05T14:18:49.537000 CVE-2024-8427,0,0,1d0d7daf1e8474e50325418d52e79c4545246c244dd6a29747e6934be9944c58,2024-09-06T12:08:04.550000 CVE-2024-8428,0,0,32f99662d2ff0a82eac2c387b5879cdce3b74766786e4d561b16e1b245df448a,2024-09-06T16:46:26.830000 +CVE-2024-8439,1,1,b4eacb6a11dc14d7212cfdbe9629a765b4f24ad00bc9c4fc2289184c4fdae508,2024-09-06T22:15:02.320000 CVE-2024-8445,0,0,11be885f11a2f2b8a202932b0e16edeb442a7212afe3a0c8e195900656f3fddf,2024-09-05T17:44:56.007000 CVE-2024-8460,0,0,21c8cc38664ba19f902747cfc2492ea27c718e3ca35401645ae4d1c6ff7413b5,2024-09-06T16:30:54.027000 CVE-2024-8461,0,0,e49804a708251a77ac276dc2c87288b6f990bf8f9a9704c388f55d96a1de96d3,2024-09-05T17:45:07.877000