diff --git a/CVE-2018/CVE-2018-251xx/CVE-2018-25105.json b/CVE-2018/CVE-2018-251xx/CVE-2018-25105.json index f33a12019ea..b817341fc3a 100644 --- a/CVE-2018/CVE-2018-251xx/CVE-2018-25105.json +++ b/CVE-2018/CVE-2018-251xx/CVE-2018-25105.json @@ -2,8 +2,8 @@ "id": "CVE-2018-25105", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:05.467", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:23:57.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.0", + "matchCriteriaId": "3C1C0E9F-2C3E-4AF5-A367-6941B5D92530" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=1942390%40wp-file-manager&new=1942390%40wp-file-manager&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a56d5a2f-ae13-4523-bc4a-17bb2fb4c6f0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2019/CVE-2019-252xx/CVE-2019-25213.json b/CVE-2019/CVE-2019-252xx/CVE-2019-25213.json index 985b4ca0e10..d441940d9d2 100644 --- a/CVE-2019/CVE-2019-252xx/CVE-2019-25213.json +++ b/CVE-2019/CVE-2019-252xx/CVE-2019-25213.json @@ -2,8 +2,8 @@ "id": "CVE-2019-25213", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:05.790", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:20:42.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vasyltech:advanced_access_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.9.8.1", + "matchCriteriaId": "66170E0E-92A2-44E5-A6F0-83595E62C8C7" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/2098838/advanced-access-manager/trunk/application/Core/Media.php?old=2151316&old_path=advanced-access-manager%2Ftrunk%2Fapplication%2FCore%2FMedia.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/55e0f0df-7be2-4e18-988c-2cc558768eff?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2020/CVE-2020-263xx/CVE-2020-26311.json b/CVE-2020/CVE-2020-263xx/CVE-2020-26311.json index 2332ec06b3d..409984a2fe4 100644 --- a/CVE-2020/CVE-2020-263xx/CVE-2020-26311.json +++ b/CVE-2020/CVE-2020-263xx/CVE-2020-26311.json @@ -2,8 +2,8 @@ "id": "CVE-2020-26311", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-26T21:15:14.400", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:07:38.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -73,14 +95,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:useragent_project:useragent:*:*:*:*:*:node.js:*:*", + "matchCriteriaId": "BBA66A46-0609-4D7A-8CB6-B5EAA8E5BB0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/3rd-Eden/useragent/issues/167", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2020-312-redos-useragent/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-263xx/CVE-2021-26387.json b/CVE-2021/CVE-2021-263xx/CVE-2021-26387.json index 020262ab58b..809fcff55fe 100644 --- a/CVE-2021/CVE-2021-263xx/CVE-2021-26387.json +++ b/CVE-2021/CVE-2021-263xx/CVE-2021-26387.json @@ -2,7 +2,7 @@ "id": "CVE-2021-26387", "sourceIdentifier": "psirt@amd.com", "published": "2024-08-13T17:15:17.563", - "lastModified": "2024-08-14T02:07:05.410", + "lastModified": "2024-10-30T18:35:00.703", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html", diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4448.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4448.json index 6b09ddb960b..3de30bc7c6f 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4448.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4448.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4448", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:10.980", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:18:58.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kaswara_project:kaswara:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.0.1", + "matchCriteriaId": "8B9EF5A0-624E-4C09-8DB5-8DD87CFF3FFA" + } + ] + } + ] + } + ], "references": [ { "url": "https://codecanyon.net/item/kaswara-modern-visual-composer-addons/19341477", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf76527-9a11-4755-992c-02fbc1a79bae?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4449.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4449.json index 99798062336..fa1c00594f8 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4449.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4449.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4449", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:11.243", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:06:45.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,30 +51,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:digitalzoomstudio:zoomsounds:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.96", + "matchCriteriaId": "18F540A6-EDA6-432F-9F80-9CEFA635C98C" + } + ] + } + ] + } + ], "references": [ { "url": "https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/0xAgun/Arbitrary-File-Upload-ZoomSounds", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://ithemes.com/blog/wordpress-vulnerability-report-june-2021-part-5/#ib-toc-anchor-2", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://sploitus.com/exploit?id=WPEX-ID:07259A61-8BA9-4DD0-8D52-CC1DF389C0AD", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit" + ] }, { "url": "https://wpscan.com/vulnerability/07259a61-8ba9-4dd0-8d52-cc1df389c0ad", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/262e3bb3-bc83-4d0b-8056-9f94ec141b8f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4450.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4450.json index 1bf773eaf8b..19aed7913de 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4450.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4450.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4450", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:11.527", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:47:05.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pickplugins:post_grid:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.12", + "matchCriteriaId": "75DBB5BA-4674-490D-BE00-C490CE152EB6" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/2644269", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a321b112-ce37-4a0e-800f-f3feef6ac799?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-44xx/CVE-2021-4451.json b/CVE-2021/CVE-2021-44xx/CVE-2021-4451.json index ea1ffde34b6..8cf5fbaba63 100644 --- a/CVE-2021/CVE-2021-44xx/CVE-2021-4451.json +++ b/CVE-2021/CVE-2021-44xx/CVE-2021-4451.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4451", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-16T07:15:11.770", - "lastModified": "2024-10-16T16:38:14.557", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:44:27.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nintechnet:ninjafirewall:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.3.3", + "matchCriteriaId": "B40285DA-CA5C-4957-8463-763DE6476032" + } + ] + } + ] + } + ], "references": [ { "url": "https://blog.nintechnet.com/security-issue-fixed-in-ninjafirewall-wp-edition/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a1fc6c9-50cd-40fd-a777-9eed98aab797?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-490xx/CVE-2022-49001.json b/CVE-2022/CVE-2022-490xx/CVE-2022-49001.json index 383836727f9..4902cfbcb78 100644 --- a/CVE-2022/CVE-2022-490xx/CVE-2022-49001.json +++ b/CVE-2022/CVE-2022-490xx/CVE-2022-49001.json @@ -2,8 +2,8 @@ "id": "CVE-2022-49001", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-21T20:15:11.773", - "lastModified": "2024-10-23T15:13:25.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:58:53.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,124 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: riscv: arregla la ejecuci\u00f3n cuando se desborda la pila de vmap Actualmente, al detectar un desbordamiento de la pila de vmap, riscv primero cambia a la llamada pila de sombra, luego usa esta pila de sombra para llamar a get_overflow_stack() para obtener la pila de desbordamiento. Sin embargo, aqu\u00ed hay una ejecuci\u00f3n si dos o m\u00e1s harts usan la misma pila de sombra al mismo tiempo. Para resolver esta ejecuci\u00f3n, introducimos la variable at\u00f3mica spin_shadow_stack, que se intercambiar\u00e1 entre su propia direcci\u00f3n y 0 de forma at\u00f3mica, cuando la variable est\u00e1 configurada, significa que se est\u00e1 usando shadow_stack; cuando la variable se borra, significa que no se est\u00e1 usando shadow_stack. [Palmer: Agrega AQ al intercambio y tambi\u00e9n algunos comentarios]." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "5.15.82", + "matchCriteriaId": "6B49AE96-FD69-40D4-A29C-DC4DB7DE3CDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.0.12", + "matchCriteriaId": "D6D56E90-F3EE-413D-B3E2-B518932F0C7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc1:*:*:*:*:*:*", + "matchCriteriaId": "E7E331DA-1FB0-4DEC-91AC-7DA69D461C11" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc2:*:*:*:*:*:*", + "matchCriteriaId": "17F0B248-42CF-4AE6-A469-BB1BAE7F4705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc3:*:*:*:*:*:*", + "matchCriteriaId": "E2422816-0C14-4B5E-A1E6-A9D776E5C49B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc4:*:*:*:*:*:*", + "matchCriteriaId": "1C6E00FE-5FB9-4D20-A1A1-5A32128F9B76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc5:*:*:*:*:*:*", + "matchCriteriaId": "35B26BE4-43A6-4A36-A7F6-5B3F572D9186" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc6:*:*:*:*:*:*", + "matchCriteriaId": "3FFFB0B3-930D-408A-91E2-BAE0C2715D80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.1:rc7:*:*:*:*:*:*", + "matchCriteriaId": "8535320E-A0DB-4277-800E-D0CE5BBA59E8" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/7e1864332fbc1b993659eab7974da9fe8bf8c128", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/879fabc5a95401d9bce357e4b1d24ae4a360a81f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ac00301adb19df54f2eae1efc4bad7447c0156ce", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-383xx/CVE-2023-38379.json b/CVE-2023/CVE-2023-383xx/CVE-2023-38379.json index 46718a4c057..4d7474db350 100644 --- a/CVE-2023/CVE-2023-383xx/CVE-2023-38379.json +++ b/CVE-2023/CVE-2023-383xx/CVE-2023-38379.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38379", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-16T17:15:09.337", - "lastModified": "2023-07-26T03:28:37.867", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T18:35:01.937", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0568.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0568.json index 197ff703bd4..0d8964aa35f 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0568.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0568", "sourceIdentifier": "cybersecurity@se.com", "published": "2024-02-14T17:15:11.440", - "lastModified": "2024-02-14T18:04:50.373", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:52:38.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "cybersecurity@se.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "cybersecurity@se.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cybersecurity@se.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +81,69 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:se:rmnf22tb30_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "8AD0EE30-4C33-49FC-ACAF-0954B6146663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:se:rmnf22tb30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E183566E-1734-4530-8919-066259D6FBF5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:se:renf22r2mmw_firmware:*:*:*:*:*:*:*:*", + "matchCriteriaId": "ABF12535-94D8-4D4A-81F9-55C37C59052D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:se:renf22r2mmw:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7855741A-4D18-408A-A7EB-C37C1388ADA3" + } + ] + } + ] + } + ], "references": [ { "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2024-044-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2024-044-02.pdf", - "source": "cybersecurity@se.com" + "source": "cybersecurity@se.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json index 37c6207fcdf..833e6278f11 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10033", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-16T17:15:13.267", - "lastModified": "2024-10-30T03:15:03.337", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:50:04.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", @@ -51,18 +71,72 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:ansible_automation_platform:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3FEC89-D26D-4144-8298-4276390AE424" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:ansible_developer:1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "EF19DE86-0524-4785-B606-F8E384FD23F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:ansible_inside:1.3:*:*:*:*:*:*:*", + "matchCriteriaId": "B2C9238C-11E7-42A2-A87B-3B82F1F6DA5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/errata/RHSA-2024:8534", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/security/cve/CVE-2024-10033", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2319162", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json index c6973e10efe..5afbfd416d8 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10234.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10234", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-22T14:15:14.573", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:50:59.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N", @@ -51,14 +71,42 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:*:*:*:*", + "matchCriteriaId": "824BB506-D01A-4C88-AD4A-3C94A2409CD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "01FBC63E-BB92-49FF-AA00-BF0FCC17732A" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-10234", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2320848", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10355.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10355.json index 337e418bcbf..0a141106e36 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10355.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10355.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10355", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-25T01:15:13.497", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:13:02.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,26 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/K1nako0/tmp_vuln4/blob/main/README.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281702", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281702", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.430077", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.sourcecodester.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10379.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10379.json index 6fdfae4f9b8..7155437ffd3 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10379.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10379.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10379", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-25T12:15:02.890", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:54:15.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in ESAFENET CDG 5. Affected by this vulnerability is the function actionViewDecyptFile of the file /com/esafenet/servlet/client/DecryptApplicationService.java. The manipulation of the argument decryptFileId with the input ../../../Windows/System32/drivers/etc/hosts leads to path traversal: '../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The affected function has a typo and is missing an R. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en ESAFENET CDG 5. La funci\u00f3n actionViewDecyptFile del archivo /com/esafenet/servlet/client/DecryptApplicationService.java est\u00e1 afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento decryptFileId con la entrada ../../../Windows/System32/drivers/etc/hosts conduce a un path traversal: '../filedir'. El ataque se puede lanzar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La funci\u00f3n afectada tiene un error tipogr\u00e1fico y le falta una R. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -116,22 +150,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*", + "matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/0b03c61a-76a5-4f45-9ee7-a88e0f21d539?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.281809", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.281809", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.426087", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10426.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10426.json index 35b5cb8b3b8..04e4aa7ae39 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10426.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10426.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10426", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T20:15:02.447", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:16:03.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/21", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281967", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281967", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.432132", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10427.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10427.json index 16fb98545ac..0ecf9ce6bce 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10427.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10427", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T20:15:02.743", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:21:48.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/22", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.281968", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281968", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.432134", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10430.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10430.json index 32365252bad..f3445cce6ea 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10430.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10430.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10430", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T23:15:02.487", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:48:43.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/23", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281981", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281981", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.432149", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10431.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10431.json index 6c8950558dc..a4e5cce5012 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10431.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10431.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10431", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-27T23:15:02.747", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:10:49.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,54 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codezips:pet_shop_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E41915B8-0D4A-49AF-90F2-6DBCAE78A889" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ppp-src/CVE/issues/24", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281982", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281982", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.432150", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10432.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10432.json index fac5c6d6b49..63730641f24 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10432.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10432.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10432", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-28T00:15:03.103", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:45:59.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:simple_web-based_chat_application:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FDF20687-0AD7-4A55-95AA-EC9E8B8BEBFA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_sqli.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281983", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281983", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.432234", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10433.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10433.json index 1af324cebd3..9e0802e39c8 100644 --- a/CVE-2024/CVE-2024-104xx/CVE-2024-10433.json +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10433.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10433", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-28T00:15:03.370", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:31:49.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:projectworlds:simple_web-based_chat_application:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FDF20687-0AD7-4A55-95AA-EC9E8B8BEBFA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/jadu101/CVE/blob/main/project_worlds_simple_web_based_chat_app_index_xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281984", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281984", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.432236", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-104xx/CVE-2024-10456.json b/CVE-2024/CVE-2024-104xx/CVE-2024-10456.json new file mode 100644 index 00000000000..f671eb09e3f --- /dev/null +++ b/CVE-2024/CVE-2024-104xx/CVE-2024-10456.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-10456", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2024-10-30T18:15:05.123", + "lastModified": "2024-10-30T18:15:05.123", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Delta Electronics InfraSuite Device Master versions prior to 1.0.12 are affected by a deserialization vulnerability that targets the Device-Gateway, which could allow deserialization of arbitrary .NET objects prior to authentication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ics-cert@hq.dhs.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-303-03", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21722.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21722.json index 6be6dd9961c..d87f0cc0a6e 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21722.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21722.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21722", "sourceIdentifier": "security@joomla.org", "published": "2024-02-29T01:44:03.627", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-10-30T18:35:02.897", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Las funciones de administraci\u00f3n de MFA no finalizaban correctamente las sesiones de usuario existentes cuando se modificaban los m\u00e9todos de MFA de un usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22105.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22105.json index 604939d1da9..5e382dce7d1 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22105.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22105.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22105", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-02T16:15:03.877", - "lastModified": "2024-07-05T17:03:50.940", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T18:35:03.223", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2241.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2241.json index 18a7b45e3c2..1eb0596f9bd 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2241.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2241.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2241", "sourceIdentifier": "security@devolutions.net", "published": "2024-03-07T13:15:07.533", - "lastModified": "2024-03-07T13:52:27.110", + "lastModified": "2024-10-30T18:35:06.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El control de acceso inadecuado en la interfaz de usuario en Devolutions Workspace 2024.1.0 y versiones anteriores permite que un usuario autenticado realice acciones no deseadas a trav\u00e9s de permisos espec\u00edficos" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://devolutions.net/security/advisories/DEVO-2024-0003", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json index 1b41ab0e7e9..8d1eb7198a8 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27849.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27849", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.093", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:07:30.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda leer informaci\u00f3n confidencial sobre la ubicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.0", + "matchCriteriaId": "E8017C16-A17E-4AE7-9A0B-1295200A3A45" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27853.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27853.json index 02032a1d070..e7af7acafed 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27853.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27853", "sourceIdentifier": "product-security@apple.com", "published": "2024-07-29T23:15:10.297", - "lastModified": "2024-08-12T15:13:14.897", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T18:35:04.113", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30112.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30112.json index 6694811dec4..82f52ea7e47 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30112.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30112.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30112", "sourceIdentifier": "psirt@hcl.com", "published": "2024-06-25T22:15:30.117", - "lastModified": "2024-06-26T12:44:29.693", + "lastModified": "2024-10-30T18:35:07.780", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0114148", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30126.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30126.json index 3eb9451329b..e3359bd9d9a 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30126.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30126.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30126", "sourceIdentifier": "psirt@hcl.com", "published": "2024-07-18T20:15:03.967", - "lastModified": "2024-07-19T13:01:44.567", + "lastModified": "2024-10-30T17:35:02.160", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0113886", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30807.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30807.json index a7369925c35..ca126e74dcc 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30807.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30807.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30807", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-02T18:15:12.460", - "lastModified": "2024-04-02T20:31:58.463", + "lastModified": "2024-10-30T18:35:08.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Bento4 v1.6.0-641-2-g1529b83. Hay un heap-use-after-free en AP4_UnknownAtom::~AP4_UnknownAtom en Ap4Atom.cpp, lo que provoca una denegaci\u00f3n de servicio (DoS), como lo demuestra mp42ts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/937", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30885.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30885.json index dbfe8a2ac20..dbce1ca0bd4 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30885.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30885.json @@ -2,7 +2,7 @@ "id": "CVE-2024-30885", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-11T05:15:47.730", - "lastModified": "2024-04-11T12:47:44.137", + "lastModified": "2024-10-30T18:35:09.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting (XSS) reflejado en HadSky v7.6.3, permite a atacantes remotos ejecutar c\u00f3digo arbitrario y obtener informaci\u00f3n confidencial a trav\u00e9s del componente chklogin.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Hebing123/cve/issues/29", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31064.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31064.json index 1133ec98272..fc33cb0e471 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31064.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31064.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31064", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T19:15:49.057", - "lastModified": "2024-03-28T20:53:20.813", + "lastModified": "2024-10-30T17:35:03.070", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de cross-site scripting en Insurance Mangement System v.1.0.0 y anteriores permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del campo de entrada Nombre." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://insurance.com", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31392.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31392.json index ac04e9b8fd8..5ea795fef2c 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31392.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31392.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31392", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-03T16:15:07.230", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-10-30T17:35:03.930", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Si se agregaba un elemento inseguro a una p\u00e1gina despu\u00e9s de un retraso, Firefox no reemplazar\u00eda el \u00edcono seguro con un estado de seguridad de contenido mixto. Esta vulnerabilidad afecta a Firefox para iOS < 124." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1875925", diff --git a/CVE-2024/CVE-2024-315xx/CVE-2024-31574.json b/CVE-2024/CVE-2024-315xx/CVE-2024-31574.json index 9b17c5f28e4..d44114df8c1 100644 --- a/CVE-2024/CVE-2024-315xx/CVE-2024-31574.json +++ b/CVE-2024/CVE-2024-315xx/CVE-2024-31574.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31574", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-25T17:15:49.853", - "lastModified": "2024-04-25T17:24:59.967", + "lastModified": "2024-10-30T17:35:04.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross-Site Scripting en TWCMS v.2.6 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ysl1415926/cve/blob/main/CVE-2024-31574.md", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31634.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31634.json index 26ccd0e15ca..af7e2321569 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31634.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31634.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31634", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-16T04:15:08.463", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-10-30T17:35:04.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting (XSS) en Xunruicms versiones 4.6.3 y anteriores, permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del archivo Security.php en el cat\u00e1logo \\XunRuiCMS\\dayrui\\Fcms\\Library." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/buchilajiao1/CVE/blob/main/xunruicms/xunruicms.md", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31652.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31652.json index 4c4947453cc..e15cd3e0b3d 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31652.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31652.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31652", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-15T21:15:07.637", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-10-30T17:35:05.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Cross-site scripting (XSS) en Cosmetics and Beauty Product Online Store v1.0 permite a los atacantes ejecutar scripts web o HTML arbitrario a trav\u00e9s de un payload manipulado inyectado en el par\u00e1metro de b\u00fasqueda." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mohitkumar0786/CVE/blob/main/CVE-2024-31652.md", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31946.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31946.json index 4f770038164..536cdcab313 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31946.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31946.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31946", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-15T19:15:02.503", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-10-30T17:35:06.460", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en Stormshield Network Security (SNS) 3.7.0 a 3.7.41, 3.10.0 a 3.11.29, 4.0 a 4.3.24 y 4.4.0 a 4.7.4. Un usuario que tiene acceso al SNS con acceso de escritura en la p\u00e1gina de alertas por correo electr\u00f3nico tiene la capacidad de crear correos electr\u00f3nicos de alerta que contienen JavaScript malicioso, ejecutado mediante la vista previa de la plantilla. Las siguientes versiones solucionan este problema: 3.7.42, 3.11.30, 4.3.25 y 4.7.5." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://advisories.stormshield.eu/2024-007", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31955.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31955.json index 1c8416ab24b..1db4257b667 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31955.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31955.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31955", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-15T21:15:10.690", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2024-10-30T17:35:07.267", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json new file mode 100644 index 00000000000..f492fbd1be4 --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31972.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-31972", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:06.760", + "lastModified": "2024-10-30T18:15:06.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EnGenius ESR580 A8J-EMR5000 devices allow a remote attacker to conduct stored XSS attacks that could lead to arbitrary JavaScript code execution (under the context of the user's session) via the Wi-Fi SSID input fields. Web scripts embedded into the vulnerable fields this way are executed immediately when a user logs into the admin page. This affects /admin/wifi/wlan1 and /admin/wifi/wlan_guest." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31972", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json new file mode 100644 index 00000000000..28c605f8e7e --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31973.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-31973", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:06.893", + "lastModified": "2024-10-30T18:15:06.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Hitron CODA-4582 2AHKM-CODA4589 7.2.4.5.1b8 devices allow a remote attacker within Wi-Fi proximity to conduct stored XSS attacks via the 'Network Name (SSID)' input fields to the /index.html#wireless_basic page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Hitron/CVE-2024-31973", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json new file mode 100644 index 00000000000..6698b8ddf89 --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31975.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-31975", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:06.967", + "lastModified": "2024-10-30T18:15:06.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EnGenius ESR580 devices through 1.1.30 allow a remote attacker to conduct stored XSS attacks via the Wi-Fi SSID parameters. JavaScript embedded into a vulnerable field is executed when the user clicks the SSID field's corresponding EDIT button." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31975", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json new file mode 100644 index 00000000000..44034376d5d --- /dev/null +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36060.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-36060", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.037", + "lastModified": "2024-10-30T18:15:07.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EnGenius EnStation5-AC A8J-ENS500AC 1.0.0 devices allow blind OS command injection via shell metacharacters in the Ping and Speed Test parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-36060", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json b/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json new file mode 100644 index 00000000000..35bcd5b5cf1 --- /dev/null +++ b/CVE-2024/CVE-2024-375xx/CVE-2024-37573.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-37573", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.107", + "lastModified": "2024-10-30T18:15:07.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Talkatone com.talkatone.android application 8.4.6 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.talkatone.vedroid.ui.launcher.OutgoingCallInterceptor component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/com.talkatone.android/blob/main/CVE-2024-37573", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json b/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json index f91e7a280d5..6fa0ad31eeb 100644 --- a/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json +++ b/CVE-2024/CVE-2024-408xx/CVE-2024-40853.json @@ -2,8 +2,8 @@ "id": "CVE-2024-40853", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:04.810", - "lastModified": "2024-10-29T20:35:25.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T17:08:42.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,50 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "ACD3B3B0-329C-413B-BDF7-6B1C6298846E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.0", + "matchCriteriaId": "2222A2EE-00FA-4019-8779-13B82A4F9DD0" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121250", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json index db5c0cdb0bd..ea9445cdf84 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42011.json @@ -2,7 +2,7 @@ "id": "CVE-2024-42011", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:05.043", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-30T18:35:10.283", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n Spotify 8.9.58 para iOS tiene un desbordamiento de b\u00fafer en el uso de strcat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://community.spotify.com/t5/iOS-iPhone-iPad/Spotify-constantly-crashes-lags-and-heats-up-my-battery/td-p/6217537", diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json new file mode 100644 index 00000000000..6b93ab33d63 --- /dev/null +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42041.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-42041", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.223", + "lastModified": "2024-10-30T18:15:07.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The com.videodownload.browser.videodownloader (aka AppTool-Browser-Video All Video Downloader) application 20-30.05.24 for Android allows an attacker to execute arbitrary JavaScript code via the acr.browser.lightning.DefaultBrowserActivity component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/com.videodownload.browser.videodownloader/blob/main/CVE-2024-42041", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json index e7796dfb881..a8c2c3e9271 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44175.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44175", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.737", - "lastModified": "2024-10-30T16:35:21.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T17:14:55.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "20977171-B964-4F89-AF53-6136003EDDB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121238", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json index 8186ed046bc..70952d5efb7 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44194", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.800", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:16:24.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,102 @@ "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en watchOS 11.1, visionOS 2.1, iOS 18.1 y iPadOS 18.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json index f56446f8915..979dbaafff0 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44197.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44197", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:05.917", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:35:11.603", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,30 @@ "value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada puede provocar una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://support.apple.com/en-us/121568", diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json index ab5f84b7ce1..47ab8fbe949 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44213", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.110", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:19:38.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "Exist\u00eda un problema en el an\u00e1lisis de las URL. Este problema se solucion\u00f3 mejorando la validaci\u00f3n de entrada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un atacante en una posici\u00f3n privilegiada en la red podr\u00eda filtrar informaci\u00f3n confidencial del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json index 3f6f590248f..b7608af8d82 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44215.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44215", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.167", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:22:44.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,163 @@ "value": "Este problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de una imagen puede provocar la divulgaci\u00f3n de la memoria del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B10D207-D2D8-465D-8A17-F77DC194BAA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53F54FA8-13B2-4E49-834B-F5465B074D76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json index f2f46b50fd2..ab8880cec99 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44218.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44218", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.237", - "lastModified": "2024-10-29T20:35:27.533", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T17:24:01.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,70 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B10D207-D2D8-465D-8A17-F77DC194BAA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53F54FA8-13B2-4E49-834B-F5465B074D76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "20977171-B964-4F89-AF53-6136003EDDB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json index 601ff735f7a..967c83af3d7 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44222.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44222", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.297", - "lastModified": "2024-10-29T19:35:15.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T17:25:30.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json index b3f674f91d1..8e5b8353745 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44236.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44236", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.520", - "lastModified": "2024-10-29T21:35:15.290", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T17:28:52.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json index 428d0c08357..6c26fb9e8fb 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44239", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.580", - "lastModified": "2024-10-29T14:34:50.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:30:13.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,163 @@ "value": "Se solucion\u00f3 un problema de divulgaci\u00f3n de informaci\u00f3n con una mejor redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. Es posible que una aplicaci\u00f3n filtre informaci\u00f3n confidencial del estado del kernel." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B10D207-D2D8-465D-8A17-F77DC194BAA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53F54FA8-13B2-4E49-834B-F5465B074D76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json index 7020553e2e0..bf1554d515b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44244.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44244", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.637", - "lastModified": "2024-10-29T23:15:03.547", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T17:31:35.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,138 @@ "value": "Se solucion\u00f3 un problema de corrupci\u00f3n de memoria con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, watchOS 11.1, visionOS 2.1 y tvOS 18.1. El procesamiento de contenido web manipulado con fines malintencionados puede provocar un bloqueo inesperado del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.1", + "matchCriteriaId": "1D298E1D-DD23-4D35-9DE4-E3F5999F97AA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "8B754D7C-3FF7-4275-9C5B-4DCECFACD491" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121564", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121571", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json index c26ef73c8b4..825305ac05b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44247", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.697", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:49:05.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,111 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json index 093f812316b..f67e1147001 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44251.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44251", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.757", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:35:11.887", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -15,11 +15,93 @@ "value": "Este problema se solucion\u00f3 mediante una mejor gesti\u00f3n del estado. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1. Un atacante podr\u00eda ver contenido restringido desde la pantalla de bloqueo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json index a64e90026b0..2755470000e 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44252.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44252", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.813", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:11:48.300", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,124 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica mejorando el manejo de archivos. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, visionOS 2.1 y tvOS 18.1. Restaurar un archivo de copia de seguridad manipulado con fines malintencionados puede provocar la modificaci\u00f3n de archivos de sistema protegidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json index bc02d52b9dc..af2fc9a2e59 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44253", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.870", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:14:05.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Es posible que una aplicaci\u00f3n pueda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json index f1911eeb806..660cf886206 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44254.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44254", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:06.933", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:20:42.880", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,117 @@ "value": "Este problema se solucion\u00f3 con una redacci\u00f3n mejorada de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en watchOS 11.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, iOS 18.1 y iPadOS 18.1. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json index 37ccc5e8d27..3065ebe3ea6 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44255", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.003", - "lastModified": "2024-10-30T16:35:24.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:26:03.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,103 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json index cd6cb3579bc..852c0fce574 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44258.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44258", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.083", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:28:24.490", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,124 @@ "value": "Este problema se solucion\u00f3 con un manejo mejorado de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, visionOS 2.1 y tvOS 18.1. Restaurar un archivo de copia de seguridad manipulado con fines malintencionados puede provocar la modificaci\u00f3n de archivos de sistema protegidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json index cf461c07178..dcef3114e9f 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44262.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44262", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.277", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:34:09.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,68 @@ "value": "Este problema se solucion\u00f3 mejorando la redacci\u00f3n de informaci\u00f3n confidencial. Este problema se solucion\u00f3 en visionOS 2.1. Un usuario puede ver informaci\u00f3n confidencial del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json index 5fbc56c6356..86fb2c95743 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44264", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.393", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:37:01.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,111 @@ "value": "Este problema se solucion\u00f3 con una validaci\u00f3n mejorada de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda crear enlaces simb\u00f3licos a regiones protegidas del disco." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json index 65d29e122a8..d3164ce5181 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44265.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44265", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.457", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:38:43.420", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "El problema se solucion\u00f3 restringiendo las opciones ofrecidas en un dispositivo bloqueado. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Un atacante con acceso f\u00edsico puede introducir eventos del controlador de juego en aplicaciones que se ejecutan en un dispositivo bloqueado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json index 5d272786964..66e2af0c11c 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44267.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44267", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.513", - "lastModified": "2024-10-30T16:35:26.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:39:55.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,59 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json index 7b789d56be5..4d6f5dbc130 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44269.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44269", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.577", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:41:01.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,153 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con comprobaciones mejoradas. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. Una aplicaci\u00f3n maliciosa puede usar accesos directos para acceder a archivos restringidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json index dbb445d5703..f586ceeaa35 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44270.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44270", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.667", - "lastModified": "2024-10-30T16:35:26.390", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:44:35.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json index 2ec627d4ffd..fe942ab5f5c 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44273.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44273", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.737", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:45:10.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,27 +15,125 @@ "value": "Este problema se solucion\u00f3 con un manejo mejorado de los enlaces simb\u00f3licos. Este problema se solucion\u00f3 en iOS 18.1 y iPadOS 18.1, visionOS 2.1, macOS Sonoma 14.7.1, watchOS 11.1 y tvOS 18.1. Una aplicaci\u00f3n maliciosa podr\u00eda tener acceso a informaci\u00f3n privada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "1F64554D-9F90-4871-9A0B-FB28BD52F4B3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "B9A26654-0DDB-4D4D-BB1E-C65C3339148E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "20977171-B964-4F89-AF53-6136003EDDB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json index 0d4d5e4ceb7..fcef202616b 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44274.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44274", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:07.807", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:46:02.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,107 @@ "value": "El problema se solucion\u00f3 con una autenticaci\u00f3n mejorada. Este problema se solucion\u00f3 en iOS 17.7.1 y iPadOS 17.7.1, watchOS 11.1, iOS 18.1 y iPadOS 18.1. Un atacante con acceso f\u00edsico a un dispositivo bloqueado podr\u00eda ver informaci\u00f3n confidencial del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json index 68b18c53ffe..f89704a5ff4 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44281.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44281", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.263", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:46:38.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "Se solucion\u00f3 un problema de lectura fuera de los l\u00edmites con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. El an\u00e1lisis de un archivo puede provocar la divulgaci\u00f3n de informaci\u00f3n del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json index 5a0c4b78a5f..1a0bb821db1 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44282.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44282", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.340", - "lastModified": "2024-10-29T21:35:17.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:47:21.447", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,34 +81,131 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json index 46e81e42807..c7ddc6ed1fd 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44284.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44284", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.450", - "lastModified": "2024-10-29T21:35:20.070", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:48:11.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json index 4358fe5ffb0..a76ee20028a 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44285.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44285", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.520", - "lastModified": "2024-10-30T14:35:12.353", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-30T18:48:49.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,22 +81,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "C1AEAF56-49F9-4F1F-993C-97ECD7BDA012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.1", + "matchCriteriaId": "748B3415-F0B7-4677-B6C7-3EC7CFA8CCA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json index c8e33cee90c..29da87695ee 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44287.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44287", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:08.600", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:49:43.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,83 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en macOS Ventura 13.7.1 y macOS Sonoma 14.7.1. Una aplicaci\u00f3n malintencionada podr\u00eda modificar partes protegidas del sistema de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json b/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json index 02ccee6f9b6..dc91811d653 100644 --- a/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json +++ b/CVE-2024/CVE-2024-443xx/CVE-2024-44302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44302", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-28T21:15:09.040", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:49:53.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,163 @@ "value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en tvOS 18.1, iOS 18.1 y iPadOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1 y visionOS 2.1. El procesamiento de una fuente manipulada con fines malintencionados puede provocar la divulgaci\u00f3n de la memoria del proceso." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "F42291CA-6AC4-4F11-AC23-B3FE25139483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5B10D207-D2D8-465D-8A17-F77DC194BAA3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.1", + "matchCriteriaId": "468FFF6F-879C-4AF4-BC42-6A1AA30441C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:18.0:*:*:*:*:*:*:*", + "matchCriteriaId": "53F54FA8-13B2-4E49-834B-F5465B074D76" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "13.7.1", + "matchCriteriaId": "FA438ABE-99D4-49D3-A90A-959B8FDD4012" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.7.1", + "matchCriteriaId": "901D36FD-C5D9-428D-BE13-662AC380C9AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.1", + "matchCriteriaId": "5D57FCAE-9B33-4532-BC69-BC3D35719EDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.1", + "matchCriteriaId": "15E4723D-CD2B-4486-A69C-27F843844A80" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.1", + "matchCriteriaId": "5DB9A303-7D3D-4167-9F28-64AA4B1EC0E1" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/121563", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121565", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121566", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121567", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121568", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121569", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/121570", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json index 0ddb207a294..743346e6153 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45230.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45230", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T16:15:11.903", - "lastModified": "2024-10-19T00:53:40.757", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T17:35:09.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json index ae93b4a96e4..488b4b2013e 100644 --- a/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45231", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-08T16:15:11.997", - "lastModified": "2024-10-19T00:56:42.883", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T17:35:10.147", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47063.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47063.json index 14b626729e6..d3b394650ba 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47063.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47063", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-30T15:15:06.293", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:24:21.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -73,14 +95,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cvat:computer_vision_annotation_tool:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.4.7", + "versionEndExcluding": "2.19.0", + "matchCriteriaId": "E4E9C155-897E-4E2A-B68B-E5BABE11F235" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cvat-ai/cvat/commit/75c3d573bc9468b718f53b442c2ef69ad1d5de12", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-2c85-39cc-2px9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47064.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47064.json index 9600d3772b3..895c39906f1 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47064.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47064", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-30T15:15:06.413", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:23:17.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -77,14 +99,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cvat:computer_vision_annotation_tool:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.16.0", + "versionEndExcluding": "2.19.0", + "matchCriteriaId": "0F7CC823-C8C1-4D43-918A-C22129D0B862" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cvat-ai/cvat/commit/0bf45fd5de08a652dffbfb517318a64c2fdbc5cf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-hp6c-f34j-qjj7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json index 302d369c80b..fc7b2f703c4 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47169.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47169", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-26T18:15:10.157", - "lastModified": "2024-09-30T12:46:20.237", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:25:39.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -55,10 +75,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:agnai:agnai:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.330", + "matchCriteriaId": "018F1D62-64B1-4A69-BC8B-37565BF64656" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/agnaistic/agnai/security/advisories/GHSA-mpch-89gm-hm83", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47172.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47172.json index 555b113d4af..062e48dccd8 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47172.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47172.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47172", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-30T15:15:06.523", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:20:58.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cvat:computer_vision_annotation_tool:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.19.1", + "matchCriteriaId": "E5639409-21F0-4AD7-91A7-1845A44DAA08" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/cvat-ai/cvat/commit/59ce6ca784a0d426b2cfb8cf2850ba1d520c03f5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/cvat-ai/cvat/security/advisories/GHSA-gxhm-hg65-5gh2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47878.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47878.json index a0512a04f1b..d3b8f9b880d 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47878.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47878", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-24T21:15:12.293", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:01:44.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.8.3", + "matchCriteriaId": "0B0F993E-8EB2-4CD2-8985-3DCD90F7EBBF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenRefine/OpenRefine/commit/10bf0874d67f1018a58b3732332d76b840192fea", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-pw3x-c5vp-mfc3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47880.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47880.json index 8ae4a13244a..3f7541568ab 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47880.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47880.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47880", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-24T21:15:12.750", - "lastModified": "2024-10-25T12:56:07.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:42:42.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,14 +85,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openrefine:openrefine:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.8.3", + "matchCriteriaId": "0B0F993E-8EB2-4CD2-8985-3DCD90F7EBBF" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OpenRefine/OpenRefine/commit/8060477fa53842ebabf43b63e039745932fa629d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/OpenRefine/OpenRefine/security/advisories/GHSA-79jv-5226-783f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json index a3db56b2bbe..ee3afc01593 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48107.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48107", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.453", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-30T17:35:10.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "SparkShop <=1.1.7 es vulnerable a server-side request forgery (SSRF). Esta vulnerabilidad permite realizar ataques para escanear puertos en la intranet o red local donde reside el servidor, atacar aplicaciones que se ejecutan en la intranet o red local o leer metadatos en el servidor en la nube." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/RMAX2000/ebb654016e5b8a5b55aa6d8a7f2f321a#file-cve-2024-48107", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json index de880d37f67..285fd5ea23d 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48177.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48177", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.523", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-30T17:35:11.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "MRCMS 3.1.2 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro RID en /admin/article/delete.do." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/dabaizhizhu/123/issues/9", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json index cb59eec4dc8..36622de7bd0 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48178.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48178", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.843", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-30T18:35:13.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "newbee-mall v1.0.0 es vulnerable a Server-Side Request Forgery (SSRF) a trav\u00e9s del par\u00e1metro goodsCoverImg." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://github.com/dabaizhizhu/123/issues/10", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json index 375cc8e5e94..b6f66ccaaf8 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48195.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48195", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.903", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-30T18:35:14.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en eyouCMS v.1.6.7 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una secuencia de comandos especialmente manipulada para el par\u00e1metro post." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/cyb3res3c/CVE-2024-48195/blob/main/CVE-2024-48195.md", diff --git a/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json b/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json index 1423d4acb13..a6af0cbeb58 100644 --- a/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json +++ b/CVE-2024/CVE-2024-481xx/CVE-2024-48196.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48196", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:05.960", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-30T18:35:15.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un problema en eyouCMS v.1.6.7 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de un script manipulado espec\u00edficamente para el par\u00e1metro post." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/cyb3res3c/CVE-2024-49186/blob/main/CVE-2024-48196.md", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json new file mode 100644 index 00000000000..1d4e20c50d8 --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48214.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48214", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.420", + "lastModified": "2024-10-30T18:15:07.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KERUI HD 3MP 1080P Tuya Camera 1.0.4 has a command injection vulnerability in the module that connects to the local network via a QR code. This vulnerability allows an attacker to create a custom, unauthenticated QR code and abuse one of the parameters, either SSID or PASSWORD, in the JSON data contained within the QR code. By that, the attacker can execute arbitrary code on the camera." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://medium.com/%40shenhavmor/exploiting-a-chinese-camera-for-fun-cve-2024-48214-2d56848870c2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json new file mode 100644 index 00000000000..f2aacc32a8e --- /dev/null +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48241.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-48241", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.490", + "lastModified": "2024-10-30T18:15:07.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in radare2 v5.8.0 through v5.9.4 allows a local attacker to cause a denial of service via the __bf_div function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/St-Andrews-Bug-Busters/Vuln_info/blob/main/radare2/CVE-2024-48241.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/radareorg/radare2/issues/23317", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/radareorg/radare2/pull/23318", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json index 03ba33ec836..df895f371f9 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48356.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48356", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.627", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-30T17:35:12.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "LyLme Spage <=1.6.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/group.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Jingyi-u/LyLme_Spage/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json index 6a334edde5e..e2b7544833f 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48357.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48357", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.050", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-30T17:35:13.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "LyLme Spage 1.2.0 a 1.6.0 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/apply.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/Jingyi-u/LyLme_Spage_2/blob/main/README.md", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json index efc2634843f..552ec18183f 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48465.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48465", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T20:15:06.120", - "lastModified": "2024-10-29T14:34:50.257", + "lastModified": "2024-10-30T18:35:15.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La versi\u00f3n 1.5.0 de MRBS tiene una vulnerabilidad de inyecci\u00f3n SQL en el archivo edit_entry_handler.php, espec\u00edficamente en el par\u00e1metro rooms%5B%5D" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/4459gif/zo/blob/main/index.html", diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48569.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48569.json new file mode 100644 index 00000000000..d99c7ba1086 --- /dev/null +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48569.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48569", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.567", + "lastModified": "2024-10-30T18:15:07.567", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Proactive Risk Manager version 9.1.1.0 is affected by multiple Cross-Site Scripting (XSS) vulnerabilities in the add/edit form fields, at the urls starting with the subpaths: /ar/config/configuation/ and /ar/config/risk-strategy-control/" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/MarioTesoro/CVE-2024-48569", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json index 3174045f4f1..6de1fd87fd8 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48594.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48594", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T21:15:09.690", - "lastModified": "2024-10-29T14:34:04.427", + "lastModified": "2024-10-30T17:35:14.010", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de carga de archivos en Prison Management System v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente de carga de archivos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/Aa1b/mycve/blob/main/Readme.md", diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48646.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48646.json new file mode 100644 index 00000000000..d18b78eec6b --- /dev/null +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48646.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48646", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.640", + "lastModified": "2024-10-30T18:15:07.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An Unrestricted File Upload vulnerability exists in Sage 1000 v7.0.0, which allows authorized users to upload files without proper validation. An attacker could exploit this vulnerability by uploading malicious files, such as HTML, scripts, or other executable content, that may be executed on the server, leading to further system compromise." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/hx381/Sage-1000-v7.0.0-Exploit/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48647.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48647.json new file mode 100644 index 00000000000..bc8ab984398 --- /dev/null +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48647.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48647", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.743", + "lastModified": "2024-10-30T18:15:07.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A file disclosure vulnerability exists in Sage 1000 v7.0.0. This vulnerability allows remote attackers to retrieve arbitrary files from the server's file system by manipulating the URL parameter in HTTP requests. The attacker can exploit this flaw to access sensitive information, including configuration files that may contain credentials and system settings, which could lead to further compromise of the server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/hx381/Sage-1000-v7.0.0-Exploit/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-486xx/CVE-2024-48648.json b/CVE-2024/CVE-2024-486xx/CVE-2024-48648.json new file mode 100644 index 00000000000..48a3fe4522c --- /dev/null +++ b/CVE-2024/CVE-2024-486xx/CVE-2024-48648.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-48648", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T18:15:07.813", + "lastModified": "2024-10-30T18:15:07.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Reflected Cross-Site Scripting (XSS) vulnerability exists in the Sage 1000 v 7.0.0. This vulnerability allows attackers to inject malicious scripts into URLs, which are reflected back by the server in the response without proper sanitization or encoding." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/hx381/Sage-1000-v7.0.0-Exploit/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json index 0e20d5057fd..65aade16d63 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50071.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50071", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.327", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:02:34.740", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: pinctrl: nuvoton: corrige una liberaci\u00f3n doble en ma35_pinctrl_dt_node_to_map_func() 'new_map' se asigna utilizando devm_* que se encarga de liberar los datos asignados al quitar el dispositivo, llamar a .dt_free_map = pinconf_generic_dt_free_map libera el mapa dos veces mientras pinconf_generic_dt_free_map() llama a pinctrl_utils_free_map(). Corrija esto utilizando kcalloc() en lugar de devm_kcalloc() administrado autom\u00e1ticamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.11", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "566D17E8-7DD1-40F5-9042-8FDAE762B036" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3fd976afe9743110f20a23f93b7ff9693f2be4bf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6441d9c3d71b59c8fd27d4e381c7471a32ac1a68", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json index 76c46ae71be..5fe6885477c 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50079", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-10-29T01:15:04.927", - "lastModified": "2024-10-29T14:34:04.427", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T17:05:40.960", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,90 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring/sqpoll: asegurarse de que el estado de la tarea sea TASK_RUNNING al ejecutar task_work Cuando sqpoll sale y cancela elementos de trabajo pendientes, es posible que deba ejecutar task_work. Si esto sucede desde dentro de io_uring_cancel_generic(), es posible que est\u00e9 esperando la cola de espera de io_uring_task. Esto da como resultado el siguiente splat del programador, ya que se puede intentar capturar el mutex de anillo mientras se est\u00e1 en un estado TASK_INTERRUPTIBLE. Aseg\u00farese de que el estado de la tarea est\u00e9 configurado adecuadamente para eso, al igual que lo que se hace para los otros casos en io_run_task_work(). no llame a operaciones de bloqueo cuando !TASK_RUNNING; estado=1 establecido en [<0000000029387fd2>] prepare_to_wait+0x88/0x2fc ADVERTENCIA: CPU: 6 PID: 59939 en kernel/sched/core.c:8561 __might_sleep+0xf4/0x140 M\u00f3dulos vinculados: CPU: 6 UID: 0 PID: 59939 Comm: iou-sqp-59938 No contaminado 6.12.0-rc3-00113-g8d020023b155 #7456 Nombre del hardware: linux,dummy-virt (DT) pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--) pc : __might_sleep+0xf4/0x140 lr : __might_sleep+0xf4/0x140 sp : ffff80008c5e7830 x29: ffff80008c5e7830 x28: ffff0000d93088c0 x27: ffff60001c2d7230 x26: dfff800000000000 x25: ffff0000e16b9180 x24: ffff80008c5e7a50 x23: 1ffff000118bcf4a x22: ffff0000e16b9180 x21: ffff0000e16b9180 x20: 000000000000011b x19: ffff80008310fac0 x18: 1ffff000118bcd90 x17: 30303c5b20746120 x16: 74657320313d6574 x15: 0720072007200720 x14: 0720072007200720 x13: 0720072007200720 x12: ffff600036c64f0b x11: 1fffe00036c64f0a x10: ffff600036c64f0a x9: dfff800000000000 x8: 00009fffc939b0f6 x7: ffff0001b6327853 x6 : 0000000000000001 x5 : ffff0001b6327850 x4 : ffff600036c64f0b x3 : ffff8000803c35bc x2 : 000000000000000 x1 : 0000000000000000 x0 : ffff0000e16b9180 Rastreo de llamadas: __might_sleep+0xf4/0x140 mutex_lock+0x84/0x124 io_handle_tw_list+0xf4/0x260 tctx_task_work_run+0x94/0x340 io_run_task_work+0x1ec/0x3c0 io_uring_cancel_generic+0x364/0x524 io_sq_thread+0x820/0x124c ret_from_fork+0x10/0x20" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.9", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "DF445508-130D-47A0-8D0A-52A2212A1B17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/887ba598d9cfb537bdb3dfd95f087ff8a08cb74d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8f7033aa4089fbaf7a33995f0f2ee6c9d7b9ca1b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json index bd03cf78011..f54424c4d6f 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50311", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-22T14:15:19.450", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:39:40.617", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "secalert@redhat.com", @@ -41,8 +63,18 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +83,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-50311", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2319379", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50312.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50312.json index 83a015bd625..2228f953793 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50312.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50312.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50312", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-22T14:15:19.973", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:35:56.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -63,8 +83,18 @@ }, "weaknesses": [ { - "source": "secalert@redhat.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secalert@redhat.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,18 +103,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "932D137F-528B-4526-9A89-CD59FA1AB0FE" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-50312", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2319378", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/openshift/console/pull/14409/files", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50602.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50602.json index 1a8c3a4945f..8cd3db95483 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50602.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50602.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50602", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-27T05:15:04.090", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-30T18:35:16.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en libexpat antes de la versi\u00f3n 2.6.4. Se produce un bloqueo en la funci\u00f3n XML_ResumeParser porque XML_StopParser puede detener o suspender un analizador no iniciado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://github.com/libexpat/libexpat/pull/915", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51258.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51258.json new file mode 100644 index 00000000000..5ef770407b9 --- /dev/null +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51258.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51258", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-10-30T17:15:14.037", + "lastModified": "2024-10-30T18:35:17.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DrayTek Vigor3900 1.5.1.3 allows attackers to inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the doSSLTunnel function." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json index 629c130ad4d..3f3e07fa646 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51296.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51296", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.337", - "lastModified": "2024-10-30T14:15:08.337", + "lastModified": "2024-10-30T18:35:17.830", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the pingtrace function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json index 87eed860254..7f3da0cefc6 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51299.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51299", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.510", - "lastModified": "2024-10-30T14:15:08.510", + "lastModified": "2024-10-30T18:35:18.640", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the dumpSyslog function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json index 87af9e0df08..3d5e9f40e4d 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51300.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51300", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.597", - "lastModified": "2024-10-30T14:15:08.597", + "lastModified": "2024-10-30T18:35:19.433", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the get_rrd function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json index 1ce57b69eea..1583fc44f27 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51301.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51301", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T14:15:08.680", - "lastModified": "2024-10-30T14:15:08.680", + "lastModified": "2024-10-30T18:35:20.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the packet_monitor function." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json index 37daccb3eb2..4ffa338a219 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51304.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51304", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T13:15:14.360", - "lastModified": "2024-10-30T13:15:14.360", + "lastModified": "2024-10-30T18:35:21.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n ldap_search_dn." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8036.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8036.json index 2b19d10a02e..b124753b77b 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8036.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8036.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8036", "sourceIdentifier": "cybersecurity@ch.abb.com", "published": "2024-10-25T17:15:04.963", - "lastModified": "2024-10-28T13:58:09.230", + "lastModified": "2024-10-30T18:15:07.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,50 @@ } ], "metrics": { + "cvssMetricV40": [ + { + "source": "cybersecurity@ch.abb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:P/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:I/V:D/RE:H/U:Amber", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "PRESENT", + "automatable": "NO", + "recovery": "IRRECOVERABLE", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "HIGH", + "providerUrgency": "AMBER", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + } + } + ], "cvssMetricV31": [ { "source": "cybersecurity@ch.abb.com", diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8382.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8382.json index c9ad8e4727b..3fb2042fc0d 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8382.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8382.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8382", "sourceIdentifier": "security@mozilla.org", "published": "2024-09-03T13:15:05.630", - "lastModified": "2024-09-06T17:15:17.677", + "lastModified": "2024-10-30T17:35:14.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-273" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8383.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8383.json index f0b636a28c7..3327640543a 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8383.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8383.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8383", "sourceIdentifier": "security@mozilla.org", "published": "2024-09-03T13:15:05.687", - "lastModified": "2024-09-06T19:15:12.830", + "lastModified": "2024-10-30T17:35:15.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8386.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8386.json index 3500876d068..cd43f2cc778 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8386.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8386.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8386", "sourceIdentifier": "security@mozilla.org", "published": "2024-09-03T13:15:05.860", - "lastModified": "2024-09-06T17:15:18.147", + "lastModified": "2024-10-30T17:35:16.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8388.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8388.json index c31f3403edc..91aa444d57a 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8388.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8388.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8388", "sourceIdentifier": "security@mozilla.org", "published": "2024-09-03T13:15:05.980", - "lastModified": "2024-09-04T15:49:19.170", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T17:35:17.283", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9110.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9110.json new file mode 100644 index 00000000000..e6989feb0da --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9110.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9110", + "sourceIdentifier": "13061848-ea10-403d-bd75-c83a022c2891", + "published": "2024-10-30T17:15:14.177", + "lastModified": "2024-10-30T17:15:14.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A medium severity vulnerability has been identified within Privileged Identity which can allow an attacker to perform reflected cross-site scripting attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "13061848-ea10-403d-bd75-c83a022c2891", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt24-09", + "source": "13061848-ea10-403d-bd75-c83a022c2891" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-92xx/CVE-2024-9231.json b/CVE-2024/CVE-2024-92xx/CVE-2024-9231.json index 278452ba6a2..de5488882ff 100644 --- a/CVE-2024/CVE-2024-92xx/CVE-2024-9231.json +++ b/CVE-2024/CVE-2024-92xx/CVE-2024-9231.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9231", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-22T10:15:07.313", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-30T18:56:03.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,22 +51,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:butlerblog:wp-members:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.9.6", + "matchCriteriaId": "7EEE00B2-4E16-45A4-B42D-AB52242AF7D1" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-members/tags/3.4.9.5/includes/class-wp-members-forms.php#L2198", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/wp-members/tags/3.4.9.5/includes/class-wp-members.php#L1960", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3172354/wp-members/trunk/includes/class-wp-members-forms.php?contextall=1", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d59e599-59da-4c03-b71f-d00a078b2442?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9393.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9393.json index 2421fbcfc5e..51e54521fb4 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9393.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9393.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9393", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.623", - "lastModified": "2024-10-11T16:07:50.900", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T17:35:18.107", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9394.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9394.json index 462c15c26b6..4648660e8be 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9394.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9394.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9394", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.683", - "lastModified": "2024-10-11T16:08:21.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T18:35:22.020", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json index ede2841334c..a30bbdfdff8 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9398", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.913", - "lastModified": "2024-10-11T16:08:14.577", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T18:35:22.757", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json index d919fa1c37a..7d1d004f60c 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9399.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9399", "sourceIdentifier": "security@mozilla.org", "published": "2024-10-01T16:15:10.980", - "lastModified": "2024-10-15T16:04:59.350", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-30T18:35:23.640", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9419.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9419.json new file mode 100644 index 00000000000..3f73c062aff --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9419.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9419", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-10-30T18:15:08.260", + "lastModified": "2024-10-30T18:15:08.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Client / Server PCs with the HP Smart Universal Printing Driver installed are potentially vulnerable to Remote Code Execution and/or Elevation of Privilege. A client using the HP Smart Universal Printing Driver that sends a print job comprised of a malicious XPS file could potentially lead to Remote Code Execution and/or Elevation of Privilege on the PC." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11505949-11505972-16", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json index 88202503931..b1dc7f172f3 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9675", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-09T15:15:17.837", - "lastModified": "2024-10-30T07:15:16.493", + "lastModified": "2024-10-30T17:15:14.397", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:8563", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:8675", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9675", "source": "secalert@redhat.com" diff --git a/README.md b/README.md index a6b5cb3026c..5536cdf0564 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-30T17:00:20.690193+00:00 +2024-10-30T19:00:20.325771+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-30T16:59:39.013000+00:00 +2024-10-30T18:58:53.863000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -267662 +267678 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `16` -- [CVE-2024-50344](CVE-2024/CVE-2024-503xx/CVE-2024-50344.json) (`2024-10-30T16:15:04.763`) -- [CVE-2024-50419](CVE-2024/CVE-2024-504xx/CVE-2024-50419.json) (`2024-10-30T15:15:19.360`) +- [CVE-2024-10456](CVE-2024/CVE-2024-104xx/CVE-2024-10456.json) (`2024-10-30T18:15:05.123`) +- [CVE-2024-31972](CVE-2024/CVE-2024-319xx/CVE-2024-31972.json) (`2024-10-30T18:15:06.760`) +- [CVE-2024-31973](CVE-2024/CVE-2024-319xx/CVE-2024-31973.json) (`2024-10-30T18:15:06.893`) +- [CVE-2024-31975](CVE-2024/CVE-2024-319xx/CVE-2024-31975.json) (`2024-10-30T18:15:06.967`) +- [CVE-2024-36060](CVE-2024/CVE-2024-360xx/CVE-2024-36060.json) (`2024-10-30T18:15:07.037`) +- [CVE-2024-37573](CVE-2024/CVE-2024-375xx/CVE-2024-37573.json) (`2024-10-30T18:15:07.107`) +- [CVE-2024-42041](CVE-2024/CVE-2024-420xx/CVE-2024-42041.json) (`2024-10-30T18:15:07.223`) +- [CVE-2024-48214](CVE-2024/CVE-2024-482xx/CVE-2024-48214.json) (`2024-10-30T18:15:07.420`) +- [CVE-2024-48241](CVE-2024/CVE-2024-482xx/CVE-2024-48241.json) (`2024-10-30T18:15:07.490`) +- [CVE-2024-48569](CVE-2024/CVE-2024-485xx/CVE-2024-48569.json) (`2024-10-30T18:15:07.567`) +- [CVE-2024-48646](CVE-2024/CVE-2024-486xx/CVE-2024-48646.json) (`2024-10-30T18:15:07.640`) +- [CVE-2024-48647](CVE-2024/CVE-2024-486xx/CVE-2024-48647.json) (`2024-10-30T18:15:07.743`) +- [CVE-2024-48648](CVE-2024/CVE-2024-486xx/CVE-2024-48648.json) (`2024-10-30T18:15:07.813`) +- [CVE-2024-51258](CVE-2024/CVE-2024-512xx/CVE-2024-51258.json) (`2024-10-30T17:15:14.037`) +- [CVE-2024-9110](CVE-2024/CVE-2024-91xx/CVE-2024-9110.json) (`2024-10-30T17:15:14.177`) +- [CVE-2024-9419](CVE-2024/CVE-2024-94xx/CVE-2024-9419.json) (`2024-10-30T18:15:08.260`) ### CVEs modified in the last Commit -Recently modified CVEs: `93` +Recently modified CVEs: `108` -- [CVE-2024-48063](CVE-2024/CVE-2024-480xx/CVE-2024-48063.json) (`2024-10-30T15:35:17.993`) -- [CVE-2024-48138](CVE-2024/CVE-2024-481xx/CVE-2024-48138.json) (`2024-10-30T15:35:18.830`) -- [CVE-2024-48206](CVE-2024/CVE-2024-482xx/CVE-2024-48206.json) (`2024-10-30T15:35:19.677`) -- [CVE-2024-48572](CVE-2024/CVE-2024-485xx/CVE-2024-48572.json) (`2024-10-30T15:35:20.497`) -- [CVE-2024-48573](CVE-2024/CVE-2024-485xx/CVE-2024-48573.json) (`2024-10-30T15:35:21.227`) -- [CVE-2024-4872](CVE-2024/CVE-2024-48xx/CVE-2024-4872.json) (`2024-10-30T15:31:41.743`) -- [CVE-2024-48955](CVE-2024/CVE-2024-489xx/CVE-2024-48955.json) (`2024-10-30T15:35:22.063`) -- [CVE-2024-49210](CVE-2024/CVE-2024-492xx/CVE-2024-49210.json) (`2024-10-30T16:13:12.307`) -- [CVE-2024-49211](CVE-2024/CVE-2024-492xx/CVE-2024-49211.json) (`2024-10-30T16:08:23.040`) -- [CVE-2024-50068](CVE-2024/CVE-2024-500xx/CVE-2024-50068.json) (`2024-10-30T16:57:35.427`) -- [CVE-2024-50069](CVE-2024/CVE-2024-500xx/CVE-2024-50069.json) (`2024-10-30T16:58:19.983`) -- [CVE-2024-50070](CVE-2024/CVE-2024-500xx/CVE-2024-50070.json) (`2024-10-30T16:59:39.013`) -- [CVE-2024-50080](CVE-2024/CVE-2024-500xx/CVE-2024-50080.json) (`2024-10-30T15:54:17.967`) -- [CVE-2024-50081](CVE-2024/CVE-2024-500xx/CVE-2024-50081.json) (`2024-10-30T15:45:39.047`) -- [CVE-2024-50082](CVE-2024/CVE-2024-500xx/CVE-2024-50082.json) (`2024-10-30T15:44:05.180`) -- [CVE-2024-50083](CVE-2024/CVE-2024-500xx/CVE-2024-50083.json) (`2024-10-30T15:07:02.577`) -- [CVE-2024-51257](CVE-2024/CVE-2024-512xx/CVE-2024-51257.json) (`2024-10-30T16:35:28.993`) -- [CVE-2024-51298](CVE-2024/CVE-2024-512xx/CVE-2024-51298.json) (`2024-10-30T16:35:29.790`) -- [CVE-2024-51378](CVE-2024/CVE-2024-513xx/CVE-2024-51378.json) (`2024-10-30T15:35:23.600`) -- [CVE-2024-6238](CVE-2024/CVE-2024-62xx/CVE-2024-6238.json) (`2024-10-30T16:35:29.987`) -- [CVE-2024-6657](CVE-2024/CVE-2024-66xx/CVE-2024-6657.json) (`2024-10-30T15:15:19.877`) -- [CVE-2024-7941](CVE-2024/CVE-2024-79xx/CVE-2024-7941.json) (`2024-10-30T15:29:26.673`) -- [CVE-2024-7976](CVE-2024/CVE-2024-79xx/CVE-2024-7976.json) (`2024-10-30T16:35:30.723`) -- [CVE-2024-8900](CVE-2024/CVE-2024-89xx/CVE-2024-8900.json) (`2024-10-30T15:35:26.207`) -- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-10-30T16:15:05.100`) +- [CVE-2024-48356](CVE-2024/CVE-2024-483xx/CVE-2024-48356.json) (`2024-10-30T17:35:12.420`) +- [CVE-2024-48357](CVE-2024/CVE-2024-483xx/CVE-2024-48357.json) (`2024-10-30T17:35:13.203`) +- [CVE-2024-48465](CVE-2024/CVE-2024-484xx/CVE-2024-48465.json) (`2024-10-30T18:35:15.410`) +- [CVE-2024-48594](CVE-2024/CVE-2024-485xx/CVE-2024-48594.json) (`2024-10-30T17:35:14.010`) +- [CVE-2024-50071](CVE-2024/CVE-2024-500xx/CVE-2024-50071.json) (`2024-10-30T17:02:34.740`) +- [CVE-2024-50079](CVE-2024/CVE-2024-500xx/CVE-2024-50079.json) (`2024-10-30T17:05:40.960`) +- [CVE-2024-50311](CVE-2024/CVE-2024-503xx/CVE-2024-50311.json) (`2024-10-30T18:39:40.617`) +- [CVE-2024-50312](CVE-2024/CVE-2024-503xx/CVE-2024-50312.json) (`2024-10-30T18:35:56.753`) +- [CVE-2024-50602](CVE-2024/CVE-2024-506xx/CVE-2024-50602.json) (`2024-10-30T18:35:16.237`) +- [CVE-2024-51296](CVE-2024/CVE-2024-512xx/CVE-2024-51296.json) (`2024-10-30T18:35:17.830`) +- [CVE-2024-51299](CVE-2024/CVE-2024-512xx/CVE-2024-51299.json) (`2024-10-30T18:35:18.640`) +- [CVE-2024-51300](CVE-2024/CVE-2024-513xx/CVE-2024-51300.json) (`2024-10-30T18:35:19.433`) +- [CVE-2024-51301](CVE-2024/CVE-2024-513xx/CVE-2024-51301.json) (`2024-10-30T18:35:20.227`) +- [CVE-2024-51304](CVE-2024/CVE-2024-513xx/CVE-2024-51304.json) (`2024-10-30T18:35:21.050`) +- [CVE-2024-8036](CVE-2024/CVE-2024-80xx/CVE-2024-8036.json) (`2024-10-30T18:15:07.960`) +- [CVE-2024-8382](CVE-2024/CVE-2024-83xx/CVE-2024-8382.json) (`2024-10-30T17:35:14.793`) +- [CVE-2024-8383](CVE-2024/CVE-2024-83xx/CVE-2024-8383.json) (`2024-10-30T17:35:15.640`) +- [CVE-2024-8386](CVE-2024/CVE-2024-83xx/CVE-2024-8386.json) (`2024-10-30T17:35:16.450`) +- [CVE-2024-8388](CVE-2024/CVE-2024-83xx/CVE-2024-8388.json) (`2024-10-30T17:35:17.283`) +- [CVE-2024-9231](CVE-2024/CVE-2024-92xx/CVE-2024-9231.json) (`2024-10-30T18:56:03.380`) +- [CVE-2024-9393](CVE-2024/CVE-2024-93xx/CVE-2024-9393.json) (`2024-10-30T17:35:18.107`) +- [CVE-2024-9394](CVE-2024/CVE-2024-93xx/CVE-2024-9394.json) (`2024-10-30T18:35:22.020`) +- [CVE-2024-9398](CVE-2024/CVE-2024-93xx/CVE-2024-9398.json) (`2024-10-30T18:35:22.757`) +- [CVE-2024-9399](CVE-2024/CVE-2024-93xx/CVE-2024-9399.json) (`2024-10-30T18:35:23.640`) +- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-10-30T17:15:14.397`) ## Download and Usage diff --git a/_state.csv b/_state.csv index b6f8a29fbd6..64a3be2e69e 100644 --- a/_state.csv +++ b/_state.csv @@ -121399,7 +121399,7 @@ CVE-2018-25100,0,0,d942384485e6477ac02d774d7915e3145ff5d011228e897d01068d424d5fd CVE-2018-25101,0,0,f5cb23a560b5f7e2ed0bc287e9dbbe48d218ed9a2d3fbe094521b3e09b217300,2024-06-04T19:16:57.060000 CVE-2018-25103,0,0,e59105c00442742ab1ecc8faba8dbf0d67b37225837a23e9578526d5287d5f7e,2024-07-09T16:15:02.787000 CVE-2018-25104,0,0,c412ef65650738495a83605320ac7195d29f366a69eba1057ff5aa9aae33634c,2024-10-18T12:52:33.507000 -CVE-2018-25105,0,0,63af7806a4a2bfeed5122abc8779195bd1ad11fd6e03af09c9625630d0daa033,2024-10-16T16:38:14.557000 +CVE-2018-25105,0,1,eb809870ddd24491d3fe4a672f049aec23f06015b2a8596e8943d0883e941ef0,2024-10-30T18:23:57.830000 CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000 CVE-2018-2560,0,0,abeb87aebf654213323bee155595996aacb66704cd990a641203ef8ccfeaa82a,2020-08-24T17:37:01.140000 CVE-2018-2561,0,0,6c44c7f29655175e898d7e0c8e9efa3daa6d95623035a440e858ef0262739964,2018-01-25T13:53:15.120000 @@ -138405,13 +138405,13 @@ CVE-2019-2521,0,0,557cd7afc62b8b0d5545a61da2b67008378b171f216bd58bad5399af268228 CVE-2019-25210,0,0,266aa4bd7522d806fa5da076db229c2449a919075778b85ff023cb6f7676cfb1,2024-09-04T18:35:00.600000 CVE-2019-25211,0,0,469c1561e074b807caf6701e40210358657a37dbe70bde81f85c8d68a4456e96,2024-08-01T13:41:57.540000 CVE-2019-25212,0,0,2a7e2cc8de54fa224ded29f3182e12267199b33c4461fd66ffca600627e7e093,2024-09-26T13:36:48.280000 -CVE-2019-25213,0,0,4c39da3714b8e12c2f219916ee30c392a205d27e9a07728154327b686f4a314a,2024-10-16T16:38:14.557000 +CVE-2019-25213,0,1,5be7006688eb034a7091dc418e89c9fdfa8aab7bcb6b3eb60f20b2628c0cc9dd,2024-10-30T18:20:42.563000 CVE-2019-25214,0,0,f39238d5ed48577540f531994d29659bb57358e55406eaf7ee66d83805ed736b,2024-10-16T16:38:14.557000 CVE-2019-25215,0,0,e894585b718ba6ffd4c4fb2559e624b9ffb182a68ef25ae0e57369eba12bd404,2024-10-16T16:38:14.557000 CVE-2019-25216,0,0,4deb2b163c53c3da84ce16e745f05ec6e2891bf0f3544a26c07ca5c280831bcc,2024-10-16T16:38:14.557000 CVE-2019-25217,0,0,30c2571b4837240b6da6c51001318f4e94ce56e8b309a54c15bcaa6ac6286204,2024-10-16T16:38:14.557000 CVE-2019-25218,0,0,5b80931fba7b5b61a09b6a7cef47b52c4c321e607f57f9764b15a065a78a0d69,2024-10-21T17:10:22.857000 -CVE-2019-25219,0,1,5a9c6fd8137a5395bbebfd600a3c9429c55154de7ddd9a4e7ecf893f26288516,2024-10-30T16:35:01.230000 +CVE-2019-25219,0,0,5a9c6fd8137a5395bbebfd600a3c9429c55154de7ddd9a4e7ecf893f26288516,2024-10-30T16:35:01.230000 CVE-2019-2522,0,0,438e5228ba492857a388b8016b2219394ce3508b8a36f1f8aede8ea3eeec2072,2020-08-24T17:37:01.140000 CVE-2019-2523,0,0,4a0e4915f05e6fa4b1849fafb208e6fb024214d6840b1c8202b1873b064ed383,2020-08-24T17:37:01.140000 CVE-2019-2524,0,0,bee2c79f8df3b71e86ab52db9d5dee51c63979ccd70534be30c64d8fa54a9384,2020-08-24T17:37:01.140000 @@ -155387,7 +155387,7 @@ CVE-2020-26308,0,0,35eec3a4d43d6d258408be26f3e5e27703d47e5d4c6dc9dc58836423c2a6b CVE-2020-26309,0,0,28d8896b5e2ba2f2b59d664e6455e0c04ccaaf9f4d4ff03dafdab67098b23194,2024-10-28T13:58:09.230000 CVE-2020-2631,0,0,5046699c80d5cb83a63f5d20bab67d0b0c4bb7840b215c085c94d5784e64e79d,2022-04-29T02:28:10.417000 CVE-2020-26310,0,0,68317d741363e03351a68d6825549282c0a005cf43e75712db88f36039f1622b,2024-10-28T13:58:09.230000 -CVE-2020-26311,0,0,5b8e6d1897a08070309bf94c13e98fce1afb4cf94bd06eacab71d1b70fc6a2a0,2024-10-28T13:58:09.230000 +CVE-2020-26311,0,1,ebb672b904f408e12ccbd2d17f1f11978cc23475eea635244eea5b3c9bb0ee0d,2024-10-30T18:07:38.110000 CVE-2020-26312,0,0,80fc0fcbc2d04eee4c3076f3daa90ef7f4deb9af9c8bfbb2495ec991be3de55d,2024-05-15T16:40:19.330000 CVE-2020-26313,0,0,4f8438affbb47b619adf4b6ba484d05206ac16511e81ced9ddd5162b1bf025fd,2023-11-07T03:20:33.210000 CVE-2020-26314,0,0,b537bcca105c723dd060969291a12aa249876b6502e65215930a5f4eec5761b5,2023-11-07T03:20:33.247000 @@ -171844,7 +171844,7 @@ CVE-2021-26382,0,0,2619984e005bf5dfb9bf02d268b62c9de35d3b48b045fc49f40ab7ca09050 CVE-2021-26384,0,0,86857582aeacb169fedc31b2eed60e471712f9602d4766f0000c707ba3ce19f3,2023-08-08T14:21:49.707000 CVE-2021-26385,0,0,f2c8b7d9db601ac08dd018e8b3647ecdeba07aaa7932dabdf667e78be8806825,2023-11-07T03:31:43.570000 CVE-2021-26386,0,0,8f9efe3b31036cb87b0be0023f428f9a725cab75e1d54024482b257db12f8585,2023-08-08T14:21:49.707000 -CVE-2021-26387,0,0,13b262b135b5d9fd07e423351cbaf05c9027d446154970c61efa6d00d09c74cb,2024-08-14T02:07:05.410000 +CVE-2021-26387,0,1,6191308606f84f4176c7d2fbff61a4f963f3aa3b2d2d901a43008bdebbde729c,2024-10-30T18:35:00.703000 CVE-2021-26388,0,0,280678e189a8aa58a5cd382994aa504bd31b98f2239de3b1c9f45665d365595a,2023-08-08T14:22:24.967000 CVE-2021-26390,0,0,9aa39d537f73fce75398a5f84e6f7f957780d46911c94229c09ea2b4b0e2766a,2022-05-25T17:27:34.660000 CVE-2021-26391,0,0,47e8735ad01937d363965d6012f21c924faf94920adf8c3251095064212ab776,2022-11-23T14:00:15.610000 @@ -185297,7 +185297,7 @@ CVE-2021-44476,0,0,398362e6030dea7ee9aefc21638361a67f4ab579aa9d4980350cb25266bbd CVE-2021-44477,0,0,8059f08690d70d464f9a6a49458bee5cc6ff0a947abf25f59957ab405e2daf7b,2022-04-04T14:30:52.257000 CVE-2021-44478,0,0,c89e69a0e964419c068765deaec3ff1e239e6f118958dbe52e02236674e17c7e,2022-07-28T18:12:36.160000 CVE-2021-44479,0,0,8cea3450cf8bac0a6e4a6300cc359f9a7c00b5b6bea31be6f8e8b19c33781aca,2021-12-16T18:17:26.373000 -CVE-2021-4448,0,0,7daba693a8017f0bd704e190c2c6248217c7b4322f5a52e639c608a65efce3d7,2024-10-16T16:38:14.557000 +CVE-2021-4448,0,1,6d9a2ad616bc601d4d502cfcc176cafdd913e09698d430e35be2fddcb6c3446f,2024-10-30T18:18:58.743000 CVE-2021-44480,0,0,ddea244291b0724396d82dc4281cc3c83442a2fc58c58c2e60bc63edd247b296,2022-07-12T17:42:04.277000 CVE-2021-44481,0,0,dbcfe1893eb2f7985aefe165b81e9828ea61d702498caab8e3bd89688cb1d9bc,2022-04-22T17:20:15.950000 CVE-2021-44482,0,0,fd07f92c02617685f2f0d51129d25a98428904018ae992cb5341865e68692d10,2022-04-22T17:20:33.857000 @@ -185308,7 +185308,7 @@ CVE-2021-44486,0,0,27651a6cdbc22fd811c396815fcd58c7e9df9e9f02efddd164029d4bd79fd CVE-2021-44487,0,0,ce0f49aeeb21b12eb994e31f9dc8ea4fe493e2fe9799304f6f5aad363af30a48,2022-04-22T18:01:28.737000 CVE-2021-44488,0,0,bc8fc47b2dc1fbdd2ff6796c164eebb69dd5e7769c2abff2f3b40703b1585918,2023-08-08T14:21:49.707000 CVE-2021-44489,0,0,fc081116b281e7438a800f81bf67993d6eaa9a04d13c5b0ce5603c38a8798416,2022-04-22T18:07:30.377000 -CVE-2021-4449,0,0,df3830743f0d723380f82e54340ca77b4ee9b2c54ddefa874854b4e69e991299,2024-10-16T16:38:14.557000 +CVE-2021-4449,0,1,0e0e082c3a6c3ddc1426515768de2016c9ed0a351e76d07a15dbe859aa441a14,2024-10-30T18:06:45.840000 CVE-2021-44490,0,0,51f6af39f7e9972b590a3dbba460e49e28124b6ab2ac9cafcc1c5568b297a218,2022-04-22T18:09:36.837000 CVE-2021-44491,0,0,724834766a658e6af5246aa62e8b332579badff28d2a1ca2e55cfbfb4cacb43d,2022-04-22T18:10:27.727000 CVE-2021-44492,0,0,a173c7c4257b833737dbbd312753d696476e51ef65f5326b2a29e920081a90a5,2022-04-22T17:35:22.267000 @@ -185319,7 +185319,7 @@ CVE-2021-44496,0,0,a07c07b6904c144bd70645c1900f72e0a5308f16f5c8420754481bf17edd8 CVE-2021-44497,0,0,948a4f8a98e6d117d49b08d1c2fa9965216be8b16c34304f2be2dfe99b7b45a6,2022-04-22T15:57:06.907000 CVE-2021-44498,0,0,c81b74e5f1199a3a2e4776dfaa85d0faa4c68db76a10423d7a5f2d91f494dcf5,2022-04-22T15:58:01.770000 CVE-2021-44499,0,0,8c6047bfb74db5465d98b5344cfe14293befc2375500f0f94b07a920dcf8b7b4,2022-04-22T16:10:34.870000 -CVE-2021-4450,0,0,87790577e3a6d68446b24065841c248d84ea84408584132000477efd0419a181,2024-10-16T16:38:14.557000 +CVE-2021-4450,0,1,f76e640b25e899be135d6f94bb26278caf4568d4cab81e16319414cf1ecb802b,2024-10-30T17:47:05.390000 CVE-2021-44500,0,0,025bfd6caf5a2b7ad2796c2ed667f9f1b2ed0b57a8e1158094e8cd856a2925a8,2022-04-22T16:11:19.893000 CVE-2021-44501,0,0,8865bba6dd75ef7675fb9be6a3ca0476f574dcc24bb3fbedb17e1dd48b2e17e1,2022-04-22T17:32:13.303000 CVE-2021-44502,0,0,81821cd79b4d30f62969daad02d568ded97c95de61241e894ca7a3b889192d79,2022-04-22T16:13:14.973000 @@ -185330,7 +185330,7 @@ CVE-2021-44506,0,0,58aea1c6e9a257ce746f10c108c19ad7fec6cb4b1c3efb015f5efff33d4ea CVE-2021-44507,0,0,aebde9357e585eff7a908d0de741a5e2985f463655b48ff7bcf113e5f679573e,2022-04-22T17:33:03.377000 CVE-2021-44508,0,0,c6792eaf6eb2a60c5e6ecdad5a800d632bb5b7ce863a54c68f8e7ac2a06ffd14,2022-04-22T15:16:26.873000 CVE-2021-44509,0,0,f649a3c99dfb2035d5f2555476d3723c6b7a288e6f77c9ccc7c73904b306808f,2022-04-22T15:24:17.437000 -CVE-2021-4451,0,0,fea0d057a2cc133f7d1366dbfaefc086cdfaf59f3f4db71365084f4fc19438ac,2024-10-16T16:38:14.557000 +CVE-2021-4451,0,1,902a9acb4fd203f5be11fd0a47f290d84b64dc2416460832d591cabd0e9e02a6,2024-10-30T17:44:27.477000 CVE-2021-44510,0,0,dfa3f0eec83167d212f23d0e1521038a3d1d2b98db47c6c7c2dc0e3c17256d77,2022-04-22T15:30:29.873000 CVE-2021-44512,0,0,9ea723d5afac9658d5da6130a4b16112f4aad592a684696723d489c785f3a5b6,2022-05-03T16:04:40.443000 CVE-2021-44513,0,0,1652b513dfbea72dbecb281e6d0e273723050582e745fe46b7e47813c9a3bc54,2021-12-08T14:27:43.643000 @@ -193049,7 +193049,7 @@ CVE-2022-23856,0,0,ee2cbc2426322388ff1afe7a44f2d91a7a9d83fba9914f637e37fe8ae0521 CVE-2022-23857,0,0,132a872c07af8d8c70261b35abca8d6a153a1859a711a2ed034df1a2f2ae9139,2022-01-27T16:14:04.917000 CVE-2022-23858,0,0,62f1f606d4b9efbf1631daba2d503d290be6f481e4bba2a8ebf7e52bf48393a1,2022-12-09T16:23:45.117000 CVE-2022-2386,0,0,09f49d4259c6ee996cc850650c207ec22add260b3b84ba16b896c572ed7d3292,2022-08-12T14:17:49.413000 -CVE-2022-23861,0,1,c12e5923e506db6637da2f4d7bfffd29645fd8e22872e2626b0a16457c09b7d0,2024-10-30T15:49:36.883000 +CVE-2022-23861,0,0,c12e5923e506db6637da2f4d7bfffd29645fd8e22872e2626b0a16457c09b7d0,2024-10-30T15:49:36.883000 CVE-2022-23862,0,0,2b721dae3c741fa798c190bd3375737db683c0e200456780df62dd1f1d9e42d1,2024-10-23T15:12:34.673000 CVE-2022-23863,0,0,718dca3b438e5f32d08c79cae192ff7673ae1521722bf5bc5fb8ef6492a0b31b,2023-08-08T14:22:24.967000 CVE-2022-23865,0,0,34050304e0195f46e2f5ca23d58f867b7e2ee63ec6639e974e762ba109c518b8,2022-04-22T14:12:24.920000 @@ -198103,7 +198103,7 @@ CVE-2022-29942,0,0,fc6818e24192943f3057a8472863591b0bb410e0e79a09a779f4711b67142 CVE-2022-29943,0,0,eb71e97800ee6b5a94d1e1a421a0d55ce4cb2015dadb56eeca914938a3f2d059,2022-05-13T17:23:57.113000 CVE-2022-29944,0,0,e0453dbd280c8ec27e5d94cb7d5b123a013998c63d2761a98d606f48d9a0c42e,2023-05-03T17:27:22.773000 CVE-2022-29945,0,0,f380615d8f5440312b415143b2443943838c53f7406b1f6016a4f3d97dd61ac0,2023-08-08T14:22:24.967000 -CVE-2022-29946,0,1,5ec202bd25f66840f4cdf614c9274cd0b945e73801e9e0fe77105f095424c643,2024-10-30T15:35:02.187000 +CVE-2022-29946,0,0,5ec202bd25f66840f4cdf614c9274cd0b945e73801e9e0fe77105f095424c643,2024-10-30T15:35:02.187000 CVE-2022-29947,0,0,67254d8c9a43ca264578d67120b013387788e7f1a55025339547ad0a1bfa936a,2022-05-11T13:56:37.537000 CVE-2022-29948,0,0,8d37f4431c9db2945bfb3bbbdfad7cfabf57086d1ad46e1cb618623f6774987a,2022-10-29T02:46:43.147000 CVE-2022-2995,0,0,02ae8d9183cac311d74d01f776697fe5152487245d68259e2d43f14baa91e4b5,2022-09-21T18:05:11.537000 @@ -203198,7 +203198,7 @@ CVE-2022-36224,0,0,a8df48107e3438e5636b1b67645301c5d46c7f827136d7d2eecddb479297b CVE-2022-36225,0,0,bc5ff33817b075cefe645e2473f6e3ee21d74e0020eca717973ee4a2644e0e31,2022-08-22T19:54:34.733000 CVE-2022-36226,0,0,d18d91af6dd58c2f963a8b5e6f9c28aedb3937746d0423d033ce941ec368b11d,2023-08-08T14:22:24.967000 CVE-2022-36227,0,0,f9c6c598655ba70529d76222b6d51e0a6a2419795bbe07d0ce8c6f260026ead8,2024-03-27T16:04:27.210000 -CVE-2022-36228,0,1,957d55f748ca15de37b4228f612bb064b6017702be1774a7b3e831b0ac313c87,2024-10-30T15:35:02.480000 +CVE-2022-36228,0,0,957d55f748ca15de37b4228f612bb064b6017702be1774a7b3e831b0ac313c87,2024-10-30T15:35:02.480000 CVE-2022-3623,0,0,d02a8abf840926caba5dbea47b45f5bb51f70a451a618f3d86b7bcf2b8470e11,2023-08-18T18:55:40.750000 CVE-2022-36231,0,0,29a154d09509e8cc5de0ff23cd1345d0b13b28501e5a09334b4b39f337efd8e5,2023-03-03T19:28:14.753000 CVE-2022-36233,0,0,ad3393a640e2a6b7e865efbc8773573711ba1d4d4d15c42713474979d69dce4e,2022-08-21T03:32:01.793000 @@ -204680,7 +204680,7 @@ CVE-2022-3817,0,0,7d6d5e06ce4b54a69a15f245efee2d0bc975fca433f45e15e83300dcb63b4b CVE-2022-38170,0,0,fec0209b1dfb726508691f57987f06577b560c61488de81ef4d3fd8428cfc5c6,2023-08-08T14:21:49.707000 CVE-2022-38171,0,0,19564da8badda997ec23aecd8a5b76c77aa4f9d0c43cac0ebbfd31343c26a67f,2022-10-27T20:27:03.480000 CVE-2022-38172,0,0,a23c5a71823cbad61f7943c598cb50459ec8ca672cb2fe40a0943b35e2021a53,2022-08-26T20:30:24.243000 -CVE-2022-38176,0,1,f62d403be86525e685a9bff53af5bc6e07a4870526aba05a23f51a5bd2421902,2024-10-30T16:17:27.707000 +CVE-2022-38176,0,0,f62d403be86525e685a9bff53af5bc6e07a4870526aba05a23f51a5bd2421902,2024-10-30T16:17:27.707000 CVE-2022-38177,0,0,0082ba3dd67bb968376b404fe94580d7fcd28909b39a957b495083482112b313,2023-11-07T03:50:04.117000 CVE-2022-38178,0,0,fda06f4717ca850d5ee2668681d5b834814e5488d84760e2eb6b8385fe747302,2023-11-07T03:50:04.237000 CVE-2022-38179,0,0,c2e2f8914bfd4076ff98881e91082413ed75e5486ae489ce82bcb37bd6b344a9,2022-08-16T11:50:42.253000 @@ -212238,11 +212238,11 @@ CVE-2022-48630,0,0,3b8d0c800bfc12bda16c507877a10fda7326e6eb492171fa2e9c1d717c882 CVE-2022-48631,0,0,aaab3ba02d20eb7ed75e56691adb619871b3eeeb9b3909dd50966148f3ed94c9,2024-04-29T12:42:03.667000 CVE-2022-48632,0,0,604f20ec0eaf6c13c4b3b66792ca33665e6d1e06fdaa3f2397f35f9bec38e179,2024-04-29T12:42:03.667000 CVE-2022-48633,0,0,d1b02d8abcad4acece798c33d4e1bda012ee764a6eb89a127c625e4eb186648a,2024-04-29T12:42:03.667000 -CVE-2022-48634,0,1,6f9e85aad26012b70d7c8d41258b2878b0ea511ab17c91d430d2bb71c1968eaf,2024-10-30T16:35:02.927000 +CVE-2022-48634,0,0,6f9e85aad26012b70d7c8d41258b2878b0ea511ab17c91d430d2bb71c1968eaf,2024-10-30T16:35:02.927000 CVE-2022-48635,0,0,d07f3535dd18090e28a3ad66b0f48653e8ef64caf808c0affb4639b5bb25d19e,2024-07-03T01:39:01.047000 CVE-2022-48636,0,0,bd119ee3a500e8de66c4e55ffa746e94e5dcf276788f5780f1a4b33a00caa150,2024-10-29T16:35:05.977000 CVE-2022-48637,0,0,95cbf38f6433ae1842bf68b823814d5589e431e5f63f01bcfbef4ed19660977f,2024-07-03T01:39:01.937000 -CVE-2022-48638,0,1,6855b79bbb70622095182cba4b392928edff874affdf1fd590bd21063729c93e,2024-10-30T16:35:03.473000 +CVE-2022-48638,0,0,6855b79bbb70622095182cba4b392928edff874affdf1fd590bd21063729c93e,2024-10-30T16:35:03.473000 CVE-2022-48639,0,0,4a5ae1aed25211cad58cf1392921491fc3122875f222672a6b19cfd32acf6264,2024-04-29T12:42:03.667000 CVE-2022-4864,0,0,d2a18ac64f46b7de7e75713eac668d767e5348c6b6dc712ad9b2de33d41cdd0c,2023-10-11T15:24:48.003000 CVE-2022-48640,0,0,f98768d06d2bce4ee0a2ff2316c3738424f501d15f7baaa490ac56116110bd52,2024-04-29T12:42:03.667000 @@ -212260,7 +212260,7 @@ CVE-2022-48650,0,0,766619acc76f809ac3f89b4b9fbe9aa75ea430cb3be2d98085e4eead243c1 CVE-2022-48651,0,0,ea5e7dd991b84e861b0bd0b393c1c319833e347be30618e84d0eb3f743ebfc69,2024-07-03T01:39:03.180000 CVE-2022-48652,0,0,05a5a1c50a1d4992042ef5994a0d5c1c6f5485af066180e574dbce1a367a6ecb,2024-04-29T12:42:03.667000 CVE-2022-48653,0,0,8f84c0201a079d8a50061e5f0d56ccc48847df28331e9cee5b020fada4dfd712,2024-04-29T12:42:03.667000 -CVE-2022-48654,0,1,7e71c39d2c45027cd06e36e4438012870bcb7b54fab8df415bb6c67748e6890f,2024-10-30T16:35:04.010000 +CVE-2022-48654,0,0,7e71c39d2c45027cd06e36e4438012870bcb7b54fab8df415bb6c67748e6890f,2024-10-30T16:35:04.010000 CVE-2022-48655,0,0,117c1f7933b825ff69775b7174e7dea2fe0670d0f8ada0f09471ea3ef6ecf8ba,2024-07-03T01:39:04.060000 CVE-2022-48656,0,0,40a2007fa4d639e6f83f0edc7aee784b5f7b01ef417ffc776351b17161144b2b,2024-05-16T20:41:09.867000 CVE-2022-48657,0,0,be78ff049b68a0f97aeb78e19baa31929ce72df0ecfae8aafeac4e8b40bf2819,2024-05-16T20:31:47.880000 @@ -212293,17 +212293,17 @@ CVE-2022-48685,0,0,279d877bd3e5e695339d59d1554a8781d3242fb426a6baf3c7acd095af7bb CVE-2022-48686,0,0,653933df85aeb53741c4da508441bc4178f22de8ca5ed91694baaa41b1db130d,2024-05-23T20:33:45.640000 CVE-2022-48687,0,0,0ec523c7f518c54f1476367451f0187184c8bdd6245e5a7032af6a4d4908842f,2024-05-23T20:33:49.117000 CVE-2022-48688,0,0,d455650df5c1da9bd9791ee4c72bc65174296941dc339d8a298b6c5309ca5633,2024-05-23T20:33:54.213000 -CVE-2022-48689,0,1,348745f20f7b16f6e437efe97d505fac3dab667f37f632881a0d5b5926af8ed6,2024-10-30T16:35:04.910000 +CVE-2022-48689,0,0,348745f20f7b16f6e437efe97d505fac3dab667f37f632881a0d5b5926af8ed6,2024-10-30T16:35:04.910000 CVE-2022-4869,0,0,daf2f3101da8ef8ac50d09fde630b69f6fce1705ae93beee4322fd92abc6df7a,2024-05-17T02:17:00.030000 CVE-2022-48690,0,0,e3f3080cc94bbe09dc9a2554fc22d04dc505032f1d5abcd43d428ee8f98a164c,2024-05-06T12:44:56.377000 -CVE-2022-48691,0,1,f3cf9d8cdcc44069cb228445fc6742b749bf778cb3c28ec48e2565638e1249ff,2024-10-30T16:35:05.407000 +CVE-2022-48691,0,0,f3cf9d8cdcc44069cb228445fc6742b749bf778cb3c28ec48e2565638e1249ff,2024-10-30T16:35:05.407000 CVE-2022-48692,0,0,46546614be66817a48b52a16773b86b62dd71ed7709b7cc7f5f2e6be9c7a9d15,2024-05-23T20:34:02.510000 CVE-2022-48693,0,0,2de2da6c1292fb939817f4985aaa3748704c5e172b80ff619c511ddeeb51fc58,2024-05-23T20:34:08.557000 CVE-2022-48694,0,0,c39c541ec46d540d96fddfe1bdcf81c083d74c7bb84ee90738a9b26551466af0,2024-05-23T20:34:12.060000 CVE-2022-48695,0,0,8970459b5cf430fc8f110f8b3b9636df1f2a218eaed323426aa62da1f67d7386,2024-05-06T12:44:56.377000 CVE-2022-48696,0,0,3533dc13616699020d365772c25d089e92f2accd7741d17aac660fb36007a062,2024-05-06T12:44:56.377000 -CVE-2022-48697,0,1,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000 -CVE-2022-48698,0,1,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000 +CVE-2022-48697,0,0,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000 +CVE-2022-48698,0,0,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000 CVE-2022-48699,0,0,acc89b565cb5cce5b9f8e8bd3da6f880e3d6b9a5e41cd82aa70c3c6804a5dd1a,2024-05-06T12:44:56.377000 CVE-2022-4870,0,0,e992349af17f597cfe5651dfb20a7ad9ae9a4ba97330151fb88be70e92531900,2023-05-25T17:41:06.867000 CVE-2022-48700,0,0,88ca7cc46b5af146038dcfc5e39f2532e471081a55d5445d724a7a174c9021e7,2024-05-06T12:44:56.377000 @@ -212318,7 +212318,7 @@ CVE-2022-48708,0,0,3d74c0532114de6a04115e08b692eed3d80cca2b1e01d5c31b7a193896d3d CVE-2022-48709,0,0,7c1e37ea20fd009be2e17dcacc36b6d370f119b42b8143088cf57ed615197c10,2024-05-21T16:53:56.550000 CVE-2022-4871,0,0,7905d6520e1c27f1cbb6f441e5d1598686722bb011c394a9d524ad16179257b5,2024-05-17T02:17:00.160000 CVE-2022-48710,0,0,7bae9b7428c55842f90af4097ed2f283707d207d75866de2320645d0389c3c29,2024-05-21T16:53:56.550000 -CVE-2022-48711,0,1,fd479d2a20ad7a5e8b12450a72d66add54b0ab9d37e435b0a0c4320c4d4a2e8b,2024-10-30T16:35:06.243000 +CVE-2022-48711,0,0,fd479d2a20ad7a5e8b12450a72d66add54b0ab9d37e435b0a0c4320c4d4a2e8b,2024-10-30T16:35:06.243000 CVE-2022-48712,0,0,ccace5c10a916df674bb9392d637200516b0891ac7d4932f88a1539d40c22b70,2024-06-20T12:43:25.663000 CVE-2022-48713,0,0,43f577b3081d00bb625fc50a3475feaa155bc41741f6b85f1672e53c165db779,2024-06-20T12:43:25.663000 CVE-2022-48714,0,0,d3e55637265824378aa3c7bae71a7fa48c76755872399adfb8504da466ec168c,2024-06-20T12:43:25.663000 @@ -212353,7 +212353,7 @@ CVE-2022-4874,0,0,90cc8c4c3185a1ec38cc988f4bdad23e05202e72d0f25ddcfdaf13ee3fb346 CVE-2022-48740,0,0,a7eb1a4fcfc2023fb44223bb3669f06339f2ab543ff2db91386fcf93c418fa7e,2024-08-19T17:03:31.843000 CVE-2022-48741,0,0,f7a9ce9b119d13af0b410c25cec09275b8f2fb2239b9abc03783d7e15ae6e5f9,2024-08-19T17:34:17.233000 CVE-2022-48742,0,0,955f0c7fbe8c4fb04c29ac68d1923a29168477849bc7b7e7e1a38f90faa04e83,2024-08-20T13:44:57.483000 -CVE-2022-48743,0,1,2dee83a739865d1358b8ab0bde16312d292f3858b29fc6d3a871089f3cf027ae,2024-10-30T16:35:06.467000 +CVE-2022-48743,0,0,2dee83a739865d1358b8ab0bde16312d292f3858b29fc6d3a871089f3cf027ae,2024-10-30T16:35:06.467000 CVE-2022-48744,0,0,db97d2408a3729b8332ee7728404bcf0a8034b20ec9bb81fa52c25169879c043,2024-06-20T12:43:25.663000 CVE-2022-48745,0,0,41db11ed51a619f18bf8566d3a9646fcce3f1ca7e8c8d1b8f24a053db7635b13,2024-06-20T12:43:25.663000 CVE-2022-48746,0,0,e0fa12e9f2d5b9a8bc1db423dcc6c83d2f1745d072ea799cb50d0201d1a5ab3d,2024-06-20T12:43:25.663000 @@ -212364,7 +212364,7 @@ CVE-2022-4875,0,0,0248cb7e88a64eaf1154285e30f722a7ce5832425ab7216a34bbdccf82920b CVE-2022-48750,0,0,55afd22040c9a204644583104b9b0ba5a5b6f53a98ecd72808a82376e1affbba,2024-09-18T16:04:21.597000 CVE-2022-48751,0,0,be32087ff7da3afc8bbd26738891fe8c820998963c64317e4b1afedf242a7fee,2024-06-20T12:43:25.663000 CVE-2022-48752,0,0,38cf75d35e9d1cb0a011fd7ff84616d4bbbc7cc6cd1186a506f033bb40c015f3,2024-06-20T12:43:25.663000 -CVE-2022-48753,0,1,f480bdbf0728c0db5a1ac2926fd0d873642c12cdac06bb9b6481850b26aa1f47,2024-10-30T16:35:06.700000 +CVE-2022-48753,0,0,f480bdbf0728c0db5a1ac2926fd0d873642c12cdac06bb9b6481850b26aa1f47,2024-10-30T16:35:06.700000 CVE-2022-48754,0,0,5e2ca936305382512d4f653834ab56313ed29fa4ae7f0616f9271b8d0d1471f0,2024-07-03T01:39:15.380000 CVE-2022-48755,0,0,30010b42de97147ea0203eebb224554207374f1ac961584225a137f3aa742eee,2024-06-20T12:43:25.663000 CVE-2022-48756,0,0,ba335ca06870d086c208a4b61d6e4ff2c3db981eb9732fbe19a2518767ecf69b,2024-09-18T15:59:50.983000 @@ -212373,13 +212373,13 @@ CVE-2022-48758,0,0,2390cac20b5fb952629cce9f98f33922ffc2f9637f8248dc4bb4782f5e162 CVE-2022-48759,0,0,7962889d3c432d97af1edc38f6b3670b53bb47c561e33f1c213dfd68840532fe,2024-06-20T12:43:25.663000 CVE-2022-4876,0,0,e65b1d52e56908a8a506a957a5c75cf98f657410276c30e7e528870e80a276e5,2024-05-17T02:17:00.467000 CVE-2022-48760,0,0,a822cc7f5fd5d465f57fc80abb1c1a54e7b02787f15d26b19ce6fe3fda938330,2024-06-20T12:43:25.663000 -CVE-2022-48761,0,1,a0fb503b182a42adce92b4284ad999cd8d122ef26da6442d172429172a99aed1,2024-10-30T16:35:06.947000 +CVE-2022-48761,0,0,a0fb503b182a42adce92b4284ad999cd8d122ef26da6442d172429172a99aed1,2024-10-30T16:35:06.947000 CVE-2022-48762,0,0,f4510de1769eada9940776802a8e77e4c4286daddf6ec9206df95f4e10a02de8,2024-10-29T19:35:01.667000 CVE-2022-48763,0,0,019f757453c2977363dff510d05dc5a6e5a09147b632f78395e58e6c428efd83,2024-06-20T12:43:25.663000 -CVE-2022-48764,0,1,1d8469156824e41f94fa6c088c0234978319f16fe9708dd8892fc7b184fb9b19,2024-10-30T16:35:07.177000 +CVE-2022-48764,0,0,1d8469156824e41f94fa6c088c0234978319f16fe9708dd8892fc7b184fb9b19,2024-10-30T16:35:07.177000 CVE-2022-48765,0,0,84ad02e5d8e4b2b68f2606184b9db643b6473e4cacb7a99b922c82145d37f1c7,2024-06-20T12:43:25.663000 CVE-2022-48766,0,0,aee9379c6937dedc065a980d6dc6c448fa04b0544ba5aa2485f663dd038070cb,2024-06-20T12:43:25.663000 -CVE-2022-48767,0,1,f847103d72827504d342cba4ec3cd5aea429a2d2e6b886a77f0ced3f8cffee83,2024-10-30T16:35:07.380000 +CVE-2022-48767,0,0,f847103d72827504d342cba4ec3cd5aea429a2d2e6b886a77f0ced3f8cffee83,2024-10-30T16:35:07.380000 CVE-2022-48768,0,0,03d6c63d6763b8b5c29aaf908a5acdf73da6dfcfa8ecf0bfe0aa68dc7902959c,2024-09-09T12:59:37.460000 CVE-2022-48769,0,0,9da3594b688f3419de5209099af92b325945b83e31f6492d68a0030e2619bb31,2024-06-20T12:43:25.663000 CVE-2022-4877,0,0,7be088f764e81f3d159b624bbe89e382d534c3a5b5b12bd3cddcbca9b765980c,2024-05-17T02:17:00.577000 @@ -212636,7 +212636,7 @@ CVE-2022-48998,0,0,b57fd57be2b9c4c0639652b977cb6f002cc2a4810b1a8b3ec1079b25ac9d8 CVE-2022-48999,0,0,ec5be2b03e3b5b7d38590253ae9fa2814424968d957fec2c8bd6f9455405047f,2024-10-23T15:13:25.583000 CVE-2022-4900,0,0,190b62a537516e288099ba80e5f84457dcb946e631ca8348b4310cc8613075c4,2023-11-30T22:15:07.600000 CVE-2022-49000,0,0,66fc4f4f03879d9d446108a6269b018e290959a61a92a2a2ba3fb133109a0b85,2024-10-23T15:13:25.583000 -CVE-2022-49001,0,0,a7ebb50038c6320990b6a4272aa8a293aee28015fce836d5217b5b7746259999,2024-10-23T15:13:25.583000 +CVE-2022-49001,0,1,90c0c95232b0e405569e477719b0ebe94e42951a70f8f80fcb42731ab4608f53,2024-10-30T18:58:53.863000 CVE-2022-49002,0,0,fad7889d4553e8099b0d53ab53b5daa8b36d6d338a8c65200d67fb3b44de9d3c,2024-10-25T14:24:12.620000 CVE-2022-49003,0,0,f8f764dbf52fdce662c912f1975da1ca6c961f4536dbe6925188461916d8623f,2024-10-25T14:12:59.897000 CVE-2022-49004,0,0,9c8dbf0cc81a830f0d0ecd035cf3bc42a715d008e6d3d287c61a14372514dd29,2024-10-25T14:21:21.593000 @@ -212741,9 +212741,9 @@ CVE-2022-4966,0,0,d7772092edb1c4f6ea77758ef1a2b38cc5d3bd7ded1e7c81a0173f7456d0da CVE-2022-4967,0,0,acbcdcd64f9485d059508255d49aabf4f78227f1537ec6f5aeb5af6241be26cb,2024-06-14T13:15:49.633000 CVE-2022-4968,0,0,9a17fbf13f4e41d8329babee660719152ca3e30f9b3218a566abcb9c02a6a5dd,2024-10-30T13:56:32.953000 CVE-2022-4969,0,0,6da77d75911b6f9f4d4eed5e8e9a02ef51bdb2636c0fddb313d49f06fb600e32,2024-06-06T16:15:10.250000 -CVE-2022-4971,0,1,f6ff69e7ed7e1feffcfd40ec8ecc2dace723d01c8e8dee7c8441179db44a8395,2024-10-30T16:37:33.237000 -CVE-2022-4972,0,1,b59aab7940af7df89b4a4014b803c15ac567db0b0d743fb31ad6d103cfe2de78,2024-10-30T16:34:55.117000 -CVE-2022-4973,0,1,c846697ac57e999699ffcd63f1eb7690000d94006aa238932cc11138832eecb6,2024-10-30T15:58:30.907000 +CVE-2022-4971,0,0,f6ff69e7ed7e1feffcfd40ec8ecc2dace723d01c8e8dee7c8441179db44a8395,2024-10-30T16:37:33.237000 +CVE-2022-4972,0,0,b59aab7940af7df89b4a4014b803c15ac567db0b0d743fb31ad6d103cfe2de78,2024-10-30T16:34:55.117000 +CVE-2022-4973,0,0,c846697ac57e999699ffcd63f1eb7690000d94006aa238932cc11138832eecb6,2024-10-30T15:58:30.907000 CVE-2022-4974,0,0,14764381bacd12db5e2c67438cb3bfc3f3c80d088b68fde09bb3a022a5cf379e,2024-10-16T16:38:14.557000 CVE-2023-0001,0,0,89cc7c25326dd5727e94c3abe5ce2365a868c05aa8d47b4c236024303b20e03e,2024-01-12T22:10:50.817000 CVE-2023-0002,0,0,85151726e26db3dd412b666129cc1146d77d486c542304fa6aa1433f4f16452f,2023-11-07T03:59:26.433000 @@ -229125,7 +229125,7 @@ CVE-2023-38370,0,0,2f608b49fa78e28ed7d54597307441f89eca69687954b9c4cb03d84feb585 CVE-2023-38371,0,0,4edab7c3516b345c2e16468cfeaf027cb33accb5ab8d56ed3046f56a6f192615,2024-08-02T15:08:22.527000 CVE-2023-38372,0,0,34047b6c5dcd93e81132074ab6241a9ad4a05b791237a0f6e823189abf423033,2024-02-29T13:49:47.277000 CVE-2023-38378,0,0,8ab192e7a9153bcaafe18bb1bf0059c9cf2ca1f98ab45a54604a5039bcd870eb,2023-07-26T01:11:51.500000 -CVE-2023-38379,0,0,6df6dbc234c5660ad6de216021ecedf747e624f1234888926c6939902105f460,2023-07-26T03:28:37.867000 +CVE-2023-38379,0,1,c176d7360d8c064d26a0be6b0a21585efaabc5065b73ddeb0ba69c036b831e61,2024-10-30T18:35:01.937000 CVE-2023-3838,0,0,465dbf1a7d4aa34a6e987609e8c74e95bda6eb7a9924aca57f35ff7bb0db0b61,2024-05-17T02:27:52.243000 CVE-2023-38380,0,0,ff66243c6ec21bff87635f3d98a0c92243c71c6c49ed5b2a129928510438d604,2024-06-11T12:15:10.630000 CVE-2023-38381,0,0,5acb99d816e9b0f771fbdd68d1408999c6676db108fae6fda98f4d5b8f9a30ab,2023-10-04T19:53:28.377000 @@ -229156,7 +229156,7 @@ CVE-2023-38405,0,0,eb678e1398b0cc7afc6cadec898dca16e86921fb7075e187826e227511830 CVE-2023-38406,0,0,b4e9fee11e6ca1b95b528449b15c85e7b4af1b868f84535cfe760130604cc642,2024-04-28T07:15:08.367000 CVE-2023-38407,0,0,693c501a24fd30d31e2ef38a392256cef1f52bdf566fe136ed9d5ad372f839a0,2024-07-03T01:40:51.010000 CVE-2023-38408,0,0,8ede47c21e8c8a65641e21bf39fbf7db76eae2d961f2c4f7ab02db10fe0385f1,2024-10-15T19:35:32.680000 -CVE-2023-38409,0,1,41a273a7228c0568b2310db49eed9cb552b2447de4ace94f4b54143996698810,2024-10-30T15:35:04.137000 +CVE-2023-38409,0,0,41a273a7228c0568b2310db49eed9cb552b2447de4ace94f4b54143996698810,2024-10-30T15:35:04.137000 CVE-2023-3841,0,0,d2f5ee23f09965afeb5d36623db7f402f898f5d6074e3d1a8c3e15639396c726,2024-05-17T02:27:52.550000 CVE-2023-38410,0,0,6c048eb455397479418bb47030b11f6e590486d07d435d761a9e48d83acfb861,2024-10-23T15:35:13.280000 CVE-2023-38411,0,0,878de725f745853626d009447a072e4f76f5e67940f796a7c936cf666df69e06,2023-11-21T18:44:14.920000 @@ -241947,7 +241947,7 @@ CVE-2024-0564,0,0,e658595f44d1aeec7c9b8d0db769cc2be653bf4eea6c6475809afc90d39e10 CVE-2024-0565,0,0,ca58e43bc8d960bbfb34d32be78694d44cad238c92c5ee98dbd6b9bf2c483600,2024-09-14T00:15:15.387000 CVE-2024-0566,0,0,596c6a44a6236efe2ddb3202b638004a8482a0ee81f574b58e361ad51f787e1d,2024-10-09T15:23:20.433000 CVE-2024-0567,0,0,2f4df701f3416c48266db1bb8a27d322f4c7f91f5c54f623275f8e06a0796629,2024-09-16T13:15:08.680000 -CVE-2024-0568,0,0,33eac886ba5b69f80ae385e0dcdb88a2caf2e7add15dda3f9f1cb918faf651d0,2024-02-14T18:04:50.373000 +CVE-2024-0568,0,1,cc8f0b8ee84c996f4878a206f10b1275ee241c7bff98f41e01f6c3c40bead0be,2024-10-30T18:52:38.517000 CVE-2024-0569,0,0,a95accd00cf0ee074f6751dcd8e432a7e91c717e436d391ea5221ea3ce82042e,2024-06-18T13:21:16.393000 CVE-2024-0570,0,0,5b3b3864dfe61724c9374954c01de1e56a444e4219e92c2a04dbcce5169d914d,2024-06-18T13:21:42.383000 CVE-2024-0571,0,0,7f21c4d6902cc90ab062599d3bdfb7eedbe2496d392c6cb9d3b01f0939918320,2024-05-17T02:34:47.150000 @@ -242365,7 +242365,7 @@ CVE-2024-10023,0,0,fb7a2d87c1d01f1c0f753ee2a4448f391382353000e2526f44469dfe5432a CVE-2024-10024,0,0,341fb3a51358c0d5f83894d8ffa34bc8830630ac4903510ed67f09db34646b2e,2024-10-21T13:15:01.730000 CVE-2024-10025,0,0,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 -CVE-2024-10033,0,0,acdf5074f0a65571bb13fd536474d2e55d1aca0ec9686906dc29923cd27bb029,2024-10-30T03:15:03.337000 +CVE-2024-10033,0,1,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625cc1e,2024-10-30T18:50:04.137000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-10040,0,0,e60010f49ca3103740274faae9ff6204ef5e8179ea2561631dfe21b2ee350ec3,2024-10-18T12:52:33.507000 CVE-2024-10041,0,0,d3a5fc70054a78d48c6ae937cda2967a3e628fbc08e88f2a331a6962f073bdec,2024-10-23T15:12:34.673000 @@ -242482,7 +242482,7 @@ CVE-2024-1023,0,0,8d9bd157d13575cb2f7284ebb3a2797f2b531ebc1f530e248b6a4889677c41 CVE-2024-10230,0,0,7c95dfcca31fe3a59bb8904d131576d1f25eece1df462a8bd9caf648b1fe5671,2024-10-25T17:02:56.843000 CVE-2024-10231,0,0,eb0443e51721212742591278ce3f179ecbfdd0bb144d3d1886157523275588e9,2024-10-25T17:01:55.633000 CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07086,2024-10-29T14:34:04.427000 -CVE-2024-10234,0,0,f0f874ebc55e8dfa4acd91fc71f3ef8e531ff2aafbcdb23e5894b5f6702649bb,2024-10-23T15:12:34.673000 +CVE-2024-10234,0,1,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 @@ -242503,12 +242503,12 @@ CVE-2024-10287,0,0,f35de541a09293478313fb52f4e207e82b325b3fc6432429ed8850f6465c2 CVE-2024-10288,0,0,fd731f2fa655e977394860f265053908b8d125d4076d3124439c81d187b95c3b,2024-10-24T04:07:45.110000 CVE-2024-10289,0,0,7362f8b5a4aaa787d5c8f070f69545dea8207d6f1adb78df74793ff58580e97d,2024-10-24T04:07:51.340000 CVE-2024-1029,0,0,0f58435c5c731694bc563330e2e0cc48091c7d28b092c9a25a6684c410525166,2024-05-17T02:35:11.633000 -CVE-2024-10290,0,1,554c14bf86d2356052ac39788fb0ad56602d77a74cd88f42cb8fe953feceae46,2024-10-30T15:06:00.617000 +CVE-2024-10290,0,0,554c14bf86d2356052ac39788fb0ad56602d77a74cd88f42cb8fe953feceae46,2024-10-30T15:06:00.617000 CVE-2024-10291,0,0,8507b4447fcd8fcc7aa118a709f5691fbd662f3c7fbb1d55694140494fcc8310,2024-10-30T13:23:47.827000 CVE-2024-10292,0,0,426a6dd878f8fed452ebd6448d3edb5b732c219a4b0073be487941c8e5287eea,2024-10-30T13:40:07.353000 CVE-2024-10293,0,0,8e56039c8372aa88e5dabe6a523be86aef575434b11facd48a467e1a8dc36c3c,2024-10-30T13:37:27.067000 CVE-2024-10295,0,0,05be2217733c9dc82e0ab847a99213d443b6eb2416a14b489bddd760491fe8e9,2024-10-25T12:56:07.750000 -CVE-2024-10296,0,1,a167e288d770dbaf1b2cdb5a1f53629a1025f7402c7add21139cd0e6f9a1db2d,2024-10-30T15:13:18.077000 +CVE-2024-10296,0,0,a167e288d770dbaf1b2cdb5a1f53629a1025f7402c7add21139cd0e6f9a1db2d,2024-10-30T15:13:18.077000 CVE-2024-10297,0,0,7059e1e2bb8cf8e51a328b566020cbc23abd446f188f444527bfee9442b2adad,2024-10-25T12:56:36.827000 CVE-2024-10298,0,0,a0e9f6b5e6c68ad8ada3edbba009974fda145ba113b49020fdab65d252296669,2024-10-25T18:51:44.370000 CVE-2024-10299,0,0,8f6bbd417e81aed931d66aa709de124d671c1a1cb50b9fa501b1939928e9cb42,2024-10-25T18:51:17.047000 @@ -242536,23 +242536,23 @@ CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccb CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000 CVE-2024-10350,0,0,1eff377645f31addadbf2a414de92964c33d8decf15f763410afce73538f2275,2024-10-30T14:29:55.480000 CVE-2024-10351,0,0,0669fd862bd943e91d4fd75dd5a3a4f23e3a0ecf8b6b598b3fa3044b7bf8c6d6,2024-10-25T12:56:07.750000 -CVE-2024-10353,0,1,e06260810ab2f8d83e8148f12eacebfdfa4f171568dc8f755f0a84d5679240e8,2024-10-30T16:21:35.113000 -CVE-2024-10354,0,1,b93bbc475560ddb322fc6987c8bb9a496754455b51c6de71617d975e234845da,2024-10-30T16:32:48.453000 -CVE-2024-10355,0,0,7a858a56547ed44307c9a540d3394b900b64454d40ccf6ae564bf35aa8fa4990,2024-10-25T12:56:07.750000 +CVE-2024-10353,0,0,e06260810ab2f8d83e8148f12eacebfdfa4f171568dc8f755f0a84d5679240e8,2024-10-30T16:21:35.113000 +CVE-2024-10354,0,0,b93bbc475560ddb322fc6987c8bb9a496754455b51c6de71617d975e234845da,2024-10-30T16:32:48.453000 +CVE-2024-10355,0,1,2602c2076153349e7adf5f2683fe39bdc0cb3abdcbf15a26de13daaf9ad9d066,2024-10-30T17:13:02.417000 CVE-2024-10357,0,0,c001d8d64b65c4e55da5d7861409d0c563d6d1b141b88d9a7700fd93b48c7a3c,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,aa65a53beadc56e4dda3efe9acb5802f242935c19973e66e0ff7f62d01b276fd,2024-05-17T02:35:12.357000 CVE-2024-10360,0,0,3576dc079f058e2dd67b489fd947e85df4509a4862ebce17e71112c47cb76c6c,2024-10-29T14:34:04.427000 -CVE-2024-10368,0,1,c8e0d6969c93ffe96acf5e0ee7b5c26394eeb4c801dc04ebad8a62cf1ce3fd82,2024-10-30T16:46:30.783000 -CVE-2024-10369,0,1,5a59dc320150c27565cde3d9105528beaf16a536e1981e9f54165bf31963ac02,2024-10-30T16:50:32.567000 +CVE-2024-10368,0,0,c8e0d6969c93ffe96acf5e0ee7b5c26394eeb4c801dc04ebad8a62cf1ce3fd82,2024-10-30T16:46:30.783000 +CVE-2024-10369,0,0,5a59dc320150c27565cde3d9105528beaf16a536e1981e9f54165bf31963ac02,2024-10-30T16:50:32.567000 CVE-2024-1037,0,0,dc80ea945a1c7339fa73e61584161c3f0eb5c7e682984c3146b230e695ed7de9,2024-02-14T19:09:45.253000 -CVE-2024-10370,0,1,810741af1a3bf30d10bf8fd3a18c7ee61ae1ab9f3ef9c730b2d4820dea325396,2024-10-30T16:38:40.240000 +CVE-2024-10370,0,0,810741af1a3bf30d10bf8fd3a18c7ee61ae1ab9f3ef9c730b2d4820dea325396,2024-10-30T16:38:40.240000 CVE-2024-10371,0,0,0850681dd0b7affd7117bf912b3d2c475da42ed7b5f5270f8839e339171d9bac,2024-10-30T14:51:07.863000 CVE-2024-10372,0,0,55d82ebc64e3347208b42e044461acfe18dba6e494597fc717ca90fd21fd7f16,2024-10-25T12:56:07.750000 CVE-2024-10374,0,0,7790d94803baee2c2a9a346f5727b3f8fa2f864d9522e5ceae124a52fbb8369d,2024-10-25T12:56:07.750000 CVE-2024-10376,0,0,f82f08f1ceca9553145aba97b8462c352f4e5d7c7ee750ca3d73316f521c8aa7,2024-10-25T12:56:07.750000 CVE-2024-10377,0,0,a15010b5ad5322f79230df4206509f3830d24cc27a02c60cbaafdcf05dc546a6,2024-10-25T12:56:07.750000 CVE-2024-10378,0,0,f96d78c466727891d6770df4b523902e99af433e665127d34225b4275b798b13,2024-10-25T12:56:07.750000 -CVE-2024-10379,0,0,3c7753aa53a7f490ce21f7358197ba3a7c5845bca9dfc769528ab53d2e506bc3,2024-10-25T12:56:07.750000 +CVE-2024-10379,0,1,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c2557a,2024-10-30T18:54:15.323000 CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000 CVE-2024-10380,0,0,c0bfbd9ad4334d0e506431d63b2a93926d9f9867b959b3bb457de8428d08215c,2024-10-28T13:58:09.230000 CVE-2024-10381,0,0,63addd0f8191b1c4cfb4d8f0e97d60f16153f091ecece1db9c0d0bcf5f8350fa,2024-10-28T13:58:09.230000 @@ -242584,15 +242584,15 @@ CVE-2024-10422,0,0,8238f03495deed1cfc2bc6657a30d42a132cd1a657f5c4eb6a7808938f211 CVE-2024-10423,0,0,7da6b57d8702a9ff0d8846d62f06cb0163e846663417286c202356caeba5127a,2024-10-29T13:11:44.690000 CVE-2024-10424,0,0,0082f2c9329da5c28dc61d90822e77e972ce57e5080d3ba52361d4d460b4446e,2024-10-29T13:11:42.527000 CVE-2024-10425,0,0,8adfa31fd985d4bc27743db745ec868540b0820dcf6294ef53f1f23cb0898627,2024-10-29T13:14:31.863000 -CVE-2024-10426,0,0,28b0546203467c7939d52a82523c488ba35fb615e4616239613197f9a3fa4d63,2024-10-28T13:58:09.230000 -CVE-2024-10427,0,0,9b2f066d18b440b54fefaad47103e26dcc47db3306972f0530c451a917b87acd,2024-10-28T13:58:09.230000 +CVE-2024-10426,0,1,5ad177c0aa589104250414c1a9e7a84c375bf9be397449c0145d8fd6bc1c23f4,2024-10-30T18:16:03.617000 +CVE-2024-10427,0,1,993865614f672d9f73abb587f40fb0798131c7167c970fe2a7009412d84b464c,2024-10-30T18:21:48.327000 CVE-2024-10428,0,0,da4ce94fc5734b784cd3dc14f57a304ad2272c949dac6a2208ebece092333393,2024-10-28T13:58:09.230000 CVE-2024-10429,0,0,f4e1ec2360cded360300a57b36833fea93401789c82301c0be7d9ae66b51ac51,2024-10-28T13:58:09.230000 CVE-2024-1043,0,0,413776c522ad3bf5006fcc461919529b065f700723f9f41e7759ea485749a4c3,2024-02-29T13:49:29.390000 -CVE-2024-10430,0,0,99101dda209c7956f142ad08e7b1bfb911bc97dcd821ed50b7fad250fda1b56f,2024-10-28T13:58:09.230000 -CVE-2024-10431,0,0,0db9dc6c8730da654b17584eb9e9ee49e84da66a02863e5094e5cce21bfcc001,2024-10-28T13:58:09.230000 -CVE-2024-10432,0,0,0feeda3c5cdfbe1e06aa23ee0373b3f8448fc444aaeb6ffe58ff80bb8da9ac0d,2024-10-28T13:58:09.230000 -CVE-2024-10433,0,0,1e21095aa44ed844c5521070f3a998ae62e31fd3b0fa5ff270c189969069c652,2024-10-28T13:58:09.230000 +CVE-2024-10430,0,1,9c27f96e65330f12f06f69b793b04930685373858718245ee6072afa271bb3e9,2024-10-30T18:48:43.473000 +CVE-2024-10431,0,1,767c9cfd95147af4cb155f3df94b6fb3e42f7cfb738998eb48c8c9953386c8f2,2024-10-30T18:10:49.883000 +CVE-2024-10432,0,1,2dd29a2be6c6864e3457908824a1c27a12e65734ab80198c6a5af55b506760a6,2024-10-30T18:45:59.990000 +CVE-2024-10433,0,1,e097eac5e6c9b16c5aa67cfdee100d74954b46b4ee87539d0837ca729523792e,2024-10-30T18:31:49.533000 CVE-2024-10434,0,0,f9a031ee95bd658c2fe9253d4ed2ae867e5902a8cd9d172e239b9cea0516e525,2024-10-28T13:58:09.230000 CVE-2024-10435,0,0,8912a60b7c15872def4963355302dc88d9e35ad474f000f7a82d872c1d7ba62f,2024-10-28T13:58:09.230000 CVE-2024-10436,0,0,a1797d9cd5fbed49a304a21cb6a3c6dedd7a712c79dd7d33ba3878a13f49582f,2024-10-29T14:34:04.427000 @@ -242608,6 +242608,7 @@ CVE-2024-10449,0,0,37c2bcaf33d85978782c73468306745d1914d0da52c07cf95c1e143ce9f51 CVE-2024-10450,0,0,173344ccdd09f6157ee138e9e87d5e1e2468de9e6dcf03f6fb5d2387fc884b09,2024-10-29T14:34:50.257000 CVE-2024-10452,0,0,b9c0cdbb1129f4d2a683c96007a5a37f3de5a0f61940081281473b366238480a,2024-10-29T16:15:04.593000 CVE-2024-10455,0,0,9f18b197c1829a5ecbaa5a69cd0dd4162e3d6f6c6818ccd45083d33b92cd8ac7,2024-10-29T14:34:50.257000 +CVE-2024-10456,1,1,4e8313f83dd74eaf01a85b0e2c8241c892546e7f6f740c8d60482cb697257f25,2024-10-30T18:15:05.123000 CVE-2024-10458,0,0,7226d5d845dae2d50cf0c67a709b76b4ee40123526a8a54fcaba4953dcdb6c62,2024-10-29T14:34:04.427000 CVE-2024-10459,0,0,9d75223b7f4d8772f198dec4be94083c31b07915596609c3d6e28cafba36747c,2024-10-29T14:34:04.427000 CVE-2024-1046,0,0,2cc4ec780c94e2fc2c5a11377d58ffcde319d06f8567f8dea25dd56811075522,2024-02-13T19:44:34.880000 @@ -244960,7 +244961,7 @@ CVE-2024-21690,0,0,63aa6e78c909be7fa5e5f93bbdaf8524fe66cd24db06ace89e57fd339e74e CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 -CVE-2024-21722,0,0,d14653ceeea554498f54b290b2aca83cfb5fff4d83fdd9da44383d93a67c6521,2024-02-29T13:49:29.390000 +CVE-2024-21722,0,1,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000 CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bce7b,2024-02-29T13:49:29.390000 CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000 CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000 @@ -245249,7 +245250,7 @@ CVE-2024-22100,0,0,e855863eeea03a74b723c195199ccfd00bd60d0199ea36e280bac9ca49c0c CVE-2024-22102,0,0,ee912b26c5f7cee5f9eb859546c190fdb98e830544dee57d01c3888ba8630d97,2024-07-05T17:03:19.087000 CVE-2024-22103,0,0,c8cca3af00da48367ef48bbedd18587bf8b3429750474a031b56e74c1ca1eee6,2024-07-05T17:03:27.443000 CVE-2024-22104,0,0,46f7c14be53e7da77ec7952334802c5317eb32a02297b2565c92e14405615a15,2024-07-08T14:17:26.540000 -CVE-2024-22105,0,0,85df55a9066bb053c302f07c9b18f29241a4312ce2bda90b82d2854172ae61fc,2024-07-05T17:03:50.940000 +CVE-2024-22105,0,1,678b43245b25c599527244f1a59023cc53ea79618d26ff31f3a4cdf7bb48a4cc,2024-10-30T18:35:03.223000 CVE-2024-22106,0,0,f122ebe1c50607a0115cf3d0b091929cd936ab081af02de4de0ee8a1c0fdaeaf,2024-07-05T17:04:07.103000 CVE-2024-22107,0,0,64d7edf67861f2aea41c988e2079065b0ec1cd38f81bbea72ea4457990c0939a,2024-02-09T19:44:32.497000 CVE-2024-22108,0,0,ea9416ff38e82db4d89f422aa521b9f43cdfda08ac0452ecfa3b97765a1ecbeb,2024-02-09T19:39:12.853000 @@ -245536,7 +245537,7 @@ CVE-2024-22406,0,0,ea566858868ae11fe7ef4a5f2555b84db7c93b7c67df25429950c184dec03 CVE-2024-22407,0,0,cf670d2324cf66774d9eb7c61891310af11be913e25885b888550b08c2fa0ca0,2024-01-24T17:03:42.037000 CVE-2024-22408,0,0,a42a4513712c6b51d1d7c72b965b95fa5e4ff47dd54d62c36a3dc1c609bb6683,2024-01-24T16:58:50.313000 CVE-2024-22409,0,0,e05753c8acd1f285965d0d0e0c2ffa323383d6c471ba19a27e49d52af4c2f716,2024-01-25T16:08:58.740000 -CVE-2024-2241,0,0,f289d8f3c643a6daad38a5273832fc08ac4a63386fc51119efdf9312533f7165,2024-03-07T13:52:27.110000 +CVE-2024-2241,0,1,541e617d86f9923ba9d3daa6c868cd5bd33ce121ca601e6ee639e1fcc2ce09ff,2024-10-30T18:35:06.970000 CVE-2024-22410,0,0,8c73cc4914e92abc0e1ed8f091cef1bf9083400c08320133395259f72c8912c2,2024-01-26T18:49:50.430000 CVE-2024-22411,0,0,77e91a5ed75dc3b25614ad8afc3f932e5c64f38aae1d578182fc9000811ded96,2024-01-24T18:54:46.323000 CVE-2024-22412,0,0,8e98657957a95445a548ba846cbc04ab386dec08e74cc6429f6892d0554a170d,2024-03-19T13:26:46 @@ -245580,7 +245581,7 @@ CVE-2024-22450,0,0,fe403e8a7fd8e390fc32bc73d33734a11d8d75e8e2adff855cffc5954c4b0 CVE-2024-22452,0,0,5a080959ec2d756b184e442711bbcbbb6cb0c52e3b6bc2f798e7179e3dcb554d,2024-03-04T13:58:23.447000 CVE-2024-22453,0,0,f9797fcda68051d8f971de586c04a2c106a15949c4e3d09d430cad58ebd8464f,2024-03-19T13:26:46 CVE-2024-22454,0,0,e9841476327230c5841a8929ea4ecb0ea65558a6dfa68436b83b2a2a5b045860,2024-02-27T17:10:16.097000 -CVE-2024-22455,0,1,bc4b26eafc25ec70283fabda69920871bbe1148ce58d7c2c8d6a539864f8578e,2024-10-30T15:15:18.117000 +CVE-2024-22455,0,0,bc4b26eafc25ec70283fabda69920871bbe1148ce58d7c2c8d6a539864f8578e,2024-10-30T15:15:18.117000 CVE-2024-22457,0,0,cb04de6dd02e8a0381ffeb293f9eb43c468f190969ea3471927cb046b6407271,2024-03-01T14:04:04.827000 CVE-2024-22458,0,0,a8f3b6bb3f7ce3a09f59dfbc4d2b0db5234bfeb3a6e52235fbee24c30c1d9fe2,2024-03-01T14:04:04.827000 CVE-2024-22459,0,0,cabd1003173ddb6b26c1189dde137f8a2e465bcd34b07ccffe332260e291ed8f,2024-02-28T14:06:45.783000 @@ -247234,7 +247235,7 @@ CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1 CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000 CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 -CVE-2024-25087,0,1,d0eb5bf250014d4733c8c2cd43475d3db0483672bd5d42f237e7c0898368e6b0,2024-10-30T15:35:07.993000 +CVE-2024-25087,0,0,d0eb5bf250014d4733c8c2cd43475d3db0483672bd5d42f237e7c0898368e6b0,2024-10-30T15:35:07.993000 CVE-2024-25088,0,0,50203c63d0e75eec6b30df19b3f3ba45509939426c60ccdf3351d03062178a9d,2024-08-01T13:47:33.673000 CVE-2024-25089,0,0,e665d40e71849b52a984e51750a3ed30341c4f9c0766ccd2a466247b89c7c920,2024-08-26T19:35:12.087000 CVE-2024-2509,0,0,e1632462213f3b340d9efadccdf81857ddba6b28ec7154489106797e9e1ad3ed,2024-07-03T01:53:19.050000 @@ -247710,7 +247711,7 @@ CVE-2024-25830,0,0,71ac0259693b1e35aa4a4da1b197118a1a7a2d7250e15b0af091ae1d4d2ba CVE-2024-25831,0,0,5b9f73c2b189e5dd33d90886632cdb674cb173750266ada8e06c07c01ebdf635,2024-08-20T20:35:09.747000 CVE-2024-25832,0,0,a4448e0b7fded4d69ae19d5a812394b0dfee60300a31f6c0311dd994464f2ea8,2024-02-29T13:49:29.390000 CVE-2024-25833,0,0,b51394028b2e438a7195762bbea65216839d5c40b4973445f19556678b890008,2024-08-21T16:35:02.683000 -CVE-2024-25837,0,1,e8566032733132a4e472898a09554d7d5b745597958025023019d2ffd25f360c,2024-10-30T15:35:08.810000 +CVE-2024-25837,0,0,e8566032733132a4e472898a09554d7d5b745597958025023019d2ffd25f360c,2024-10-30T15:35:08.810000 CVE-2024-25839,0,0,112ead546eeb57a908059ec1a3d260836a97873d0981df33665fbecb07c8a6ee,2024-08-26T20:35:15.523000 CVE-2024-2584,0,0,dd550e2c3dd90cf91d2a8279de69803860a7180796c6bc877e47cf73e9bebe16,2024-03-18T19:40:00.173000 CVE-2024-25840,0,0,446c9d87bd75b43e98b54bb5f507147f090d48ad09f8a4c53ee839f0d8bcd54b,2024-08-23T20:35:09.290000 @@ -247741,7 +247742,7 @@ CVE-2024-2587,0,0,e2d83da8cabb60e53d324491ce37ed304b28f02c73e9f44ebaa65b6ebded53 CVE-2024-25873,0,0,b0ef6e77600c842b742f164755ad8cfeb8283e0b096faea6d4ca3226ee47f51d,2024-08-26T19:35:23.777000 CVE-2024-25874,0,0,88ae9cad6df17a6b755158813094243d8c75451396169285ca83aa1d99653257,2024-08-27T19:35:17.383000 CVE-2024-25875,0,0,632b54a489df7bdc09e0b8bc1d6535cebf3df53d32564f2ff9029e61a6f4935a,2024-08-15T21:35:09.433000 -CVE-2024-25876,0,1,71252f27c94e104ba80cd9940e7e481f22d4a42058ace62f35175357d7df908a,2024-10-30T16:35:12.507000 +CVE-2024-25876,0,0,71252f27c94e104ba80cd9940e7e481f22d4a42058ace62f35175357d7df908a,2024-10-30T16:35:12.507000 CVE-2024-2588,0,0,d929ea9fc76d73a92e0f60853fb9e3277ed73e9df922a4da6e549ab75ddb350a,2024-03-18T19:40:00.173000 CVE-2024-25885,0,0,d7b45ca9946efade56286fe216db0d8d419d93e37f8064c8e12d635de4b291aa,2024-10-10T12:56:30.817000 CVE-2024-2589,0,0,c013a892db4b6c9e5083074a6ba63c6dd2462c0f9900a29d5df8d96a9aeef8ee,2024-03-18T19:40:00.173000 @@ -247913,7 +247914,7 @@ CVE-2024-26056,0,0,cdde0faae5371b6934ff40ac1740cac009f960619bf2984b3c2abc0f388d4 CVE-2024-26057,0,0,e45b3f0f152eb3c78dc9320bed534a79a66b2c35d46fd8b2b0ef0017333c4b87,2024-06-14T19:46:03.817000 CVE-2024-26058,0,0,a93e87c800fd4d920581776c16d0072b04deb406d205f9f24e685781c2f5715f,2024-06-14T19:37:56.100000 CVE-2024-26059,0,0,3a74ee7caa73ebe11f8a8e2f4a849fd43a4fe73562ba6d99358d666bb4fc6636,2024-03-18T19:40:00.173000 -CVE-2024-2606,0,1,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000 +CVE-2024-2606,0,0,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000 CVE-2024-26060,0,0,9cdef2d575b129761f3290b88017e8f07b5021de9d3255eeba059f838c645f83,2024-06-14T18:49:08.077000 CVE-2024-26061,0,0,95eff38cd1c7e403d46e8de01e1ed3169b38a7e929aa5fe4e06324861444a4f1,2024-03-18T19:40:00.173000 CVE-2024-26062,0,0,3dc8f814b10216475d4edc6897c31db61a1f8c0a6e3b0883a2d1e46684b7142a,2024-03-18T19:40:00.173000 @@ -247956,7 +247957,7 @@ CVE-2024-26095,0,0,9f6c7bddb38cd6b8f363ea5c70ef041eaf1840874199b0d4f54fdf8f0f85f CVE-2024-26096,0,0,7fe4823fe2a7b575a3ae0ebf41ef8d560b89c2e0159509c3214f5a6c2615f8b6,2024-03-18T19:40:00.173000 CVE-2024-26097,0,0,cf64c962cadb0fc8f1556505bc07c2350b9f9285ec03ff659cd6a815a0eb0c88,2024-04-10T13:23:38.787000 CVE-2024-26098,0,0,dbbd02b23dacb0109748d3b2fc272a4103fcd271020bb791bb34007edc8f300f,2024-04-10T13:23:38.787000 -CVE-2024-2610,0,1,8a8dfbfa641be414cd802b96cdada12ae4887a35722e5a49e14d5a6b88bfdf78,2024-10-30T16:35:13.863000 +CVE-2024-2610,0,0,8a8dfbfa641be414cd802b96cdada12ae4887a35722e5a49e14d5a6b88bfdf78,2024-10-30T16:35:13.863000 CVE-2024-26101,0,0,a3bcaed7b7153b5cc7bbbc52911724f0db36b199f4ed571b79e387b893a73377,2024-03-18T19:40:00.173000 CVE-2024-26102,0,0,35dbb61e3e6ac12fce2788e2b3706c2ebc69e7be37fd2a337727452fe09da848,2024-03-18T19:40:00.173000 CVE-2024-26103,0,0,8def4a39c13d47b53292840b50c64b12658220aacee9dc293340637f660797b8,2024-03-18T19:40:00.173000 @@ -248130,9 +248131,9 @@ CVE-2024-26268,0,0,a834c6859c82fe01c7319b79ec743ac2e1e48384520fe6bc3af73c96ba93c CVE-2024-26269,0,0,cb625b1bd944ac1bff27d9b34a6ef0746c8193395b27f4cce109495578d443cc,2024-02-22T19:07:37.840000 CVE-2024-2627,0,0,e439be7d2f37d06c2a4be60c3366459538fd000d9e0a2427e31ec28a8b0dbf4b,2024-08-08T21:35:10.330000 CVE-2024-26270,0,0,2370bdb7a99956787a3745aa3f3e8554faf5c6062fbc90c3c2a2f302e3ff3d08,2024-02-20T19:50:53.960000 -CVE-2024-26271,0,1,90efe8aa58b5016b25a8857eef82f6f11ce202cf315496c4a742a78e19f3fe47,2024-10-30T15:04:11.867000 -CVE-2024-26272,0,1,c80525339098677fa4e717ed434c933352995311835a52a959174ee5867f82c0,2024-10-30T15:03:51.437000 -CVE-2024-26273,0,1,9e726bb802e7d5f73ab9b92d6026de7424a2b453f9bff0a1c38491bf0c7e5d8d,2024-10-30T15:03:35.040000 +CVE-2024-26271,0,0,90efe8aa58b5016b25a8857eef82f6f11ce202cf315496c4a742a78e19f3fe47,2024-10-30T15:04:11.867000 +CVE-2024-26272,0,0,c80525339098677fa4e717ed434c933352995311835a52a959174ee5867f82c0,2024-10-30T15:03:51.437000 +CVE-2024-26273,0,0,9e726bb802e7d5f73ab9b92d6026de7424a2b453f9bff0a1c38491bf0c7e5d8d,2024-10-30T15:03:35.040000 CVE-2024-26275,0,0,8dfbb329f4480275f3997f999c67156f6da28beb9598b03f6430ffd568c06a84,2024-08-13T08:15:09.747000 CVE-2024-26276,0,0,ed958264a3e7c1b7d2ac25a218f34723a1e07c37a5fc5a5cc9f79cdf29775191,2024-08-13T08:15:09.880000 CVE-2024-26277,0,0,38c0c6ef14e665cf88fac106ffd03b1734f58fbe675610b1f96bcc355b7c6807,2024-08-13T08:15:10.003000 @@ -248154,7 +248155,7 @@ CVE-2024-26296,0,0,544e1c2c94ce65e70db959ad46d5372fa189de6687abd994a179048ab80cb CVE-2024-26297,0,0,af2dff5c494a25db31e51e78048442dd01fa43e7ea7ca9a2aba52748560b0484,2024-08-01T13:48:05.817000 CVE-2024-26298,0,0,59727460b37052fa0a59faa646f1b3121962ba5c31619135e5630e3a1f8617f0,2024-08-01T13:48:06.523000 CVE-2024-26299,0,0,388de7f3a87ecf2fa8513c69a452c6b2ff267b5ff8f028f7dadd75103abb070e,2024-02-28T14:06:45.783000 -CVE-2024-2630,0,1,ec856c27a5c03dd021fb947cb024a63c9409651759234a9bffe340d8fd7b989a,2024-10-30T16:35:14.117000 +CVE-2024-2630,0,0,ec856c27a5c03dd021fb947cb024a63c9409651759234a9bffe340d8fd7b989a,2024-10-30T16:35:14.117000 CVE-2024-26300,0,0,1ac1f21ae9a2403844c235609ee04177577ebeaf725b3bb4b2178b26e2a031f5,2024-02-28T14:06:45.783000 CVE-2024-26301,0,0,19f0f94ed5cbffac086b7363ba9897dc486d991fcb04fba1d0f3db89247a8bc8,2024-02-28T14:06:45.783000 CVE-2024-26302,0,0,ff20007eb31c0fa8781cc9c4d6fc8a55c00403a520ce07afbda60fb035b40218,2024-02-28T14:06:45.783000 @@ -249395,12 +249396,12 @@ CVE-2024-27844,0,0,f47c820a9af800de343432c38bc9e2d59f37cb68e7684b8e09f702eb76aca CVE-2024-27845,0,0,0d564bfe9e561fcf31182cd0bbc6cacf5e39792be0769beb62d2dc37b802ea42,2024-07-03T16:24:57.930000 CVE-2024-27847,0,0,be6eb9a0d20bc008efd3235440ec5fe6670ad0bd2a6cedf0bc5d5f0b0c4962ca,2024-07-03T01:51:11.167000 CVE-2024-27848,0,0,ee1f57d57993dc2355133c7db4fe16e1b04f171eb2d17aa6e9b6d31c1607026c,2024-07-03T16:16:03.303000 -CVE-2024-27849,0,0,d06e2ced14c2d6572239df5b42f897095fe518712e55a9defeb063cbc8a74fee,2024-10-29T14:34:50.257000 +CVE-2024-27849,0,1,2b0390a3c7af617e321758162dcf6e21890f863d1d49d034fc1f53bad90b5536,2024-10-30T17:07:30.317000 CVE-2024-2785,0,0,c80d6189c649f881f5582594daf56ace11d883766a2f87b2cab5fb27986794c8,2024-05-14T16:13:02.773000 CVE-2024-27850,0,0,f6e043cb321f3091936e7d5f2f1f5aed96502ad82fd54bc04d66b8f060434e31,2024-07-03T16:14:52.247000 CVE-2024-27851,0,0,c183a7efee06e381e2c9ea0fe349e0a169f6a96a6b8ec9dee046a92195e2d536,2024-07-03T16:13:40.273000 CVE-2024-27852,0,0,9c516bed02a09c2aff2aa4b9ea5d528517ae4b8f02f5b13e3e44ea400df8e7a3,2024-06-10T18:15:29.900000 -CVE-2024-27853,0,0,883bb6d3fa0a8c26652b1f3a1d11e0d0aae3b4d2023d0960134066c2e88301e8,2024-08-12T15:13:14.897000 +CVE-2024-27853,0,1,8df7532682cb8a40efdd1da3dac4b2797ba206eaf005122bafbb0c307b6b39d0,2024-10-30T18:35:04.113000 CVE-2024-27855,0,0,e4901bc850a7c0f79eade81e1de0a193a7e166d4d71678ff74681ab03b5418a8,2024-08-01T13:48:51.967000 CVE-2024-27857,0,0,b12d57be271aa438e5d4c668c7f18ead13afc3b08569565d9c95a215938e9ba2,2024-07-03T15:43:17.007000 CVE-2024-27858,0,0,3faede3942350a3693df13af74a4e5d2e9238d23ab2568766082e7421f38d015,2024-09-23T19:56:28.840000 @@ -250955,7 +250956,7 @@ CVE-2024-30109,0,0,04881debc711277dac69677e9ba1bd3a604eac95048cd8a9d9b601fb19907 CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf5482466d,2024-05-17T02:39:40.533000 CVE-2024-30110,0,0,a07e687d8cc25234136155156054fc7c4d3e910119afb02b600c596b9dc2e496,2024-06-28T10:27:00.920000 CVE-2024-30111,0,0,2d23b069061a9f03f5bbdc50f3bb24e02ba7cc17cb7c96642572c4ddb7c10c61,2024-06-28T10:27:00.920000 -CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1b94,2024-06-26T12:44:29.693000 +CVE-2024-30112,0,1,3e1c8200fee5cd8baae06337440fff74a11f2fbaf6de0922c4c4289a7679b982,2024-10-30T18:35:07.780000 CVE-2024-30117,0,0,c717054d410c2c72ddbb6b4d8b212a7b8e9eb89db453470e8ab539422e902bee,2024-10-17T21:01:17.807000 CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68377,2024-10-10T18:50:54.383000 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 @@ -250964,7 +250965,7 @@ CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4 CVE-2024-30122,0,0,b78e8f60e4d0df5148447073604013d9d8b1860e36c446b761d204643c69cb09,2024-10-25T12:56:36.827000 CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000 CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 -CVE-2024-30126,0,0,1dc4258efb62007b2fcf00852fe3af92d237972fa2c163c391fddf8c594d1425,2024-07-19T13:01:44.567000 +CVE-2024-30126,0,1,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000 CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e7b5,2024-09-26T13:32:02.803000 CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000 CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000 @@ -251525,7 +251526,7 @@ CVE-2024-30801,0,0,79037a49ae58d0454d89f94ba313d584f276e2894821b324a5e75dde95008 CVE-2024-30802,0,0,1376f3b4e3d1d6ed6e73bef87767a1a17df2d57663c8be14203281e52f5ae9c3,2024-09-06T23:35:00.597000 CVE-2024-30804,0,0,dd10458412d3521d15e3678824d59c04de028b22e6295f81ee6095b0ff10efe7,2024-10-25T20:35:07.267000 CVE-2024-30806,0,0,d64ba375e8a4aee4aa1348cdd3ca4e1493d138147be36aa2ff70b6291ff84259,2024-09-04T16:35:07.870000 -CVE-2024-30807,0,0,4152651982bff689cfa963c375e94b647d4d42e48408c3cb0b93ed4cc183ecd1,2024-04-02T20:31:58.463000 +CVE-2024-30807,0,1,9adf66eab8d20fa39067410ec7fc440301636d430d268d7656949581b727165e,2024-10-30T18:35:08.630000 CVE-2024-30808,0,0,156121cad1cb8b48efeaec8ac2958220fd52aa0ba41912798852a887abc4f701,2024-04-02T20:31:58.463000 CVE-2024-30809,0,0,1fcb0fd8f1a39e7f469bccbb27a3f6f436aa5c361167acbe3a36e26117f3ec6d,2024-08-01T13:50:27.443000 CVE-2024-3081,0,0,01dfa9fbad742b3b5c96a84664fd07fad21a9856f0e0dafe766309ca8f119c58,2024-05-17T02:39:42.433000 @@ -251562,7 +251563,7 @@ CVE-2024-3088,0,0,8c7469f878ec7cd8b5c24cda6fed51b2dd10606a6076102ea910b62b21ab4a CVE-2024-30880,0,0,96833c6da8b722f149fb59bda052ae3acf51b2dbf7db685f3dd13fb70ea6d96a,2024-08-01T13:50:31.417000 CVE-2024-30883,0,0,797b2441b715707191740c9fa7df6d1b293fbe4a72a5d05afa9b676f71d49814,2024-04-11T12:47:44.137000 CVE-2024-30884,0,0,453cca54472a26a8ca3d84c4d89a94e0d61ec7afc409128696362f32ae3d409b,2024-08-01T13:50:32.180000 -CVE-2024-30885,0,0,825f7aae44feadfc4199050283e8cd02df667be35770719d5832f7a196d5ce12,2024-04-11T12:47:44.137000 +CVE-2024-30885,0,1,5d637d2cb10d1a5f777b4a3791f8cb9cec659a4c7018d52c2dcd138b02d2c578,2024-10-30T18:35:09.460000 CVE-2024-30886,0,0,3f62f85f345458e571bc5d6599576ec911abf1641e0ba6b07f58563bdc308215,2024-08-07T15:35:01.500000 CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7ed09,2024-08-15T16:35:07.067000 CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000 @@ -251646,7 +251647,7 @@ CVE-2024-3105,0,0,d1365c4198fb5e36e8becbc41dad6d35b33f14f8f23909f9ba45f9f9d5508f CVE-2024-31061,0,0,66c585c6dcfe88f6d4ed833c4b2082d6859ef1b946fb15da1a412618a9ebff85,2024-08-01T13:50:43.283000 CVE-2024-31062,0,0,b5a9a4cbd113d85932da23971f519edde410a6db59033e4ad09ce76acba6508c,2024-07-03T01:54:38.023000 CVE-2024-31063,0,0,0f2cfd453331b0c0d998b6fdfc0e00e4c8ddeb168f57d84d45f0d786ff612084,2024-08-20T20:35:23.760000 -CVE-2024-31064,0,0,09fc7c8df13203efb1ca9057b678e29517d4a825c266b7d99eb7440ce2a3e41b,2024-03-28T20:53:20.813000 +CVE-2024-31064,0,1,14689d53f0d468f6edc52f9c387db327be12ce679ee4fbb5ab5c4afba3f365d7,2024-10-30T17:35:03.070000 CVE-2024-31065,0,0,937ed835ef092f0b01f28500bfeb9fa9746544f25976e145c8c22dad96d9bed1,2024-08-01T13:50:44.083000 CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd82687004ae,2024-04-15T13:15:51.577000 CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000 @@ -251968,7 +251969,7 @@ CVE-2024-31389,0,0,82ed0284dd4429db7c8aa9d21d25225a2ef36c52331bf0f8fc976b267cc1b CVE-2024-3139,0,0,64af74c1a26327d6aaf3c1ee84e198c0bf3fdfb75c7d49a0bca77b0cccd7b731,2024-06-04T19:20:16.613000 CVE-2024-31390,0,0,30f60be7abe5e15fe4c38b058763102f6eeb5aa13fc0131c15112296c96eeaee,2024-05-08T08:15:38 CVE-2024-31391,0,0,be3e3b0749f1f4a92f989cd2a13433175b667c60773cc8880e10eb3ed1687a2a,2024-05-01T17:15:36.400000 -CVE-2024-31392,0,0,90f870aad60adbb29615bf323ba755be311794e0c6e96b2025908a4ce7431427,2024-04-03T17:24:18.150000 +CVE-2024-31392,0,1,f0207d337d79a299cb771825b7dbb479f58a71a9edd6b7a24834f55fec6479f6,2024-10-30T17:35:03.930000 CVE-2024-31393,0,0,675d7cbb5105173b3ddbf8a5a8c43270ec3504343013c71755eb5691c8dc2cb2,2024-04-03T17:24:18.150000 CVE-2024-31394,0,0,057a59cfe49b19144d2e3f8a03ac1db28c62eb3e70e92a240bc4577876d0a78c,2024-05-22T12:46:53.887000 CVE-2024-31395,0,0,84ffe8279d5fc146d1e75e38d339843647ddbe44b201c68383044efb99b4ee60,2024-05-22T12:46:53.887000 @@ -252093,7 +252094,7 @@ CVE-2024-31556,0,0,284801355e37e5d2bb66f70abf65c157c874bd86154c46b8086826ccbf00b CVE-2024-3156,0,0,51decfaeced6eef599bb2d824f817b3e8faaceb41748738897303b173f7baed8,2024-08-01T13:56:20.987000 CVE-2024-3157,0,0,60480b33efb0aa6d09d95f483f38fea3bacba0ec338d2c533afa6497c687e787,2024-07-03T02:06:02.227000 CVE-2024-31570,0,0,13eadb758f3d135a35bcbdc0da22b0a2db0abd3a7461107672829d5315a1eac1,2024-09-25T14:57:47.337000 -CVE-2024-31574,0,0,9d49c3d810249e7fdec3d7ec5acd27e5dbf702e0786215525f0f8c041faf71ea,2024-04-25T17:24:59.967000 +CVE-2024-31574,0,1,9400a5c727a8f962945d3b9afb4282bb6d4362af3e2cf5cf9ead87b636851f1e,2024-10-30T17:35:04.123000 CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000 CVE-2024-31578,0,0,6e50b0fb4096fdf1e9e4bd343bba1497d28778deb9cd70cc171baa5af3c65f3a,2024-07-03T01:55:11.213000 CVE-2024-3158,0,0,8c0df3030fba0de4aa2ae2d7990adff2ae9764437d291bf6e80bf8d1917f3ff5,2024-04-26T16:00:15.540000 @@ -252130,7 +252131,7 @@ CVE-2024-31629,0,0,553c81e4d5a1720d369cb037cd3d3fdc00a0ab2d6da0b4add50845296fba4 CVE-2024-3163,0,0,f776e5c10f11e4b84bc40e9270b43fa69aea4a4b0a04be1ca5354161f1fbb82e,2024-09-26T15:13:56.280000 CVE-2024-31630,0,0,2bd16e3fcef7bda0b7ed937f45148dde60c59ea9d09224ef4dc76dc8aeb1eb7a,2024-06-05T17:15:13.040000 CVE-2024-31631,0,0,189299e833a9bdec5625f34c9b7af7b60646f6c7b2cd4586dea999ec400d5e00,2024-06-05T17:15:13.130000 -CVE-2024-31634,0,0,cd6336332928e139372eaeb7f2fa7bd12555d147721492304ddeef71595ef37a,2024-04-16T13:24:07.103000 +CVE-2024-31634,0,1,423dad2651bf593bb7960942c39e569b456bc9b105e941263b999addeef393a4,2024-10-30T17:35:04.907000 CVE-2024-31636,0,0,5030ab945dd9e3d071b87a4da035a97defc5897507c6002a20e31f1008a32478,2024-07-03T01:55:16.580000 CVE-2024-3164,0,0,0228131b2e264217aeda632549ca753158869120be34b2b79697e3114ab65fbd,2024-09-30T16:15:08.653000 CVE-2024-31648,0,0,14919d1b61efab10d4203511450f239ac7204789ae95d83bb57af18f0000d172,2024-08-08T19:35:18.173000 @@ -252138,7 +252139,7 @@ CVE-2024-31649,0,0,8b247291638ecff50896f2aca79dadb1b9c9aa19002fdb0afc961b73616ec CVE-2024-3165,0,0,0646edb30e52b9cd1d5dc09ce07b22c68fadd9067d31e951e14a2e77fb715a7d,2024-09-30T16:15:08.847000 CVE-2024-31650,0,0,f91457293ffe9951d31a570db1b9cb5f0c4dfb9ffa5e388dc3d2c34a75979925,2024-07-03T01:55:17.350000 CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdace05,2024-08-20T16:35:08.810000 -CVE-2024-31652,0,0,2f3d2336fbc8f42d1dec7a1682c8c016320ebabd666e8e526baaf0f45acfa966,2024-04-16T13:24:07.103000 +CVE-2024-31652,0,1,d3a39df49d7c9a4ac8f46bb863860ab64051b06ba513b7c983446092a2722415,2024-10-30T17:35:05.700000 CVE-2024-3166,0,0,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000 CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 @@ -252299,7 +252300,7 @@ CVE-2024-31941,0,0,afb95f4bebc84bd64697d4f74d4565720846f17ff4a035556242f3c05ce58 CVE-2024-31942,0,0,3d122d20f9462572618ef3940be00c9131d19d68aedd2b72ba341efc50cfe360,2024-04-15T13:15:31.997000 CVE-2024-31943,0,0,56cdbf200aa11a32766ecc5507b8a2e7a0c7f3e429e59b24bdd1e94f41929256,2024-04-10T19:49:51.183000 CVE-2024-31944,0,0,e69264ce6e3b6306dced0b00105f74916d6ed9b25ae35aaae2c1582b163be752,2024-04-10T19:49:51.183000 -CVE-2024-31946,0,0,d96d722cb390b805e089cc7f5547ae66b90cd8ed2ef9c749ee5feb0215341870,2024-07-16T13:43:58.773000 +CVE-2024-31946,0,1,8c67fc0cd19f48e93c63125aeb88281b065e8bd4c07896921be7da72b674603e,2024-10-30T17:35:06.460000 CVE-2024-31947,0,0,e00380625c87db2df939d886c81bf82791ef4afaca372c3fd2b9b85dcad2f71b,2024-09-10T16:34:14.823000 CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6d68,2024-07-03T01:55:34.387000 CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000 @@ -252309,7 +252310,7 @@ CVE-2024-31951,0,0,b251f1577f50282fe90266ab8c20a58dd7e6f3cc651d794f33ba3516646b4 CVE-2024-31952,0,0,3d77ea42e3c6b71ca78bc5c0c7985e6bde91a46241e6b9004033a640e8da9c8d,2024-09-06T19:35:20.623000 CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 -CVE-2024-31955,0,0,8f943461abaeba04af092501dd8e53d2fbc3543c6d0e56173b6c076b93aca771,2024-10-16T16:38:14.557000 +CVE-2024-31955,0,1,72d0807742b832886063cb8fb0fc75735941e6a51da0c7c5dc7e88e0122b92f9,2024-10-30T17:35:07.267000 CVE-2024-31956,0,0,9c56384997ee12995d0e30a7f8f0ab04e153069838f415bd0e5a559ec646d264,2024-07-16T16:27:59.690000 CVE-2024-31957,0,0,52e3fc3f2f752e45a27580270575f061b25dbef0b821774e0c078c02042898e2,2024-07-12T14:53:30.260000 CVE-2024-31958,0,0,44708fdf8ae36298988c578ad1dcbe0c4a075be9b80092bd73c33c39211727f7,2024-10-29T21:35:07.203000 @@ -252325,7 +252326,10 @@ CVE-2024-31967,0,0,d11e85355b08311754a29e0c672ae95e7ac529a4f49e30497f6cb09093fb9 CVE-2024-3197,0,0,324c7a8dc9ccea612ec0432519a90414016d01b55429c0b6dc09fc2cc5af230b,2024-05-02T18:00:37.360000 CVE-2024-31970,0,0,dc760428323022074304e6c9bb04a280cd725057b022c5a2ca8dd65247ed99d9,2024-09-03T21:15:15.603000 CVE-2024-31971,0,0,a1f4b42965419df8f210a326f6ff82813b583045274127c94e5e4f5a032a0e1b,2024-10-28T21:15:04.253000 +CVE-2024-31972,1,1,7192fae571c1ab1e202c201b7113c02c4234890ed042f9671a85615954ec0a0f,2024-10-30T18:15:06.760000 +CVE-2024-31973,1,1,03d63ffb1c32e04793a4762ff57566dbe2b867558d8ce7b244d134aa6d92497e,2024-10-30T18:15:06.893000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 +CVE-2024-31975,1,1,063e04bc50fdf8529cbdc56dff32a76ecfbbf4663a658390f3e293a3cdb9784c,2024-10-30T18:15:06.967000 CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000 CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000 CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 @@ -254799,7 +254803,7 @@ CVE-2024-35475,0,0,5630b4549b65d33d3ee9b0fbe82b2113175125b521e97ea87cdc02319a1cf CVE-2024-3548,0,0,d36c3da57ad232cab63cfe730b939da3d11ca9fb8353135fe3e907f711d131dc,2024-05-15T16:40:19.330000 CVE-2024-3549,0,0,0cde880e41c0c3ba557ce463b1ff0900f3f316d2ed3d6009897a715aae6e97e9,2024-06-11T13:54:12.057000 CVE-2024-35492,0,0,33aecacefd5370fcd53a7eb152d476421944d3120d3115b260ff90b817999987,2024-08-20T16:35:13.950000 -CVE-2024-35495,0,1,444681b65907f601dc2fb6718ff6a9a46524dbc2dc6f97955af4c68af39cb4af,2024-10-30T15:35:10.887000 +CVE-2024-35495,0,0,444681b65907f601dc2fb6718ff6a9a46524dbc2dc6f97955af4c68af39cb4af,2024-10-30T15:35:10.887000 CVE-2024-3550,0,0,ac5bbd2b6bc618ed8d0d187264280ccbd8a80d9a5319faa69118b498969cb88c,2024-05-02T18:00:37.360000 CVE-2024-35504,0,0,e166404c83da3941ce306fedbcc958803779345d2352a83f02ebf499c8052277,2024-05-30T18:19:11.743000 CVE-2024-3551,0,0,66b014d685e7b98f0edafdd7cdd0ca69eb0c14e102cb460567e00480c7707135,2024-05-17T18:36:05.263000 @@ -255323,6 +255327,7 @@ CVE-2024-36055,0,0,9a65ac3e65fa237426eeec0a5393b74ddf0f405783f600502382f8e03d635 CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915ff94,2024-07-03T02:02:43.870000 CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 +CVE-2024-36060,1,1,47ac2b47ef070fafcd6d8ef5d543187d564e462de0136ed700db546a70c3411b,2024-10-30T18:15:07.037000 CVE-2024-36066,0,0,e5935714f53a973b510722d45f5d3bf2cba784516885d84bf43ae18c5d973e73,2024-09-18T20:28:50.313000 CVE-2024-36068,0,0,67b8dd20c17029d0df65b62ef592fd27b14aad04438209518cbf5b8f0453cf62,2024-09-05T20:27:19.640000 CVE-2024-3607,0,0,bb41f416bf193e789c6c3a3e947ee7231c896c3b9ba6bc5f3e43284359c7ea80,2024-05-02T18:00:37.360000 @@ -255523,7 +255528,7 @@ CVE-2024-36307,0,0,a7967d17a652c5cbc0d13d93e7f7b355b3ac34f8807bd56af098c71434269 CVE-2024-3631,0,0,2d02e6433eb5754f41661766194384a96e84152255ba4510c23359c3175c973c,2024-05-15T16:40:19.330000 CVE-2024-3632,0,0,b5152c6f3734461efaf203a246eaafe8ef0e2600523c2de907e61dd2f01c5bfc,2024-08-01T13:56:37.647000 CVE-2024-3633,0,0,56839b289684cefae86bb3dbba78c89cd0cc4141e4ff321380a2afe97575b1d3,2024-07-03T02:06:26 -CVE-2024-3634,0,1,09c0f8e04a3455cab5ef2b14d0e5b955d12b537618764af3142f130e0a11271e,2024-10-30T16:35:16.890000 +CVE-2024-3634,0,0,09c0f8e04a3455cab5ef2b14d0e5b955d12b537618764af3142f130e0a11271e,2024-10-30T16:35:16.890000 CVE-2024-3635,0,0,b778d7b498dcea7fa24c3ef8d2fdc2e16efa86aeebfac3bfee1e098824c6eea4,2024-10-02T14:30:24.627000 CVE-2024-36358,0,0,af47b72fb8afb1752f05b722e59135646af27eabe6a52a7a346d1b2f983dd9bc,2024-06-11T13:54:12.057000 CVE-2024-36359,0,0,e2a4054af1c7293cd417470c34bfb1cad308864123ebeae9851a8bc28053ec60,2024-10-03T19:49:00.337000 @@ -256328,7 +256333,7 @@ CVE-2024-37513,0,0,1c07fcefcf90d83263e223acafda07d839ab3170ec7237f3cc19bf420f1c6 CVE-2024-37514,0,0,017431762cd806034c0397e7ba3b52966faa01f09615fd1c323b7b13e5887081,2024-09-06T21:26:30.600000 CVE-2024-37515,0,0,04cc8ac0f8833e2b36939b6215917d15f9cb9e17391e30434c678ba392c11039,2024-07-22T13:00:31.330000 CVE-2024-37519,0,0,06297c4f20b9cadb68ce894a717e27e20a04a06c00ca9b94ef586bc751ac8651,2024-09-06T21:29:28.770000 -CVE-2024-3752,0,1,a5efb5effc0a5c4e1d6b4c1affd3679917ceb564b80faf8557eca4784ede510d,2024-10-30T16:35:17.613000 +CVE-2024-3752,0,0,a5efb5effc0a5c4e1d6b4c1affd3679917ceb564b80faf8557eca4784ede510d,2024-10-30T16:35:17.613000 CVE-2024-37520,0,0,1cad459c20e2d875630bdc07513eda15868aad6421fe450388baf16c360c4642,2024-08-29T18:39:02.407000 CVE-2024-37521,0,0,92260650514ff9cc36fedb5b0e26b86efa3c3653012779fb5476fce986ce4885,2024-09-06T21:32:13.107000 CVE-2024-37522,0,0,1b2f77530043cdcc607fe91a87e862ddc0dc48e27522ec3fb1bd31ea865c37b9,2024-09-06T21:33:02.857000 @@ -256375,6 +256380,7 @@ CVE-2024-37569,0,0,d72ceb83b037eeec35f3e81abfdf503a49618e4aba004fb3f45e6970df347 CVE-2024-3757,0,0,d3e75f8205a45aeb6c1cb5b9efd4d99998e027f23a100dabf40ce218744ea3e8,2024-05-07T13:39:32.710000 CVE-2024-37570,0,0,3d4360fa9467e8eab1b52b173ed2069d0c82ea4d63ef454bbfc16c6908108d82,2024-10-25T19:35:06.277000 CVE-2024-37571,0,0,67e7b2412f8af956bea28aab4c57aae5f7e196be8f9b19162aa5c75b5cf90c89,2024-06-27T12:47:19.847000 +CVE-2024-37573,1,1,550b704c3f502709be7a35148f537b84d5935982dac3dec6b20c4a996030062f,2024-10-30T18:15:07.107000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 @@ -256613,7 +256619,7 @@ CVE-2024-37998,0,0,f74f0aee21c1d0ed189b1b53893b54b9b769e53300f2261ee57ad9c992f02 CVE-2024-37999,0,0,8cc7ef29669a6bf56abc5c4d9d499ae722d49a7fd7f5699024acadd03ad23f41,2024-07-11T14:44:57.050000 CVE-2024-3800,0,0,f8f57ef4bdedf9e336bba69e6db949ed7a578f3b2a10988d7c69ed3685de0000,2024-07-03T14:36:22.273000 CVE-2024-38002,0,0,a488a788ece9f6902fc8a3f89310aa3b40f556b69c0e0415157e9af8e5691ca8,2024-10-30T14:47:10.953000 -CVE-2024-3801,0,1,07aa9a9e6d81fba8cef5860d9c76583a9b904874d0e98aaaacf604b5d57dcd58,2024-10-30T16:35:18.490000 +CVE-2024-3801,0,0,07aa9a9e6d81fba8cef5860d9c76583a9b904874d0e98aaaacf604b5d57dcd58,2024-10-30T16:35:18.490000 CVE-2024-38010,0,0,125b75eaae30e843cae73c88a30795eb210e3d24686e4a61bf98ad43199377ac,2024-07-12T18:53:35.657000 CVE-2024-38011,0,0,dfdf39bbdcd434b41a8000e4746e5893d04cf4219e333c27df414f4801f5d71e,2024-07-12T18:57:40.873000 CVE-2024-38013,0,0,0a18606eaff9f516ff72b6e0417c94b62f282527a7fb5284ff29917a0162ad77,2024-07-11T16:17:38.197000 @@ -257943,7 +257949,7 @@ CVE-2024-3978,0,0,264c95fabf2474878692eedd3d0ccd0dbcfac72fb894e9f86052802e2ea097 CVE-2024-3979,0,0,e9e7991f3b86f818ec400b9ec60245e440b2d51744d0b7d3598ed5add4c2b631,2024-06-06T20:15:14.127000 CVE-2024-39791,0,0,67ad59fd29829ae2f24abc2182dde7428e4f74acb93e703ae70c08f625fe2293,2024-08-20T17:15:56.067000 CVE-2024-39792,0,0,89dfb5d6e1471517d66a74daaa8f0b2947fd2994f2ce01af52b42a5dfe4eec05,2024-08-19T16:20:28.967000 -CVE-2024-3980,0,1,c112ad3a9592e527e0da0797cc7aa917bbe565618aa427a8c29ee83d7bab28f6,2024-10-30T15:33:12.697000 +CVE-2024-3980,0,0,c112ad3a9592e527e0da0797cc7aa917bbe565618aa427a8c29ee83d7bab28f6,2024-10-30T15:33:12.697000 CVE-2024-39806,0,0,707dfc0ddef50ef77e39ddae9dd446416de56337e997263c3f5b5e8fa232a33d,2024-10-16T16:49:41.507000 CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e010,2024-07-05T17:07:47.090000 CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 @@ -257954,7 +257960,7 @@ CVE-2024-39816,0,0,99e8d0f2ca7c7949ccc5b1fb01e67a6b8249c725e85c2220f31f36de7605b CVE-2024-39817,0,0,da37b9dcdb041f40628bdd9732b2ecb73043147c99cfbf7acdec75950efdf2c1,2024-09-11T19:36:18.050000 CVE-2024-39818,0,0,060cae25a3d44b550fdd040c9993a800c9e0d5e1283fe900d463907d0567c6f8,2024-09-11T13:27:30.923000 CVE-2024-39819,0,0,c8db5421a3ae027faff5d4d06e3d8592e32e290e4092ae4f0fac52eb30d3f58b,2024-07-16T13:43:58.773000 -CVE-2024-3982,0,1,6ab9b53d4a58c1bf71f942b6bcb5c49bc959baba81f92d15e8f83b5fc0f8152f,2024-10-30T15:32:23.680000 +CVE-2024-3982,0,0,6ab9b53d4a58c1bf71f942b6bcb5c49bc959baba81f92d15e8f83b5fc0f8152f,2024-10-30T15:32:23.680000 CVE-2024-39820,0,0,e80ca54bf5fea4b83e9254c90576692ea592c71bc167353b8799d70169ce0139,2024-07-16T13:43:58.773000 CVE-2024-39821,0,0,3d8221c440f8b1dbd5c98d43cf97f16f597a43c5d93725a475fc98495ffe9f3b,2024-07-16T13:43:58.773000 CVE-2024-39822,0,0,89aeba217fe888961e59273bc198a6d383f528aef9e342f9ebf06b5dc5cc7454,2024-09-04T21:28:37.727000 @@ -258348,7 +258354,7 @@ CVE-2024-4074,0,0,e0d606c18d1f193dcf25e2a451ef5a2bdfc69d8e090f30f7431f35132ae93a CVE-2024-40740,0,0,b418443d865eec432c82a04de65de6e9b39f235788ff127206843cf6bdb7c8c5,2024-07-12T16:12:01.927000 CVE-2024-40741,0,0,d8d483a0abb3b7648774c6f8d0ea3345aaa4bf40cdd21fdc9df2fcbe837ed8fa,2024-08-01T13:57:59.147000 CVE-2024-40742,0,0,a7b4d8a63cd84bbed8ae36225a2d630607182f2ae3b73228fc1ab3090889f783,2024-07-11T15:06:29.580000 -CVE-2024-40743,0,1,1ca5c18a4f8e370309e54e9979f8748e30571bbf531892fd8ed83274cf09559a,2024-10-30T15:35:12.210000 +CVE-2024-40743,0,0,1ca5c18a4f8e370309e54e9979f8748e30571bbf531892fd8ed83274cf09559a,2024-10-30T15:35:12.210000 CVE-2024-40746,0,0,eead0b50026ce20d26effd54607d8bf55992b18b9630c4426d5bb7acadcc3473,2024-10-29T15:34:22.100000 CVE-2024-4075,0,0,29d19ea935c989efa2e770180ba61eb06fe49f0b181d6d812a7498d3145b983a,2024-05-17T02:40:15.170000 CVE-2024-40750,0,0,123c568c4a271c6bb023f9091df0f00fec1f937f3d0585148d7948581d7b9455,2024-07-11T13:06:13.187000 @@ -258357,7 +258363,7 @@ CVE-2024-4076,0,0,3600a7160ba6cb63d73da78d982aeb737757fd1783e0b44697873d9ae49c2d CVE-2024-40761,0,0,04b56637ed1b4ee2d83e39ba88cb3e446c0c66fca89659ba993cbe8999f96ded,2024-09-26T13:32:02.803000 CVE-2024-40764,0,0,1e75ed57cfb3afa3fa923571a9717a22e138728f5cce910126d5f1cc9418f1c7,2024-09-10T14:03:09.167000 CVE-2024-40766,0,0,9ffdda3005aa6c238f823c6e65a3a89594c21a379fd17878a86615d17b31de27,2024-09-16T19:48:30.827000 -CVE-2024-40767,0,1,41a668ec3a3d9108df95a63cfc1397e92444c792025e20527bb6192adab7ddba,2024-10-30T15:35:12.440000 +CVE-2024-40767,0,0,41a668ec3a3d9108df95a63cfc1397e92444c792025e20527bb6192adab7ddba,2024-10-30T15:35:12.440000 CVE-2024-4077,0,0,d4f08c4fa42913c8d00f3fecbe96233f1448e9383bf97ebcbeca4cc0f2c8ae2b,2024-04-25T13:18:02.660000 CVE-2024-40770,0,0,a0184ec6f6517bc414460e13ef7b4dae6b47fe9304d99403525f52de9ec9d9c3,2024-09-24T14:55:38.737000 CVE-2024-40774,0,0,f727e8aeb5baa126b4b2412fe1a51e0fe6f28b6a0195e382f8e2cfe4c9297314,2024-10-28T21:35:14.033000 @@ -258376,11 +258382,11 @@ CVE-2024-40785,0,0,0ebfce5c55bfee438659b0a5ff21c26489a17105755c9acc95a453360d4cf CVE-2024-40786,0,0,1d5a22dc485257f61ad56f387446230ed28d8c6d76c2d4bb7e66185337af2307,2024-08-15T16:44:31.820000 CVE-2024-40787,0,0,e7872c59114f8bc6e1d61059bacac8cf94d2c897fdc9c325ee9cdaea3ebeeed2,2024-08-26T17:47:24.847000 CVE-2024-40788,0,0,e37f9cfa39fdb648ce78db53ddf485c5cf3db09885741b13a44f173dcb0901e4,2024-10-27T01:35:10.487000 -CVE-2024-40789,0,1,3602e32e7b4902ad10b1f750ee1eea33948cb5d6d1874e478f20149ceaf89da5,2024-10-30T15:35:13.230000 +CVE-2024-40789,0,0,3602e32e7b4902ad10b1f750ee1eea33948cb5d6d1874e478f20149ceaf89da5,2024-10-30T15:35:13.230000 CVE-2024-4079,0,0,bb93991a44f221a491ad95feb924066985bee7115b17c98782fedf8bbd66c067,2024-09-05T17:12:19.830000 CVE-2024-40790,0,0,f74af1b6450b7abb69693b13c877ce53db126e23128080b9a116672c6aa27da8,2024-09-23T22:55:36.537000 CVE-2024-40791,0,0,1462bf4b5845ed6535d6a4bb5a36a3a889e0ddd7f70e74baa361a7ba6c70fe5c,2024-09-24T15:44:24.397000 -CVE-2024-40792,0,1,5e64c5a9ebd88a63372b8138e0e1226bf6f7a3505f73897b84f2b3055775dd49,2024-10-30T16:35:18.823000 +CVE-2024-40792,0,0,5e64c5a9ebd88a63372b8138e0e1226bf6f7a3505f73897b84f2b3055775dd49,2024-10-30T16:35:18.823000 CVE-2024-40793,0,0,e270b48bbfb7457af71d2df8b98374cdb1521bf4ad146ca87a93b5903c957504,2024-08-23T15:55:17.410000 CVE-2024-40794,0,0,0846f939e0e7c288e34ad63bc25a9b5387bb5773e036a49319e63c41d5246c45,2024-08-23T15:18:40.450000 CVE-2024-40795,0,0,ecb3737fc9c1d9258aa88dabfa79d9f92976c4e445700e54c3486854d82d2502,2024-08-23T15:23:45.990000 @@ -258423,7 +258429,7 @@ CVE-2024-40830,0,0,ca7776e0c74cfd2ad6a11e7b11560ae15ef0e22a367085df69798c9a30c56 CVE-2024-40831,0,0,99c2265cb4d2ae896b91e30bceb0318bce6f0816674b19fd0a8ff6533bf23346,2024-09-23T19:18:02.207000 CVE-2024-40832,0,0,0508ad5cde16d373df00450e2ce0c69eb3ff2fe39db1297b844b6503945a5cbf,2024-10-29T21:35:11.120000 CVE-2024-40833,0,0,3b5bd8adb9200d22552753acbaa4168e91eb7a378a926cf5206f38e0cdca97aa,2024-10-27T01:35:11.700000 -CVE-2024-40834,0,1,cbaf51bbf3e70fb46e2d22d974c0fb2ca3cf811ec9acb1b99d8a954817a080a2,2024-10-30T15:35:14.080000 +CVE-2024-40834,0,0,cbaf51bbf3e70fb46e2d22d974c0fb2ca3cf811ec9acb1b99d8a954817a080a2,2024-10-30T15:35:14.080000 CVE-2024-40835,0,0,ffa2d0f502e7a09e89b4898498fc215520bfece3735d19b72358067234b3c222,2024-08-23T14:39:03.070000 CVE-2024-40836,0,0,3f8d294ac16d143cb335a801addaeae273151ae88e0d093a406c7dfedffe62dd,2024-08-01T13:58:15.220000 CVE-2024-40837,0,0,ccc4fbf4d07a48518f7fa02b46184c88d2b8e0a64ca26c4f8ffcf17903cd52b7,2024-09-23T18:50:16.050000 @@ -258440,9 +258446,9 @@ CVE-2024-40847,0,0,ac34ef361fd419d2c48bb6c61015668892d59a23316cf5cdc2086e1759e39 CVE-2024-40848,0,0,7ab28782bb21d2f3b29c42ec6d7a69b6a3d16784ab458e6dd25f268e7916d92f,2024-09-24T15:57:03.893000 CVE-2024-4085,0,0,7aad6a4056b6c332cceb43166a488ef1c1b3002f44d4bee7dddba365a66e15ea,2024-05-02T18:00:37.360000 CVE-2024-40850,0,0,7d15ba2596e6638a9baa06d58c5470198e88fecf8047b38bd33f0680a13c813a,2024-09-24T15:41:22.803000 -CVE-2024-40851,0,1,2951b01099c450197931b2d3c9228abf645beafb747dcd3e2912599f5aa43484,2024-10-30T15:35:14.883000 +CVE-2024-40851,0,0,2951b01099c450197931b2d3c9228abf645beafb747dcd3e2912599f5aa43484,2024-10-30T15:35:14.883000 CVE-2024-40852,0,0,3de957ce6dc717c4eca0b29db3655ade9659ced84b056b000601bcd50e3e4584,2024-09-20T12:31:20.110000 -CVE-2024-40853,0,0,8b571240b2aaeae983c05f75ab22f4e2c4695165f3df0121995d9ccc6e81c7ac,2024-10-29T20:35:25.610000 +CVE-2024-40853,0,1,406098e9dedf197de0514938c4993bfbf477e600f2b7ec8507b9e9ccf473be1e,2024-10-30T17:08:42.157000 CVE-2024-40855,0,0,90f4bd8e2db22cf8648d6901c6c3a67ee009b99fe00cc69ba2463d3c3905a513,2024-10-29T17:42:18.573000 CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000 @@ -259213,7 +259219,7 @@ CVE-2024-42008,0,0,239b4738ade78ee5cb428e4f0bc1011e17071df970bcf82670ecd9f70d12e CVE-2024-42009,0,0,8775464dacf05b07f164d9bf135cafdb2ba4b40a363a5d9db69127bd2ae3f95b,2024-09-06T21:50:47.813000 CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb089,2024-07-18T19:39:50.667000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 -CVE-2024-42011,0,0,6c3467251e164c596233c97e56a2ece8699104c8d56c773b7e497bb18011c226,2024-10-29T14:34:50.257000 +CVE-2024-42011,0,1,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000 CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000 CVE-2024-42018,0,0,48c29334c5da2098d436407e3b178f068ba556edf0bd6315b98cc5d6fe724ba8,2024-10-15T12:58:51.050000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 @@ -259240,6 +259246,7 @@ CVE-2024-42038,0,0,eb94dedf88ce1c88ce5bfbc4f90e50df94d98b05443b426e18ed40ec47c0c CVE-2024-42039,0,0,7c8969b8c7addbeea34acdb619551d58483846230427052a3b95bfac07270d18,2024-09-12T19:37:01.487000 CVE-2024-4204,0,0,862cae0d91d079678d989fc30b77e9abff361be6cebd83fcf5dbeecd5c0be203,2024-05-17T18:36:05.263000 CVE-2024-42040,0,0,0994275c2c474f352961ba40bdf13e3388778f56f566ec8d1d02a6ad8ef6691a,2024-08-23T16:18:28.547000 +CVE-2024-42041,1,1,d83cbb9aaa6f76c62437214077cda06da4047e9b91244abad56488139d97f345,2024-10-30T18:15:07.223000 CVE-2024-42049,0,0,9abf5139ab1afe8d55de5e333c97afa73e09c57ae34abc37f55eb8e975c40df6,2024-08-01T13:59:18.253000 CVE-2024-4205,0,0,3bc679c8856618cb4acfda15e793a18c79adc1e7d27d459136a04f77802a5775,2024-05-31T13:01:46.727000 CVE-2024-42050,0,0,d2a1e67e449aa6326dde0504a879c37570d5ac7e2fe0ffc282ef9a9581af71d3,2024-08-01T13:59:19.083000 @@ -260652,7 +260659,7 @@ CVE-2024-44070,0,0,897c04ba9a67e5ea511bddee651919522720d2ac02cb9c6411d8cfecd2598 CVE-2024-44072,0,0,c15ddc9cbc2cc106650a31089cdfd669f16d12a8ad25609c42818d1d63e1458b,2024-09-10T20:35:09.990000 CVE-2024-44073,0,0,de55f1c002ffa890fb79df1a9da58802af7cfd53cb9325cc406c6e277fabf47c,2024-09-06T17:35:17.523000 CVE-2024-44076,0,0,d8ab474e3e0cd492e411ba495a07543359555360960989541af9d6ad1fd6855e,2024-08-21T12:33:42.487000 -CVE-2024-44080,0,1,9bee276309c166c6facf28cf9cd30e5a6038b72ef2397f7e25826f1c9a81a8e6,2024-10-30T15:35:15.230000 +CVE-2024-44080,0,0,9bee276309c166c6facf28cf9cd30e5a6038b72ef2397f7e25826f1c9a81a8e6,2024-10-30T15:35:15.230000 CVE-2024-44081,0,0,07bf67c5a602c2a19603ce6d7abb6b6fa1f2ddcb8427e95085138a8c0cfb2a42,2024-10-29T22:15:03.730000 CVE-2024-44082,0,0,eca3489830dade6ed42141e32f34d30f3f0c158d92e0366e9686c819b89d9a20,2024-09-06T15:15:13.180000 CVE-2024-44083,0,0,0fbb97686726ee4d6be299ae185c5a7e6d7807c436d290993d1b41ed0119344c,2024-08-28T15:15:17.050000 @@ -260716,7 +260723,7 @@ CVE-2024-44155,0,0,bc69f7eda0ccc25d9ce40996abffd50dd53eb3f764e8a2b160a1b820e4079 CVE-2024-44156,0,0,c7b3823189e90823d63dfcd6d29d891ddc5936a4d7c2355696b7ee8e9b86261b,2024-10-29T17:33:51.597000 CVE-2024-44157,0,0,97a910630a3e98feb305f0a101a5c0c80098e87c8c858ed1c75250af3ffe7b5f,2024-10-27T02:35:03.400000 CVE-2024-44158,0,0,9d7e2fa5cd578734634a4ad7f07935a9c77533bae7cbf9b59ee2c2f082d12524,2024-09-24T15:50:25.083000 -CVE-2024-44159,0,1,7d179919ce785cd1c8cd21feada413b24fa5e3082c0fb76a2673925d4b5b996f,2024-10-30T16:35:19.750000 +CVE-2024-44159,0,0,7d179919ce785cd1c8cd21feada413b24fa5e3082c0fb76a2673925d4b5b996f,2024-10-30T16:35:19.750000 CVE-2024-44160,0,0,111306ea6d5f4cd614ad1f97ebba8b9ebd1a48c26d38996100c4c5802f2b5bd6,2024-09-20T12:31:20.110000 CVE-2024-44161,0,0,7c1aadaed2bcadc65ac3b4a310e13a88d0da6d821bc96d21705d61516e8bb478,2024-09-26T13:56:51.110000 CVE-2024-44162,0,0,1131808ef016b13b5d7fcf92510530c5e9d006caa670f7c22a84955b0e1ca58f,2024-09-29T00:16:28.033000 @@ -260730,8 +260737,8 @@ CVE-2024-44169,0,0,1984dc39e10d51ae75d1eb4ce71ed44a0e161e0da261bb6e58a46f9336bba CVE-2024-4417,0,0,9b4dc22c7f1e74f381016fafb921403ecdaeb7b3b80aa5fc2130db180ef5935c,2024-05-14T16:11:39.510000 CVE-2024-44170,0,0,09c524e61ec90fba1a595f63070c116f0423bd8870a9c70b92682dcc392756d2,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,8849ab93a4e3d95b8d0c07b2a5929755d0774e3c1ebcd6d4c47f015cff90ac49,2024-09-24T16:22:38.880000 -CVE-2024-44174,0,1,58e94ae286d7256e79f455f95122397c43bb1dbfdfda643ceb43c228c40a57d2,2024-10-30T16:35:20.507000 -CVE-2024-44175,0,1,7afc5d4329ba4ebd4a317f125db3a537b10c67d1498a1deac5c91104e26a4bf4,2024-10-30T16:35:21.327000 +CVE-2024-44174,0,0,58e94ae286d7256e79f455f95122397c43bb1dbfdfda643ceb43c228c40a57d2,2024-10-30T16:35:20.507000 +CVE-2024-44175,0,1,efb937d5b225987319c921d2cb78fa6683fad5111762ef319926b510871daf3d,2024-10-30T17:14:55.127000 CVE-2024-44176,0,0,5b6fb86a9ad1c810cf7d21dda6f46ac369e13568efffc12218acbb73a0a9f505,2024-09-25T13:27:13.333000 CVE-2024-44177,0,0,4b644fb54bfe5bad82f56bfb2ac65172a558203c45040f662484a2178ef047ba,2024-09-24T16:28:09.853000 CVE-2024-44178,0,0,8f3bedb3f1854b823e7d7c5ff9360a99b55c0a468dfebda9287f95f4dbce5848,2024-09-24T16:28:40.960000 @@ -260750,9 +260757,9 @@ CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c281 CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000 CVE-2024-44191,0,0,fd90f1ba5d10f528b1625af58577f983572aef3fdc720edeeb57922b3d21d47c,2024-09-25T13:24:42.380000 CVE-2024-44193,0,0,f17ea6ad74232cbfafb0dc23bcf4b401977d8786ab1d3a877fc57ebc775c3168,2024-10-04T13:50:43.727000 -CVE-2024-44194,0,0,a903dcdde1fd9d3163ec05258db0160ebd2ed91097df8b113a89edcdc22938c4,2024-10-29T14:34:50.257000 -CVE-2024-44196,0,1,28248fab8e27e7b89ddddaf6c4ec2fde647f72a4825e0a1f4e2461e08554e2da,2024-10-30T16:35:22.640000 -CVE-2024-44197,0,0,e38e0235fcf85579dbe16d1dc7df7b31f0e5ecba2c502c313f48d42f4d4e4171,2024-10-29T14:34:50.257000 +CVE-2024-44194,0,1,a72a729395908679d65238c4629e953464a1555a31cfb5252936c5c793c0aaa9,2024-10-30T17:16:24.380000 +CVE-2024-44196,0,0,28248fab8e27e7b89ddddaf6c4ec2fde647f72a4825e0a1f4e2461e08554e2da,2024-10-30T16:35:22.640000 +CVE-2024-44197,0,1,96a67bc53eb67814f0144909bf31b5b2b095c5319ef55687f42e9a0c6356d0b8,2024-10-30T18:35:11.603000 CVE-2024-44198,0,0,a791372ee4d27381da793bfaa9ff3602c34f52c134516fb46328053cb2cef47f,2024-09-24T15:45:32.787000 CVE-2024-4420,0,0,02a774e6911ba5e1ba33187a3301eb3f9ee3d8fd212c89cee791dd002410f381,2024-05-21T12:37:59.687000 CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd271,2024-09-20T12:31:20.110000 @@ -260762,68 +260769,68 @@ CVE-2024-44205,0,0,e33dfb139154886257e161081c01cc4f82c900563ff347637d97391b0de31 CVE-2024-44206,0,0,cce809798797c4f27f98da648a0cb34cc37e85900206791dd0f0bb97bf5465c4,2024-10-29T21:35:15.080000 CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000 CVE-2024-44208,0,0,1be70d7561ee435c2d0f8e81dc051c8c001e4fcd1cadd09db81bc9c1630bcb7e,2024-10-29T20:47:09.883000 -CVE-2024-44213,0,0,8f3af05cc28637515ddd7c72b05e054e2da62bf3199c29442c79bb3fd6a47a3a,2024-10-29T14:34:50.257000 -CVE-2024-44215,0,0,857f244c4b6f0129b65da808880593dd1da0efe0b6a97e93140557ee3b01e4f9,2024-10-29T14:34:50.257000 +CVE-2024-44213,0,1,b53078959b2fc545806e84128607011b6f832a16732e3d2d6e9cb355bfd27585,2024-10-30T17:19:38.887000 +CVE-2024-44215,0,1,cf750d905eb4c52e30461cbb963ee1f20dbc877cf5e3fa53d2d0e1c7681709db,2024-10-30T17:22:44.883000 CVE-2024-44216,0,0,de6ac6e9b2d69b5b6744c8356c035a6b7070bb6dd38f2674516e3ca7750277fb,2024-10-29T20:35:26.520000 CVE-2024-44217,0,0,ab4aae72c487ef9961bd4471dfdd070d691c131f2334ec94271933c28ef8ef43,2024-10-29T20:35:27.313000 -CVE-2024-44218,0,0,0577675dc967a8af0ba8199d6549acb67fb12345391312d52db564fcf4863868,2024-10-29T20:35:27.533000 +CVE-2024-44218,0,1,4acc0083614746b6c2d229477750a7eb26d5e6e27308c70dfb411c8e5af1f7dc,2024-10-30T17:24:01.703000 CVE-2024-4422,0,0,19c238465441950f6a856008185dbc8a7b4e94407f1040ce4816040c86860490,2024-05-30T13:15:41.297000 -CVE-2024-44222,0,0,6876cf4f9ef2e09faf0fff40698500ab66abf0475d8e16d35fa6cdc8f22a00f2,2024-10-29T19:35:15.710000 +CVE-2024-44222,0,1,2d1c9506aa01928c94a245f74651f0e477458ddd815a4bd143998351ecb565cb,2024-10-30T17:25:30.903000 CVE-2024-44228,0,0,fe7edec8c83c3f0586e9f6a97768d2ff14a75aa7bfd4217491cf596d00d7ae54,2024-10-29T20:42:04.980000 CVE-2024-44229,0,0,459366a3ff6ef76a99d08535a28f4f2b6e8f55a20bc19afc8ece1fec95aa44c2,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 CVE-2024-44235,0,0,bff9483ed01f45367c2cc53c10da12b8ef5b3cc5871d67ec16f360502d98ebcc,2024-10-29T20:32:46.747000 -CVE-2024-44236,0,0,8711746e75a235c45f0a09cb006be8a739fb94eaa13c58436ee313e463e91d44,2024-10-29T21:35:15.290000 +CVE-2024-44236,0,1,2596c988781ee3ffb6a2ddc6dda4e4baeacf8834e38bce0c324b3d9abc20481c,2024-10-30T17:28:52.077000 CVE-2024-44237,0,0,0ccb96caec122e6d60ce17ba18063b0a9447d8c20c9511ccf57f0112e5d3846b,2024-10-29T21:35:16.563000 -CVE-2024-44239,0,0,6572c4bd50e97c915779c9681dec90ff254e0ffa6df2363add5efde003d61b9f,2024-10-29T14:34:50.257000 +CVE-2024-44239,0,1,7be9b876ae3cd0f9d085175bfedf6d3126f24ca02962d21407808a5ed582373f,2024-10-30T17:30:13.147000 CVE-2024-4424,0,0,f0ec85c26b242f03f1dda01796c703344a9d3cb93681b5b37fa83e955b9558c1,2024-05-14T16:11:39.510000 CVE-2024-44240,0,0,e5ba92ee4549f224efe1d86523187caae6bf204f299f708564698d6b997335ba,2024-10-29T20:35:28.870000 -CVE-2024-44244,0,0,d53a3eab30193c3c25cb5e93a974278bf170e7880fc4f6fb719a675afd0403a0,2024-10-29T23:15:03.547000 -CVE-2024-44247,0,0,d7b92efdaa300dd98e4987c2d8849c05e732d8243dade9113cd309b9e95e3b2f,2024-10-29T14:34:04.427000 +CVE-2024-44244,0,1,a62deb1a2b523655718dd139a4c8dce4cc346f3e72b961246a962afeb68be202,2024-10-30T17:31:35.970000 +CVE-2024-44247,0,1,defcbc0b3d225705e42d0820ed116fe0437d4039aabcb45092438de3ff44467c,2024-10-30T17:49:05.693000 CVE-2024-4425,0,0,42da9fd06b4c286cf2ec4b279ef4c006e94043f167bd5abbfb6b02300a24e0e6,2024-07-03T02:07:33.267000 -CVE-2024-44251,0,0,406183b990c31e8b289d3648e898b17ee3f61e9384718d2bc8b02eb22ceb576d,2024-10-29T14:34:04.427000 -CVE-2024-44252,0,0,1f56156c1b3504c9e6ce29efa3aa1850aadb21fc5cc83f9d279e387e16772ccd,2024-10-29T14:34:04.427000 -CVE-2024-44253,0,0,9dfc45ca17e6731fbad34191bc8c6dd082b2ad98644cfc4500dc83643e48425f,2024-10-29T14:34:04.427000 -CVE-2024-44254,0,0,9ffc01c4a01fb0cf2dfa1b937b902fdcdac883a07b08df9e5c9982b891104dde,2024-10-29T14:34:04.427000 -CVE-2024-44255,0,1,946f5df35060c9db396726e4af4a963170f6b027f300a610055beb900a58e006,2024-10-30T16:35:24.113000 +CVE-2024-44251,0,1,06b7014596787640addefbe5cb788573d9364f4008e67845454699247f85ea82,2024-10-30T18:35:11.887000 +CVE-2024-44252,0,1,2900e8eb4277894e96511252705f846cc73aa1b0f9912fe369b4487a3fa26418,2024-10-30T18:11:48.300000 +CVE-2024-44253,0,1,c115d1039b45a7f9690eb2a56a9835db18a5c11a32647494866cd52c7669fa9c,2024-10-30T18:14:05.540000 +CVE-2024-44254,0,1,8796e37d4c81752c3cec650638e6ba94006e768e29f3bceedc28e9fc3faa8a81,2024-10-30T18:20:42.880000 +CVE-2024-44255,0,1,89e692fbabe1ac868aa1386f1241f7c919e5ed3a9076044380cfc36ec3d5e720,2024-10-30T18:26:03.767000 CVE-2024-44256,0,0,17aa03a2ed4c3fc9cc6050efee4584273e8e878058b24cc398dd2574b5d0db34,2024-10-29T20:35:29.053000 CVE-2024-44257,0,0,fbfaa04f8cbb781c7b5c9b4d7e31917aa6b40ea53153adf50b1bee22b30132a9,2024-10-29T20:35:29.240000 -CVE-2024-44258,0,0,cc430542de7d98821c8b71a980b44111ab28852dadd6ee720ceb482eaccacf5c,2024-10-29T14:34:04.427000 +CVE-2024-44258,0,1,91308a1547f18fc4e41f208855ec5d4256762f382e547d5702ebf3ed7d38e066,2024-10-30T18:28:24.490000 CVE-2024-44259,0,0,34e000c43f89f1c6e41f971ae05cc2648b135b80ff70f0cd9cdfe5676f091511,2024-10-29T23:15:03.663000 CVE-2024-4426,0,0,438c7e77bba5537169c045ba2dc210873849174945e68052d5a8bbbd94b93b11,2024-05-30T13:15:41.297000 CVE-2024-44260,0,0,5a4143b47f6bb680997cf416c6ec19c71d6b161de490b20adc7ab8ee10998409,2024-10-29T21:35:17.343000 CVE-2024-44261,0,0,63f4f56282555d6400339aacb88699660f2f51148f97c24f4e2f1148936767b9,2024-10-29T21:35:17.520000 -CVE-2024-44262,0,0,1e84b5b5e920ae0a5d39bb092052fca1937f3b656c20347fc26958279d3169e6,2024-10-29T14:34:04.427000 +CVE-2024-44262,0,1,356fa30d61a2a4a05c20d3e53cceb79f71f449793bf98caae6568d43ce868e5e,2024-10-30T18:34:09.203000 CVE-2024-44263,0,0,a819848c86eae35a801a866c7cc8c7d5416433f8b99a5a8aa14e7494fd1ec8c4,2024-10-29T20:35:30.263000 -CVE-2024-44264,0,0,373b827613c9a9c7f3a770e81e0fe9608c0c7e87e15a1473f6a79c0a693604a6,2024-10-29T14:34:04.427000 -CVE-2024-44265,0,0,15fd2e5ab0bd9692c8b85fcbfa245a300e35e9c55661f38c9ca204f7cedba610,2024-10-29T14:34:04.427000 -CVE-2024-44267,0,1,db7d7d22b2d2ece8f2ca8d393f1769afda13d2beb2f2e94ff305ece63bb4168d,2024-10-30T16:35:26.040000 -CVE-2024-44269,0,0,1c9a87340d5e4e82f40555347c8caadf6fa5b6f66b0f5a9614db97e3a7ef4b37,2024-10-29T14:34:04.427000 +CVE-2024-44264,0,1,33fcf42e2fcb995d42ddbd345714bacb26a882080544a1c74471572aa6f67948,2024-10-30T18:37:01.203000 +CVE-2024-44265,0,1,9ef30c68a4b5e740c80bdeea2d54e3ef577bc22cce0ce7d85455d9e52a85fc13,2024-10-30T18:38:43.420000 +CVE-2024-44267,0,1,54e307259fdf9faf2d295558cca35d928ee749fcbb69e49a19893e000b272151,2024-10-30T18:39:55.167000 +CVE-2024-44269,0,1,d2ae1f2daae5520892f4d3835c55bd6e3c91a5428c7b7f94431738fbb8222d17,2024-10-30T18:41:01.060000 CVE-2024-4427,0,0,80d5c9824f4d390f5c719cacd09f3ea81ff1def48bdeaace03a047150cb666b0,2024-05-30T13:15:41.297000 -CVE-2024-44270,0,1,b9dc04a4ca0dd5953d447e5de930be19747b99fec8fb45d55b8104ec62054d58,2024-10-30T16:35:26.390000 -CVE-2024-44273,0,0,11a628ab450ae1f43cfd6e9012e9c8730804b871d63d3b05a279a1370eed85aa,2024-10-29T14:34:04.427000 -CVE-2024-44274,0,0,7042f1a17d79ad7857d5d12b1176335958b275fae27c4e0945876e2b01ab9aec,2024-10-29T14:34:04.427000 +CVE-2024-44270,0,1,7089433a6c538cdb3d5ca719fb3a428260ae4bb28b57a76008743dcdfdc4dc2b,2024-10-30T18:44:35.083000 +CVE-2024-44273,0,1,9b52f6442241f191e6f7734f08bf3bd3c66642dbeb46beac22ef1f1f71e24ebd,2024-10-30T18:45:10.080000 +CVE-2024-44274,0,1,5b4e9e2856a51a6e66e782c43c09e022afbf7f1fd6aad46a493e13d3ac112e5d,2024-10-30T18:46:02.053000 CVE-2024-44275,0,0,d8e06bb43c158fcc4281797d1ccceef0155ebbbf771c23024f0bfd1184657b41,2024-10-29T19:35:17.777000 CVE-2024-44277,0,0,61d2c2a1458817cc145742f3d2eca621b243ba7bf6807dd615d1ca055f76ebe4,2024-10-29T21:35:17.737000 CVE-2024-44278,0,0,6a7f9872d82db0bbf03957c1afd6ecbea3f2f06c40db6f23a06b217454e0d632,2024-10-30T14:35:12.077000 -CVE-2024-44279,0,1,46b4a70284608cd623dce4bf8f315595524d7e7caa51dbade793fd08dea3ec38,2024-10-30T15:35:16.063000 +CVE-2024-44279,0,0,46b4a70284608cd623dce4bf8f315595524d7e7caa51dbade793fd08dea3ec38,2024-10-30T15:35:16.063000 CVE-2024-4428,0,0,a6da5e3db14ee64a55bd0d7000ef1cdcb0310671965cf729d94b935d780a379a,2024-08-30T15:49:16.927000 -CVE-2024-44280,0,1,3c88d828a58a14a85e8e2703993f405717fc468f11000fa1c0be5028b7b08202,2024-10-30T15:35:17.173000 -CVE-2024-44281,0,0,836ebb72fd4fec7a9d20e240194eb06c62bd346b60d324b256da0dcc1d64341f,2024-10-29T14:34:04.427000 -CVE-2024-44282,0,0,0d2af15e3522707d977fe4bc740af92cf6ebf4241f16cee27277cbdffe06cb5d,2024-10-29T21:35:17.953000 +CVE-2024-44280,0,0,3c88d828a58a14a85e8e2703993f405717fc468f11000fa1c0be5028b7b08202,2024-10-30T15:35:17.173000 +CVE-2024-44281,0,1,7fd4737b3e9be75854224a5c70b12c7f4aea269fcf1b84782835dfec60814ea0,2024-10-30T18:46:38.580000 +CVE-2024-44282,0,1,5f8c798b4d9d0ea2d7f04997e606b856022096ee97d357274135c89c18674756,2024-10-30T18:47:21.447000 CVE-2024-44283,0,0,3ac88c7ddb1fed650f2454e0ae10df8bc4c84ca583c6c661ebf37603888b15af,2024-10-29T21:35:19.207000 -CVE-2024-44284,0,0,aafaa862d706f7d4aa62b9578549e88ea4f6c2a4a88cff4811eff309dbf54c3e,2024-10-29T21:35:20.070000 -CVE-2024-44285,0,0,165dc42a02262c5425e1d7b749becd46b90cc524a173f56e70ab7173cb3084f2,2024-10-30T14:35:12.353000 -CVE-2024-44287,0,0,4b2b7e8101daf580110e865664d09e9b8e738d0759f08414f92a6a6cfd3889a2,2024-10-29T14:34:04.427000 -CVE-2024-44289,0,1,39f2c304e535f897d30f0fda10654e4d803aee074158bd870b6d7fbf5cd0aed5,2024-10-30T16:35:28.097000 +CVE-2024-44284,0,1,408ec82bcd689899a7eaf351c916a36c25fe85db51067481e7d4441b11a5b830,2024-10-30T18:48:11.557000 +CVE-2024-44285,0,1,5c8e052fde575e72fffee46801bee3de9f610486dcc1d33eddb4869da7c6a89d,2024-10-30T18:48:49.837000 +CVE-2024-44287,0,1,8c6b0e8108c2bf6150307a0355f6dc97dc7349ae63c8d98b7f099e4f6ae8aba4,2024-10-30T18:49:43.793000 +CVE-2024-44289,0,0,39f2c304e535f897d30f0fda10654e4d803aee074158bd870b6d7fbf5cd0aed5,2024-10-30T16:35:28.097000 CVE-2024-4429,0,0,f3c6ad6c7fc3529e6805efa10bcecee8b01db9336bcb1f88fdc476ffd1173766,2024-05-28T17:11:55.903000 CVE-2024-44294,0,0,59fc3334cee0c3e9631e7e6a5312e3c47084303bd875a30b037f9e38f2893ed1,2024-10-29T21:35:21.347000 CVE-2024-44295,0,0,fb98babf34b319b0a2af419c6d70bf7de5dce9049e181af2638c884d22361b7b,2024-10-29T21:35:21.523000 -CVE-2024-44296,0,1,8a3539d8b1a8455313f180197289b9017621c597386d505523693a7de422292c,2024-10-30T15:35:17.433000 -CVE-2024-44297,0,1,79b1a7724e5e5ef3ea1a90918f341220daf2a3cd7bb65b3a989c955fd834b7c9,2024-10-30T15:35:17.777000 +CVE-2024-44296,0,0,8a3539d8b1a8455313f180197289b9017621c597386d505523693a7de422292c,2024-10-30T15:35:17.433000 +CVE-2024-44297,0,0,79b1a7724e5e5ef3ea1a90918f341220daf2a3cd7bb65b3a989c955fd834b7c9,2024-10-30T15:35:17.777000 CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000 CVE-2024-44301,0,0,1947d3abeb8f3c617a953d82aff9239aa51a781f132c513eb9bd113e9e3104ce,2024-10-29T14:34:04.427000 -CVE-2024-44302,0,0,135dd022b19581dad4cc89a6e95bc2764f06cd4002b60ed18a51aacb9b5fcb7d,2024-10-29T14:34:04.427000 +CVE-2024-44302,0,1,8ecfedad59d8a53cf201de7999f2b2a1319aa7dcff5d0590cb4d2b5e11349389,2024-10-30T17:49:53.193000 CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000 CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4433,0,0,29650c676957862ed8f96380f29298acd09e1ae0c4c0eae7a19f73eb896474af,2024-05-02T18:00:37.360000 @@ -261270,8 +261277,8 @@ CVE-2024-45219,0,0,c224e79389ff96b26c26ec1d442701e983378824a2d2ca673202eaa91c8ad CVE-2024-4522,0,0,acd0b6b231758473c48ed22daa75c2f0d87280406667aa3ced0f39aaa73cb777,2024-06-04T19:20:41.320000 CVE-2024-45229,0,0,9c8c70fcda9c99c754f0fdd9cd19b64ab40d1023f96876f950167f9ed6ee6a43,2024-09-26T13:32:55.343000 CVE-2024-4523,0,0,e149ff229bd41b5a453469b36d558b5c1f467161b85c2884a74fe2177217c73a,2024-06-04T19:20:41.420000 -CVE-2024-45230,0,0,8f67a6da5b318e97f5efb660f51d66617c021c24287422779e5556e8d399c2a0,2024-10-19T00:53:40.757000 -CVE-2024-45231,0,0,3f98d9a820a62c85aff054f9433aac987ac2972888cd1c53632fdac92daf3c27,2024-10-19T00:56:42.883000 +CVE-2024-45230,0,1,7b73abf525314878e9827dadb2fa71133312b8c86176f66c9fda7db34cdf7efc,2024-10-30T17:35:09.360000 +CVE-2024-45231,0,1,8dfdd76ea8df01dd95aff84bc8e82e707d0ed2710cf19ee3ef7e3ed0a6347d6f,2024-10-30T17:35:10.147000 CVE-2024-45232,0,0,d2eccd07147c0ab2f9f7e5560b5b1bac422f5ad79377d7ed727039bcaf25bbd4,2024-08-30T16:34:39.270000 CVE-2024-45233,0,0,5285670af66f459db0801c25719b83bc6fb78721d233b9411020bb578be83355,2024-08-30T16:33:56.720000 CVE-2024-45234,0,0,4b3eecbe75c64cf8d46066aeb4347cf8775538d743d35431815d363ef479920c,2024-08-27T15:45:44.560000 @@ -262240,8 +262247,8 @@ CVE-2024-4706,0,0,9fb317504579dba9e9851d8ef4d6ad37a71c1b39f231cbe007ab86fbaba76d CVE-2024-47060,0,0,3723bb9e2990e983919d891a0f942a097942693d70a5d147a7a34b2c3bd8fa94,2024-09-25T16:43:47.267000 CVE-2024-47061,0,0,fe88cb5968145d279da6e4fd6edb09ab3be3c5c5915bf3eb5f15f2dbcdbe9c9e,2024-09-26T13:32:55.343000 CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d4304ec,2024-09-26T13:32:55.343000 -CVE-2024-47063,0,0,ef8c248d98e47bb74e839363585e029685cdee789de6732fef6e4d24b3b66b2c,2024-10-04T13:51:25.567000 -CVE-2024-47064,0,0,21420490a45b8aaefdc1b6d4bd2c7e4a0799d2dee64a3d505838007bd45e04be,2024-10-04T13:51:25.567000 +CVE-2024-47063,0,1,c726e0d37891011bf574e2ada4ecd35149371afeb49fe2d5efae62d1adcff659,2024-10-30T18:24:21 +CVE-2024-47064,0,1,5ab2606b47a3954363f47ef08af3365b7f2a07e53b06c729e25edc8cc707330a,2024-10-30T18:23:17.020000 CVE-2024-47066,0,0,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000 CVE-2024-47067,0,0,11c88cd23cf1a822b362b5c4da6e6e5aad4cf4ba8be6cf32fd08cc0b90e2e962,2024-10-04T13:51:25.567000 CVE-2024-47068,0,0,264a648ddebf754f99098ce6835c5c225a8b5d43bf206a3d80cb7c7fc0e3a5d3,2024-10-29T16:15:05.583000 @@ -262299,11 +262306,11 @@ CVE-2024-47165,0,0,881bf2549f2d4704c79d07cf1e9f88319a5d90b6cae51a4a00cade408ae38 CVE-2024-47166,0,0,5c5295334f20e9bd176e1ae6abbe7b3e08455bfe1f7bad8e6b116f744252494d,2024-10-17T16:48:17.097000 CVE-2024-47167,0,0,4c86185472551a2b9180107cbdd6b98169696575a22927ca991ef9ad610efbf3,2024-10-17T16:53:29.823000 CVE-2024-47168,0,0,98da9c7578a24c3d90ca8df79642035cdb40468b52b7f244646b864ebfe072c2,2024-10-17T17:00:47.057000 -CVE-2024-47169,0,0,3d7d577c82be13838843013d038c262ca65c719ce4179d733fb886eea7d8c747,2024-09-30T12:46:20.237000 +CVE-2024-47169,0,1,588459ac3aa4a8ea81fea7ee1e8cdeb6aef8ccdafede21bdfd28b6e7c4e14b7e,2024-10-30T18:25:39.783000 CVE-2024-4717,0,0,7921e256cd1b57dcd690590999b44ca8d29db58a18405deda5f12fdfca691aaa,2024-05-17T02:40:34.317000 CVE-2024-47170,0,0,a85abb331c710555402bc0d82b6c178a53d0789a4a177e8b976e0e4f16299a52,2024-10-29T20:59:57.227000 CVE-2024-47171,0,0,48e31c72c69d0bb6a9d666c7c99661a52d3c05dd11adcb85b19ee942d0085d2e,2024-09-30T12:46:20.237000 -CVE-2024-47172,0,0,4b79f4b3803af95fc411c443fe5cc5794c9441cfc034adffdc054b0882caedf7,2024-10-04T13:51:25.567000 +CVE-2024-47172,0,1,b1bb57e4062ba16e673f05677e6ed6a10fe36a501b3f3b66d9f6260b2ac883f9,2024-10-30T18:20:58.270000 CVE-2024-47173,0,0,05b2b633f7d32e023424835d76c61946451664d5230f0a57160406ff89f5847a,2024-10-25T12:56:07.750000 CVE-2024-47174,0,0,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae7df,2024-09-30T12:46:20.237000 CVE-2024-47175,0,0,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000 @@ -262783,10 +262790,10 @@ CVE-2024-47874,0,0,88e5d0bddb2eed021dc78650aabb938bda29c8272245d4971b4c42756e899 CVE-2024-47875,0,0,7d3f699a2dfd28fae24f11f0ffebcb02477b8963ab93d8f474f9ee88d14cf58e,2024-10-15T12:58:51.050000 CVE-2024-47876,0,0,1c9291ffcd100f5445236e1c704211e20624e03c95916aeaee6676900242dcd8,2024-10-16T16:38:43.170000 CVE-2024-47877,0,0,42d52e9a067bcb9f8cadc0b4324eaa32d4b8c11c11d62f0e9296f0c93d92bc00,2024-10-15T12:57:46.880000 -CVE-2024-47878,0,0,c04801860d1e5fb3abd30700d30ee67b20f1a06f7a548f35c6b4d8d60068132f,2024-10-25T12:56:07.750000 +CVE-2024-47878,0,1,81812ac8cdd3af1a71a439326705b677a4426a66fc37dcc26d70cbb43db62172,2024-10-30T18:01:44.277000 CVE-2024-47879,0,0,59b45feaaf4a8cf57e9effd22946f68b574db079cdbae5f200b89c2ed52ddf0f,2024-10-25T12:56:07.750000 CVE-2024-4788,0,0,036e4ce9e476328c73022572d41365684f416f1f77ea3a1f5e72bdd2454ce2ec,2024-08-05T20:23:52.467000 -CVE-2024-47880,0,0,2aa03bc0f7d4d0c41d7c5b5270f0ebbd14a95aa63bdaf3ae3d1fe08d4da240e2,2024-10-25T12:56:07.750000 +CVE-2024-47880,0,1,38d66998eddc8a45b06eca84ae7adabad76e5e8eed046ff5c46acdc3902d4511,2024-10-30T17:42:42.737000 CVE-2024-47881,0,0,0ca7d0c4ea2ef98dc6fa44b67e25e5f8500f3dd12648b54a5ed0735593ea5d45,2024-10-28T14:14:02.157000 CVE-2024-47882,0,0,4b03398d595b6f930af95937fe2262f7f6cefa2a162c2aed1edc416b90ac1433,2024-10-28T14:26:11.707000 CVE-2024-47883,0,0,83a589cc0dbabc4ecea54b79d6959561de3acb3cdc41dd039a81f860b3c45f3b,2024-10-29T15:38:11.573000 @@ -262797,10 +262804,10 @@ CVE-2024-47888,0,0,1ed854ade470bc163ad8c76031be0255e632797f8163938f76c7a31de7a78 CVE-2024-47889,0,0,661bf5d3df9343f9d9841050fa7811eba61ad27c7b6cfb90f97b1fd9293eaac0,2024-10-18T12:53:04.627000 CVE-2024-4789,0,0,991c3c0809892f7a4ebcc223f96155782fc07af160e30bd64d5fbc63735bec50,2024-05-17T18:35:35.070000 CVE-2024-4790,0,0,96aecd7cd4f769c190cdd6309a2627db4d493e5cf9efda536a135cb9a7f4eb96,2024-06-20T20:15:19.883000 -CVE-2024-47901,0,1,351c2de719aa37343f5b8705371f6ea3811b8e193d3e2965a197dc16aa2632d5,2024-10-30T15:39:47.430000 -CVE-2024-47902,0,1,2363b86854bd24a49201ca293fb87d24363aec990236fe9e9bf134a5daa38aeb,2024-10-30T15:48:39.207000 -CVE-2024-47903,0,1,7e28902499cd69638cf23751436e57fbe15e705859d687d60c9f544fac8af41e,2024-10-30T15:54:34.647000 -CVE-2024-47904,0,1,21b127b0effcb8b297c48dd7cd57e94387991d137ef282d6dd7cb6727add6e3b,2024-10-30T15:39:06.020000 +CVE-2024-47901,0,0,351c2de719aa37343f5b8705371f6ea3811b8e193d3e2965a197dc16aa2632d5,2024-10-30T15:39:47.430000 +CVE-2024-47902,0,0,2363b86854bd24a49201ca293fb87d24363aec990236fe9e9bf134a5daa38aeb,2024-10-30T15:48:39.207000 +CVE-2024-47903,0,0,7e28902499cd69638cf23751436e57fbe15e705859d687d60c9f544fac8af41e,2024-10-30T15:54:34.647000 +CVE-2024-47904,0,0,21b127b0effcb8b297c48dd7cd57e94387991d137ef282d6dd7cb6727add6e3b,2024-10-30T15:39:06.020000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 @@ -262870,19 +262877,19 @@ CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 -CVE-2024-48063,0,1,f1898c32cb0d80af7ff886a74079ae648139d7f78816f6b5b345dcc6592ae313,2024-10-30T15:35:17.993000 +CVE-2024-48063,0,0,f1898c32cb0d80af7ff886a74079ae648139d7f78816f6b5b345dcc6592ae313,2024-10-30T15:35:17.993000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 -CVE-2024-48107,0,0,b3b56031af4c83db1aa8c8b7592d603d12b933dd8dd7f5c4ea819744e41aed3a,2024-10-29T14:34:04.427000 +CVE-2024-48107,0,1,c40d4300b831a33464aba579f0b2928bc6562dbbd091bed8c83ce565b9877e14,2024-10-30T17:35:10.860000 CVE-2024-4811,0,0,8f7cba70fec134bbd5d6693fb99cf5ba1e86f11c73cf50479f15d27ff9c0c5a5,2024-07-25T12:36:39.947000 CVE-2024-48119,0,0,70720ece2ac49da334fb21cd2227183af2fff6cb7ddcb2e4d023bf820cab9ef7,2024-10-30T14:32:43.217000 CVE-2024-4812,0,0,96f0244e64d02e8b825789000f88a75dd5b3d67c4d6e5fa4b2230b6ad5599e15,2024-06-18T18:49:19.783000 CVE-2024-48120,0,0,ac048d30db75e88feb91392efffb6e9bab5a19e9dc21f5cdbbca8a6a240da1c5,2024-10-29T20:57:53.360000 CVE-2024-4813,0,0,ffced1bec51c6384e79d75317b856f32e05abf0a3cdd3adf718b586086ffad4a,2024-06-04T19:20:50.970000 -CVE-2024-48138,0,1,7066ba30968daa1d80e7eb0a2b4b354fd811d0b1bdb9289276d5694cb5caa2b4,2024-10-30T15:35:18.830000 +CVE-2024-48138,0,0,7066ba30968daa1d80e7eb0a2b4b354fd811d0b1bdb9289276d5694cb5caa2b4,2024-10-30T15:35:18.830000 CVE-2024-48139,0,0,4498e53310bd0f1ddf9c5f5a2ccdf773885d2c9acdbd970572ebc94239438a82,2024-10-25T19:35:12.730000 CVE-2024-4814,0,0,6ed65b628d782e4c0035f27d12907232951228fb5dd63de02df922628089b508,2024-06-04T19:20:51.077000 CVE-2024-48140,0,0,7bdd1e284971ed20bbd566db3c44806f986d48a3fa213bf0dc8436945e28930e,2024-10-25T19:35:13.497000 @@ -262897,21 +262904,22 @@ CVE-2024-48153,0,0,ed2a32bb2c14f00255ae97ac8d2c6b7371ced6a3b47f478082697408eb2ec CVE-2024-4816,0,0,8565abd2d0a6378ede6981ddf7bac1f2251b8eaa5cb7a310b72a2f14c255bb14,2024-06-04T19:20:51.290000 CVE-2024-48168,0,0,0fd63dbc86b3cb12d110bd22d9d904e3f3202d39864d2923ce46e572ac34fcfc,2024-10-15T16:35:11.240000 CVE-2024-4817,0,0,34b565d993de0f23b2da3e66a459da3d9e976182c7f2db8f77c4f90d033797ec,2024-06-04T19:20:51.393000 -CVE-2024-48177,0,0,5acd39b3771ea9ccd3637329c33f61cdb08ead2a4464b21a81ec1b448fad5613,2024-10-29T14:34:04.427000 -CVE-2024-48178,0,0,a5ac25bbc8787ba3cc9ebf81d8786aee148069ca8f15c68fbc88514fb8317fb1,2024-10-29T14:34:50.257000 +CVE-2024-48177,0,1,7a10e5b3acd69a20c763e5cb319cb3d376fabf6248f72931a19fe63fc5f7ce5e,2024-10-30T17:35:11.637000 +CVE-2024-48178,0,1,913e74839dde0ee44e9a1ace5875330bdbe3118a0df5d44956599d3793bfa29c,2024-10-30T18:35:13.637000 CVE-2024-4818,0,0,3fe1d5f18f9b194d5b3db8480cedce43b94847211b0e14441f0f1578988c6d95,2024-06-04T19:20:51.510000 CVE-2024-48180,0,0,5891665b96e5bb6f8325528a26dbdcd36c2f7a69e9155272862a28dae07f40ed,2024-10-18T12:53:04.627000 CVE-2024-4819,0,0,bc26e072d222c9731ee42bb1198fec18f8f3236e713c07e319d531bbf6577caa,2024-06-04T19:20:51.613000 CVE-2024-48191,0,0,9ba7fcbb9576126d52a944517bc9b5d6157dc8b3575acddab54b0bd9380c7365,2024-10-29T14:34:50.257000 CVE-2024-48192,0,0,50ca3857fa6f25fe2966bfab9679a90bf80eec0b1a66f64f4eaab1d030168651,2024-10-18T12:52:33.507000 -CVE-2024-48195,0,0,3054a51a5210b07d7faf145209b3abc8afc3e28d4e10bf6f8fe8cb40d2a3b462,2024-10-29T14:34:50.257000 -CVE-2024-48196,0,0,d2cd7ad27e7af883e5b6f39983b5e91f258998d179c5a9da881899be449dd56d,2024-10-29T14:34:50.257000 +CVE-2024-48195,0,1,624eed9854f46ef9dafc813bcbfebca0bf2ab48de4eb64a4aa5f0a1ddeec9a89,2024-10-30T18:35:14.433000 +CVE-2024-48196,0,1,06085a08add8a4f4e1622d4b148953be486d5c8e3772fc9fb5febed91d95829e,2024-10-30T18:35:15.220000 CVE-2024-4820,0,0,832738c431d4032e72cf5367ea2c2310b7c6cd840d9bc0fc3f10b9e1f0e05ed2,2024-06-04T19:20:51.710000 CVE-2024-48204,0,0,69679e584cfff362cbf75841399d234bf7f34f17f0a6df889a2bd0d1f27ec83d,2024-10-28T13:58:09.230000 -CVE-2024-48206,0,1,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000 +CVE-2024-48206,0,0,6817b9ae5feb72d446c529ddcda9c3a6e3777ee388634567e44646cfb7309cbb,2024-10-30T15:35:19.677000 CVE-2024-48208,0,0,4cb069f7302b809408534c2d4d84e19f7a8371042576c478cf8a47f5a05c9a1b,2024-10-28T19:35:28.037000 CVE-2024-4821,0,0,dc7d4132f68a39a1fe6c6bac80c0ac3156e2e90bf5e433ad24749311cb9093af,2024-06-11T17:29:33.213000 CVE-2024-48213,0,0,117f3b040dc13bc06ba79e6afb4438d02d6453981e7ddab2f51ac57958bb9036,2024-10-25T12:56:07.750000 +CVE-2024-48214,1,1,545337ba91d9e48fe5a14a91b3e479f2b07f65d57894410b810073acc8b06a4f,2024-10-30T18:15:07.420000 CVE-2024-48218,0,0,4df2a1737bc3ceef8118ffc8f43bf6e7bfd49691ee8956737c4244a24a4c0e36,2024-10-29T18:35:08.783000 CVE-2024-4822,0,0,35737e7a1acb373d4b9b0a7db2a81b8ded4d641f08c88a2e676b684417908472,2024-05-14T16:11:39.510000 CVE-2024-48222,0,0,97fd76ae3dd28f1e5888fec68e340e9e5e41841170d874971e984dd4b28f68c5,2024-10-29T18:35:10.053000 @@ -262934,6 +262942,7 @@ CVE-2024-48237,0,0,f3d3944c7915cd53a5149061b05fd23c13ecbc6a88f801480d775419cbc2f CVE-2024-48238,0,0,82a52e47a3d3b03e4d50c93edac3f04555f82b841e94f644b1bc9259903b3bad,2024-10-29T19:35:22.083000 CVE-2024-48239,0,0,adb497d48658b0187eda42678c3fa683c391f0d842af36fe4602456f703dca6b,2024-10-29T19:35:22.840000 CVE-2024-4824,0,0,e31432116aed0554c3dc4b1001cfc03d00512889f9f84533cba85f3e0d8e9591,2024-05-14T16:11:39.510000 +CVE-2024-48241,1,1,7c567e5e4359fa3a6a2946531b46e62f29d10096d5832e934f7e07203f224751,2024-10-30T18:15:07.490000 CVE-2024-48249,0,0,da8b8817e37741a9aa47e2e2d74b7c2d9016e75eaeb0e762d84c505d09bf271b,2024-10-15T18:35:15.607000 CVE-2024-4825,0,0,155a89a5474625dde1ab63dcac3020c23f71c92d3744c7dbee990f6fffb4feb0,2024-05-14T16:11:39.510000 CVE-2024-48251,0,0,d31074b7bd4badb1c138e8ee894c9698881e0c5446022316d3777a7df111e058,2024-10-17T18:35:12.280000 @@ -262951,8 +262960,8 @@ CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce3719 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 CVE-2024-4835,0,0,b63c1e2c2f2232a6ba415444f30303ee4e5ea1a45d737d79b2133d2755ec709c,2024-05-24T01:15:30.977000 -CVE-2024-48356,0,0,eb83e1244399418d09f0af15f0e28266d6d5b9219ba01c88a810a4fca8aabef3,2024-10-29T14:34:04.427000 -CVE-2024-48357,0,0,6b9632f69af5b85b728c9706bae3831119448965b03733f601b0a0d518bb13b0,2024-10-29T14:34:50.257000 +CVE-2024-48356,0,1,d61948bf2095cc3d150baaa31fe05023f5cd4e2dab12daf4f3dc83771432fb5f,2024-10-30T17:35:12.420000 +CVE-2024-48357,0,1,dba1c026ce12a35ee6a885944cea646b76fb79069c0e7307a1deb45a88532ca1,2024-10-30T17:35:13.203000 CVE-2024-4836,0,0,6397d82c08a27dc6d1e4828623f7dccd401e56dd97e62d291cde8c73c9f6f8bd,2024-07-02T12:09:16.907000 CVE-2024-4837,0,0,e7f6212a3767856f93e80078aa36a8d58ae9b0d6d87727b0b71ea9bfd6a3b44b,2024-05-15T18:35:11.453000 CVE-2024-4838,0,0,18fa2348db877da11c5078171d002c78cc86239f9092091ea1ecb3106ab22873,2024-05-16T13:03:05.353000 @@ -262981,7 +262990,7 @@ CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0 CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 CVE-2024-48461,0,0,9960bda35adcb94dcd0b3bf022771fea9545283526dbc51d80d11c8841f314e3,2024-10-29T21:15:04.347000 -CVE-2024-48465,0,0,b7bc8b7cfc9842a5d866167a988ef7343bad75516e5493e6477a6a79f57bd11b,2024-10-29T14:34:50.257000 +CVE-2024-48465,0,1,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4849,0,0,ea1119b37dea5602dfce7972c7449fed4caaba21295f1145a8612489a3c2fd07,2024-05-20T13:00:34.807000 @@ -263002,16 +263011,17 @@ CVE-2024-48547,0,0,9db332cc676278e21a081b803d57f1c54b011fe5dd42093550c345ebe0949 CVE-2024-48548,0,0,ec80620fd2405092cb652dc2117913ce945d52911c33fb7583254b23a981c173,2024-10-25T12:56:07.750000 CVE-2024-4855,0,0,c93719b20367086f39a585784c8fe87b51678f3d6fabb283bc26fc5dedf0f872,2024-08-29T15:15:31.893000 CVE-2024-4856,0,0,01234b09ea1a4585c989c1dc87d23ed182241e8a50536214983ade66b15e19f8,2024-06-04T16:57:41.053000 +CVE-2024-48569,1,1,91c2fa2c1c7332ea9dc8a9b1062985c79a4a9fb96a8cf8ecdc3ac622a15c568a,2024-10-30T18:15:07.567000 CVE-2024-4857,0,0,1a28f92c79b598b55521235359a1d50b478306861b37a5a0ef0abc4d3160ef4c,2024-06-04T16:57:41.053000 CVE-2024-48570,0,0,7446ae4df00f32873e4ee72b4a315b4accd5c33a83ff9b6be395bc57cb3e12c5,2024-10-25T18:59:22.033000 -CVE-2024-48572,0,1,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000 -CVE-2024-48573,0,1,0a68f4420e4d1b58f44b6c5009b5c0eaf6abf127f60f5f3f3e548f76f67b8ebe,2024-10-30T15:35:21.227000 +CVE-2024-48572,0,0,80073f63de1b6b029056367f8422bcae6c5c4185d84c98ab62ad2ed7d0192815,2024-10-30T15:35:20.497000 +CVE-2024-48573,0,0,0a68f4420e4d1b58f44b6c5009b5c0eaf6abf127f60f5f3f3e548f76f67b8ebe,2024-10-30T15:35:21.227000 CVE-2024-48579,0,0,753bc89d80ce06ee02f1517d3e6d38134feb41965d0a3e14286b4761046c72e7,2024-10-28T13:58:09.230000 CVE-2024-4858,0,0,3cb9bd8b6c75f95328665e9ee04ad5356aa75f69b8a71bb4682aa7bcb86b9454,2024-05-28T12:39:42.673000 CVE-2024-48580,0,0,cecfbaeb166c1997f85eff468048926c1d6a76c932cf18638f27e79db1bfe914,2024-10-28T13:58:09.230000 CVE-2024-48581,0,0,fd7c149e40f4a27b5093e18e40ce454de675d636c2c72ee484afba9e2e6f192b,2024-10-28T13:58:09.230000 CVE-2024-4859,0,0,8383b8e86eb4a4e5b90aae7f1f2380c0c5e94dbe99d2c93d082bf89d93f61e82,2024-05-14T19:17:55.627000 -CVE-2024-48594,0,0,d746a9ab267fb3d6366b49f5e1e810ae4be71ae5de5276f3f9d9297a22ea4ee6,2024-10-29T14:34:04.427000 +CVE-2024-48594,0,1,6be039bf855c4be1d49afbd58ae5048955316e1e064ee00bf75a0e493062d8f1,2024-10-30T17:35:14.010000 CVE-2024-48597,0,0,72aec40fe60a6c8353dc32b60169cb2bc295b2fc07fd4d45cd6ccc7e559fc86b,2024-10-23T15:12:34.673000 CVE-2024-4860,0,0,51415b9207d508daf9b92cfd5981ba904e23fd57e3ad30c10a4a3319cff2429d,2024-05-14T19:17:55.627000 CVE-2024-48605,0,0,c6fe6d7786e01bf3c07bbcc6dab9ca443b7f4a840bac8f1d3880bbfc76bd164d,2024-10-23T15:12:34.673000 @@ -263032,6 +263042,9 @@ CVE-2024-48637,0,0,d42c2fa4f588b75285bfd9e74cf828ce6be24d319097efc6470bbe43fee07 CVE-2024-48638,0,0,93a9606c88551eca2a43d58a9a18871f8de782bd448d66dc6474dd57c860ad86,2024-10-18T12:52:33.507000 CVE-2024-48644,0,0,767bea0974441fd2cc19792b3d98e4d360220265a6636145290e8043d3dbc5a5,2024-10-23T19:35:12.593000 CVE-2024-48645,0,0,68a6d6f0e4b4f7bc96fb65a4350b69a13ff6b55f133c0422ecbf10590166619b,2024-10-23T15:12:34.673000 +CVE-2024-48646,1,1,4c9c6455e72fa4e064bd4a2b7a189f4dffba8958051d29eda67b01e92b35ba68,2024-10-30T18:15:07.640000 +CVE-2024-48647,1,1,94ce367962be9d0683c240aa1f45fa1dcb7f705c30650ba43cb3291139c01b2a,2024-10-30T18:15:07.743000 +CVE-2024-48648,1,1,2a80e89aa93227016ed8aeb5356172e6789bbec68ef44d58e2537023377aded5,2024-10-30T18:15:07.813000 CVE-2024-4865,0,0,df8706c5d26e485ec9b623150b314bb58c6338346ba72ce79d78a6dbca58bc77,2024-05-20T13:00:34.807000 CVE-2024-48652,0,0,de9357326c4ec67fec06a2f6916117e7d67385a63ec8c48f3929233398d3928a,2024-10-25T16:51:57.013000 CVE-2024-48654,0,0,b1175c42eb9b6ad703f77f6cacd261d0eb5f65c9d2e13e20c8b31a8501988240,2024-10-28T13:58:09.230000 @@ -263053,7 +263066,7 @@ CVE-2024-48710,0,0,2fbd0f8c58cb24ce52b0e5c8d654e92a74d3cd7c1aadc3c4c977083a33ba4 CVE-2024-48712,0,0,26c5ef0ec7563b7eb021e1452100a4e706852158c36c374f8078b72afb6523b7,2024-10-16T17:35:04.483000 CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35eca,2024-10-16T17:35:05.450000 CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000 -CVE-2024-4872,0,1,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000 +CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000 @@ -263143,7 +263156,7 @@ CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5 CVE-2024-48948,0,0,6468ccc34445744b46aaa46da604a8323b3afae5876966b014aee375073e1d6b,2024-10-16T16:38:43.170000 CVE-2024-48949,0,0,a2a3af77c2ec8dfe23cb3bfb50401d91f40f6be7761d017f52ac86b99455f8e7,2024-10-15T14:07:04.057000 CVE-2024-4895,0,0,f6b1e62d3b5bd64aea52e6768b6c469e049c941759a77bf99aa3b85ad7e20caa,2024-05-24T01:15:30.977000 -CVE-2024-48955,0,1,6a753515eadee4efaaa9ce7d086aaac0fd1d1f88a870f6a34578f374c110a15f,2024-10-30T15:35:22.063000 +CVE-2024-48955,0,0,6a753515eadee4efaaa9ce7d086aaac0fd1d1f88a870f6a34578f374c110a15f,2024-10-30T15:35:22.063000 CVE-2024-48957,0,0,73c8e1634cf56d3192b3375f11aa72eac69f0bcf8a4cb1f3b137dcc189616d8f,2024-10-11T21:36:47.930000 CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4922,2024-10-11T21:36:48.687000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 @@ -263180,8 +263193,8 @@ CVE-2024-4920,0,0,fb11a98a98fcee227749c982e12efa14a4a4b18da858cef87f2552ce91a0c6 CVE-2024-49208,0,0,3a58d346a6ade89e8c0020a10a544403e4226ebcc2dc44aeebe9f12dc5b80439,2024-10-25T20:18:20.550000 CVE-2024-49209,0,0,7815188905707c2f76092b0250e46fa9658c3c02368a05bd7a2ebfc97747dcec,2024-10-25T20:17:36.353000 CVE-2024-4921,0,0,1060b5013f8dc8547f0f33cabd337061fb69f6fcf324e5387138007cbeb6a9c1,2024-06-04T19:20:53.730000 -CVE-2024-49210,0,1,fede0e1b09388373fa08476821abad3fe0da120473a4d4b6dc058c6031c67944,2024-10-30T16:13:12.307000 -CVE-2024-49211,0,1,5a695ee7d767f52160012b95bd74c374d22d486a496c62fb284212334663087a,2024-10-30T16:08:23.040000 +CVE-2024-49210,0,0,fede0e1b09388373fa08476821abad3fe0da120473a4d4b6dc058c6031c67944,2024-10-30T16:13:12.307000 +CVE-2024-49211,0,0,5a695ee7d767f52160012b95bd74c374d22d486a496c62fb284212334663087a,2024-10-30T16:08:23.040000 CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000 CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 @@ -263706,10 +263719,10 @@ CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 CVE-2024-50067,0,0,24c4c2a9f57cbbf60955a0b70b9105797845f089603805c65d417718be190cc3,2024-10-29T16:30:44.217000 -CVE-2024-50068,0,1,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000 -CVE-2024-50069,0,1,f0efb37fce406b5577ae6affb711463f72093df862fef1ce6ec787e41a622262,2024-10-30T16:58:19.983000 -CVE-2024-50070,0,1,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d64b,2024-10-30T16:59:39.013000 -CVE-2024-50071,0,0,62707d07bb4d39afcfce746e848fc0ec2081f01347fce6c0d69c478aa69fbee9,2024-10-29T14:34:04.427000 +CVE-2024-50068,0,0,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000 +CVE-2024-50069,0,0,f0efb37fce406b5577ae6affb711463f72093df862fef1ce6ec787e41a622262,2024-10-30T16:58:19.983000 +CVE-2024-50070,0,0,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d64b,2024-10-30T16:59:39.013000 +CVE-2024-50071,0,1,ca95de15815d680369f3146cc2915571a1b4f1c26211b6f5790ba4ff0facd2a6,2024-10-30T17:02:34.740000 CVE-2024-50072,0,0,d234ae692cf6ab3c0d4120deeeee388838384d41a26d87045a3f6220157fcdde,2024-10-29T14:34:04.427000 CVE-2024-50073,0,0,3ac354f0a571c346e70d9b14ed507d0361e0d40b760fe5591a7f7878e93be242,2024-10-29T14:34:04.427000 CVE-2024-50074,0,0,88a57db36e785df4cc21dcc18102af1a36a44aab602ea5f2f857fa91d7cda796,2024-10-29T14:34:04.427000 @@ -263717,12 +263730,12 @@ CVE-2024-50075,0,0,f254549f01ba2f5ee239dee6fc0e7ecbe8fe1b2c6da566e1dc2c41565299f CVE-2024-50076,0,0,960b5306eb9d7d5b99e64da9813531f1a11820802abfb99e23dd9c044d60901e,2024-10-29T14:34:04.427000 CVE-2024-50077,0,0,6ccef6c49c4eb4414f8a4b868e27c1decea0e3b4db33c98cce1cc8afd4299d1e,2024-10-29T14:34:04.427000 CVE-2024-50078,0,0,edfd843daaab21e8f3881bc9f52685650308d1e7e15f322d52dbb99d6ddc0e3a,2024-10-29T14:34:04.427000 -CVE-2024-50079,0,0,86e00e39a4c6f4df698328fa6af74ef3f8403f4eb5813cad15aa3ecbc54c0116,2024-10-29T14:34:04.427000 +CVE-2024-50079,0,1,806bd69797c7a803f343ba903bc85a8d670910145e013710a8d12ec38e028308,2024-10-30T17:05:40.960000 CVE-2024-5008,0,0,41c3cff745583fe16908c309126d70e41415ad78f2790f83925cbb0a70eb9065,2024-09-06T22:43:49.557000 -CVE-2024-50080,0,1,fb0a9233976006e31e13d528210f2a875fd57a1186630aa7b33ed2c9b62b05db,2024-10-30T15:54:17.967000 -CVE-2024-50081,0,1,ff287bf6aa891e3d3993ac2c1de15bdf3f0c65db0dd3e9d23543b30a892b930d,2024-10-30T15:45:39.047000 -CVE-2024-50082,0,1,a4dcbd09b14dbc1fca6632f76d6b2dd6f5882ab966fd9496307593f81c7c2e4e,2024-10-30T15:44:05.180000 -CVE-2024-50083,0,1,bb1d270756f6cf1c77db32b44ebc17c8b18ec1e069dec30590ec1ad0e71318f5,2024-10-30T15:07:02.577000 +CVE-2024-50080,0,0,fb0a9233976006e31e13d528210f2a875fd57a1186630aa7b33ed2c9b62b05db,2024-10-30T15:54:17.967000 +CVE-2024-50081,0,0,ff287bf6aa891e3d3993ac2c1de15bdf3f0c65db0dd3e9d23543b30a892b930d,2024-10-30T15:45:39.047000 +CVE-2024-50082,0,0,a4dcbd09b14dbc1fca6632f76d6b2dd6f5882ab966fd9496307593f81c7c2e4e,2024-10-30T15:44:05.180000 +CVE-2024-50083,0,0,bb1d270756f6cf1c77db32b44ebc17c8b18ec1e069dec30590ec1ad0e71318f5,2024-10-30T15:07:02.577000 CVE-2024-50084,0,0,5220042c35127404cd0f78170fda586bf2f27c4455dfe8faea9ee063c5a720d5,2024-10-30T14:56:07.497000 CVE-2024-50085,0,0,a57d9cdadbbc5cf4e1ca2a641bfe5ff538d06a7e75b6cba1f85d47ffcf3a24b8,2024-10-30T14:49:42.953000 CVE-2024-50086,0,0,4899fd1fcdb0e30e29828cc31e053f57e8ba7925a7a6cc27c5825af59bd564e5,2024-10-30T14:46:09.080000 @@ -263747,13 +263760,13 @@ CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b2843 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 -CVE-2024-50311,0,0,2a5a791ea9a6ed953dd59786f3feebf3d6f42a9a801f740efbdba1fdb4b4c644,2024-10-23T15:12:34.673000 -CVE-2024-50312,0,0,e1c46649456e4db99a8bc5fe6e245d8f0cb367071dbc5cb51f03a7f5cb1f8348,2024-10-23T15:12:34.673000 +CVE-2024-50311,0,1,a911784e609d4ab74e0290e5d915dbb7b1471b8d97b5435937a13bc8c9811bb6,2024-10-30T18:39:40.617000 +CVE-2024-50312,0,1,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a398f,2024-10-30T18:35:56.753000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 CVE-2024-50334,0,0,e5afd12be3769678c4d0afd24ca9f86adfc7c8adcd7a12eb57abf0e3b514a033,2024-10-29T15:15:12.560000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 -CVE-2024-50344,1,1,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000 +CVE-2024-50344,0,0,93395b02a9e3e381ddc8a3070f13b915f9e8cd62d8e0f5a4556777cec89a5a2b,2024-10-30T16:15:04.763000 CVE-2024-50348,0,0,08d996230fa601a51dc4ce7290dfd8c5c344e9cd2fb7716f4e499eeaa4bf6b24,2024-10-29T23:15:03.863000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 CVE-2024-50353,0,0,ce993db7dd8b2e688fe3051b6a9bf88cf5e983902433f1fe7fb795b54f262c07,2024-10-30T14:15:07.790000 @@ -263776,7 +263789,7 @@ CVE-2024-50414,0,0,746272a7c7dd2879b6476bd50d3580f414214c743026233c5a8a443eadcc6 CVE-2024-50415,0,0,3bae710664bb232f209cea02e6f0f5a3beb85a13b624cf1c6525fd9727938bc5,2024-10-29T14:34:04.427000 CVE-2024-50416,0,0,d6fa8ee755917351e975e2572b208d1eff8656e05d108ea493511ed3f6bbfdc0,2024-10-29T16:02:10.660000 CVE-2024-50418,0,0,9f03d934805840cc103a686a0254fefcc5de3e5598fc5ddc4ea79fd3cdb6c2ef,2024-10-29T14:34:04.427000 -CVE-2024-50419,1,1,d5e1d88e0d77245c4f86e43f425967a0a1eba5d52f9c69ee2ce122923f3c0b76,2024-10-30T15:15:19.360000 +CVE-2024-50419,0,0,d5e1d88e0d77245c4f86e43f425967a0a1eba5d52f9c69ee2ce122923f3c0b76,2024-10-30T15:15:19.360000 CVE-2024-5042,0,0,94f87ab7ec94fdfd62be1f748dc3eabc441b5ca85cd66d27e43bb6f6e1a4ec28,2024-07-17T16:15:05.160000 CVE-2024-50420,0,0,9d07ec5963eb0da6d255e05be4967cacf836cf4fce5748c19509f40aea254b9d,2024-10-29T14:34:04.427000 CVE-2024-50421,0,0,98ac1ae0ba7f04515a38743b156e0486e07d82e9611d46b2b591ba50ee1df54e,2024-10-29T22:15:04.083000 @@ -263893,7 +263906,7 @@ CVE-2024-50582,0,0,8ee09c1822530ab12253edb2ea8a5293a80f3664e0faaa7e73f6ab343465f CVE-2024-50583,0,0,db2a2ad9d7e60027a7a0abb846b837f27b8194afb56c33e89ab55cbf708c9a52,2024-10-25T21:35:08.253000 CVE-2024-5059,0,0,b0901ef33b8b4d50fbd07542bb49b954ef3e45e5d8bea77c76cb9c3c21bd9422,2024-06-24T18:49:29.467000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 -CVE-2024-50602,0,0,08c8d2a8417f5e3f2bf92a8d515440a7950e45ce9b4bb2df63491cdf7040e5f7,2024-10-28T13:58:09.230000 +CVE-2024-50602,0,1,45e9269102f2b541d78d641e3b6d4f0d7b12a8e026b5814df3e38d2c0c706172,2024-10-30T18:35:16.237000 CVE-2024-5061,0,0,acb15fde0f7701ee7d55862ecbc276a299a2eba41aa60a0bce397763155cd902,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,d80d6b113c44f07cc636e5fd392ee34024158d35040cac62e8ac7789d39a48d8,2024-10-28T13:58:09.230000 CVE-2024-50611,0,0,e7f7189172abb0692407abd2470d50472d7ee79181e3e0c186ddd4e2a3b2e872,2024-10-28T13:58:09.230000 @@ -263966,18 +263979,19 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,c7015fc65f4e276c0cbb38596091155495fc50548eef3d0d6bdd3dfed4992761,2024-10-17T18:32:52.030000 -CVE-2024-51257,0,1,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000 +CVE-2024-51257,0,0,29ad8b0137a8baebd65102b3b2a8b1d79f8cad235c4dd225c313b0295438f266,2024-10-30T16:35:28.993000 +CVE-2024-51258,1,1,8552984991114543bb72db401d789b000ecda7ab1e49c15b21f3ab9c1d4b407b,2024-10-30T18:35:17.040000 CVE-2024-5126,0,0,04ff4a563e301de69d63a906163bcc7b9149a0fc439aa3db44fa193023df5115,2024-10-03T16:52:45.027000 CVE-2024-5127,0,0,3b08ea85b89bf08b7ac589e3aa718857524fafebf4ce0fa847d24755edc03403,2024-10-09T13:38:49.307000 CVE-2024-5128,0,0,9fcc5cef7e8f556e2bf8719670c94f779c2307d32f054ea85c0fee175fdcf878,2024-09-23T15:11:09.923000 CVE-2024-5129,0,0,775c71113c1b7299300ab83c8a34b391b75dc55b55486fb0ef4553cde0b68e06,2024-10-03T16:56:02.837000 -CVE-2024-51296,0,0,9a7705564b8add589868e87f6c09742274a494117c21f47f3822fe4837d98ba4,2024-10-30T14:15:08.337000 -CVE-2024-51298,0,1,514609b543458b7816356ece778427649461627c080a99a1f018491e8c0ee256,2024-10-30T16:35:29.790000 -CVE-2024-51299,0,0,0ece1b0e7724506cb420cc3f500f40feedfa43a88dc890c970e5a78188a1d1c7,2024-10-30T14:15:08.510000 +CVE-2024-51296,0,1,e87a8f03521ab40cf91ec0c397a12cf5de3692de4daab1e7a503649d69b18f0f,2024-10-30T18:35:17.830000 +CVE-2024-51298,0,0,514609b543458b7816356ece778427649461627c080a99a1f018491e8c0ee256,2024-10-30T16:35:29.790000 +CVE-2024-51299,0,1,b495c4d03e184ceb460e9abb4d4a30397c91e555675c36d59fcd8a863b3c8db5,2024-10-30T18:35:18.640000 CVE-2024-5130,0,0,08201be0ef3110b3d4a5f221adfbbc30fa234732006b6518b80f0c4870c61cea,2024-10-03T16:57:19.050000 -CVE-2024-51300,0,0,dff9a18c0cf0e0e8d43d69d02b2ea90ae97f80e734a42b72bdbadbdca5040ffb,2024-10-30T14:15:08.597000 -CVE-2024-51301,0,0,adcc4888ae1a374ea5d952bb92f163ccfdc7b4babdc622c47d76013d87115f75,2024-10-30T14:15:08.680000 -CVE-2024-51304,0,0,1bf4a400847d4516ab1a63391d32e92aced542fd9a53ea834711c8bab078e83f,2024-10-30T13:15:14.360000 +CVE-2024-51300,0,1,5500ee6d0844febb48bc884ecbc7a3a29671e7ac84bd188005f2cbc32f652446,2024-10-30T18:35:19.433000 +CVE-2024-51301,0,1,6b3b113e104cce5cf7a33904773509ba1b10780786214d76654fc313fa3aa896,2024-10-30T18:35:20.227000 +CVE-2024-51304,0,1,29809ef6fdb39fcf531622b627c18c1616566b9408d3e297584b398d1c92c0c7,2024-10-30T18:35:21.050000 CVE-2024-5131,0,0,e128e407b1f44dbf47d9ef9fd7ec5fd0648bd27c90b8180b437c118e29f83c77,2024-10-03T16:59:22.137000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 @@ -263985,7 +263999,7 @@ CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 -CVE-2024-51378,0,1,f6b847436d6454318a22bddb787fe79bac14b8796ff39c09e4001e54682664f0,2024-10-30T15:35:23.600000 +CVE-2024-51378,0,0,f6b847436d6454318a22bddb787fe79bac14b8796ff39c09e4001e54682664f0,2024-10-30T15:35:23.600000 CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 @@ -264964,7 +264978,7 @@ CVE-2024-6232,0,0,df72d1f3465f3e86534783b85aee8c51cc91639c676c4fe966017792ca61cc CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3c4,2024-07-11T15:06:34.163000 CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000 CVE-2024-6237,0,0,42d974b137e9f6fa213536980d088f395c1fe724ef5f0786bbfbf5436af83280,2024-08-29T18:15:14.947000 -CVE-2024-6238,0,1,ed9c2d1c6c6b7ce98df1d438dedd8db9b89c4dbb8c302ebc32aa84b1d702412d,2024-10-30T16:35:29.987000 +CVE-2024-6238,0,0,ed9c2d1c6c6b7ce98df1d438dedd8db9b89c4dbb8c302ebc32aa84b1d702412d,2024-10-30T16:35:29.987000 CVE-2024-6239,0,0,331baa2e2a54956b72059cf6f370c174a3a7f88f365f410b1d7435c4cb7f3fbb,2024-09-18T09:15:05.803000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 @@ -265330,7 +265344,7 @@ CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000 CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 -CVE-2024-6657,0,1,05c0e312b6717337b62bbde27360a3cb75d1b987b144a353d64d592acfd9d308,2024-10-30T15:15:19.877000 +CVE-2024-6657,0,0,05c0e312b6717337b62bbde27360a3cb75d1b987b144a353d64d592acfd9d308,2024-10-30T15:15:19.877000 CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000 CVE-2024-6660,0,0,caad23d7b98522c6f22294c27dcab3f8925f974b7a7faae66643c3e06a0d6672,2024-07-19T15:48:14.040000 CVE-2024-6661,0,0,b1af44a52f9370b6a9eee52c0900f8f875202dae713119fd68b00889cf9d23b8,2024-07-29T14:12:08.783000 @@ -266368,7 +266382,7 @@ CVE-2024-7937,0,0,58f817c63d0d354ded52ec3007f0bc413c02bdd9e5e4a4484a57dcc393e994 CVE-2024-7938,0,0,05885971f29247a07809090893658b29d0c486ec3695696a5efeaad9575e9baa,2024-09-04T14:53:13.887000 CVE-2024-7939,0,0,1694bf433403f87f2893bf75dc39017446333f520bf502dae403d9f8dca4c12a,2024-09-13T07:15:06.990000 CVE-2024-7940,0,0,dbd0239c121d6194e450c1260a59c9e5a29e98f7339f7b43ef0e94924bfd60bf,2024-08-28T16:24:07.043000 -CVE-2024-7941,0,1,51b8d26737f71adb5ae5530acd71328d0aa0426f28a41276bd1870203243d487,2024-10-30T15:29:26.673000 +CVE-2024-7941,0,0,51b8d26737f71adb5ae5530acd71328d0aa0426f28a41276bd1870203243d487,2024-10-30T15:29:26.673000 CVE-2024-7942,0,0,10ad4e44439e447affdd92c4cf521f51989afe951a6ccfba24c688ebb8095c63,2024-09-03T20:39:07.790000 CVE-2024-7943,0,0,94f72e6ad51a66c5e4d9bb6076fffd725bc241265ce47f7b427b083f1491ead0,2024-09-03T20:35:23.587000 CVE-2024-7944,0,0,746f5ab96ce75fa2f3ceb934a195b4543f73936672a5c19d615f70b88c853fd7,2024-08-21T15:24:44.280000 @@ -266397,7 +266411,7 @@ CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829 CVE-2024-7973,0,0,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000 CVE-2024-7974,0,0,4f1766ede0a46e011fd6362a463054e086647121f22e7cff04b5a03dfc3c746c,2024-08-22T17:40:27.950000 CVE-2024-7975,0,0,6eead3f121fb76c19460ccba2d1c91cf33314b233f7cc8d0a23049d05e30e6a0,2024-08-22T17:40:09.223000 -CVE-2024-7976,0,1,5088084110cef04ed95fff38a405451653ecf97406b1b78dfc70a5e2f0f0fa75,2024-10-30T16:35:30.723000 +CVE-2024-7976,0,0,5088084110cef04ed95fff38a405451653ecf97406b1b78dfc70a5e2f0f0fa75,2024-10-30T16:35:30.723000 CVE-2024-7977,0,0,7f96e9ae91564fe788773f7fc620ef26ab3a10a3c58ea5396e14a68a3ee2a8b8,2024-08-22T20:35:28.140000 CVE-2024-7978,0,0,32f4e05559c2808de89ac0caea53fb83c96439d90c95d7208a9711199924c25c,2024-10-29T20:35:44.730000 CVE-2024-7979,0,0,7197dd548ee44d45e84f2f2c61d6a52a80bd0fd2ed16f305497f42e667362bae,2024-08-26T15:13:19.383000 @@ -266430,7 +266444,7 @@ CVE-2024-8030,0,0,b6f55198da4c8a890918e236b9cb91502d6b60f60aed340690526a7aff836e CVE-2024-8033,0,0,bc1d961345030012faa7942ae80f05081f947cf441680ad49c3fcb3512e2fcdc,2024-08-27T19:39:04.953000 CVE-2024-8034,0,0,990fb53670bf6f787a3d54c0392722fc0a67a939e8056c22142bc6f2bee92a38,2024-08-22T17:35:30.003000 CVE-2024-8035,0,0,e11fe8c378f080395f404658baee2e1c5cd70ef826bdf0b13fe46f85c653ad4a,2024-08-22T17:33:37.407000 -CVE-2024-8036,0,0,f28521b0b56a9571c69a1403c58582cb62e8068fede49f77a9503e84d1a86f30,2024-10-28T13:58:09.230000 +CVE-2024-8036,0,1,e903a73796aef64821cbd43655f9ee6c6cb45a96a0e83ad1676ec87aed5c1df5,2024-10-30T18:15:07.960000 CVE-2024-8037,0,0,ad453071137fae9bcec080d9b16736ac997e7f592728683f801a0fad0292f9ca,2024-10-04T13:50:43.727000 CVE-2024-8038,0,0,57ce29f0b3931b72a63ae8ef2369330769f4bf264a0163aeabfd65f65e14fa82,2024-10-04T13:50:43.727000 CVE-2024-8039,0,0,75dd15cbf64fe4bb3f25b4e678f58a350c7ac0d4791106998aa5586c640f03c8,2024-09-17T02:35:59.503000 @@ -266683,13 +266697,13 @@ CVE-2024-8376,0,0,bbf16835f6f3aa10a7af4872c5b5167c731ff01012cb5251b279466a1d91cb CVE-2024-8379,0,0,085298af9559a314a9f72b50c0919e14d810bca9e3bf6d4dab66f461020341e6,2024-10-07T15:49:54.653000 CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000 CVE-2024-8381,0,0,71cd6342a2b6c00c154431956e1e93b11926fd4f87284990ba91ff899e315a4c,2024-09-06T17:15:17.573000 -CVE-2024-8382,0,0,6313fe051491464f5060a11c4fbfc0623b9d0d82cc5fbeccd812557ff3cd8b8d,2024-09-06T17:15:17.677000 -CVE-2024-8383,0,0,0c7c8fc57c83ea73337551cc7b14e8b03c1890f74ce3289a96514ab4a1d7bf4c,2024-09-06T19:15:12.830000 +CVE-2024-8382,0,1,98b215ef51a1d5a65c5211b7332af10895687bb26fef2923b4293269056eca96,2024-10-30T17:35:14.793000 +CVE-2024-8383,0,1,167a5747074feaaca251908036fe3649dcf0cf0b699dd137e91c4f560317a25d,2024-10-30T17:35:15.640000 CVE-2024-8384,0,0,7f643a14ceffced6d0d3e99b7b5797044b595379fd33f7956a2ce3d49b93443c,2024-09-06T17:15:17.847000 CVE-2024-8385,0,0,872fe06c6b294313fd73974851ece3a7b150af3cd55f8851236acdbb2fa92f66,2024-09-06T17:15:17.980000 -CVE-2024-8386,0,0,8b34d4ba1d63296afda5e75e2a105c44c8fe2c828a5521a3c426a1f456b14da0,2024-09-06T17:15:18.147000 +CVE-2024-8386,0,1,3b5fda99ab6572bbdab57b2cb55746518638d5616041d99b93bfd026f4805a78,2024-10-30T17:35:16.450000 CVE-2024-8387,0,0,0236f6236e30b259f0ad5d7ef58b73e88f9716952aaecf201cfb31f83aed0c30,2024-09-06T17:15:18.253000 -CVE-2024-8388,0,0,c9864eb6d3c315590c52d0b0a1a482222ad75576dc8d176a33dcc59976d2f97c,2024-09-04T15:49:19.170000 +CVE-2024-8388,0,1,a311a61163cccb40e86ebc6857a81933dc978e5806b424daeff3bb5dbedbca45,2024-10-30T17:35:17.283000 CVE-2024-8389,0,0,b86f9dffcb24008ea2fc4581b98019930f23a761524133d12e1b7b2aa1f8008a,2024-09-04T15:50:02.933000 CVE-2024-8391,0,0,e4a53876b2b078fcdc3ea9cb2dcdd9122c87a07a74293148b584a5df448e0076,2024-09-12T16:44:01.247000 CVE-2024-8392,0,0,3343898f56ebc4a1eaf8cb14372686dd9582e66846077d475563fa9697365b08,2024-10-28T13:58:09.230000 @@ -267027,7 +267041,7 @@ CVE-2024-8891,0,0,aa12a440054ffbd9bbb7dd25787b2c9efe1fc6e33a09eaeb1daa5594da775b CVE-2024-8892,0,0,b5404a9c6df12d8f66b57eddda13f138d35d7b48bdd71ae1e8b3a805c49716e0,2024-10-07T17:10:26.673000 CVE-2024-8896,0,0,a0c605576448a2e11080223e5dd725b3d72b9db8a933f1d2fd38560e97af6299,2024-10-29T22:15:08.513000 CVE-2024-8897,0,0,73bf9affb964d11dd95d3adbb34f86a16b9ae0fd786e64b4bbd48b1e4387bb49,2024-09-25T19:49:02.493000 -CVE-2024-8900,0,1,d930082a3862c99b4e58aa6993c3377fe493c46938169528591b4cc486e72a25,2024-10-30T15:35:26.207000 +CVE-2024-8900,0,0,d930082a3862c99b4e58aa6993c3377fe493c46938169528591b4cc486e72a25,2024-10-30T15:35:26.207000 CVE-2024-8901,0,0,c42abead2f721e44cbad55763c07a3fd24e0a842c194ee61580274699db985ca,2024-10-23T21:15:14.950000 CVE-2024-8902,0,0,e5dace8ff5577040ad4e028bf354543120981f772810138844b5cb4413778526,2024-10-15T12:57:46.880000 CVE-2024-8903,0,0,2ce54562e46551a15b98a64a6437d41656e447939ac76ef855f5d59decf764b8,2024-09-26T13:32:55.343000 @@ -267169,6 +267183,7 @@ CVE-2024-9105,0,0,0cdbd87fc1daf91e234d9d55d0a069fe1f153017fe382631f31d8e30d34561 CVE-2024-9106,0,0,e27db71c396a4ccaf2c72a333395893b81bc19abafa7c4f380f448da576e2d26,2024-10-04T13:51:25.567000 CVE-2024-9108,0,0,a5bd0d20b10740e2633e894f79cde5eedf60bb1d894cbb8ab0abf2750035a6b9,2024-10-04T13:51:25.567000 CVE-2024-9109,0,0,92ffc81317d04a5f58ae681583509b482d53f08c836f7e996194793f616d35bb,2024-10-25T12:56:07.750000 +CVE-2024-9110,1,1,83da4389515507c44e2c5e707c8635b39d7fcc581e881ed5b53ecf8aec62e678,2024-10-30T17:15:14.177000 CVE-2024-9115,0,0,1c4e70138ee9590ca65c2e328b29e5a87d064a3f49c7286913d14c3952d00fc4,2024-10-01T13:47:25.403000 CVE-2024-9116,0,0,6ad6ee3b57ea62c4d5b3e8fc83d1f8a6dcbcd94ec854a42b3db11ddd2d087efb,2024-10-28T13:58:09.230000 CVE-2024-9117,0,0,77f0703e7ba19b3d087cb3250573807a507cc3ac6f6e62f26867d41b190dba74,2024-10-01T13:56:55.893000 @@ -267235,7 +267250,7 @@ CVE-2024-9222,0,0,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931 CVE-2024-9224,0,0,1efb870d30ff5afb9078703fdeff1bc29463ebfa0c91ad435c25d902219ffec9,2024-10-07T19:19:38.157000 CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409ea,2024-10-07T20:24:41.420000 CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000 -CVE-2024-9231,0,0,d9b97ab1a46e2ec8ce00428658a043128c841292d1f959cb3918d04f7f0f3dde,2024-10-23T15:12:34.673000 +CVE-2024-9231,0,1,1a98d4e564cd1445dff204dbfca514c3336df15b7e3a4c13356dccfc41c8c7ca,2024-10-30T18:56:03.380000 CVE-2024-9232,0,0,a07f526496bb68b184ee001c7d6cd9744d3cb563b91260e8d60bd9b70cac4bda,2024-10-15T12:58:51.050000 CVE-2024-9234,0,0,304bee6ceb91eca0cdc00d7cdc49b4c339c82fe3a2287348525c06a570d629da,2024-10-15T12:58:51.050000 CVE-2024-9235,0,0,c0d2fcd4071fbbf94cf89580c6ac68eab724cd673d3397917c29c65c8b62b4df,2024-10-25T12:56:07.750000 @@ -267265,7 +267280,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000 -CVE-2024-9287,0,1,0f86ab1cffe327e8f075f779612d5e540dfae80c2e1ed7753f609a96564d1250,2024-10-30T16:15:05.100000 +CVE-2024-9287,0,0,0f86ab1cffe327e8f075f779612d5e540dfae80c2e1ed7753f609a96564d1250,2024-10-30T16:15:05.100000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000 @@ -267337,13 +267352,13 @@ CVE-2024-9385,0,0,0d2e28a3f2481a04ce784fbf885d088010920135683d5ffb6adf8001c8688d CVE-2024-9388,0,0,009230a12615f1bb2e717bad5419f25943ec085386cae195436492e6c2697f58,2024-10-30T11:15:16.297000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 CVE-2024-9392,0,0,beca44e590b21e5502ca4e733f60749ac893cd13053addd71013500d8f613300,2024-10-04T13:51:25.567000 -CVE-2024-9393,0,0,8991f032fac5df92cbca1bcfbd289d2f6fc6372985ab09be505deb12f485dbe2,2024-10-11T16:07:50.900000 -CVE-2024-9394,0,0,5ed6e653f78b8906c28bb62e758664ed375e0597617ec060b919f3513dbdc6ac,2024-10-11T16:08:21.067000 +CVE-2024-9393,0,1,db59aa733a962fd145e1e4784b7a62c0f1f699599f513fdc3af9c19b1068eebf,2024-10-30T17:35:18.107000 +CVE-2024-9394,0,1,5a2da29e26f8cfcdeead92ef1535e6e515313ff6708ae768ef7117e4a9bbf2fa,2024-10-30T18:35:22.020000 CVE-2024-9395,0,0,5635514233d9ffee7876b8b2143dfc7636f2a12f95a3e319a76e442d8673b9b2,2024-10-04T13:51:25.567000 CVE-2024-9396,0,0,530fd74976554bcd60385c13cda51e8c090f8d2168af9c130173451c01d15309,2024-10-04T13:51:25.567000 CVE-2024-9397,0,0,eedca49f89627e559465b4c1980d39b3c979416597a1ac9dbc74efac9146189f,2024-10-11T16:07:56.577000 -CVE-2024-9398,0,0,bdddf943c112a95674b6a5445a1c9aea85241f45d8a7242f5a5f280afd3f7bd6,2024-10-11T16:08:14.577000 -CVE-2024-9399,0,0,71d350d28d9602a123d1293eb86793568be4f2238424536b634c21711ccc3392,2024-10-15T16:04:59.350000 +CVE-2024-9398,0,1,9a1cd165b131dcc697a6ce69dca59963d7d6fd72e1fa191341ec3c597be24d83,2024-10-30T18:35:22.757000 +CVE-2024-9399,0,1,79881a1208778cdf9bb5e9456363b2a3ffd4ce6267b77bc2ba04e5c58ec35d40,2024-10-30T18:35:23.640000 CVE-2024-9400,0,0,a07b092a7377838a4bb1e87b4e3b2f09cba515c42895dfa1fbf9dfd7eae19700,2024-10-04T13:51:25.567000 CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f468c,2024-10-04T13:51:25.567000 CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b23,2024-10-04T13:51:25.567000 @@ -267355,6 +267370,7 @@ CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ff CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 +CVE-2024-9419,1,1,de7d0cde54d42021a802d6b7be3bc5b8e5ef5abf6921100f08965fc41996e730,2024-10-30T18:15:08.260000 CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9425,0,0,bc1d05d29533f5db80147aca0ebcf5dcf1807c002307822e9b1efd4c274ae327,2024-10-22T13:55:04.537000 @@ -267495,7 +267511,7 @@ CVE-2024-9656,0,0,0baa2843f7043c4ebd829d23f2741f972b762b755442a0f0f83539eb776103 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 -CVE-2024-9675,0,0,eeea36cc8b9f2954bb20129c787b2558ad2679a2c1fb2ba959a00f3259f50e8c,2024-10-30T07:15:16.493000 +CVE-2024-9675,0,1,734a0b0d1dbc9cb01a8d4e1348695fad0a96de0e08ae92ad9d279c34c79d2946,2024-10-30T17:15:14.397000 CVE-2024-9676,0,0,388826e2f736cae6407dafbf37e070d02b7de19b7221232ae54333a7a67ea4ed,2024-10-30T09:15:02.860000 CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000