diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json index 9ef73fc7d31..1b0b141568c 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4244.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4244", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-25T20:15:10.220", - "lastModified": "2024-05-03T16:15:08.730", - "vulnStatus": "Modified", + "lastModified": "2024-10-10T20:04:34.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:codehaus-plexus:plexus-utils:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.0.24", - "matchCriteriaId": "AAE606F1-EBAB-4832-8F66-495E84147298" + "matchCriteriaId": "EA55EA05-9741-46F1-95D7-6F4E2ACAEE8A" } ] } @@ -118,7 +118,10 @@ "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:2135", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:3906", diff --git a/CVE-2022/CVE-2022-42xx/CVE-2022-4245.json b/CVE-2022/CVE-2022-42xx/CVE-2022-4245.json index 8bd624f3fde..ac7f8a97532 100644 --- a/CVE-2022/CVE-2022-42xx/CVE-2022-4245.json +++ b/CVE-2022/CVE-2022-42xx/CVE-2022-4245.json @@ -2,8 +2,8 @@ "id": "CVE-2022-4245", "sourceIdentifier": "secalert@redhat.com", "published": "2023-09-25T20:15:10.400", - "lastModified": "2024-05-03T16:15:08.987", - "vulnStatus": "Modified", + "lastModified": "2024-10-10T20:02:34.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -90,9 +90,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:codehaus-plexus_project:codehaus-plexus:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:codehaus-plexus:plexus-utils:*:*:*:*:*:*:*:*", "versionEndExcluding": "3.0.24", - "matchCriteriaId": "AAE606F1-EBAB-4832-8F66-495E84147298" + "matchCriteriaId": "EA55EA05-9741-46F1-95D7-6F4E2ACAEE8A" } ] } @@ -118,7 +118,10 @@ "references": [ { "url": "https://access.redhat.com/errata/RHSA-2023:2135", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://access.redhat.com/errata/RHSA-2023:3906", diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22342.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22342.json index ae5e84f2cd4..52787fde4ff 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22342.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22342.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22342", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:39.063", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:28:04.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22390.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22390.json index 6ec85c84374..66f0e54d05e 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22390.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22390.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22390", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:39.433", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:27:55.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22848.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22848.json index 564445cfc5a..ade464eb7b1 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22848.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22848.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22848", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:39.757", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:27:48.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24463.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24463.json index 0d2ed9c8d4e..c92235d8673 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24463.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24463.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24463", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:40.127", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:27:39.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-244xx/CVE-2023-24481.json b/CVE-2023/CVE-2023-244xx/CVE-2023-24481.json index b7bdd85be54..7f9a354f6ff 100644 --- a/CVE-2023/CVE-2023-244xx/CVE-2023-24481.json +++ b/CVE-2023/CVE-2023-244xx/CVE-2023-24481.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24481", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:40.327", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:27:32.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 3.7 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24542.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24542.json index c871dc69e5d..aae94a768cb 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24542.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24542.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24542", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:40.513", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:27:25.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24589.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24589.json index 6974f5b218e..92cee586ed1 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24589.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24589.json @@ -2,8 +2,8 @@ "id": "CVE-2023-24589", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:40.717", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:27:18.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.7 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25769.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25769.json index 74a0f15192e..f3081420994 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25769.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25769.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25769", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:42.970", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:27:08.520", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25777.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25777.json index e37ada43087..eb089e36a0a 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25777.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25777.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25777", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:43.270", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:26:52.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.9, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 5.3 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25779.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25779.json index 667d3b713b3..c18b331f948 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25779.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25779.json @@ -2,8 +2,8 @@ "id": "CVE-2023-25779", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:43.500", - "lastModified": "2024-02-14T15:02:01.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:26:44.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26585.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26585.json index 95393ffe3f2..ea10291d8bf 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26585.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26585.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26585", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:44.230", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:26:36.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26591.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26591.json index 9f4348fb628..515d2a81928 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26591.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26591.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26591", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:44.893", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:26:20.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.0, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.5, + "impactScore": 1.4 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-252" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26592.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26592.json index bb08c2fd812..026840e5a4d 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26592.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26592.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26592", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:45.140", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:26:03.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26596.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26596.json index 6ac143eeea8..66fed907fb8 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26596.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26596.json @@ -2,8 +2,8 @@ "id": "CVE-2023-26596", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:45.380", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:26:27.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 1.4 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27300.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27300.json index a92d7cbd0f9..38faca02c78 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27300.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27300.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27300", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:45.740", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:25:40.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27301.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27301.json index 97c58aaf376..487d8755417 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27301.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27301.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27301", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:46.227", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:25:31.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.1, + "impactScore": 2.7 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27303.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27303.json index 459e0183ec4..826d51be976 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27303.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27303.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27303", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:46.663", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:25:20.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27307.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27307.json index dd07f2ef070..72314de0dda 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27307.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27307.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27307", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:46.887", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:25:08.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.8, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-273xx/CVE-2023-27308.json b/CVE-2023/CVE-2023-273xx/CVE-2023-27308.json index d221be46e2a..c19c3be4258 100644 --- a/CVE-2023/CVE-2023-273xx/CVE-2023-27308.json +++ b/CVE-2023/CVE-2023-273xx/CVE-2023-27308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27308", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:47.120", - "lastModified": "2024-02-14T15:01:55.963", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:24:47.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 2.7 + }, { "source": "secure@intel.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@intel.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:intel:thunderbolt_dch_driver:*:*:*:*:*:windows:*:*", + "versionEndExcluding": "88", + "matchCriteriaId": "39941EA6-827E-4A1A-AE6D-8E09C2014183" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00851.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-390xx/CVE-2023-39020.json b/CVE-2023/CVE-2023-390xx/CVE-2023-39020.json index 3b88c5bd785..9dc9b64d1be 100644 --- a/CVE-2023/CVE-2023-390xx/CVE-2023-39020.json +++ b/CVE-2023/CVE-2023-390xx/CVE-2023-39020.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39020", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-28T15:15:13.287", - "lastModified": "2023-08-03T18:01:31.200", + "lastModified": "2024-10-10T20:22:41.110", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -61,8 +61,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:stanford:stanford_parser:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.9.2", - "matchCriteriaId": "942594D2-81EF-4D2D-A6AF-3373350B59D9" + "versionEndExcluding": "4.5.5", + "matchCriteriaId": "970E62FE-5B05-42E3-8BE9-1D00D153E121" } ] } diff --git a/CVE-2023/CVE-2023-494xx/CVE-2023-49441.json b/CVE-2023/CVE-2023-494xx/CVE-2023-49441.json index 43d903faf4b..c89e8eb85d7 100644 --- a/CVE-2023/CVE-2023-494xx/CVE-2023-49441.json +++ b/CVE-2023/CVE-2023-494xx/CVE-2023-49441.json @@ -2,8 +2,8 @@ "id": "CVE-2023-49441", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-06T22:15:09.843", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:00:44.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,74 @@ "value": "dnsmasq 2.9 es vulnerable al desbordamiento de enteros a trav\u00e9s de forward_query." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:thekelleys:dnsmasq:2.9:*:*:*:*:*:*:*", + "matchCriteriaId": "8BFBF5E9-7287-4B1D-AD78-0E30A5E2F0E9" + } + ] + } + ] + } + ], "references": [ { "url": "https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2023q4/017332.html", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Mailing List" + ] }, { "url": "https://thekelleys.org.uk/gitweb/?p=dnsmasq.git%3Ba=commit%3Bh=65c2d6afd67a032f45f40d7e4d620f5d73e5f07d", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Broken Link" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5136.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5136.json index 3e6d8dd5ca3..a4f217c0736 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5136.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5136.json @@ -2,13 +2,13 @@ "id": "CVE-2023-5136", "sourceIdentifier": "security@ni.com", "published": "2023-11-08T16:15:11.067", - "lastModified": "2023-11-15T18:42:41.643", - "vulnStatus": "Analyzed", + "lastModified": "2024-10-10T21:15:04.303", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file.\n" + "value": "An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file." }, { "lang": "es", @@ -76,7 +76,7 @@ "description": [ { "lang": "en", - "value": "CWE-732" + "value": "CWE-611" } ] } diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json index fae7facf5f4..2551e4c361f 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23609.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23609", "sourceIdentifier": "security@ni.com", "published": "2024-03-11T16:15:08.157", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-10-10T21:15:04.623", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n" + "value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-755" + "value": "CWE-1285" } ] } diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json index dc66699ebcc..1fd8ba2d0e3 100644 --- a/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23612.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23612", "sourceIdentifier": "security@ni.com", "published": "2024-03-11T16:15:08.743", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-10-10T21:15:04.753", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.\n\n" + "value": "An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions." }, { "lang": "es", @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-755" + "value": "CWE-1285" } ] } diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30464.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30464.json index d03a72cf48a..7fd9525774d 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30464.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30464.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30464", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T11:15:50.200", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T20:24:02.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpzoom:social_icons_widget:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.2.16", + "matchCriteriaId": "E119FF40-D115-475E-B043-F0E9824DC5F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/social-icons-widget-by-wpzoom/wordpress-social-icons-widget-block-by-wpzoom-plugin-4-2-15-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30465.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30465.json index 646ac8c32b5..1546af6d980 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30465.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30465.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30465", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-09T11:15:50.430", - "lastModified": "2024-06-10T02:52:08.267", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T20:20:21.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.2", + "matchCriteriaId": "3D25725A-8386-421D-8A0A-92D501E60624" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pagelayer/wordpress-pagelayer-plugin-1-8-1-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json b/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json index d01c4d5c2b5..89035f13fdd 100644 --- a/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json +++ b/CVE-2024/CVE-2024-428xx/CVE-2024-42812.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42812", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-19T20:15:07.070", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:18:11.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,86 @@ "value": "En D-Link DIR-860L v2.03, existe una vulnerabilidad de desbordamiento del b\u00fafer debido a la falta de verificaci\u00f3n de longitud para el campo SID en gena.cgi. Los atacantes que explotan con \u00e9xito esta vulnerabilidad pueden provocar que el dispositivo de destino remoto falle o ejecute comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dlink:dir-860l_firmware:2.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7383928C-851B-40C5-914C-83AB9CFD9748" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dlink:dir-860l:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCDB9720-8F5A-4F02-A436-920CDAC15D69" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/XiaoCurry/574ed9c2b0d12cd0b45399116d82121c", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.dlink.com/en/security-bulletin/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json index 19a4ee92856..460f5d1f3d0 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45115.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45115", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:03.127", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:51:56.040", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -37,8 +37,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +57,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json index 1fbb40c7593..1e53eec8dfe 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45116.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45116", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:03.930", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:47:27.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -47,10 +47,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json index aab71d83bac..4de9a6a43ab 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45117.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45117", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.150", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:47:11.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -37,8 +37,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +57,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json index 5de33f52a11..6a7a0152fc7 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45118.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45118", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.357", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:47:00.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -37,8 +37,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +57,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json index e1ea958c61e..5cdc7b87c02 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45119", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.563", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:37:39.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -14,8 +14,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", @@ -47,10 +67,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json index f468ed0ff5f..cfea8544ce4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45120", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.787", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:37:20.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -14,8 +14,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -47,10 +67,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json index b848b6de78b..2dab3897ca4 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45121.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45121", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:04.997", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:37:08.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -13,6 +13,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -37,8 +57,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +77,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json index 504d1e13c60..a065d8c40ec 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45122", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:05.200", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:35:53.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -37,8 +37,18 @@ }, "weaknesses": [ { - "source": "psirt@adobe.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "psirt@adobe.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -47,10 +57,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json index e961d0c3435..a1075fc53e1 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45123", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-10T10:15:05.400", - "lastModified": "2024-10-10T12:51:56.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-10-10T21:34:32.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "psirt@adobe.com", "type": "Secondary", @@ -47,10 +57,605 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B790C86A-4B59-4B37-9147-7C72CA6D32F4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*", + "matchCriteriaId": "4346BF61-743B-4BBE-AC90-9954FEE6E943" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "9F471E19-8AFE-4A6C-88EA-DF94428518F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "27E5B990-1E1C-46AC-815F-AF737D211C16" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*", + "matchCriteriaId": "8D1598F4-AA41-4F94-A986-E603DC42AC8B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*", + "matchCriteriaId": "3A3535F6-227F-4DD2-881F-9ADAB68373CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*", + "matchCriteriaId": "428B889D-3BAF-46A2-913A-E0022217F804" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*", + "matchCriteriaId": "2A0A7F6F-6218-4714-A7C7-79580FBA8FFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext3:*:*:*:*:*:*", + "matchCriteriaId": "304A7DB2-0174-42A2-A357-944634C2ADFA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.3.7:p4-ext4:*:*:*:*:*:*", + "matchCriteriaId": "C5954698-9CA1-4463-833C-E7DB447AC80A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2534F3CE-1387-46FC-B6AF-0D3379B38B8F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D845F99F-2958-4118-B27E-6D84602B7FB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "61266FCB-916E-4B72-A5CE-8E9D3D817996" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "4B4BB14A-5BBE-4FF3-B956-306D721D99E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8D33D70D-84E7-46D9-A50B-857DF71B43C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.0:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "6291AFE6-3F06-4796-B6B8-761D995F1F9D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:*:*:*:*:*:*:*", + "matchCriteriaId": "319BD62E-B745-41C0-8F31-A807B6067A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*", + "matchCriteriaId": "33BE2A5D-A4B1-4863-A1D9-29F08CA8CCE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "F1BCDF10-D4D2-4FB5-8A6A-960730C17911" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "F747F9C6-BD3F-4DFC-BC91-6361F66E50D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "8249B061-BD24-4A05-A08B-8CE776C23F79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.1:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "40315EF0-0EAF-465B-BC82-57B74C23ED98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:*:*:*:*:*:*:*", + "matchCriteriaId": "26B82CF0-829C-4CC4-B5FD-BD783B0C13BB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "62BF6A4C-BC58-40A2-AE21-B4F309562661" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "1D0E8BC4-17BD-4F42-A849-2CC439CF82D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E9E12EC1-36A9-42F5-9EE6-88FAA6FD52F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "F2B3EF0E-31B4-4508-AC48-D89CB4460D89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "B0B4ABDB-1C22-4B26-BA4D-DA73ED1F50D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "496DE1BC-DC23-4873-9A13-E166A267CC13" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "95AA877E-D67C-42B0-8673-EB7C1CFCE138" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB93DC1-7F58-435F-A54D-3E0C9C6AD811" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*", + "matchCriteriaId": "7B503C35-8C90-4A24-8E60-722CDBBF556B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*", + "matchCriteriaId": "FC5B997C-8DB4-4FDF-96F6-6DCF23970705" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*", + "matchCriteriaId": "E8B1341E-A0C9-42EB-8BAE-E23D88BC3CB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-3:*:*:*:*:*:*", + "matchCriteriaId": "14CEAFB8-0812-4F19-8E83-93A61A23594F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:ext-4:*:*:*:*:*:*", + "matchCriteriaId": "25A9AC2F-7AAC-41FF-8D93-3A5CBE24BED6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*", + "matchCriteriaId": "8A453C85-A14A-47B8-B91D-3906BBE42A78" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.3:p2:*:*:*:*:*:*", + "matchCriteriaId": "38FFC3BA-B75E-4060-9E29-74367C7BE8A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*", + "matchCriteriaId": "D258D9EF-94FB-41F0-A7A5-7F66FA7A0055" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*", + "matchCriteriaId": "4E5CF6F0-2388-4D3F-8FE1-43B8AF148564" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*", + "matchCriteriaId": "1C3D7164-1C5F-40BC-9EEC-B0E00CD45808" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*", + "matchCriteriaId": "D6D6F1A7-ABB5-4EDC-9EA8-98B74518847A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*", + "matchCriteriaId": "CFEBDDF2-6443-4482-83B2-3CD272CF599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*", + "matchCriteriaId": "6661093F-8D22-450F-BC6C-A8894A52E6A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*", + "matchCriteriaId": "2515DA6D-2E74-4A05-BD29-FEEF3322BCB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*", + "matchCriteriaId": "69A1F1F7-E53C-40F3-B3D9-DC011FC353BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*", + "matchCriteriaId": "6A56E96C-6CE5-442C-AA88-F0059B02B5E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*", + "matchCriteriaId": "8867F510-201C-4199-8554-53DE156CE669" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "23988132-DD4E-4968-B6B8-954122F76081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*", + "matchCriteriaId": "9B07F7B2-E915-4EFF-8FFC-91143CEF082E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*", + "matchCriteriaId": "7F5E9DB6-1386-4274-8270-2FE0F0CAF7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*", + "matchCriteriaId": "8605E4E6-0F7D-42C8-B35B-2349A0BEFC69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*", + "matchCriteriaId": "B6318F97-E59A-4425-8DC7-045C78A644F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*", + "matchCriteriaId": "324A573E-DBC8-42A0-8CB8-EDD8FBAB7115" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*", + "matchCriteriaId": "54151A00-CFB8-4E6A-8E74-497CB67BF7E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*", + "matchCriteriaId": "6DF0E74D-9293-4209-97D1-A3BA13C3DDE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "8922D646-1A97-47ED-91C6-5A426781C98A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*", + "matchCriteriaId": "952787C6-9BF1-49FB-9824-1236678E1902" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*", + "matchCriteriaId": "898A8679-3C46-4718-9EDF-583ADDFCF2EC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*", + "matchCriteriaId": "7C7AFBB1-F9C9-4BDE-BCEF-94C9F0AC6798" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*", + "matchCriteriaId": "D6086841-C175-46A1-8414-71C6163A0E7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*", + "matchCriteriaId": "D2E0DDD1-0F4A-4F96-B25D-40A39A1A535A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*", + "matchCriteriaId": "A576B1B5-73A2-431E-998F-7E5458B51D6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*", + "matchCriteriaId": "0E05F4AC-2A28-47E3-96DE-0E31AF73CD43" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*", + "matchCriteriaId": "3A9A62EE-1649-4815-8EC9-7AEF7949EB2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*", + "matchCriteriaId": "E58690F9-FA9C-42A0-B4CD-91FD1197A53E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*", + "matchCriteriaId": "77D01D8B-1FBC-43CA-90F9-C89D9B4D18F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*", + "matchCriteriaId": "B5D04853-0C2F-47DD-A939-3A8F6E22CB7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*", + "matchCriteriaId": "6EBB0608-034B-4F07-A59B-9E6A989BA260" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*", + "matchCriteriaId": "B3BF9B08-84E3-4974-9DEB-F4285995D796" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*", + "matchCriteriaId": "2E05341A-C70C-4B3D-AF30-9520D6B97D30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*", + "matchCriteriaId": "4D98B52E-3B59-4327-AC7E-DDBB0ADA08F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*", + "matchCriteriaId": "C4667AA3-4CC9-41C0-8E0C-19B0FCE1CF79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*", + "matchCriteriaId": "2ADE32D1-2845-4030-BE1F-ECE28189D0F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1C90C433-6655-4038-9AB3-0304C1AFF360" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*", + "matchCriteriaId": "6E94B136-7A2C-47F0-BCE4-6BB8E776A305" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*", + "matchCriteriaId": "3C5C3F26-24F0-4CF5-AA2E-7CA13E9D17DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*", + "matchCriteriaId": "66F3EA5F-08A2-4A1E-82D3-BBE7FFA2667E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*", + "matchCriteriaId": "15C638A8-EFE0-47DB-B1F9-34093AF0FC17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*", + "matchCriteriaId": "CB863404-A9D7-4692-AB43-08945E669928" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*", + "matchCriteriaId": "D8CFA8F4-D57D-4D0F-88D5-00A72E3AD8DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:-:*:*:*:open_source:*:*:*", + "matchCriteriaId": "B57D1E23-3174-43D5-B6C6-C871654881EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.3:*:*:*:open_source:*:*:*", + "matchCriteriaId": "1A4D7A6E-D4E3-43D2-AC4C-C26AE4EE365C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*", + "matchCriteriaId": "AC641EFE-3B9B-4988-A143-FE1F6FD0D689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "5F7AA4A6-69E3-4BA4-A476-CA37F41D5482" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p10:*:*:open_source:*:*:*", + "matchCriteriaId": "3465841A-1CE5-4173-A795-48881146618B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "A3D05570-FA72-4FCF-90E9-EC19731CD9F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "7DF079F1-1886-4974-A0F0-82DEA88F2E83" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "C4E7AFE2-E02D-4C7D-B9C3-CEF345F1287C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "F39BCCFC-4748-4626-8E35-4BD299CE42A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "EB9003A6-F5CC-463F-AC3A-C76F96A39F45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "10DBD0CA-AFC2-4E12-9239-C2FBE778E6E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "FBB3AA19-BF6C-4C4B-A213-494D35F08D99" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.4:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "6FE43B88-BCD6-4ADF-94E7-81EC15550A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*", + "matchCriteriaId": "7A41C717-4B9F-4972-ABA3-2294EEC20F3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "3FA80BBC-2DF2-46E1-84CE-8A899415114E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "510B1840-AE77-4BDD-9C09-26C64CC8FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "FA1EDF58-8384-48C4-A584-54D24F6F7973" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "9D2D9715-3A6B-4BE0-B1C5-8D19A683A083" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "1C99B578-5DD6-476D-BB75-4DCAD7F79535" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "7C1B2897-79A5-4A5B-9137-7A4B6B85AA84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "B9E8299D-FA97-483A-8E1B-BA7B869E467D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*", + "matchCriteriaId": "9A1B92EC-E83A-43B3-8F14-5C1A52B579B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*", + "matchCriteriaId": "E5F2B6F1-AE8F-4AEE-9AB3-080976AE48B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*", + "matchCriteriaId": "789BD987-9DAD-4EAE-93DE-0E267D54F124" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "A3F113C0-00C5-4BC2-B42B-8AE3756252F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "02592D65-2D2C-460A-A970-8A18F9B156ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*", + "matchCriteriaId": "457B89CF-C75E-4ED6-8603-9C52BA462A9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*", + "matchCriteriaId": "A572A2DC-2DAB-4ABE-8FC2-5AF2340C826F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*", + "matchCriteriaId": "2A2DD9C6-BAF5-4DF5-9C14-3478923B2019" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*", + "matchCriteriaId": "BA9CFC70-24CF-4DFA-AEF9-9B5A9DAF837D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*", + "matchCriteriaId": "2AA0B806-ABB8-4C18-9F9C-8291BE208F52" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*", + "matchCriteriaId": "0E06FE04-8844-4409-92D9-4972B47C921B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*", + "matchCriteriaId": "99C620F3-40ED-4D7F-B6A1-205E948FD6F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*", + "matchCriteriaId": "9C77154A-DBFE-48C3-A274-03075A0DB040" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*", + "matchCriteriaId": "F5AAC414-623C-444F-9BD5-EE0ACE2B2246" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/magento/apsb24-73.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47651.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47651.json index e828d09946b..787b2a48790 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47651.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47651.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47651", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-04T12:15:12.710", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T21:01:39.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "This vulnerability exists in Shilpi Client Dashboard due to improper handling of multiple parameters in the API endpoint. An authenticated remote attacker could exploit this vulnerability by including multiple \u201cuserid\u201d parameters in the API request body leading to unauthorized access of sensitive information belonging to other users." + }, + { + "lang": "es", + "value": "Esta vulnerabilidad existe en Shilpi Client Dashboard debido al manejo inadecuado de m\u00faltiples par\u00e1metros en el endpoint de la API. Un atacante remoto autenticado podr\u00eda aprovechar esta vulnerabilidad al incluir m\u00faltiples par\u00e1metros de \u201cidentificaci\u00f3n de usuario\u201d en el cuerpo de la solicitud de la API, lo que provocar\u00eda un acceso no autorizado a informaci\u00f3n confidencial perteneciente a otros usuarios." } ], "metrics": { @@ -55,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ { - "source": "vdisclose@cert-in.org.in", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", "description": [ { "lang": "en", @@ -69,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:shilpi:client_dashboard:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.7.0", + "matchCriteriaId": "0CE3D83D-DF53-481D-A01C-648B65908D3E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0313", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-48xx/CVE-2024-4890.json b/CVE-2024/CVE-2024-48xx/CVE-2024-4890.json index 787b2a2ccd6..13ce2b2e72e 100644 --- a/CVE-2024/CVE-2024-48xx/CVE-2024-4890.json +++ b/CVE-2024/CVE-2024-48xx/CVE-2024-4890.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4890", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:16:03.630", - "lastModified": "2024-06-07T14:56:05.647", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:11:44.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:litellm:litellm:1.27.14:*:*:*:*:*:*:*", + "matchCriteriaId": "967C5FF4-2C4B-4366-A3BC-9ADD0A3E2781" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/a4f6d357-5b44-4e00-9cac-f1cc351211d2", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8804.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8804.json index 1083c403fe4..130ff1ee934 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8804.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8804.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8804", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T06:15:05.353", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:56:49.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:davidartiss:code_embed:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5", + "matchCriteriaId": "BA9EAD25-9011-4690-8525-9D1E6E287EA5" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3162219%40simple-embed-code&new=3162219%40simple-embed-code&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ab4149e1-8378-4007-bbf2-1ac3c479e7ea?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9180.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9180.json new file mode 100644 index 00000000000..3e253fad386 --- /dev/null +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9180.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9180", + "sourceIdentifier": "security@hashicorp.com", + "published": "2024-10-10T21:15:05.010", + "lastModified": "2024-10-10T21:15:05.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privileged Vault operator with write permissions to the root namespace\u2019s identity endpoint could escalate their privileges to Vault\u2019s root policy. Fixed in Vault Community Edition 1.18.0 and Vault Enterprise 1.18.0, 1.17.7, 1.16.11, and 1.15.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@hashicorp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + } + ] + } + ], + "references": [ + { + "url": "https://discuss.hashicorp.com/t/hcsec-2024-21-vault-operators-in-root-namespace-may-elevate-their-privileges/70565", + "source": "security@hashicorp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9349.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9349.json index 91b076198a1..51f73e4a137 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9349.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9349.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9349", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:12.820", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:25:57.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:michaeluno:auto_amazon_links:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.4.3", + "matchCriteriaId": "8E2E8200-A692-43DA-9AA4-14715D3850CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/amazon-auto-links/tags/5.4.2/include/core/main/admin/report/http_request/AmazonAutoLinks_AdminPage_Tab_HTTPRequest.php#L133", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3161302%40amazon-auto-links&new=3161302%40amazon-auto-links&sfp_email=&sfph_mail=#file5", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ebd4936-9d68-42cb-a427-a1db894b49ec?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9368.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9368.json index db8b7bba79d..3c4d16fc067 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9368.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9368.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9368", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:13.240", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:30:51.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:miguelmello:aggregator_advanced_settings:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.1", + "matchCriteriaId": "65EE1EA0-E5A5-4498-AC66-C239F60681A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/aggregator-advanced-settings/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/838bfa4c-2eb7-4f76-a6c3-ab4684f3913c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9372.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9372.json index 861c1979e0c..e45b75a70a0 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9372.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9372", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:13.440", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:36:28.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpblockshub:wp_blocks_hub:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "01E57958-903C-49EC-BC93-1CAD02CC94F6" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/wp-blocks-hub/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d32b2cc-9336-432e-9d2e-67db8b0e3f90?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9375.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9375.json index 3f61fa8dfc5..c9b87f26a2b 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9375.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9375.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9375", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:13.630", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:44:02.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:techbanker:captcha_bank:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.0.36", + "matchCriteriaId": "98E58ABF-BD41-41B1-AF39-BDCF5C1BD453" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/captcha-bank/trunk/captcha-bank.php#L1297", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba796adc-db76-4b9d-a6f9-f0f51f070240?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9384.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9384.json index f4f6f73b4d7..2e55fa8a20e 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9384.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9384", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:13.837", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:52:33.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpfactory:quantity_dynamic_pricing_\\&_bulk_discounts_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.8.1", + "matchCriteriaId": "B1FCB822-E724-4CEC-973B-257FD7EBA94F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wholesale-pricing-woocommerce/tags/3.8.0/includes/settings/class-alg-wc-wholesale-pricing-settings-per-product.php#L126", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3161269/wholesale-pricing-woocommerce/tags/3.8.1/includes/settings/class-alg-wc-wholesale-pricing-settings-per-product.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e84ee2b5-96b5-427c-ac66-7f80418ae02f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9421.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9421.json index 8d74f3b6e2c..0ac91729404 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9421.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9421.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9421", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:14.030", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:59:01.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security@wordfence.com", "type": "Secondary", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:prontotools:login_logout_shortcode:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1.0", + "matchCriteriaId": "D5553AD5-8618-4D49-B9FF-A0DFA55CE75D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/login-logout-shortcode/trunk/login-logout-shortcode.php#L39", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/login-logout-shortcode/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8f7ce513-45ba-427b-8ee0-1007e404c1a9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9445.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9445.json index cbdfccdfc30..5abfeea398e 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9445.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9445.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9445", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-04T05:15:14.230", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-10-10T20:58:04.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,28 @@ "metrics": { "cvssMetricV31": [ { - "source": "security@wordfence.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "security@wordfence.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:acekyd:display_medium_posts:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "5.0.1", + "matchCriteriaId": "B2E7B9AA-3347-4FD8-826C-D99E7322097C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/display-medium-posts/trunk/display-medium-posts.php#L200", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://wordpress.org/plugins/display-medium-posts/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/be1e0216-d9de-45e9-837c-0cccb78729a6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json new file mode 100644 index 00000000000..cc7eb0a9aab --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9808.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9808", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T20:15:05.003", + "lastModified": "2024-10-10T20:15:05.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/?page=products/view_product. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/r1ckyL/cve/blob/main/sql.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279960", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279960", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.420744", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json new file mode 100644 index 00000000000..aa4f52826be --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9809.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9809", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T20:15:05.267", + "lastModified": "2024-10-10T20:15:05.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0. It has been declared as critical. Affected by this vulnerability is the function delete_product of the file /classes/Master.php?f=delete_product. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wuyanzu-lab/cve/blob/main/sql.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279961", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279961", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.420745", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json new file mode 100644 index 00000000000..9bcd5e5c799 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9810.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9810", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T20:15:05.517", + "lastModified": "2024-10-10T20:15:05.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in SourceCodester Record Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file sort2_user.php. The manipulation of the argument qualification leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/GangZhou1/VUL/blob/main/Record-Management-System-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279962", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279962", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.420806", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json new file mode 100644 index 00000000000..0bb3a21cee6 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9811.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9811", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T21:15:05.383", + "lastModified": "2024-10-10T21:15:05.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in code-projects Restaurant Reservation System 1.0. This affects an unknown part of the file filter3.php. The manipulation of the argument company leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ppp-src/a/issues/24", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279963", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279963", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.418728", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json new file mode 100644 index 00000000000..7a00e26acf6 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9812.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-9812", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T21:15:05.677", + "lastModified": "2024-10-10T21:15:05.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Crud Operation System 1.0. This vulnerability affects unknown code of the file delete.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ppp-src/a/issues/25", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279964", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279964", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.418729", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json new file mode 100644 index 00000000000..808b47e8f3d --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9813.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-9813", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-10-10T21:15:05.963", + "lastModified": "2024-10-10T21:15:05.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Codezips Pharmacy Management System 1.0. This issue affects some unknown processing of the file product/register.php. The manipulation of the argument category leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/ppp-src/CVE/issues/10", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.279965", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.279965", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.418904", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 66d03d2fcd3..cc49cae5423 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-10-10T20:00:17.856967+00:00 +2024-10-10T22:00:17.541767+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-10-10T19:55:20.253000+00:00 +2024-10-10T21:51:56.040000+00:00 ``` ### Last Data Feed Release @@ -33,55 +33,51 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -265262 +265269 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `7` -- [CVE-2024-47354](CVE-2024/CVE-2024-473xx/CVE-2024-47354.json) (`2024-10-10T19:15:16.837`) -- [CVE-2024-47636](CVE-2024/CVE-2024-476xx/CVE-2024-47636.json) (`2024-10-10T18:15:07.920`) -- [CVE-2024-47648](CVE-2024/CVE-2024-476xx/CVE-2024-47648.json) (`2024-10-10T19:15:17.067`) -- [CVE-2024-47962](CVE-2024/CVE-2024-479xx/CVE-2024-47962.json) (`2024-10-10T18:15:08.183`) -- [CVE-2024-47963](CVE-2024/CVE-2024-479xx/CVE-2024-47963.json) (`2024-10-10T18:15:08.330`) -- [CVE-2024-47964](CVE-2024/CVE-2024-479xx/CVE-2024-47964.json) (`2024-10-10T18:15:08.470`) -- [CVE-2024-47965](CVE-2024/CVE-2024-479xx/CVE-2024-47965.json) (`2024-10-10T18:15:08.587`) -- [CVE-2024-47966](CVE-2024/CVE-2024-479xx/CVE-2024-47966.json) (`2024-10-10T18:15:08.710`) -- [CVE-2024-9804](CVE-2024/CVE-2024-98xx/CVE-2024-9804.json) (`2024-10-10T18:15:09.150`) -- [CVE-2024-9805](CVE-2024/CVE-2024-98xx/CVE-2024-9805.json) (`2024-10-10T18:15:09.440`) -- [CVE-2024-9806](CVE-2024/CVE-2024-98xx/CVE-2024-9806.json) (`2024-10-10T19:15:17.520`) -- [CVE-2024-9807](CVE-2024/CVE-2024-98xx/CVE-2024-9807.json) (`2024-10-10T19:15:17.797`) +- [CVE-2024-9180](CVE-2024/CVE-2024-91xx/CVE-2024-9180.json) (`2024-10-10T21:15:05.010`) +- [CVE-2024-9808](CVE-2024/CVE-2024-98xx/CVE-2024-9808.json) (`2024-10-10T20:15:05.003`) +- [CVE-2024-9809](CVE-2024/CVE-2024-98xx/CVE-2024-9809.json) (`2024-10-10T20:15:05.267`) +- [CVE-2024-9810](CVE-2024/CVE-2024-98xx/CVE-2024-9810.json) (`2024-10-10T20:15:05.517`) +- [CVE-2024-9811](CVE-2024/CVE-2024-98xx/CVE-2024-9811.json) (`2024-10-10T21:15:05.383`) +- [CVE-2024-9812](CVE-2024/CVE-2024-98xx/CVE-2024-9812.json) (`2024-10-10T21:15:05.677`) +- [CVE-2024-9813](CVE-2024/CVE-2024-98xx/CVE-2024-9813.json) (`2024-10-10T21:15:05.963`) ### CVEs modified in the last Commit -Recently modified CVEs: `24` - -- [CVE-2017-1000487](CVE-2017/CVE-2017-10004xx/CVE-2017-1000487.json) (`2024-10-10T19:55:20.253`) -- [CVE-2022-22969](CVE-2022/CVE-2022-229xx/CVE-2022-22969.json) (`2024-10-10T19:13:58.310`) -- [CVE-2024-20091](CVE-2024/CVE-2024-200xx/CVE-2024-20091.json) (`2024-10-10T18:06:38.370`) -- [CVE-2024-20093](CVE-2024/CVE-2024-200xx/CVE-2024-20093.json) (`2024-10-10T18:06:57.333`) -- [CVE-2024-20095](CVE-2024/CVE-2024-200xx/CVE-2024-20095.json) (`2024-10-10T18:07:22.267`) -- [CVE-2024-20096](CVE-2024/CVE-2024-200xx/CVE-2024-20096.json) (`2024-10-10T18:07:38.557`) -- [CVE-2024-20097](CVE-2024/CVE-2024-200xx/CVE-2024-20097.json) (`2024-10-10T18:07:52.507`) -- [CVE-2024-20102](CVE-2024/CVE-2024-201xx/CVE-2024-20102.json) (`2024-10-10T18:20:31.820`) -- [CVE-2024-30118](CVE-2024/CVE-2024-301xx/CVE-2024-30118.json) (`2024-10-10T18:50:54.383`) -- [CVE-2024-44954](CVE-2024/CVE-2024-449xx/CVE-2024-44954.json) (`2024-10-10T18:02:42.307`) -- [CVE-2024-46300](CVE-2024/CVE-2024-463xx/CVE-2024-46300.json) (`2024-10-10T18:52:42.790`) -- [CVE-2024-47410](CVE-2024/CVE-2024-474xx/CVE-2024-47410.json) (`2024-10-10T18:26:44.857`) -- [CVE-2024-47411](CVE-2024/CVE-2024-474xx/CVE-2024-47411.json) (`2024-10-10T18:26:54.153`) -- [CVE-2024-47412](CVE-2024/CVE-2024-474xx/CVE-2024-47412.json) (`2024-10-10T18:27:02.867`) -- [CVE-2024-47413](CVE-2024/CVE-2024-474xx/CVE-2024-47413.json) (`2024-10-10T18:27:08.210`) -- [CVE-2024-47414](CVE-2024/CVE-2024-474xx/CVE-2024-47414.json) (`2024-10-10T18:27:17.123`) -- [CVE-2024-47415](CVE-2024/CVE-2024-474xx/CVE-2024-47415.json) (`2024-10-10T18:27:30.467`) -- [CVE-2024-47416](CVE-2024/CVE-2024-474xx/CVE-2024-47416.json) (`2024-10-10T18:27:39.187`) -- [CVE-2024-47417](CVE-2024/CVE-2024-474xx/CVE-2024-47417.json) (`2024-10-10T18:27:46.470`) -- [CVE-2024-47418](CVE-2024/CVE-2024-474xx/CVE-2024-47418.json) (`2024-10-10T18:28:04.387`) -- [CVE-2024-47419](CVE-2024/CVE-2024-474xx/CVE-2024-47419.json) (`2024-10-10T18:28:19.330`) -- [CVE-2024-47420](CVE-2024/CVE-2024-474xx/CVE-2024-47420.json) (`2024-10-10T18:28:26.860`) -- [CVE-2024-7801](CVE-2024/CVE-2024-78xx/CVE-2024-7801.json) (`2024-10-10T18:48:37.270`) -- [CVE-2024-9054](CVE-2024/CVE-2024-90xx/CVE-2024-9054.json) (`2024-10-10T18:46:08.743`) +Recently modified CVEs: `48` + +- [CVE-2023-5136](CVE-2023/CVE-2023-51xx/CVE-2023-5136.json) (`2024-10-10T21:15:04.303`) +- [CVE-2024-23609](CVE-2024/CVE-2024-236xx/CVE-2024-23609.json) (`2024-10-10T21:15:04.623`) +- [CVE-2024-23612](CVE-2024/CVE-2024-236xx/CVE-2024-23612.json) (`2024-10-10T21:15:04.753`) +- [CVE-2024-30464](CVE-2024/CVE-2024-304xx/CVE-2024-30464.json) (`2024-10-10T20:24:02.920`) +- [CVE-2024-30465](CVE-2024/CVE-2024-304xx/CVE-2024-30465.json) (`2024-10-10T20:20:21.643`) +- [CVE-2024-42812](CVE-2024/CVE-2024-428xx/CVE-2024-42812.json) (`2024-10-10T20:18:11.100`) +- [CVE-2024-45115](CVE-2024/CVE-2024-451xx/CVE-2024-45115.json) (`2024-10-10T21:51:56.040`) +- [CVE-2024-45116](CVE-2024/CVE-2024-451xx/CVE-2024-45116.json) (`2024-10-10T21:47:27.763`) +- [CVE-2024-45117](CVE-2024/CVE-2024-451xx/CVE-2024-45117.json) (`2024-10-10T21:47:11.257`) +- [CVE-2024-45118](CVE-2024/CVE-2024-451xx/CVE-2024-45118.json) (`2024-10-10T21:47:00.927`) +- [CVE-2024-45119](CVE-2024/CVE-2024-451xx/CVE-2024-45119.json) (`2024-10-10T21:37:39.153`) +- [CVE-2024-45120](CVE-2024/CVE-2024-451xx/CVE-2024-45120.json) (`2024-10-10T21:37:20.763`) +- [CVE-2024-45121](CVE-2024/CVE-2024-451xx/CVE-2024-45121.json) (`2024-10-10T21:37:08.743`) +- [CVE-2024-45122](CVE-2024/CVE-2024-451xx/CVE-2024-45122.json) (`2024-10-10T21:35:53.717`) +- [CVE-2024-45123](CVE-2024/CVE-2024-451xx/CVE-2024-45123.json) (`2024-10-10T21:34:32.123`) +- [CVE-2024-47651](CVE-2024/CVE-2024-476xx/CVE-2024-47651.json) (`2024-10-10T21:01:39.413`) +- [CVE-2024-4890](CVE-2024/CVE-2024-48xx/CVE-2024-4890.json) (`2024-10-10T20:11:44.610`) +- [CVE-2024-8804](CVE-2024/CVE-2024-88xx/CVE-2024-8804.json) (`2024-10-10T20:56:49.403`) +- [CVE-2024-9349](CVE-2024/CVE-2024-93xx/CVE-2024-9349.json) (`2024-10-10T20:25:57.580`) +- [CVE-2024-9368](CVE-2024/CVE-2024-93xx/CVE-2024-9368.json) (`2024-10-10T20:30:51.240`) +- [CVE-2024-9372](CVE-2024/CVE-2024-93xx/CVE-2024-9372.json) (`2024-10-10T20:36:28.020`) +- [CVE-2024-9375](CVE-2024/CVE-2024-93xx/CVE-2024-9375.json) (`2024-10-10T20:44:02.900`) +- [CVE-2024-9384](CVE-2024/CVE-2024-93xx/CVE-2024-9384.json) (`2024-10-10T20:52:33.333`) +- [CVE-2024-9421](CVE-2024/CVE-2024-94xx/CVE-2024-9421.json) (`2024-10-10T20:59:01.600`) +- [CVE-2024-9445](CVE-2024/CVE-2024-94xx/CVE-2024-9445.json) (`2024-10-10T20:58:04.907`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5386abdd2d1..9fa79afbc9c 100644 --- a/_state.csv +++ b/_state.csv @@ -94063,7 +94063,7 @@ CVE-2017-1000483,0,0,2c782e716e646464be3ff1c28e8962cef86475bfaafb3e5b53340fee0d5 CVE-2017-1000484,0,0,dca237d697eeaf1adf4df9dc3fe43bba4871b23225ab8d5ea64d75a83c91b7c7,2018-01-18T22:39:31.510000 CVE-2017-1000485,0,0,9712b765c25719d687e98f07dbc6c374e8514510a8409ec752de40b515fcd95a,2019-10-03T00:03:26.223000 CVE-2017-1000486,0,0,e1b0bf8479f211a6c6c4b3e7c0ee2cac4c56bbddcbe5cf37242188c85895a04f,2018-01-24T14:05:05.860000 -CVE-2017-1000487,0,1,fe2a151eaded6eb7758df45258122f096dcee65ffe680c74a0a383861f8cbd30,2024-10-10T19:55:20.253000 +CVE-2017-1000487,0,0,fe2a151eaded6eb7758df45258122f096dcee65ffe680c74a0a383861f8cbd30,2024-10-10T19:55:20.253000 CVE-2017-1000488,0,0,259d9550f380c60535f60918d3312a959d6ffda0c46bc64ece9306a6bf27a222,2021-01-25T16:51:54.423000 CVE-2017-1000489,0,0,be1903f47143d543c423ca8dcfc5ba1434d844fb3f1a7cb442e985e1df4e4331,2021-01-25T16:51:54.423000 CVE-2017-1000490,0,0,e8418584a1c0602ae01cefc26bb42542d505599f78913768c7bdde7f81f021ec,2021-01-25T16:51:54.423000 @@ -192195,7 +192195,7 @@ CVE-2022-22965,0,0,2f519047b5be7b5c3f740bb5079cac81215716a27fbb5a4a7014ed00bba97 CVE-2022-22966,0,0,cbd6dd93b6a16428418469cc7e7df48ccddd4621e61eb17f42baa53a218153a5,2022-04-22T15:54:21.460000 CVE-2022-22967,0,0,5d3cbaf95f637bfc190cb5e394da4e7c5b2b3716a498c6a0bccb9201ece5f423,2023-12-21T18:44:00.137000 CVE-2022-22968,0,0,76d2d0e04e7a2561ee37c3b7751375bfc36c7f92b02395c774552bc434e32869,2022-10-19T15:15:02.103000 -CVE-2022-22969,0,1,abbb62a9ae0a4ff9429cdf938c758920e7b6f332d1fce63b31d08e57e955cdbc,2024-10-10T19:13:58.310000 +CVE-2022-22969,0,0,abbb62a9ae0a4ff9429cdf938c758920e7b6f332d1fce63b31d08e57e955cdbc,2024-10-10T19:13:58.310000 CVE-2022-2297,0,0,4ef9b306875b455f4c7b78b1739f984226e0ad348ea6f2264c92121001a18d12,2024-09-07T12:56:42.300000 CVE-2022-22970,0,0,d980c314d1c11d3685960089d98db960d9c321630b3b200ca331bc9f8185909b,2022-10-07T13:17:11.233000 CVE-2022-22971,0,0,496751d18943e5335d8ad064b55f3d5280912afd4eb0d251bf18e253a42fb0b5,2022-10-05T16:54:41.663000 @@ -207938,14 +207938,14 @@ CVE-2022-42435,0,0,5b246c6c18fc19038c4864427b9e9c3c306bdcad03a1c27de868d67711e51 CVE-2022-42436,0,0,b997d5c87821579454aecf44a8cc02fb254274033b571b0563305dbc11c78fea,2023-11-07T03:53:18.533000 CVE-2022-42438,0,0,4b58f2c9000c194a398d779258a3939247ce7d1a77b6ec479119f29a20ef7e3f,2023-11-07T03:53:18.610000 CVE-2022-42439,0,0,479c91e805a8b4f14d241d42dea79c91c3c7482fe8da6dc12128a93e22c6ca7e,2023-11-07T03:53:18.810000 -CVE-2022-4244,0,0,41afd586b51263fdb6d4373f17a6e0deadaab82506ddfda4e661cf3a34b1838b,2024-05-03T16:15:08.730000 +CVE-2022-4244,0,1,c23d60e46aaa280e433c32352757899e7e464077a97832d207409abb7d53cc4e,2024-10-10T20:04:34.603000 CVE-2022-42442,0,0,0e9576f158d8154a50a24bc63c42a0fb79bc4d6e0d1b61221507fa5650bab92a,2023-08-08T14:22:24.967000 CVE-2022-42443,0,0,dae5cf3e2ebed8d192355532d6836aeeebef2cbcab2491ddfa1f66e95e920749,2024-02-20T19:50:53.960000 CVE-2022-42444,0,0,72f5ea427357cee3a7056dc3a752323aacc96f5a6151d3389a2c6d09b3b26480,2023-11-07T03:53:19.093000 CVE-2022-42445,0,0,e295339bba1f3487f2025ef56dc96f11beb0a1486e3cdf407bd3b450306dd43a,2023-11-07T03:53:19.370000 CVE-2022-42446,0,0,c60a97003a7f84c5f64fd596f87eab38f4c8f947f640f4977d97bb6854cb1f7d,2023-11-07T03:53:19.593000 CVE-2022-42447,0,0,0c5fa8c1d300f2b622eb4e0bf02de8273e45049e45b90fdf1b77dffdbc17b887,2023-11-07T03:53:19.810000 -CVE-2022-4245,0,0,802495ed7d071e116003e63e82428e57a30d97961f1360d9e6100a2c97eee383,2024-05-03T16:15:08.987000 +CVE-2022-4245,0,1,2f8a836729a2b28af01fd381acbb262fa1c36c272f02aeece53c3f8b33d50d4d,2024-10-10T20:02:34.187000 CVE-2022-42451,0,0,78a6921f84537121f07974459490058285256afbe4a71f2e3fe4d8f2c19d5ff8,2023-10-23T15:02:36.410000 CVE-2022-42452,0,0,b66ad06c8e49a9d8c43cd7b8918f7497d8729a8e0f307d4a7cab0bda4a8dc2bc,2023-11-07T03:53:20.100000 CVE-2022-42453,0,0,8eb505e13c81a58ec1537abc098389b013e90e9754080b524d417f996725afb1,2023-11-07T03:53:20.307000 @@ -216565,7 +216565,7 @@ CVE-2023-22339,0,0,dcf71a642458c5317f40076c67856645a6973b302f8283f4ec4c15a1dd6c2 CVE-2023-2234,0,0,f24858bfcbc0c3f15004081c0f9f7174dc852ca174c94d5399d0e063fd48b540,2023-08-28T15:32:49.990000 CVE-2023-22340,0,0,74e97020a45c9071521c452a62a93be457e2c7acaf90115076848c52917ff646,2023-11-07T04:06:50.923000 CVE-2023-22341,0,0,555dc5ee3ed489849aa3044d26b08dc240341cd1f3968fd462f21d9ef7a3ee89,2023-11-07T04:06:51.017000 -CVE-2023-22342,0,0,7b2dea820105c02712bdefe51519bef9a9b84db98545452d48f59ac6712ce7cb,2024-02-14T15:02:01.453000 +CVE-2023-22342,0,1,a886c397a69edac887424f011cec8b436924a6ece82af17708fccaf23da8ba0e,2024-10-10T21:28:04.290000 CVE-2023-22344,0,0,27632eb3785128950306d8c572b2056533d3f8f6a8d901fa895563b5fc395a7d,2023-03-13T17:54:43.867000 CVE-2023-22345,0,0,4888cb3955d300978246cd3812e3711ef5f0f46282dec6661b35f067bbe75b56,2023-02-27T14:57:47.960000 CVE-2023-22346,0,0,9120ce9af60b9406c088db3a6bfaf81f5f0456e98b118510f132581c86ebc2e2,2023-02-27T15:05:48.123000 @@ -216614,7 +216614,7 @@ CVE-2023-22387,0,0,7bd49b9c29b21308d84519d3dc1e7306591bef2af129eb58c26f6d3f7aaa6 CVE-2023-22388,0,0,e37ce7b888eabe18248987344f451a5e23489799647a80125f7ab0ae62c97bfe,2024-04-12T17:16:54.123000 CVE-2023-22389,0,0,f691e050bc1738239a086ff765d8375f9b4302b6eb151b78dafb667f7574018c,2023-11-07T04:06:52.610000 CVE-2023-2239,0,0,82d1b60db8acff7eafdd4d4e4b90765cb182848630b39712d794bc2b4f89aeab,2023-04-28T03:47:23.527000 -CVE-2023-22390,0,0,e08f196d1b3a130c82356b97ca7e56e3e79e202846e9b39ac111632e8470d188,2024-02-14T15:02:01.453000 +CVE-2023-22390,0,1,f21d595fca0f27d96c896721b6236041da2d09de79881796089f445e7f44f109,2024-10-10T21:27:55.377000 CVE-2023-22391,0,0,b96c0f7520c820864973b7ce286bb7316049e1efbf58304577d73a77d780f326,2023-01-24T18:44:00.530000 CVE-2023-22392,0,0,c7e5d6867191fdebc8b45f4d5ec9df3345e79b2776810a69d8526999f7673a3e,2024-02-21T20:08:50.277000 CVE-2023-22393,0,0,232101f0fa551fbc54a282c3aa64abd629c879af47f5fdcd9921ac3d6ab1bbc4,2023-01-24T18:46:14.963000 @@ -217016,7 +217016,7 @@ CVE-2023-22844,0,0,9f317de85823ed06761d9a78a45b6ed458126e22af9fd7359df7bf8e54e47 CVE-2023-22845,0,0,14be039ff213a3d18757ba7ac946f3d22dd764d18ce6cd8b47de41211c1c2b55,2023-04-05T13:39:14.847000 CVE-2023-22846,0,0,68ee63a6bcfae95eafaa56475436f7471d2e77a8f5bf094917056c6d391f6fc6,2023-05-02T01:32:29.167000 CVE-2023-22847,0,0,0d574b1acc76a206795e17f0407f1d9fa39bb84090c706c69f670f1706414339,2023-03-14T17:47:44.390000 -CVE-2023-22848,0,0,4e12d7711a808e70dc6ee8886d14bda6531a62459e20e79bd60eeff1e28ee1bc,2024-02-14T15:02:01.453000 +CVE-2023-22848,0,1,ba16e574782f5e66855809cd48899588e88b8ba7d2d4a89178e1e90457662fd6,2024-10-10T21:27:48.390000 CVE-2023-22849,0,0,1ec90b3782c54cf7d25f2fc54dd95845eb57a5fe4b10bf22607705dfdce90254,2023-11-07T04:07:28.167000 CVE-2023-2285,0,0,712d17a882fd0eec6f9635d1caf062c9ccca23c863ce0521fbd5deb46a961221,2023-11-07T04:12:19.670000 CVE-2023-22850,0,0,49262dd40bbc8fa6e4951becd4af6c9b4de61f99ed12ec03c0353d3546d4ef6f,2023-01-25T18:00:22.203000 @@ -218220,7 +218220,7 @@ CVE-2023-24459,0,0,d1d67fec2efd9a996e5576ce94342b072bcb017ade11692e5e156b795c03b CVE-2023-2446,0,0,77d18032db2a2d43ca89e72b2e146e40e8a0da023a9aef63f9cb1c4d6b04ffb6,2023-11-30T05:27:35.683000 CVE-2023-24460,0,0,5ccd25a0d63901a60a327bbeab4e8552530d89c34ffd5e4dea964340b6deb428,2024-05-17T18:36:31.297000 CVE-2023-24461,0,0,62ff32018786cbd664dd775fa7e246988d63a708d58a1d9ccf821bd2c7675d01,2023-05-10T18:29:52.117000 -CVE-2023-24463,0,0,edb325841268c67ee278512aa17caca77be412f27d0989d39447acd1e51f6d02,2024-02-14T15:02:01.453000 +CVE-2023-24463,0,1,b46683916100e46f365d58ccd93c2a4f791ace066fe666d3b7557e3e7b9bbe97,2024-10-10T21:27:39.470000 CVE-2023-24464,0,0,d7153b45d5e2416034e94fb0fe49853263968a99bbc8787aceee4a9dd602fa45,2023-04-18T02:21:48.263000 CVE-2023-24465,0,0,12a9995d739af115b1d8d73fad1cdb92d72ceb9ea3e09374ae0104d16290e87e,2024-09-09T12:21:53.383000 CVE-2023-24468,0,0,25ae46b121e2327b504523595446d1da3211da3edc7536696bf537ff2f660cfb,2024-09-13T18:08:15.267000 @@ -218238,7 +218238,7 @@ CVE-2023-24478,0,0,2854da322060ae3aa5136cdc270dd3e7cfe41b008077c5f73f7fb78201ae3 CVE-2023-24479,0,0,7211e9c69437501b3a8e7b9a9efd614e2106314128fbf7e75fec6228445328c8,2023-10-12T22:25:43.207000 CVE-2023-2448,0,0,698462a131ff71655a9da6cdc5a6c28ccc47ebf9f4d9a3e2f8a3a28a96eadbbf,2023-12-04T17:38:31.713000 CVE-2023-24480,0,0,a28078a70d43f9a1bf0600372a78d5ec55720dca9c0041faad26a292adbf161b,2024-04-22T16:15:12.637000 -CVE-2023-24481,0,0,4df85849bb01b723c7888788cd132cba643079c4e6e7bbca01ca2cad2a43d92c,2024-02-14T15:02:01.453000 +CVE-2023-24481,0,1,0c23556363c833feb2475dd64ff598c3fb9830615d54f6ae182ffd08bf7016d7,2024-10-10T21:27:32.037000 CVE-2023-24482,0,0,6c32cf12341531b0652a27ee9d708ebe2edf4eb372830c6ca7843cd64a3d3d8c,2023-02-22T15:43:48.470000 CVE-2023-24483,0,0,911fe608335ab8f98794e01cca66be320ab453e365d2ecbb8325edaa3c579cfa,2023-02-24T19:44:41.067000 CVE-2023-24484,0,0,dd8de6aa3440219adf79a79684619e217480bb8ef75da13f9a5e8d3139feb157,2023-02-24T19:28:17.107000 @@ -218304,7 +218304,7 @@ CVE-2023-24538,0,0,2538c871415036033c2c54e92711449c2c81b9684c6db978f1f1766c42473 CVE-2023-24539,0,0,e19e54e6bbf68c23781cbc35cb676a356b68a0a5a0b11df604e959f7e4a7b292,2023-11-07T04:08:32.030000 CVE-2023-2454,0,0,0ef6cbf471f90e338775a317f257d53e0b1652f70136b501611043b30e2cb3d4,2023-07-06T19:15:10.143000 CVE-2023-24540,0,0,522cc078ed479232a2461f858ea33ed1045a1bd6437b87778e3cee50478273d1,2023-11-07T04:08:32.233000 -CVE-2023-24542,0,0,fd15140ad29d6a3a1ec051cecdfc9d422bd17892cec59b3fa376182184850819,2024-02-14T15:02:01.453000 +CVE-2023-24542,0,1,c2a515582fa5eac330b8e2b66f04b425d97bb55957a7c7233215a48a112d0994,2024-10-10T21:27:25.523000 CVE-2023-24544,0,0,7d109185a5bad3b163eb8bfc76bdebfeb7f6c52fda3ebb84f0920821e3bc4a49,2023-04-18T19:36:20.460000 CVE-2023-24545,0,0,928a7f77ac9bee5cc5d4efa9b9d91dc7acfcea786728099161748392f777bca5,2023-04-21T15:09:02.267000 CVE-2023-24546,0,0,85ec05e5779d19477aaf79e3e0cf8ae72a395fcef6c09cf3ec5712afb4ef172b,2023-11-07T04:08:32.397000 @@ -218352,7 +218352,7 @@ CVE-2023-24585,0,0,c8ee2e9c8b780def5e641522eaff370fb6421ab70b5edac2142c09adf10ea CVE-2023-24586,0,0,7d505e08609c01397535dd24cd61e101d6d22032087576f537df01938c0a60ee,2023-05-17T16:23:17.587000 CVE-2023-24587,0,0,71f2a7d7639015266e4390781c2f3ce069b5200d3e90f15c01a7c20d915eb4d8,2023-11-28T17:01:41.183000 CVE-2023-24588,0,0,2ef36532565eb3be85b9be1d03ea17dba2ff521388a0b1d5e9f24cd0fb5ff556,2023-11-28T17:00:16.913000 -CVE-2023-24589,0,0,a376da9f3cd67c310dfad68b58b625b9586285a1e90c7097fd8b5a2ee02aee44,2024-02-14T15:02:01.453000 +CVE-2023-24589,0,1,a8570d1496a12370184415bfaaf30a6185d91001fda6cb8951fe6ab851e6a5df,2024-10-10T21:27:18.237000 CVE-2023-2459,0,0,87d0f3af5d9f2f16840cc7c27d343b6c8aa37b4163a5005ca8c8359b9978213f,2023-10-20T20:54:50.567000 CVE-2023-24590,0,0,7d131b3c6d25d723156ac81026080a6db7e78a83c9e0f7a66c7fac1f0c270f4a,2024-01-05T18:33:26.597000 CVE-2023-24591,0,0,79dd70555de28073a9e21ecb9f6a1d70538293fc45723b3df3ea9015ecfcfb09,2024-02-14T15:02:01.453000 @@ -219293,7 +219293,7 @@ CVE-2023-25765,0,0,8b8fe850a03e900a1d8f97ccc307849225ff3db9168a53a9b04c8b3f0742c CVE-2023-25766,0,0,31ba38e58cf3118b6db5f7c61d70f8629b43d743233674a011f16afbdc21f74a,2023-11-03T02:06:20.837000 CVE-2023-25767,0,0,483e68ff22a520b288e94cfaf3a1e25c90ebae527bb530eabc8f0a019be643cd,2023-11-03T02:02:37.800000 CVE-2023-25768,0,0,dc57492108f61f9e7c41acb03012978cbf466261cc9a2ddfea49f357ef0b05e3,2023-11-03T02:04:03.650000 -CVE-2023-25769,0,0,198ca9c61d051c8c694de7cff750ffa8d39aeb715958a8ab2b3e781df2601a65,2024-02-14T15:02:01.453000 +CVE-2023-25769,0,1,b43313a130296829e55468ab6b36272a9a19130abc7c2f7a33a0aeb86098a386,2024-10-10T21:27:08.520000 CVE-2023-25770,0,0,c196f3f59a9ed379f3033392f5332da695ce96226441cec597553d40d2c90803,2024-04-22T16:15:12.870000 CVE-2023-25771,0,0,0a40ade9e4b633e2e25c64b41412f6cf20b10475ee3b92ce849eec7e304b725e,2023-11-07T04:09:10.947000 CVE-2023-25772,0,0,a0a863d580e53f497e70eeff0d4bd28ff51b949ec7490c2b052c7aaa57fffae7,2023-11-07T04:09:11.190000 @@ -219301,8 +219301,8 @@ CVE-2023-25773,0,0,c8a4a4c116ed5d896279b6cb93fadbf0a6a145a41b80291e643b9b92633bb CVE-2023-25774,0,0,50f00eb85c9a6f3939ad3ac3d2f8701f08cab7d7ec6691ef9981e83d63419194,2023-10-18T17:53:08.367000 CVE-2023-25775,0,0,9e0931d7bb83de9c26f9ad076dcda45420d6c5a1e995b56352243c3259380610,2024-01-11T21:15:10.030000 CVE-2023-25776,0,0,a5c9a6507e4e8061236842380ca8385e80281fc571d20401f84423392270b8fa,2023-11-07T04:09:11.693000 -CVE-2023-25777,0,0,70123545913bea401de98bcf4c748193a0b6a86ba2575735f5f67d267b29807a,2024-02-14T15:02:01.453000 -CVE-2023-25779,0,0,c4f45cd80d41b6f3ef7e4877376f1016d5442073b915ccd5c669b5d824d58cfc,2024-02-14T15:02:01.453000 +CVE-2023-25777,0,1,f27b58950c89804e69aa68f336146b6b2e279c13c9d95190f3adaf0fdd13910b,2024-10-10T21:26:52.387000 +CVE-2023-25779,0,1,a45eb3ceaeac210511f31ab57eba3435f1fe39e20c612e5ccb2ede2582be2ff0,2024-10-10T21:26:44.253000 CVE-2023-2578,0,0,25def0f9973e4fd487f0bc4b5b8f93479b0628080fba7ffabca5d3428cfb73a2,2023-11-07T04:12:54.380000 CVE-2023-25780,0,0,125e6cf3293c902b54297f6fca692c8324cb7894208bb988b405b415df34b9cb,2023-06-09T18:10:20.373000 CVE-2023-25781,0,0,8bc7a82840fd6d46c330010cc1b910d5481474ebd1bb4f8ff65031cde3c07833,2023-06-01T02:18:46.477000 @@ -220028,18 +220028,18 @@ CVE-2023-26581,0,0,63b903fc02e85a087dd48bcf223e2d0919627f15fd80dd3fc9edf78472c1d CVE-2023-26582,0,0,12c32dcd82d637dcdedca56ca84b2864fc50eca2ce0d9d634578eaab32f2046b,2023-10-28T03:20:40.767000 CVE-2023-26583,0,0,c619025a8a287d6b9878acaa1d9ce72e24537dc38a39411e99d1856c96ad1c52,2023-10-28T03:20:44.597000 CVE-2023-26584,0,0,ebecbb1954e68aaca87b211a6a732faed82b38f5d9d39a0a0adb0aa435f6f45c,2023-10-28T03:20:48.837000 -CVE-2023-26585,0,0,5f8e63e2aad8df1193fb4334b02248e6e6a632a5a8bee64e6388c604f34d980c,2024-02-14T15:01:55.963000 +CVE-2023-26585,0,1,6a169d64030402114baa96977dc7f44050b20734c207e4738fbb9a1f046a7b26,2024-10-10T21:26:36.277000 CVE-2023-26586,0,0,5975e2524d7ffa4f54f064e0e975bd8974bd474947eba7cbdf2beeae8120f0a2,2024-02-14T15:01:55.963000 CVE-2023-26587,0,0,68f5d814568994653ae044c5e6f08404578310edae7342625238728fb686b87f,2023-11-07T04:09:40.973000 CVE-2023-26588,0,0,8d09e7de4a8174ad99c8db79151914941653e52f8e566e080f9908dd283d2aa8,2023-04-18T19:37:21.610000 CVE-2023-26589,0,0,4644ea6b391eb80feae3f8ad1321a56d547bc438f6de7ff9a9ab5f2c9ac10df8,2023-11-20T20:50:48.007000 CVE-2023-2659,0,0,a7e0e2e45c53a9d48958a2dd6e206b9e8d661b24a9b3927e750cb3cc7d0e6e0c,2024-05-17T02:23:07.997000 CVE-2023-26590,0,0,c5a2875bb9bc780f8046f77a77b5c8dc96bc1db20aa6d1dd1f39bd9eebc993db,2023-11-07T04:09:41.067000 -CVE-2023-26591,0,0,03fd71eee89b5dab1c78945646da2fb4e2e00e3976c91b9dbd72703609ae2b59,2024-02-14T15:01:55.963000 -CVE-2023-26592,0,0,ee96451bf7a9f0cfc0b14aee4a6311f8be0d94457e439673189ef40c7779a4c3,2024-02-14T15:01:55.963000 +CVE-2023-26591,0,1,fc905af4d317a2e2e12c7fdea2fb2a102ea8dd08978c81f6614718a54826ac25,2024-10-10T21:26:20.080000 +CVE-2023-26592,0,1,0d613c2ffd26c9a9c065a7367d606eb418fcc0cd155960bd1e1b647743908463,2024-10-10T21:26:03.067000 CVE-2023-26593,0,0,2fa151bf1bcfb5ec278d23e91e644a672e5591270133bbf61d18ef8d6296261f,2023-04-21T03:47:41.653000 CVE-2023-26595,0,0,e352e29d11788219d973ff84053c285ca23f5de07c08995f0a9e245c6cec861a,2023-05-31T00:18:47.900000 -CVE-2023-26596,0,0,17d9ee5dae6ab890224ed4ab1aa21777307c7a9b5994b4a896d2ed5f0f73e918,2024-02-14T15:01:55.963000 +CVE-2023-26596,0,1,6eb6f212b5509bfa7843dd6eb07f189aa9df454ebe7ba2544bfc7581f0ddd95a,2024-10-10T21:26:27.180000 CVE-2023-26597,0,0,cbc64381955284e295ea616d4d21ff75908dd618cab3eebdc42467109717eee8,2024-04-22T16:15:13.033000 CVE-2023-26599,0,0,7c7b4139779b9b50cb394fc5005279d2487de98e856d279208a6b81c27e1fd3c,2023-04-28T19:14:36.293000 CVE-2023-2660,0,0,723e93e831dbf011a2b25b3234aa39a595b815de2cf1990a716fe549232b16e3,2024-05-17T02:23:08.140000 @@ -220421,14 +220421,14 @@ CVE-2023-27295,0,0,2b35ba9c23ec3dc889df00063b1455884aad22232738faa01bb0bf1854195 CVE-2023-27296,0,0,65e6521a95e84cdf103e2a85baf1c64de8cc6d432144f2229f3d951a61ea39ca,2023-11-07T04:09:53.790000 CVE-2023-27298,0,0,8bddc45578699197351b23ab0fdfb8ded3b03ac7d83cd4217eac4097302905ee,2023-11-07T04:09:53.857000 CVE-2023-2730,0,0,dd1d0188c4d0b52d9edc97402eec83c6293a8bdf8db32c0db8927e99022b2050,2023-05-22T17:20:52.117000 -CVE-2023-27300,0,0,cf5f827ad8b82196e99a2609decb0dede7465dd0f024d43b416249a7dbc9f833,2024-02-14T15:01:55.963000 -CVE-2023-27301,0,0,b67057ba958aeebf3ccc7bc0353d5d1eacd814f61ebf05068982c8cf1d3c445f,2024-02-14T15:01:55.963000 -CVE-2023-27303,0,0,168cd36e059ff293dc6188d347c5ff994faa766bff8c232567101655909066ad,2024-02-14T15:01:55.963000 +CVE-2023-27300,0,1,99f876ece91964344f0eebd6d8c2cb263e6e1b21447c6d7d46fcd9bc2f97ebc6,2024-10-10T21:25:40.267000 +CVE-2023-27301,0,1,a9be9d918b52b944c1c5881c467ec114b3231f638526dbd2f60d5091efde6c26,2024-10-10T21:25:31.953000 +CVE-2023-27303,0,1,a5d4f576b18630c14afd989e450b435f6c526821e5759f7df608333d129a5f28,2024-10-10T21:25:20.277000 CVE-2023-27304,0,0,fd8b19bbed1afa774cac561ceb7864a241903e5d93b08469085fc3feda1a4e4f,2023-05-31T00:15:42.713000 CVE-2023-27305,0,0,337d4755adebe99b5be5fcc6844d64d1eab7368efd2e7050a942b20afe15c767,2024-05-16T21:15:51.200000 CVE-2023-27306,0,0,017cfc1c304d0cf36360c01f49f53391dbd7916ce02ee97aa10d1b8a6e15f5fd,2023-11-30T17:12:52.813000 -CVE-2023-27307,0,0,d44676ff06dcfd40e5340d0a6822ac9bee53e35710955efd8f1a15d52e837508,2024-02-14T15:01:55.963000 -CVE-2023-27308,0,0,61f844473885d2451a1d1331f5f5545b3d565050cbf0e9c8f05ce1064f4b4266,2024-02-14T15:01:55.963000 +CVE-2023-27307,0,1,eded8d9a40e151cde674709fe2495acb7f42844156fe3da062ce7ec403d13c38,2024-10-10T21:25:08.423000 +CVE-2023-27308,0,1,8ce91dc73cb89af30577806d9a1bbb78f466e4429ae2e00816e85c9072abf0f1,2024-10-10T21:24:47.837000 CVE-2023-27309,0,0,8d8b6d37141c5b83e40edb1e5bd629b83b8c8b0959de8aceeb468c117678c397,2023-03-17T17:01:45.057000 CVE-2023-2731,0,0,c4564c57c22bd85647ed5c9520a3f4fc4c16778b1b8e8f63e5b69eb7060ec95e,2023-07-03T16:15:09.727000 CVE-2023-27310,0,0,336d0d04f900b8ce4174cc4c050d6e1dc1f15757af5f506b5d1ceb2a09a8e3c9,2023-03-17T17:05:38.383000 @@ -229498,7 +229498,7 @@ CVE-2023-39015,0,0,25fc598084867b96c0280d9306f465af2d748b9ae6cd27a2361f7fee764a7 CVE-2023-39016,0,0,35309eb607975f9807b0a3d46f45f594c74574b329619228c80e35abf31e9dac,2024-07-30T14:55:53.803000 CVE-2023-39017,0,0,bd324813bcb37b44b5c9b86e7f9af2851a7fb2396edf48b6d794a7c804d10e9b,2024-08-02T18:16:00.607000 CVE-2023-39018,0,0,ea38700ac0106541c2c0e802f28b361ffa64625da709c9a04a7040996e0d9efb,2024-08-02T18:16:00.720000 -CVE-2023-39020,0,0,6cdd81912f390a2f3a64bc1ee1daf573fa48d1318977e6c8237489f0256615ac,2023-08-03T18:01:31.200000 +CVE-2023-39020,0,1,4db3a3ed638f5fcfab6dda6e46bc7370c77d08a7cf3a2d2f632a9af19a5dab0c,2024-10-10T20:22:41.110000 CVE-2023-39021,0,0,1daa275404241d65a134d5888edc30e2578947020a64fb6904413c08cae8f49f,2023-08-03T18:00:28.377000 CVE-2023-39022,0,0,46d034f33003b0a75b30179828a254a5a33fd70313cfcbe8c03c1d56ac2bc01f,2023-08-03T17:59:21.500000 CVE-2023-39023,0,0,ea60fcd815fb6276948389da49e06d579f2efb722975b79f244a61bb0761dd9d,2023-08-03T17:55:41.163000 @@ -236998,7 +236998,7 @@ CVE-2023-49436,0,0,cb2c7d03ae542d20beb71599481e05436316817b1f0a251d7191758cce818 CVE-2023-49437,0,0,b98499f0fc6d72b24cae71d4c0b436b9d90121d8a152e00c72ac90016c12523a,2023-12-09T04:44:23.637000 CVE-2023-49438,0,0,cec353ac8048387053a1e78da72250e5790a2e25d604e9c82347777babef2e98,2024-01-14T02:15:46.610000 CVE-2023-4944,0,0,8e082bf033e059811bf61b7c20b20437f74bade06cd8e13deae185d73f7b5bc7,2023-11-07T04:23:12.343000 -CVE-2023-49441,0,0,ff2667e2bafe8903ab03b083a9bd456631e1c7e005c03b10ea7d4d24a239d21e,2024-06-07T14:56:05.647000 +CVE-2023-49441,0,1,58eba0170dd4985f3285f96fd638762bf0b3a7dc42b9238f4b989aec7f21c7a3,2024-10-10T20:00:44.307000 CVE-2023-49442,0,0,60c44a7653f91852e79c87d5ad7c1bb04768e117ff057c008ea325715b330134,2024-01-10T20:26:06.417000 CVE-2023-49443,0,0,1ff94a19f669074045a4a6976326e62e4f816926a6471dbb8b1ef66b72d524d8,2023-12-11T19:12:46.117000 CVE-2023-49444,0,0,86d0aff6c754bc433a1f4a035cb97e7fca539c8a303486d7b37dcbcc4bf55682,2023-12-11T19:11:35.700000 @@ -238097,7 +238097,7 @@ CVE-2023-51350,0,0,4fe74226c6650427bea058f5dcb3e9e14dec7050b3bfa501bbdef4580b9b0 CVE-2023-51354,0,0,8a82dd65edf20609d8562e1873a2e9f73efc4655891eb6f414050aedd03313b1,2024-01-05T16:21:13.340000 CVE-2023-51356,0,0,23823337bc925443b717b8041fff9767a4ae92659ce744669517b57c4703d451,2024-05-17T18:36:05.263000 CVE-2023-51358,0,0,a682898023b1e1a2c1d59aaa6c1097e476f318de4e515eea5a5b8fa8fdabf27b,2024-01-05T16:20:52.507000 -CVE-2023-5136,0,0,10f48550b865a63c254e8ca27e09645409e7c7e9095797912266610f04f4fd2b,2023-11-15T18:42:41.643000 +CVE-2023-5136,0,1,d402cdd3608e4311d795127fe97e752624571816c34ee0e3afa13781c37b037d,2024-10-10T21:15:04.303000 CVE-2023-51361,0,0,ba54ccebbed10dc03d1df5016391e1e4912facf1264383768104a7e94a69841e,2024-01-05T04:52:30.367000 CVE-2023-51363,0,0,c603f2d1ac67a022ac5d7a06ed6265eb7080a88729cf3e6dc9c173f519db3812,2024-02-20T18:52:19.997000 CVE-2023-51364,0,0,66f24a5548b6e0407e1db99b943e553d1f8b2fb0236c73b021ff05abfe96f73b,2024-04-26T15:32:22.523000 @@ -243174,19 +243174,19 @@ CVE-2024-20088,0,0,32cc03fb498193be949fe1ffa83586a9683f15b97311ca3d66ce33be6ac94 CVE-2024-20089,0,0,f13b8ab21b15dc030dc24d817cc35e46777b9ef3b81f1ca22a499430278aeff9,2024-09-05T14:28:02.713000 CVE-2024-2009,0,0,e315bb187496fdfbd237809339603453c22bbf947712d2f37b8c2f26c500e401,2024-05-17T02:37:59.337000 CVE-2024-20090,0,0,1cc27d2d83ce003b6470b40682a3b5da8b80eb4fa000f5267f5143b72241b340,2024-10-07T19:36:41.627000 -CVE-2024-20091,0,1,95c1cc97fac75de79c119111dadc5f8d3a906b145632a8e99c237ca3d2d7644f,2024-10-10T18:06:38.370000 +CVE-2024-20091,0,0,95c1cc97fac75de79c119111dadc5f8d3a906b145632a8e99c237ca3d2d7644f,2024-10-10T18:06:38.370000 CVE-2024-20092,0,0,65830fa876d29f654e9b40a795649bd4c4172565bc9f95b5dcdf288a40258ca8,2024-10-07T19:36:41.920000 -CVE-2024-20093,0,1,c7a8ea33b5c13e2cfd81c4913c1b2b72f026361290108826cf239c320fb41376,2024-10-10T18:06:57.333000 +CVE-2024-20093,0,0,c7a8ea33b5c13e2cfd81c4913c1b2b72f026361290108826cf239c320fb41376,2024-10-10T18:06:57.333000 CVE-2024-20094,0,0,641953c4feffbce745824ec3b9a68aa2647d59084bfd49f0a36c52974ebad7a5,2024-10-07T19:36:42.200000 -CVE-2024-20095,0,1,d6b4f4b5ca0d1c0ca9fa6a164ccd3e736674879d2a4e467b2ce89e3ecdfc36f1,2024-10-10T18:07:22.267000 -CVE-2024-20096,0,1,45d32d93a320f4f6a2e9db75ef5f199b17687f055d814228fc82875df2d4036b,2024-10-10T18:07:38.557000 -CVE-2024-20097,0,1,3c6ef07555d661f8c358576e6e89719e982983707258f6bd5a4a5f4d4bf6603e,2024-10-10T18:07:52.507000 +CVE-2024-20095,0,0,d6b4f4b5ca0d1c0ca9fa6a164ccd3e736674879d2a4e467b2ce89e3ecdfc36f1,2024-10-10T18:07:22.267000 +CVE-2024-20096,0,0,45d32d93a320f4f6a2e9db75ef5f199b17687f055d814228fc82875df2d4036b,2024-10-10T18:07:38.557000 +CVE-2024-20097,0,0,3c6ef07555d661f8c358576e6e89719e982983707258f6bd5a4a5f4d4bf6603e,2024-10-10T18:07:52.507000 CVE-2024-20098,0,0,ebf7f236d13e88b2602c1ec20190e8c7c5c76c45a773e147ba2db1178f899ee9,2024-10-07T19:36:42.660000 CVE-2024-20099,0,0,8778aa965d312369cd80f285a091e79f4ec3ef9269eaa2482f6c232a39c7df59,2024-10-07T19:36:42.860000 CVE-2024-2010,0,0,b3d54c217418fe6eaac723aeeab2da7590ea8caf84d69dd0f5d6f2f7fff7952b,2024-10-02T13:52:09.270000 CVE-2024-20100,0,0,00e7a4eaba0bfed9181372c6367bfb391a030c7a1acbb9963f83a3c62045a172,2024-10-07T19:36:43.050000 CVE-2024-20101,0,0,ced475548a5bfbc53f04a0c2a5712a0c8bc4d7f836b6e8c5ac4a95d33c15bd60,2024-10-07T19:36:43.247000 -CVE-2024-20102,0,1,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000 +CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000 CVE-2024-20103,0,0,ff6d2294295d0dd22c31cf32176b100a255e6abd1ceb31b42b3a8764be05646b,2024-10-07T19:36:43.530000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 @@ -245652,11 +245652,11 @@ CVE-2024-23605,0,0,993b32c134fe8e64779e31a8d8adbe06f4e772dba085157d02460be0663b1 CVE-2024-23606,0,0,c208009da6a506f2cb89bfd3fdf2f90ab6038e888471cbfef093e4e7011305cc,2024-04-02T15:15:53.133000 CVE-2024-23607,0,0,d3e5b2cf0208dbd94423f33f1f1d830e5379284a1b054e1dac0f1142dda2bcdb,2024-02-14T18:04:45.380000 CVE-2024-23608,0,0,50dc0674b07e73ec8c46f1968864ab20402f5761f50f996f4b7f041b1d2be763,2024-03-12T12:40:13.500000 -CVE-2024-23609,0,0,0bf67e4b6dbb90739768525059cec40c70b4186b17b14c233527a43934549100,2024-03-12T12:40:13.500000 +CVE-2024-23609,0,1,3b1abf752b3d423bc6f5438ce61f2cd61b2e2a95458e8a7d8eeff140a78cb160,2024-10-10T21:15:04.623000 CVE-2024-2361,0,0,dcdcbdd2e2dfcbfc5e289c7242a337c223a46cf5b5f53777e6d8d9a1b7d862b7,2024-05-16T13:03:05.353000 CVE-2024-23610,0,0,911507017e2d1adda1f4152b49b667ed899063fa3626c265dcd8fbea70e8b461,2024-03-12T12:40:13.500000 CVE-2024-23611,0,0,9602e165d5f6e778bafbe1412b34e6984b52aae9b91c33ef6488637f8a688ffa,2024-03-12T12:40:13.500000 -CVE-2024-23612,0,0,d2d3036fc52218f8393c17811e132288de7e3ddc860c81ba223dac80b7328a80,2024-03-12T12:40:13.500000 +CVE-2024-23612,0,1,235f707bf347b024f46132ff79e6c28397a7c61dd4cb5fc018efb1c522e5dc32,2024-10-10T21:15:04.753000 CVE-2024-23613,0,0,205b218b4ed34eb16278c267b2edbefc505e012507afece91157be751ea225fa,2024-01-31T19:22:48.627000 CVE-2024-23614,0,0,a09a0a776351f6475779200c70724fec277932c5bd6e08a57ab40fb75ac3e44e,2024-01-31T19:54:08.847000 CVE-2024-23615,0,0,17e991130729493812abb446c7f3aa0d8051e8feca1aa848bb32263383d505cc,2024-01-31T23:46:44.913000 @@ -250331,7 +250331,7 @@ CVE-2024-3011,0,0,c4846fd2702ef9f4bfa13037695154c3570856acd954e92705194ddf548246 CVE-2024-30110,0,0,a07e687d8cc25234136155156054fc7c4d3e910119afb02b600c596b9dc2e496,2024-06-28T10:27:00.920000 CVE-2024-30111,0,0,2d23b069061a9f03f5bbdc50f3bb24e02ba7cc17cb7c96642572c4ddb7c10c61,2024-06-28T10:27:00.920000 CVE-2024-30112,0,0,b1be3742a46d695d3f82f4d182e1b02e2a0a297ddb2b6a4bf1d69911e3eb1b94,2024-06-26T12:44:29.693000 -CVE-2024-30118,0,1,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68377,2024-10-10T18:50:54.383000 +CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68377,2024-10-10T18:50:54.383000 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 @@ -250647,8 +250647,8 @@ CVE-2024-3046,0,0,ce4396e69b4b786c3e2210aa0d6581bc9ae569c532ea967f0d2c2bf94fc2c2 CVE-2024-30460,0,0,a54d600ed6445054e9dab2d0cafc2dcec0517bfb59656b61a5ced816c746fec3,2024-04-01T01:12:59.077000 CVE-2024-30462,0,0,fa4e2b1af314ce2e88871da6eb031da97cbd47c1b73c07089c2d4c9a5abd7cbc,2024-04-01T01:12:59.077000 CVE-2024-30463,0,0,99f9e7e4f688ebeab5fbfb1fb18c574f016eb4a992191f046d8ba02d781779c5,2024-04-01T01:12:59.077000 -CVE-2024-30464,0,0,e050022d6a58a78dfc7a413b7eb88acd80e5ceff42ac16771c97e8eed63baee5,2024-06-10T02:52:08.267000 -CVE-2024-30465,0,0,28111e75619d9756af7f6a19bf609ecff7712d92b6e4f280b4cf6bc72ba7a8c2,2024-06-10T02:52:08.267000 +CVE-2024-30464,0,1,51c3215b149dd8d8f4ee5583809245d75be185a8663332a1359ccf52187b49b3,2024-10-10T20:24:02.920000 +CVE-2024-30465,0,1,8ea95640addbc6959bc5fa5b61712e681faa8fafb6d05c1e8f9d26987e2e742c,2024-10-10T20:20:21.643000 CVE-2024-30466,0,0,1a487d41e703b208486280f81412430be4a5ff438fff64a93f583a78b9d17194,2024-10-08T21:04:44.047000 CVE-2024-30467,0,0,d05648dadb8ea488cbcafc6ce9793af38aa7b19ed7bda4077db928d381418b15,2024-10-08T21:09:50.460000 CVE-2024-30468,0,0,657b19720c7a7f72ce29247c42940126c9b095c85b3af6afa14cec4927288c40,2024-04-01T01:12:59.077000 @@ -259066,7 +259066,7 @@ CVE-2024-42797,0,0,6c0c474eaef042d41b079574b5e1792319b47174bba66d6e575baee191b55 CVE-2024-42798,0,0,68babf70e14ff8990491ab0b6e91e013a701f9cc0e2160ba92b41cfc564ee267,2024-09-20T12:31:20.110000 CVE-2024-4280,0,0,f46c38f13eff52b4d020fb374e18f92e6528a4bade2042627b2165ccf7b62772,2024-05-14T16:11:39.510000 CVE-2024-4281,0,0,cb48c26c252b1c83fb4810210335ce05e1fcbd94e5804419418b4f73b9d5c028,2024-05-08T13:15:00.690000 -CVE-2024-42812,0,0,d754a1b3fa22845b1ec28a5e3b423343f3a09420e9ed62b3cb19e2fa117c33b2,2024-08-20T15:44:20.567000 +CVE-2024-42812,0,1,5004482ab060d12928a1d563b5c5dacbbbdd48ef5a3cb8b0e65730030005a510,2024-10-10T20:18:11.100000 CVE-2024-42813,0,0,ac2ce0206860ac49c7a00dc981456912113a83f39c5bd8ad9fc9aeb5495f6bf9,2024-08-20T15:44:20.567000 CVE-2024-42815,0,0,fa939825da2520b0805320da8ef3bf06e37d61d20e773887864a50a3aa224eef,2024-09-03T21:15:16.197000 CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95dec,2024-08-27T14:35:07.077000 @@ -260184,7 +260184,7 @@ CVE-2024-44950,0,0,5e42ef2a98099750242b4bcce4d058e90a98782e0666750e9b6b801f3fbcf CVE-2024-44951,0,0,d4df6b53659b4bf2ca95c9e72ed9fbab6343da2558ed206d0ca74ab61429319e,2024-10-09T14:27:43.973000 CVE-2024-44952,0,0,6abe9435eb01f0417ea6e45511928e929f498aad7a413484748a480c46e0c4ce,2024-09-06T16:37:38.370000 CVE-2024-44953,0,0,f2ec50e0309c43f7cf9bb2e776118a51e77c29a5f9b8c0285a1645b3f3d10a0b,2024-09-06T16:37:33.650000 -CVE-2024-44954,0,1,917c2285a10b8a4c9f2cbeefe4b18ea2f038a0ed9d2b06168fbf3620c40fe5dd,2024-10-10T18:02:42.307000 +CVE-2024-44954,0,0,917c2285a10b8a4c9f2cbeefe4b18ea2f038a0ed9d2b06168fbf3620c40fe5dd,2024-10-10T18:02:42.307000 CVE-2024-44955,0,0,7ecd6df0a7fc728e9f1b78b619a80458c35c83df938799fdd53ee40a270e647d,2024-10-10T17:57:00.267000 CVE-2024-44956,0,0,6af1a87a6f61cb2e54a20c3401cc5debba4744f6ee0ebb8ac5c756a545a18cee,2024-09-06T16:37:11.777000 CVE-2024-44957,0,0,e09ae721dc946241eec9f81a8aaa6dbc034c414b1c1b70d35ec2e90777c333a8,2024-09-06T16:37:00.077000 @@ -260322,16 +260322,16 @@ CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3 CVE-2024-45111,0,0,9fb0acaa2cfe1365ae260bae686a5d90e02d1dda50ec2516e7d6462b0987e021,2024-09-13T17:20:53.993000 CVE-2024-45112,0,0,fe220e89b9c90418cf9256ec0d1a61e1fb615761854b12c59226a9746bbe3106,2024-09-19T14:56:53.697000 CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186b6b,2024-09-13T16:56:53.673000 -CVE-2024-45115,0,0,9349055a51b4ab2d771e9a41d543a968d112a832663684147ee1928c5e34e47a,2024-10-10T12:51:56.987000 -CVE-2024-45116,0,0,9d95c4eebfa9dc5644cc8b95c8341f03a255fb8d4aabaf8279b2606e0cf3d1ec,2024-10-10T12:51:56.987000 -CVE-2024-45117,0,0,2bdc9c444f08a039d22f9a2291814b16825145c91e5254ef6b130acbfd961960,2024-10-10T12:51:56.987000 -CVE-2024-45118,0,0,aa17980a1fd525820d9f1c78cd6817f722c85c9d1d66483aad1b700f8b59b9c6,2024-10-10T12:51:56.987000 -CVE-2024-45119,0,0,6bd40264aba9fd80a3a07978973e1e91c2cfc7eb5afd5323aa3cfa4145689a56,2024-10-10T12:51:56.987000 +CVE-2024-45115,0,1,c0d15d25834ccb11679279795695c8759dc5ffb68b58ffd67cc86ab12fbd63c9,2024-10-10T21:51:56.040000 +CVE-2024-45116,0,1,2e8417cf57660c41680a54b516a33af6bfa2655d4dea438d8f60db1721185df0,2024-10-10T21:47:27.763000 +CVE-2024-45117,0,1,50d3dab3d642d911df75864a2ffed044ab39b8438579d9a2b5ce56b55f3a5bc7,2024-10-10T21:47:11.257000 +CVE-2024-45118,0,1,f90980a9912fa334efade6e42cedaace6acb3f9bd4c108202dbb504666d50155,2024-10-10T21:47:00.927000 +CVE-2024-45119,0,1,7aa5ebebfc5cff150936b3197a45a460050c652be9abff4e3934364bac4209e6,2024-10-10T21:37:39.153000 CVE-2024-4512,0,0,26a6b6bccaf4c25a8f55831184ccf900ec4db9044766abdc62f8dfefbc7cb546,2024-06-04T19:20:40.540000 -CVE-2024-45120,0,0,9c37a5b804c67a1ba3fa3554cd111678f23bce2e7307dc9d87c97c3b2e468153,2024-10-10T12:51:56.987000 -CVE-2024-45121,0,0,fb30aeba36c80fee0b03bfa773b2c57565f50e4554b142e3ef4c42de44b260c7,2024-10-10T12:51:56.987000 -CVE-2024-45122,0,0,727c57ddcfbdde55122229a562db8dc62ecaba680ac368a91d6ada79bdd146ef,2024-10-10T12:51:56.987000 -CVE-2024-45123,0,0,a6bae3db15d798157c75472af51e1ee67d65d73bb66d7e670282b0b9b535a3d3,2024-10-10T12:51:56.987000 +CVE-2024-45120,0,1,5f0561f7069ac7696eeae13e26e558a6f6aedeb818e919517eb26d4bc1abbd6e,2024-10-10T21:37:20.763000 +CVE-2024-45121,0,1,2cee5e70ae658dedd8711e83034e604c9000553a071e8889c7492bbfbaeaf164,2024-10-10T21:37:08.743000 +CVE-2024-45122,0,1,416d7bdef3f05aa6196af57a7e46b71f393ea5306a521a39da2e865d3196eec6,2024-10-10T21:35:53.717000 +CVE-2024-45123,0,1,ce142fe257e2af522fabc394413dafdbd35cd8a9472574877f35e8bbc986e8ea,2024-10-10T21:34:32.123000 CVE-2024-45124,0,0,bec64ffcf043df0a92fcb7cc0c5b3c82830729882dc6bfcd467c53a8f38619b5,2024-10-10T12:51:56.987000 CVE-2024-45125,0,0,ede6671d15a517794ae07074f4e9d649201a75139dfe0347b3a19346fb3aa93a,2024-10-10T12:51:56.987000 CVE-2024-45127,0,0,e7d9a81ef8156b45b7d402ad5392b77bcc2bfd4622b7748e1ca5c53270a55e1a,2024-10-10T12:51:56.987000 @@ -260836,7 +260836,7 @@ CVE-2024-4629,0,0,54224b2085ffd2ba36897ff032b68642cbe4c57a326e28370b5db8ffd6f494 CVE-2024-46292,0,0,16657deaed202158307b9cd348b1ae5a658eccdd4341dd38e21d8ab9f2e1a265,2024-10-10T12:51:56.987000 CVE-2024-46293,0,0,d737b88fa32ca8e9cfa376b7f9d09c4f34ea852ae62d5e06ad40bbb0d6a658f3,2024-10-04T13:51:25.567000 CVE-2024-4630,0,0,a8734ce37050a74e4818d023dd3913b4f4405761deda282bae815154e00346af,2024-05-14T16:11:39.510000 -CVE-2024-46300,0,1,ac737436c281f2a0090533929879a33c37be3bd6f7970fe4b452f2dd4b8cf935,2024-10-10T18:52:42.790000 +CVE-2024-46300,0,0,ac737436c281f2a0090533929879a33c37be3bd6f7970fe4b452f2dd4b8cf935,2024-10-10T18:52:42.790000 CVE-2024-46304,0,0,b9e25f115f361d29c823a7b9b81ce31b0acdf240794d53b7d2cf265de90467a1,2024-10-10T14:15:05.100000 CVE-2024-46307,0,0,2f96c5e3d4f564d8b625e24ebef4044cea9f555c588f949b1c248bfd9bde51be,2024-10-10T12:51:56.987000 CVE-2024-4631,0,0,d3c7ebdf5d9c31d124bc2c67e858e716a594cef6aa78ec49eddcc538ef63a67e,2024-05-14T15:44:13.487000 @@ -261406,7 +261406,7 @@ CVE-2024-47349,0,0,e6c8290f3997da4ca5815c85f88c430fa697e63af208e1750b560fe37e4f7 CVE-2024-4735,0,0,74f4fbd101bb46efdc880f338cfb70c8fd3a6ef365bd7732d2107c79fb3d78b8,2024-06-04T19:20:48.397000 CVE-2024-47350,0,0,09067a079935a016b58f07623b3d09d0a14ce68a8d0e97bc64a38c36b79a09f5,2024-10-07T17:47:48.410000 CVE-2024-47352,0,0,594028d39b78ff520b0396c6a3ce285d2e384a0ebe8a52208931d1ced0ad3b29,2024-10-07T17:47:48.410000 -CVE-2024-47354,1,1,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000 +CVE-2024-47354,0,0,d139da9360db9ab0b7a0ad752058da69c1005c00d22b020d554561160c2bccbe,2024-10-10T19:15:16.837000 CVE-2024-47355,0,0,cf08585fe7cb6bc0c9335afe55d15aa081a8746842ce9e96d34e20bb3b2de71f,2024-10-07T17:47:48.410000 CVE-2024-47356,0,0,cfe95239cc4248246cd874a2cb2d77c8e851cdbbe7ac1a464fc0eb4a3c757f5f,2024-10-07T17:47:48.410000 CVE-2024-47357,0,0,149fcf46e7f27075eeb3f705ac9a4ebeb96a867a52767d71262e20ba7a053432,2024-10-07T17:47:48.410000 @@ -261448,18 +261448,18 @@ CVE-2024-47393,0,0,58cf853d8f2d02cbccb461c82596ff01f0cdfcc3c36878d036a5e6eb40f01 CVE-2024-47394,0,0,daa2fa23b6202a7be1b9a64f30715f76657ba6704579065bb397454b5369f7e9,2024-10-07T17:47:48.410000 CVE-2024-47395,0,0,90e43e7601880e084e28158fd0f757d2c1e8d3077c69265838f948abdb4cd942,2024-10-07T17:47:48.410000 CVE-2024-47396,0,0,6e476c6cf26f38283e3d61fa442a94302635b62a84c847a353123b5fa4f97bed,2024-10-04T13:51:25.567000 -CVE-2024-47410,0,1,42b59896d371aa29c83e01a1ce08752b8288a889a8db3630a5c6ba7966f3731c,2024-10-10T18:26:44.857000 -CVE-2024-47411,0,1,5875ac529772763bf76adfec6337ced119d16dc7bedac06df0488c853721b19e,2024-10-10T18:26:54.153000 -CVE-2024-47412,0,1,391d79d5da558802eae8e86cf3dd3b740642f9484cd58363cf9ca936b2f15d9d,2024-10-10T18:27:02.867000 -CVE-2024-47413,0,1,efffb7f4f524842c3da4f8e4f47d682ca3f5022b22ee31bdd64350ada5d174d7,2024-10-10T18:27:08.210000 -CVE-2024-47414,0,1,b99ef98ddddc4fe3a2ce97930aec3a4f54c382fcd7fa966d806bfcc3b3a29f17,2024-10-10T18:27:17.123000 -CVE-2024-47415,0,1,242c4905864565326853c5e25cbd1c250260c0bd4a96116024e1f67e79438df0,2024-10-10T18:27:30.467000 -CVE-2024-47416,0,1,0c7f43b25401c6f57308fc4d12ca4043b36b0b76fb92542ee8608f2b89376b6f,2024-10-10T18:27:39.187000 -CVE-2024-47417,0,1,34adb3875f984010ac1ec6bb1f4ecdfba3c04b2381129bff62f8abb8615e1a50,2024-10-10T18:27:46.470000 -CVE-2024-47418,0,1,1d09a601d50b55fb35b7d4fc7e118d1a06dd238f3708db9ef993b303806cc748,2024-10-10T18:28:04.387000 -CVE-2024-47419,0,1,8fd66d9bf61c8353ab141ddd3435e43b693fb94a6a4d1ca08ad07bf05b83025e,2024-10-10T18:28:19.330000 +CVE-2024-47410,0,0,42b59896d371aa29c83e01a1ce08752b8288a889a8db3630a5c6ba7966f3731c,2024-10-10T18:26:44.857000 +CVE-2024-47411,0,0,5875ac529772763bf76adfec6337ced119d16dc7bedac06df0488c853721b19e,2024-10-10T18:26:54.153000 +CVE-2024-47412,0,0,391d79d5da558802eae8e86cf3dd3b740642f9484cd58363cf9ca936b2f15d9d,2024-10-10T18:27:02.867000 +CVE-2024-47413,0,0,efffb7f4f524842c3da4f8e4f47d682ca3f5022b22ee31bdd64350ada5d174d7,2024-10-10T18:27:08.210000 +CVE-2024-47414,0,0,b99ef98ddddc4fe3a2ce97930aec3a4f54c382fcd7fa966d806bfcc3b3a29f17,2024-10-10T18:27:17.123000 +CVE-2024-47415,0,0,242c4905864565326853c5e25cbd1c250260c0bd4a96116024e1f67e79438df0,2024-10-10T18:27:30.467000 +CVE-2024-47416,0,0,0c7f43b25401c6f57308fc4d12ca4043b36b0b76fb92542ee8608f2b89376b6f,2024-10-10T18:27:39.187000 +CVE-2024-47417,0,0,34adb3875f984010ac1ec6bb1f4ecdfba3c04b2381129bff62f8abb8615e1a50,2024-10-10T18:27:46.470000 +CVE-2024-47418,0,0,1d09a601d50b55fb35b7d4fc7e118d1a06dd238f3708db9ef993b303806cc748,2024-10-10T18:28:04.387000 +CVE-2024-47419,0,0,8fd66d9bf61c8353ab141ddd3435e43b693fb94a6a4d1ca08ad07bf05b83025e,2024-10-10T18:28:19.330000 CVE-2024-4742,0,0,b62cb9a09c7db689b4e755ae70bed9b2375aafaa790f8e2b3ab80c930d94850e,2024-07-15T17:10:34.403000 -CVE-2024-47420,0,1,67ad7f7dd5cb664c9d8d7ab9101e8bdaff33af0ff65a5f148b23df17a4f95602,2024-10-10T18:28:26.860000 +CVE-2024-47420,0,0,67ad7f7dd5cb664c9d8d7ab9101e8bdaff33af0ff65a5f148b23df17a4f95602,2024-10-10T18:28:26.860000 CVE-2024-47421,0,0,102f8e332a29bbf3c4d5fb03ab9810391e67a628a1a147f11476861b16d4b605,2024-10-10T12:51:56.987000 CVE-2024-47422,0,0,3952ccb617f0de75e022164e02292c15f6e11ca918ca4295a5ace8ee97dd98ab,2024-10-10T12:51:56.987000 CVE-2024-47423,0,0,f17caf37955ec4ecc572648540e4cfbee61ac432f2927a7322d8623e06a593fd,2024-10-10T12:51:56.987000 @@ -261534,7 +261534,7 @@ CVE-2024-47631,0,0,01fc100dd08a1360f7c125c78507402e09d2b1c2d847226a5af87eb0733a2 CVE-2024-47632,0,0,f0965ad8a98839b57c8efa58e92981fb5169721d554ccd74aa7f6384bc6276d7,2024-10-07T17:47:48.410000 CVE-2024-47633,0,0,83d0f903f83dd379c31137a99d53fc1c554d901d5d9bc74c2d6bef68bc5c82b4,2024-10-07T17:47:48.410000 CVE-2024-47635,0,0,b72deea70e905bb748839730e330b907a08dfe276b949c1628ef45ac3c08976b,2024-10-07T17:47:48.410000 -CVE-2024-47636,1,1,ec69ee24cf2cc4e35a0d87e9bc4dc38df2ef5d9589ff0aa5f365e729ec78649f,2024-10-10T18:15:07.920000 +CVE-2024-47636,0,0,ec69ee24cf2cc4e35a0d87e9bc4dc38df2ef5d9589ff0aa5f365e729ec78649f,2024-10-10T18:15:07.920000 CVE-2024-47638,0,0,b3cbfd223fe1cc94aab3e88ad41656f2b84c9afb1b07b461655fed70a6186be3,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,0dbdca40ed3a65834d3c291ae2785dd80dbc26b9e69a0dc2156d5c47067029d8,2024-10-07T17:47:48.410000 CVE-2024-4764,0,0,d4513c07467374a5b389bb93120fcb2ac353ef34ecf409f85646dd7a83574a17,2024-07-03T02:08:04.193000 @@ -261544,10 +261544,10 @@ CVE-2024-47643,0,0,76324b383f26178af320ff117ac2bc824c9739123bf10b44dfde01cdcda70 CVE-2024-47644,0,0,e673aed60238f9b5abec2b17d0b773fd574cc4aee068cf599e12a758154a364b,2024-10-07T17:47:48.410000 CVE-2024-47646,0,0,10b5a56791d1f80011760e4ddb4fabbf6b562e5ec54c7774cd5b5f1d927a2684,2024-10-07T17:47:48.410000 CVE-2024-47647,0,0,7716a0ae18142ae56901b805b3add32c3ed7fb51591ce35c85552affb5dedd67,2024-10-07T17:47:48.410000 -CVE-2024-47648,1,1,38ca133ebdd26d7310fc58b771105a72f4adf8394bf849f97ad77530c58416a6,2024-10-10T19:15:17.067000 +CVE-2024-47648,0,0,38ca133ebdd26d7310fc58b771105a72f4adf8394bf849f97ad77530c58416a6,2024-10-10T19:15:17.067000 CVE-2024-4765,0,0,2cc9c7bf1e2c28194496aab966e3be262d91c35cfd4edb32adc2df596a464b78,2024-08-29T21:35:11.807000 CVE-2024-47650,0,0,9afef3be3c031099cbe7cbfa5812d4fd5a6f96ce9539e691bb6d557c122e6c41,2024-10-07T17:47:48.410000 -CVE-2024-47651,0,0,a5c70d4582bbdb3780ac3463bdf31076b74c5748ebb37496a5c0ac719743777c,2024-10-04T13:50:43.727000 +CVE-2024-47651,0,1,2a67e121f3a9ddab317c97af10a93f430699735ffe494d2404661e90ec37663c,2024-10-10T21:01:39.413000 CVE-2024-47652,0,0,0106178cdc2d236f6bd6fb41168a986de53675f8839d6b1fc83ef0e66c837bbc,2024-10-04T13:50:43.727000 CVE-2024-47653,0,0,9abed72960a84ca31096d60eaeacc7bd22cfefab657976224976c20e44cb9674,2024-10-04T13:50:43.727000 CVE-2024-47654,0,0,c063b2ef86115a996655e38ded9b00a5dbd609aea4e515001d1d61acc0e2d78e,2024-10-04T13:50:43.727000 @@ -261648,11 +261648,11 @@ CVE-2024-4795,0,0,2bcc48011ff4ecb8dd1cdbe375174bc480d75b3ad4f0c787cda1ca7cd904e2 CVE-2024-47950,0,0,051b7d62708c153f7aefabbe7d8cbca3b760e43438404853bb4e254aa1c32f1d,2024-10-10T12:56:30.817000 CVE-2024-47951,0,0,dd0e5081c613ef6331152cf5f5a93ee02293e5a5a930e15d75080ba702abfea6,2024-10-10T12:56:30.817000 CVE-2024-4796,0,0,964ab3d12855a9ebe6833342f869532f4dbb88319fd169505c04f4586bfbb727,2024-06-04T19:20:49.720000 -CVE-2024-47962,1,1,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000 -CVE-2024-47963,1,1,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000 -CVE-2024-47964,1,1,8708b1223f13c984225d5ff9a93e6643d31a9da9d412e571b444e93d6ab07c8d,2024-10-10T18:15:08.470000 -CVE-2024-47965,1,1,2326a0f43bbda417b7328f4bcf140455310111b0a6b80eb67cbda48f4f017f48,2024-10-10T18:15:08.587000 -CVE-2024-47966,1,1,2e5feecff0fa14f89d0ed8ddc60e7023397935bd4a2b23667d2d59536ef817ba,2024-10-10T18:15:08.710000 +CVE-2024-47962,0,0,1c993031245b9205a9445c920e9186968a00d85e81c957a316576d409863e918,2024-10-10T18:15:08.183000 +CVE-2024-47963,0,0,e68b7121a7e0333c01b2d777a44d55fa8978f9459daf9609f2c28c44e3cd7b30,2024-10-10T18:15:08.330000 +CVE-2024-47964,0,0,8708b1223f13c984225d5ff9a93e6643d31a9da9d412e571b444e93d6ab07c8d,2024-10-10T18:15:08.470000 +CVE-2024-47965,0,0,2326a0f43bbda417b7328f4bcf140455310111b0a6b80eb67cbda48f4f017f48,2024-10-10T18:15:08.587000 +CVE-2024-47966,0,0,2e5feecff0fa14f89d0ed8ddc60e7023397935bd4a2b23667d2d59536ef817ba,2024-10-10T18:15:08.710000 CVE-2024-47967,0,0,a1330cc114fe2e48a56c50da9857d953b86ef030556f660ace8207b5a6ff6caf,2024-10-10T12:57:21.987000 CVE-2024-47968,0,0,4fff8938b14b264b8114ea788e4702165e516bca6198626b64c35403b2d1f728,2024-10-10T12:57:21.987000 CVE-2024-47969,0,0,cca9607f354104b423066ece0dc4ef5cb988716d253447be49d5f3344fccc48a,2024-10-10T12:57:21.987000 @@ -261739,7 +261739,7 @@ CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1 CVE-2024-4887,0,0,cd16cdbf0d661e24b4ec24b0cab770c7eb42c6fb6d3f727954351a4e0884953b,2024-06-07T14:56:05.647000 CVE-2024-4888,0,0,fec1e03b9425eafa3abf9c794b417e5dd9f4ec5c0ccb57ecd621528833d262c0,2024-06-07T14:56:05.647000 CVE-2024-4889,0,0,e1db15d22cd014db7823bf12ffdd16045472c9266c0e44b11059f83de00383eb,2024-06-07T14:56:05.647000 -CVE-2024-4890,0,0,53ca3d470669469343718a89aecd8ceb01b5d306faed13dac96d630215f97f2a,2024-06-07T14:56:05.647000 +CVE-2024-4890,0,1,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000 CVE-2024-48902,0,0,a199409fe89d504d5aac3fbfd93ec8ade919d8618d3b520517113fdc75e03121,2024-10-10T12:51:56.987000 CVE-2024-4891,0,0,f3940d673165429e16eea192398cf8ad711af9d91140d48fc15ea6e438b5c077,2024-05-20T13:00:34.807000 CVE-2024-4892,0,0,86d55410ceaf3ecac0b7906bf27b918d65f0ae499a5475505564f001e752dae0,2024-06-13T18:36:09.013000 @@ -264177,7 +264177,7 @@ CVE-2024-7797,0,0,3430cadba65aedfbf772af49a9e572a3ca306c1e3cba3762823768d5585ee5 CVE-2024-7798,0,0,fb236dc26edd7cd7b8d8ddc705b6042a9a0956f84b8af7a488e63270aae0e9d8,2024-08-19T16:42:32.480000 CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f73,2024-08-19T16:47:37.860000 CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 -CVE-2024-7801,0,1,a8939d42b45f5ccec85b43ab25a1d0d5c294724ddfec239c933d015a4f9ab704,2024-10-10T18:48:37.270000 +CVE-2024-7801,0,0,a8939d42b45f5ccec85b43ab25a1d0d5c294724ddfec239c933d015a4f9ab704,2024-10-10T18:48:37.270000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 @@ -264867,7 +264867,7 @@ CVE-2024-8800,0,0,b88b8f7c810715332a6e73818f131e31a19db28192358d6bd8977fecaf9914 CVE-2024-8801,0,0,b5bc4f982a594acb6aaf56b2e8a82653b32de0b2ae7bfdf440e37c28bdd34de7,2024-09-30T14:23:46.140000 CVE-2024-8802,0,0,8bf5ff4db31e0529cbd08652ac36154d0a1e65a032bdeeb095aa4e8638ac0548,2024-10-08T21:49:10.173000 CVE-2024-8803,0,0,1e0c20c4da3042f287bedde6aa980588230b643699023347d741bb81db132ef8,2024-10-02T17:15:12.677000 -CVE-2024-8804,0,0,c56f7fa4df6b31f31a79ed65a12d28bbcf9e246380d4c5dc4d5fb1070d7ae9b8,2024-10-04T13:50:43.727000 +CVE-2024-8804,0,1,08d968e195b0f36220a0a723a12b9b939996510ce1ddcb52b8152a63b9728d80,2024-10-10T20:56:49.403000 CVE-2024-8850,0,0,60f99c260767f82bf00cc7954ec3e058985003b965020b8d3dac7a45b3ea5f64,2024-09-25T18:49:53.397000 CVE-2024-8853,0,0,b5a3b0675f8f2657c7381537f08c47ae3a3694c18acf1b18976370e35c278f0e,2024-09-25T17:49:25.653000 CVE-2024-8858,0,0,a55a2b45b2b7a3f3c60e0d8077307a88defc4d63f2b498893a25b1463c90c22f,2024-10-02T18:41:29.067000 @@ -264978,7 +264978,7 @@ CVE-2024-9041,0,0,99f9003688843669abe0778fb23af0702d95d6892437f5bbf3a35f1e206f8b CVE-2024-9043,0,0,585c2a6b7b38dff44f8f31bab3e4cca50893ebff20d4d599fedd4ef31bc82eef,2024-09-25T17:54:05.297000 CVE-2024-9048,0,0,f4eeb8fc17937a04134cb85e4ff1d8e798c7887dad672c6adf3a86ffdd0c5d34,2024-09-30T13:00:48.613000 CVE-2024-9049,0,0,43c64cc2e53580aadfacb0d92c10ebf9c72fa78495b0a90bf4d0f0f029260a77,2024-10-04T18:53:10.910000 -CVE-2024-9054,0,1,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000 +CVE-2024-9054,0,0,632533b0b073919c9f25cb14ed4a8d11056b8ec4f59845703ce4b59b194b976c,2024-10-10T18:46:08.743000 CVE-2024-9057,0,0,8f186945e14f31b85c7dab0f889179203746f07361926bd0e395e83df78388b0,2024-10-10T12:51:56.987000 CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000 CVE-2024-9063,0,0,df96d256cb802a721004c9ac9223f80a26c192f9136fb3599130ecff1f9d6c94,2024-09-25T01:15:48.670000 @@ -265046,6 +265046,7 @@ CVE-2024-9172,0,0,061cdfe5504cd57ff23c615d7882c5ec428decc2bc25b474b7bdd44e1c6c93 CVE-2024-9173,0,0,35b89a81311ca677fe554b85f50232d9274c2631e7208ee1d074802a8dbdb506,2024-10-01T14:12:41.293000 CVE-2024-9174,0,0,70fba8b83f62f6c4709cde03a07baa90e2b7205b145527e48fd4fbdcbf5b21e3,2024-10-04T13:50:43.727000 CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68ef,2024-10-03T14:32:46.150000 +CVE-2024-9180,1,1,9779e65e93417b197f46f5c463aa8866d46d5d3340da4da9b2b9c7085aba9dad,2024-10-10T21:15:05.010000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000 CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000 @@ -265123,21 +265124,21 @@ CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f CVE-2024-9341,0,0,6f06f8dbcaa27a536f49e7e7f0e59eeeae4e39f281abffa47a8e4056674c26ad,2024-10-04T13:51:25.567000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 -CVE-2024-9349,0,0,d93ebf21205a68549107b9eb4027ef2497abf7f2b80843c1be13a041c232bc94,2024-10-04T13:50:43.727000 +CVE-2024-9349,0,1,7fb570a958bfb5f024d701411e107c7a9174d92283208cc2689922c41cd2d99b,2024-10-10T20:25:57.580000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9355,0,0,2335659835f921193e44d10d2f6efb8c86e6209b896584e38b7b031dda2058dd,2024-10-04T13:51:25.567000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000 -CVE-2024-9368,0,0,e7a9c605e0cbf9cdb1d319aa8ea22e93a6f5e80855432922ca5e53112d3a4bc4,2024-10-04T13:50:43.727000 -CVE-2024-9372,0,0,10044aa8051896e85376f9c9a7c998e54b899918a5f49add6f2a59ddb1044af6,2024-10-04T13:50:43.727000 -CVE-2024-9375,0,0,a9c3ca594e219c636214fd2ce314e67161e6c9af25ea164279fc4bb791df9806,2024-10-04T13:50:43.727000 +CVE-2024-9368,0,1,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000 +CVE-2024-9372,0,1,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000 +CVE-2024-9375,0,1,232ace92ca49be5c1a33c93abd9a6f17ed5ee21ca74aacf34cd6b513a369ea2a,2024-10-10T20:44:02.900000 CVE-2024-9377,0,0,7e92c94153a671db6e3bc46a35701812779a3ebf2498b474df31292a74a22a6c,2024-10-10T12:51:56.987000 CVE-2024-9378,0,0,ced37e1766b174eaa8afe905f70c6bc3776421764713e21471018e4984150c99,2024-10-07T20:15:08.697000 CVE-2024-9379,0,0,516d40ef4e4e63b36e39f0d7901bfa51f0ecb87ed03e2b9d356905dfde91b2d7,2024-10-10T15:53:20.427000 CVE-2024-9380,0,0,1da17b0a78e38ec2972a0d60b36042927447aa25979eb58f6d07718527ed157b,2024-10-10T15:50:03.240000 CVE-2024-9381,0,0,38dc7b42bfe6f81a683e774fe86ddcbec5bce97b381af2229d40d440156c5086,2024-10-10T12:56:30.817000 -CVE-2024-9384,0,0,4f253b4f2066223670f6dee57b053f19faa6b05364caf5542c3a801535a8dd5a,2024-10-04T13:50:43.727000 +CVE-2024-9384,0,1,a6a408c481cce62ffd2afe76e175a7a94a46c764ed46cc8221ec17248ad3b62d,2024-10-10T20:52:33.333000 CVE-2024-9385,0,0,d5290e9b463ce80e3cb0a2758c2b2174c3a3323b0c1b53b476f1fa2df6ded1c1,2024-10-07T17:48:28.117000 CVE-2024-9391,0,0,7d6eba489d698d80c25274418cf61f043b91561cc903d053b7833bff789db601,2024-10-04T13:51:25.567000 CVE-2024-9392,0,0,beca44e590b21e5502ca4e733f60749ac893cd13053addd71013500d8f613300,2024-10-04T13:51:25.567000 @@ -265158,13 +265159,13 @@ CVE-2024-9410,0,0,90cffd2b402803b1ff7e6401238cb515c8bb4e7ed816fe3e9a33e1d435f926 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 CVE-2024-9417,0,0,3a253693d9f258d17d8c6435732a7f997d65ff8389871880258fe316da3e8053,2024-10-07T17:48:28.117000 -CVE-2024-9421,0,0,9a8bea0e59d0ab668a3cbf6b96506990581414c04a5ce69b672a275a746007d3,2024-10-04T13:50:43.727000 +CVE-2024-9421,0,1,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9429,0,0,39a47d098a68b52cf32f59e1969df9e75a8cf523aa1e072e6df455fffe62a5c0,2024-10-07T20:15:10.567000 CVE-2024-9435,0,0,c0164287b46d3e8531339252132cc16d0c7cce06943117749d5b9ae676e40cd6,2024-10-08T16:22:40.780000 CVE-2024-9440,0,0,843a4b0691140c8544f03abfab0d72b48e96752c7147156cb98041d58d09b93a,2024-10-04T13:50:43.727000 CVE-2024-9441,0,0,1eef796e7a879df6819e9c253093e433508e2bb2fbba7042830a70bc7a4951a7,2024-10-04T13:50:43.727000 -CVE-2024-9445,0,0,0c93ce7f42df628ab9963b0c4991253722d7526551714beaaf6a06be3b0d53b0,2024-10-04T13:50:43.727000 +CVE-2024-9445,0,1,8f3ba5381bff25a0e78ae3572f156125ecb8ba69b50a9e6b24cc0100c7b0aa9b,2024-10-10T20:58:04.907000 CVE-2024-9449,0,0,cfb15c20f0e2d2639784936ce05b9d4995f794dc20e1235b71d532f9a502b8fe,2024-10-10T12:51:56.987000 CVE-2024-9451,0,0,bfba756188c29e076bb119887d9bdf6d3874c705a9d59100000802c164b86caa,2024-10-10T12:51:56.987000 CVE-2024-9455,0,0,ca7310e762dfcd09cbb5f1358b0e3644684d54725bcf9d8ec53a1dfcee667610,2024-10-07T17:48:28.117000 @@ -265257,7 +265258,13 @@ CVE-2024-9798,0,0,3febb0a28d43e578aad44b3750e6bb700172b4872cbf44fcb44e8e31ee8a3f CVE-2024-9799,0,0,6b0daee96efc9c55ed5a6bedc4b2ff5a19553b40d712b021752975c98c07aece,2024-10-10T17:15:16.390000 CVE-2024-9802,0,0,910302f36fb69e8f01391eff3ef481a357455f77408333b222c68051948beb77,2024-10-10T15:35:17.230000 CVE-2024-9803,0,0,9753e92ef86676706bd9b60be2e4fcc44350789fc597aebc41f29a89827c9ac1,2024-10-10T17:15:16.730000 -CVE-2024-9804,1,1,89f8ea72d25f0eddbb8b5a3baea4833631254612ffe4917b0c6293a590d52dbf,2024-10-10T18:15:09.150000 -CVE-2024-9805,1,1,f93447fea5a871d2a236223dab8ba6d5f2748eefc9e1e41bc80a3cf4d5d96eb7,2024-10-10T18:15:09.440000 -CVE-2024-9806,1,1,fab3cf780899402ed265861f091b2b5c5a2f3a65753dc88a57c329dcdda36189,2024-10-10T19:15:17.520000 -CVE-2024-9807,1,1,f5649b59fd8fb32d2f9e11414708f6df3b7dcdb3d251afc4ade1b8999c66290b,2024-10-10T19:15:17.797000 +CVE-2024-9804,0,0,89f8ea72d25f0eddbb8b5a3baea4833631254612ffe4917b0c6293a590d52dbf,2024-10-10T18:15:09.150000 +CVE-2024-9805,0,0,f93447fea5a871d2a236223dab8ba6d5f2748eefc9e1e41bc80a3cf4d5d96eb7,2024-10-10T18:15:09.440000 +CVE-2024-9806,0,0,fab3cf780899402ed265861f091b2b5c5a2f3a65753dc88a57c329dcdda36189,2024-10-10T19:15:17.520000 +CVE-2024-9807,0,0,f5649b59fd8fb32d2f9e11414708f6df3b7dcdb3d251afc4ade1b8999c66290b,2024-10-10T19:15:17.797000 +CVE-2024-9808,1,1,12dce1f961995399bd84c517f37b8358d32cac0a693ba8205a0898e2643861b1,2024-10-10T20:15:05.003000 +CVE-2024-9809,1,1,5c1e904326cf3ec1c4ea5c0c061b9e3f46651617b12daa009afc36cd55471c31,2024-10-10T20:15:05.267000 +CVE-2024-9810,1,1,58892cd2ee4e7f061b9d9551b82639bd6ae9bb920a782066b01e5e2437d14039,2024-10-10T20:15:05.517000 +CVE-2024-9811,1,1,a363d0269356f2f6a435a37502557c3e13060bda99e1d3b9d7908a22e8f81531,2024-10-10T21:15:05.383000 +CVE-2024-9812,1,1,84a0a4c7476dad7f04cad89cc3da18e12422227f99bd80a54401a1c004280abc,2024-10-10T21:15:05.677000 +CVE-2024-9813,1,1,82e9ce42aed58de2b77887b19ce10ffb81e9a4959555fe4a3cc0c0c017de09fe,2024-10-10T21:15:05.963000